CN106446669A - Encryption method and system based on combined keys - Google Patents

Encryption method and system based on combined keys Download PDF

Info

Publication number
CN106446669A
CN106446669A CN201610948076.6A CN201610948076A CN106446669A CN 106446669 A CN106446669 A CN 106446669A CN 201610948076 A CN201610948076 A CN 201610948076A CN 106446669 A CN106446669 A CN 106446669A
Authority
CN
China
Prior art keywords
application
key
key combination
combination value
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610948076.6A
Other languages
Chinese (zh)
Inventor
陈辉
唐亮
邹高向
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201610948076.6A priority Critical patent/CN106446669A/en
Publication of CN106446669A publication Critical patent/CN106446669A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Storage Device Security (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an encryption method and system based on combined keys. The method includes the steps that a key combination value generated after at least two keys are pressed is acquired through detection; whether an application associated with the key combination value needs to be operated or not is judged; if yes, the application is operated. In this way, an owner can operate the application by pressing the combined keys, operation is easy, the encryption method is ingenious, the purpose of protecting privacy can be achieved, non-owners can hardly perceive existence of privacy applications, and therefore the risk that the privacy applications are cracked and other unnecessary troubles are effectively avoided.

Description

A kind of encryption method based on combination button and system
Technical field
The present invention relates to field of information security technology, more particularly to a kind of encryption method based on combination button and system.
Background technology
With the continuous development of information technology, the function of mobile device is more and more diversified, and memory chip capacity is increasingly Greatly, therefore, the data that user deposits in a mobile device is also continuously increased, and being wherein no lack of has privacy data.
Mobile device protection privacy function is only limited to equipment lock and function lock substantially at present.Equipment lock be to the equipment right to use Protection, once enable equipment lock, then in the case of proper password is not input into, it is impossible to using any application of equipment;Work( It is then that some applications in equipment are locked that can lock, when using these applications, it is necessary to be first input into proper password, so as to accomplish The data of the application is protected.
Aforesaid way is disadvantageous in that, after to mobile device plus equipment lock or function lock, is permitting using Before equipment or some applications, system can eject " input password " frame to point out to be input into password, easily evoke the curiosity of non-owner, Or even the desire of decryption, consequently, it is possible to it is unable to effective protection owner privacy and brings other troubles.
Content of the invention
The present invention solves the technical problem of a kind of encryption method based on combination button is provided, can be in non-owner Owner's privacy is protected in the presence of being difficult to discover privacy application.
For solving above-mentioned technical problem, one aspect of the present invention is:Be provided with a kind of based on combination by The encryption method of key, including:Detect to obtain at least two buttons and press produced key combination value;Judge whether with The associated application of key combination value needs operation;If existing, application is operated.
Wherein, judge whether that the application being associated with key combination value needs operation to include:Judge whether with The application that the combination of key value is associated needs to hide, show, start or exit.
Wherein, detection with obtain at least two buttons press produced by key combination value include:Detection is to obtain at least Two virtual keys press produced key combination value.
Wherein, pre-set and store the incidence relation between key combination value and application.
Wherein, detection with obtain at least two buttons press produced by key combination value before, during or after, system The operation information that be related to apply all is not pointed out.
Wherein, if there is no the application being associated with key combination value to need operation, system keeps current state.
For solving above-mentioned technical problem, another technical solution used in the present invention is:There is provided one kind to press based on combination The system of key encryption, including:Detection module, presses produced key combination value for detection to obtain at least two buttons; Judge module, for judge whether the application being associated with key combination value need operation;Operation module, for existing During the application being associated with key combination value, application is operated.
Wherein, operation includes to hide, show, start or exit application.
Wherein, system is further included:Setup module, for pre-setting associating between key combination value and application System;Memory module, for storing the incidence relation.
Wherein, detection with obtain at least two buttons press produced by key combination value before, during or after, system The operation information that be related to apply all is not pointed out.
The invention has the beneficial effects as follows:Produced key combination value is pressed to obtain at least two buttons by detection, And judge whether that the application being associated with key combination value needs operation, when the application that presence is associated with key combination value When, then application being operated, owner can be operated to application by pressing combination button, simple to operate, encryption method Ingenious, the purpose of protection privacy not only can be reached, and non-owner can be made to be difficult to discover the presence of privacy application, so as to effective Evade risk that privacy application the is cracked trouble unnecessary with other.
Description of the drawings
Fig. 1 is schematic flow sheet of the present invention based on one embodiment of encryption method of combination button;
Fig. 2 is functional schematic of the present invention based on one embodiment of encryption method of combination button;
Fig. 3 is the structural representation of one embodiment of system that the present invention is encrypted based on combination button;
Fig. 4 is the structural representation of one embodiment of mobile terminal that the present invention is encrypted based on combination button.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described.
As shown in figure 1, the present invention provides the schematic flow sheet of one embodiment of encryption method based on combination button, including:
S1:Detect to obtain at least two buttons and press produced key combination value.
Specifically, button can be virtual key or physical button, and key combination value is the key value that each button is produced Permutation and combination.For the variation of key combination value is realized, detect that with the key combination value for obtaining can be two or more The arrangement group of the key value that virtual key such as " home&search ", " search&home " and " home&search&back " is produced Close, but be not limited only to this;Can also be two or more physical button as " key in power key & volume ", " key & in volume The permutation and combination of the key value that power key " and " key & power key & volume lower key in volume " are produced, but it is not limited only to this;Can also Two or more virtual keys and physical button as " electricity Yuan Jian &home ", " power key & volume Xia Jian &back " and The permutation and combination of the key value that " key in search&home&back& volume " is produced, but this is not limited only to, practical application can basis Need to determine.
S2:Judge whether that the application being associated with key combination value needs operation.
Specifically, judge whether that the application being associated with the combination of key value needs to hide, show, start or move back Go out.Wherein, the incidence relation between key combination value and application pre-sets and stores.In an application examples, user is by setting Put menu and hiden application setting list is found, the application for needing to hide is chosen, the key combination value being associated with application is set, such as Shown in Fig. 2, functional schematic of the present invention based on one embodiment of encryption method of combination button, in figure application is corresponding to press The incidence relation of key combination value is only to be illustrated, and practical application can determine as needed.In other application example, a key combination Value can also be associated with two or more applications.As shown in Fig. 2 application can be photograph album, wechat, video, mobile phone Bank, Alipay, but it is not limited only to this.
S3:If existing, application is operated.
Specifically, if there is the application being associated with the combination of key value, the application is hidden, shows, starts Or the operation such as exit.
For convenience of describing, illustrate by taking the mobile phone plane plate using android system as an example, but the present invention is not obviously limited The encrypted mobile terminal of system and its type of system, in other embodiments, the mobile terminal of encryption can be computer, TV Machine, or the mobile phone plane plate using systems such as iOS, Firefox OS, but it is not limited only to this.
After user lights screen, TP system (TenProtect, Tengxun's security system) interrupts listening state in a kind of, when When user presses respective combination button, TP system can be by interrupting informing Kernel (operating system nucleus), so as to deposit to IC Device coordinate is read out to reach the purpose of key range, then by Kernel Input subsystem, key value is carried out Report, application layer monitors the key combination for pre-setting preservation in sequencing matching database of the service according to the key value for receiving Value, so as to UI layer (User Interface, user interface refer to the operation interface of user) to being accordingly hidden, showing, The operation such as start or exit.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual Ensure.
By above-described embodiment, detect with obtain at least two buttons press produced by key combination value, and judge be The application that no presence is associated with key combination value needs operation, when there is the application being associated with key combination value, then right Application is operated, and owner can be operated to application by pressing combination button, and simple to operate, encryption method is ingenious, no The purpose of protection privacy can be only reached, and non-owner can be made to be difficult to discover the presence of privacy application, hidden so as to effectively evade The private trouble for applying the risk being cracked unnecessary with other.
As shown in figure 3, the structural representation of one embodiment of system that the present invention is encrypted based on combination button, including:Detection Module 30, judge module 31 and operation module 32.
Detection module 30 is used for detection and presses produced key combination value to obtain at least two buttons.Specifically, press Key can be virtual key or physical button, and key combination value is the permutation and combination of the key value that each button is produced.For realizing pressing The variation of key combination value, detects that with the key combination value for obtaining can be two or more virtual keys such as " home& The permutation and combination of the key value that search ", " search&home " and " home&search&back " are produced, but it is not limited only to this; Can also be two or more physical button as " key in power key & volume ", " key & power key in volume " and " in volume The permutation and combination of the key value that key & power key & volume lower key " is produced, but it is not limited only to this;Can also be two or more Virtual key and physical button such as " electricity Yuan Jian &home ", " power key & volume Xia Jian &back " and " search&home&back& The permutation and combination of the key value that key in volume " is produced, but this is not limited only to, practical application can determine as needed.
Judge module 31 is used for judging whether that the application being associated with key combination value needs operation.Specifically, sentence The disconnected application needs being associated with the combination of key value that whether there is are hidden, show, start or are exited.Wherein, key combination value Incidence relation between application pre-sets and stores.
Therefore, system is further included:Setup module 33 and memory module 34, setup module 33 is used for pre-setting button Incidence relation between combined value and application;Memory module 34 is used for storing the incidence relation.
In an application examples, user finds hiden application setting list by arranging menu, chooses the application for needing to hide, The key combination value being associated with application is set, as shown in Fig. 2 the present invention is based on one embodiment of encryption method of combination button Functional schematic, the incidence relation of the corresponding key combination value of in figure application is only to be illustrated, and practical application can be as needed Determine.In other application example, a key combination value can also be associated with two or more applications.As Fig. 2 institute Show, application can be photograph album, wechat, video, Mobile banking, Alipay, but be not limited only to this.
Operation module 32 is used for, when there is the application being associated with key combination value, operating application, operation bag Include hiding, show, start or exit application.Specifically, if there is the application being associated with the combination of key value, to the application The operation such as it is hidden, shows, starts or exits.
For convenience of describing, illustrate by taking the mobile phone plane plate using android system as an example, but the present invention is not obviously limited The encrypted mobile terminal of system and its type of system, in other embodiments, the mobile terminal of encryption can be computer, TV Machine, or the mobile phone plane plate using systems such as iOS, Firefox OS, but it is not limited only to this.
After user lights screen, TP system (TenProtect, Tengxun's security system) interrupts listening state in a kind of, when When user presses respective combination button, TP system can be by interrupting informing Kernel (operating system nucleus), so as to deposit to IC Device coordinate is read out to reach the purpose of key range, then by Kernel Input subsystem, key value is carried out Report, application layer monitors the key combination for pre-setting preservation in sequencing matching database of the service according to the key value for receiving Value, so as to UI layer (User Interface, user interface refer to the operation interface of user) to being accordingly hidden, showing, The operation such as start or exit.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual Ensure.
As shown in figure 4, the structural representation of one embodiment of mobile terminal that the present invention is encrypted based on combination button, including: Processor 41 and memorizer 42.Memorizer 42 is attached with processor 41 by bus.
Processor 41 controls the operation of mobile terminal, and processor 41 can also be referred to as CPU (Central Processing Unit, CPU).Processor 41 is probably a kind of IC chip, the disposal ability with signal.Processor 41 Can also be general processor, digital signal processor (DSP), special IC (ASIC), ready-made programmable gate array Or other PLDs, discrete gate or transistor logic, discrete hardware components (FPGA).General processor Can be microprocessor or the processor can also be any conventional processor, but be not limited only to this.
Processor 41 is used for:Incidence relation between key combination value and application is set;Detection is pressed with obtaining at least two Key presses produced key combination value;Judge whether that the application being associated with key combination value needs operation;For When there is the application being associated with key combination value, application is operated.
Memorizer 42 is used for storing processor 41 and works necessary instruction and data, storage key combination value and application Between incidence relation, store operational order, operational order can hide, show, start or exit application.
The mobile terminal of the present embodiment is the equipment such as mobile phone, flat board, computer, television set, but is not limited only to this;Application is permissible It is photograph album, wechat, video, Mobile banking, Alipay, but is not limited only to this;For realizing the variation of key combination value, detect with The key combination value of acquisition can be two or more virtual keys as " home&search ", " search&home " and The permutation and combination of the key value that " home&search&back " is produced, but it is not limited only to this;Can also be two or more Physical button such as " key in power key & volume ", " key & power key in volume " and " key & power key & volume lower key in volume " is produced Key value permutation and combination, but be not limited only to this;Can also be two or more virtual keys and physical button such as " electricity The key value that source Jian &home ", " power key & volume Xia Jian &back " and " key in search&home&back& volume " are produced Permutation and combination, but this is not limited only to, practical application can determine as needed;In an application examples, user is looked for by arranging menu List is set to hiden application, the application for needing to hide is chosen, the key combination value being associated with application is set, as shown in Fig. 2 Functional schematic of the present invention based on one embodiment of encryption method of combination button, the corresponding key combination value of in figure application Incidence relation be only and illustrate, practical application can determine as needed.In other application example, a key combination value can also It is associated with two or more applications.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual Ensure.
On this basis, embodiments of the invention are the foregoing is only, the scope of the claims of the present invention is not thereby limited, all Made using description of the invention and accompanying drawing content, but be not limited only to this effect module conversion, such as skill between each embodiment The be combineding with each other of art feature, or other related technical fields are directly or indirectly used in, all include in the special of the present invention in the same manner In sharp protection domain.

Claims (10)

1. a kind of encryption method based on combination button, it is characterised in that include:
Detect to obtain at least two buttons and press produced key combination value;
Judge whether that the application being associated with the key combination value needs operation;
If existing, the operation is carried out to the application.
2. method according to claim 1, it is characterised in that described judge whether related to the key combination value The application of connection needs operation to include:Judge whether that the application needs being associated with the combination of the key value are hiding, show, Start or exit.
3. method according to claim 1, it is characterised in that the detection is to obtain produced by least two buttons press Key combination value include:Detect to obtain at least two virtual keys and press produced key combination value.
4. method according to claim 1, it is characterised in that pre-set and store the key combination value with described should With between incidence relation.
5. the method according to any one of claim 1-4, it is characterised in that the detection is pressed with obtaining at least two buttons Before, during or after key combination value produced by lower, system is not all pointed out to be related to the operation information of the application.
6. method according to claim 1, it is characterised in that if do not exist be associated with the key combination value should With then system keeps current state.
7. a kind of system based on combination button encryption, it is characterised in that include:
Detection module, presses produced key combination value for detection to obtain at least two buttons;
Judge module, for judge whether the application being associated with the key combination value need operation;
Operation module, for when there is the application being associated with the key combination value, carrying out the operation to the application.
8. system according to claim 7, it is characterised in that the operation includes to hide, show, start or exit described Application.
9. method according to claim 7, it is characterised in that further include:
Setup module, for pre-setting the incidence relation between the key combination value and the application;
Memory module, for storing the incidence relation.
10. system according to claim 7, it is characterised in that the detection is produced with obtaining at least two buttons and pressing Before, during or after raw key combination value, system is not all pointed out to be related to the operation information of the application.
CN201610948076.6A 2016-10-26 2016-10-26 Encryption method and system based on combined keys Pending CN106446669A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610948076.6A CN106446669A (en) 2016-10-26 2016-10-26 Encryption method and system based on combined keys

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610948076.6A CN106446669A (en) 2016-10-26 2016-10-26 Encryption method and system based on combined keys

Publications (1)

Publication Number Publication Date
CN106446669A true CN106446669A (en) 2017-02-22

Family

ID=58178801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610948076.6A Pending CN106446669A (en) 2016-10-26 2016-10-26 Encryption method and system based on combined keys

Country Status (1)

Country Link
CN (1) CN106446669A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110837230A (en) * 2019-10-28 2020-02-25 珠海格力电器股份有限公司 Method and device for controlling equipment, computing equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103593187A (en) * 2013-11-12 2014-02-19 浪潮齐鲁软件产业有限公司 Implementation method for awakening App or Activity through combination keys
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN103870007A (en) * 2014-03-10 2014-06-18 广东欧珀移动通信有限公司 Control method and control system for key combination of mobile terminal
CN104063218A (en) * 2012-03-15 2014-09-24 北京奇虎科技有限公司 Management method aiming at processes of multiple applications
CN104951093A (en) * 2014-03-31 2015-09-30 维沃移动通信有限公司 Mobile terminal capable of calling programs or functions by customizing keys and method of mobile terminal
CN105022940A (en) * 2015-06-19 2015-11-04 上海卓易科技股份有限公司 Method and system for identifying combination keys

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063218A (en) * 2012-03-15 2014-09-24 北京奇虎科技有限公司 Management method aiming at processes of multiple applications
CN103593187A (en) * 2013-11-12 2014-02-19 浪潮齐鲁软件产业有限公司 Implementation method for awakening App or Activity through combination keys
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN103870007A (en) * 2014-03-10 2014-06-18 广东欧珀移动通信有限公司 Control method and control system for key combination of mobile terminal
CN104951093A (en) * 2014-03-31 2015-09-30 维沃移动通信有限公司 Mobile terminal capable of calling programs or functions by customizing keys and method of mobile terminal
CN105022940A (en) * 2015-06-19 2015-11-04 上海卓易科技股份有限公司 Method and system for identifying combination keys

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110837230A (en) * 2019-10-28 2020-02-25 珠海格力电器股份有限公司 Method and device for controlling equipment, computing equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103092484B (en) The method of unlock screen, device and terminal
CN105117663A (en) Encrypted object display method and device for application
CN103336924A (en) Starting lock for mobile terminal application program
CN106874727B (en) Double-screen terminal application processing method and device and terminal
CN104239815A (en) Electronic document encryption and decryption method and method based on iris identification
CN101813992A (en) Touch screen and password-inputting method thereof
CN105205374A (en) Application program encrypting method and user terminal
CN105574418A (en) Data encryption method and apparatus
CN105095719B (en) A kind of unlocked by fingerprint method and its system and the electronic equipment with the system
WO2018045767A1 (en) Terminal control method and apparatus, and user terminal
CN103577280A (en) Method and system for duplicating data
CN103034417A (en) Unlocking method for touch screen and terminal equipment
US20150047019A1 (en) Information processing method and electronic device
CN101795450A (en) Method and device for carrying out security protection on mobile phone data
CN104768148A (en) Message encryption method and device
CN111818469B (en) Calling method, calling device, electronic equipment and network equipment
CN104318137A (en) Activating or switching method, device and terminal for operating system and/or application program
CN103595532A (en) Multi-functional composite password key based on USBKEY and OTP technology
CN106446669A (en) Encryption method and system based on combined keys
US20170337788A1 (en) Electronic device and anti-theft method
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
CN205160564U (en) System security starting drive and intelligent terminal
CN105279406B (en) A kind of method and device using Data Access Security
WO2016026333A1 (en) Data protection method, device and storage medium in connection between terminal and pc
WO2017000353A1 (en) Encryption and decryption method, encryption and decryption device and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication