CN106446669A - Encryption method and system based on combined keys - Google Patents
Encryption method and system based on combined keys Download PDFInfo
- Publication number
- CN106446669A CN106446669A CN201610948076.6A CN201610948076A CN106446669A CN 106446669 A CN106446669 A CN 106446669A CN 201610948076 A CN201610948076 A CN 201610948076A CN 106446669 A CN106446669 A CN 106446669A
- Authority
- CN
- China
- Prior art keywords
- application
- key
- key combination
- combination value
- value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
- Storage Device Security (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses an encryption method and system based on combined keys. The method includes the steps that a key combination value generated after at least two keys are pressed is acquired through detection; whether an application associated with the key combination value needs to be operated or not is judged; if yes, the application is operated. In this way, an owner can operate the application by pressing the combined keys, operation is easy, the encryption method is ingenious, the purpose of protecting privacy can be achieved, non-owners can hardly perceive existence of privacy applications, and therefore the risk that the privacy applications are cracked and other unnecessary troubles are effectively avoided.
Description
Technical field
The present invention relates to field of information security technology, more particularly to a kind of encryption method based on combination button and system.
Background technology
With the continuous development of information technology, the function of mobile device is more and more diversified, and memory chip capacity is increasingly
Greatly, therefore, the data that user deposits in a mobile device is also continuously increased, and being wherein no lack of has privacy data.
Mobile device protection privacy function is only limited to equipment lock and function lock substantially at present.Equipment lock be to the equipment right to use
Protection, once enable equipment lock, then in the case of proper password is not input into, it is impossible to using any application of equipment;Work(
It is then that some applications in equipment are locked that can lock, when using these applications, it is necessary to be first input into proper password, so as to accomplish
The data of the application is protected.
Aforesaid way is disadvantageous in that, after to mobile device plus equipment lock or function lock, is permitting using
Before equipment or some applications, system can eject " input password " frame to point out to be input into password, easily evoke the curiosity of non-owner,
Or even the desire of decryption, consequently, it is possible to it is unable to effective protection owner privacy and brings other troubles.
Content of the invention
The present invention solves the technical problem of a kind of encryption method based on combination button is provided, can be in non-owner
Owner's privacy is protected in the presence of being difficult to discover privacy application.
For solving above-mentioned technical problem, one aspect of the present invention is:Be provided with a kind of based on combination by
The encryption method of key, including:Detect to obtain at least two buttons and press produced key combination value;Judge whether with
The associated application of key combination value needs operation;If existing, application is operated.
Wherein, judge whether that the application being associated with key combination value needs operation to include:Judge whether with
The application that the combination of key value is associated needs to hide, show, start or exit.
Wherein, detection with obtain at least two buttons press produced by key combination value include:Detection is to obtain at least
Two virtual keys press produced key combination value.
Wherein, pre-set and store the incidence relation between key combination value and application.
Wherein, detection with obtain at least two buttons press produced by key combination value before, during or after, system
The operation information that be related to apply all is not pointed out.
Wherein, if there is no the application being associated with key combination value to need operation, system keeps current state.
For solving above-mentioned technical problem, another technical solution used in the present invention is:There is provided one kind to press based on combination
The system of key encryption, including:Detection module, presses produced key combination value for detection to obtain at least two buttons;
Judge module, for judge whether the application being associated with key combination value need operation;Operation module, for existing
During the application being associated with key combination value, application is operated.
Wherein, operation includes to hide, show, start or exit application.
Wherein, system is further included:Setup module, for pre-setting associating between key combination value and application
System;Memory module, for storing the incidence relation.
Wherein, detection with obtain at least two buttons press produced by key combination value before, during or after, system
The operation information that be related to apply all is not pointed out.
The invention has the beneficial effects as follows:Produced key combination value is pressed to obtain at least two buttons by detection,
And judge whether that the application being associated with key combination value needs operation, when the application that presence is associated with key combination value
When, then application being operated, owner can be operated to application by pressing combination button, simple to operate, encryption method
Ingenious, the purpose of protection privacy not only can be reached, and non-owner can be made to be difficult to discover the presence of privacy application, so as to effective
Evade risk that privacy application the is cracked trouble unnecessary with other.
Description of the drawings
Fig. 1 is schematic flow sheet of the present invention based on one embodiment of encryption method of combination button;
Fig. 2 is functional schematic of the present invention based on one embodiment of encryption method of combination button;
Fig. 3 is the structural representation of one embodiment of system that the present invention is encrypted based on combination button;
Fig. 4 is the structural representation of one embodiment of mobile terminal that the present invention is encrypted based on combination button.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described.
As shown in figure 1, the present invention provides the schematic flow sheet of one embodiment of encryption method based on combination button, including:
S1:Detect to obtain at least two buttons and press produced key combination value.
Specifically, button can be virtual key or physical button, and key combination value is the key value that each button is produced
Permutation and combination.For the variation of key combination value is realized, detect that with the key combination value for obtaining can be two or more
The arrangement group of the key value that virtual key such as " home&search ", " search&home " and " home&search&back " is produced
Close, but be not limited only to this;Can also be two or more physical button as " key in power key & volume ", " key & in volume
The permutation and combination of the key value that power key " and " key & power key & volume lower key in volume " are produced, but it is not limited only to this;Can also
Two or more virtual keys and physical button as " electricity Yuan Jian &home ", " power key & volume Xia Jian &back " and
The permutation and combination of the key value that " key in search&home&back& volume " is produced, but this is not limited only to, practical application can basis
Need to determine.
S2:Judge whether that the application being associated with key combination value needs operation.
Specifically, judge whether that the application being associated with the combination of key value needs to hide, show, start or move back
Go out.Wherein, the incidence relation between key combination value and application pre-sets and stores.In an application examples, user is by setting
Put menu and hiden application setting list is found, the application for needing to hide is chosen, the key combination value being associated with application is set, such as
Shown in Fig. 2, functional schematic of the present invention based on one embodiment of encryption method of combination button, in figure application is corresponding to press
The incidence relation of key combination value is only to be illustrated, and practical application can determine as needed.In other application example, a key combination
Value can also be associated with two or more applications.As shown in Fig. 2 application can be photograph album, wechat, video, mobile phone
Bank, Alipay, but it is not limited only to this.
S3:If existing, application is operated.
Specifically, if there is the application being associated with the combination of key value, the application is hidden, shows, starts
Or the operation such as exit.
For convenience of describing, illustrate by taking the mobile phone plane plate using android system as an example, but the present invention is not obviously limited
The encrypted mobile terminal of system and its type of system, in other embodiments, the mobile terminal of encryption can be computer, TV
Machine, or the mobile phone plane plate using systems such as iOS, Firefox OS, but it is not limited only to this.
After user lights screen, TP system (TenProtect, Tengxun's security system) interrupts listening state in a kind of, when
When user presses respective combination button, TP system can be by interrupting informing Kernel (operating system nucleus), so as to deposit to IC
Device coordinate is read out to reach the purpose of key range, then by Kernel Input subsystem, key value is carried out
Report, application layer monitors the key combination for pre-setting preservation in sequencing matching database of the service according to the key value for receiving
Value, so as to UI layer (User Interface, user interface refer to the operation interface of user) to being accordingly hidden, showing,
The operation such as start or exit.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application
Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two
Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as
The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should
With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual
Ensure.
By above-described embodiment, detect with obtain at least two buttons press produced by key combination value, and judge be
The application that no presence is associated with key combination value needs operation, when there is the application being associated with key combination value, then right
Application is operated, and owner can be operated to application by pressing combination button, and simple to operate, encryption method is ingenious, no
The purpose of protection privacy can be only reached, and non-owner can be made to be difficult to discover the presence of privacy application, hidden so as to effectively evade
The private trouble for applying the risk being cracked unnecessary with other.
As shown in figure 3, the structural representation of one embodiment of system that the present invention is encrypted based on combination button, including:Detection
Module 30, judge module 31 and operation module 32.
Detection module 30 is used for detection and presses produced key combination value to obtain at least two buttons.Specifically, press
Key can be virtual key or physical button, and key combination value is the permutation and combination of the key value that each button is produced.For realizing pressing
The variation of key combination value, detects that with the key combination value for obtaining can be two or more virtual keys such as " home&
The permutation and combination of the key value that search ", " search&home " and " home&search&back " are produced, but it is not limited only to this;
Can also be two or more physical button as " key in power key & volume ", " key & power key in volume " and " in volume
The permutation and combination of the key value that key & power key & volume lower key " is produced, but it is not limited only to this;Can also be two or more
Virtual key and physical button such as " electricity Yuan Jian &home ", " power key & volume Xia Jian &back " and " search&home&back&
The permutation and combination of the key value that key in volume " is produced, but this is not limited only to, practical application can determine as needed.
Judge module 31 is used for judging whether that the application being associated with key combination value needs operation.Specifically, sentence
The disconnected application needs being associated with the combination of key value that whether there is are hidden, show, start or are exited.Wherein, key combination value
Incidence relation between application pre-sets and stores.
Therefore, system is further included:Setup module 33 and memory module 34, setup module 33 is used for pre-setting button
Incidence relation between combined value and application;Memory module 34 is used for storing the incidence relation.
In an application examples, user finds hiden application setting list by arranging menu, chooses the application for needing to hide,
The key combination value being associated with application is set, as shown in Fig. 2 the present invention is based on one embodiment of encryption method of combination button
Functional schematic, the incidence relation of the corresponding key combination value of in figure application is only to be illustrated, and practical application can be as needed
Determine.In other application example, a key combination value can also be associated with two or more applications.As Fig. 2 institute
Show, application can be photograph album, wechat, video, Mobile banking, Alipay, but be not limited only to this.
Operation module 32 is used for, when there is the application being associated with key combination value, operating application, operation bag
Include hiding, show, start or exit application.Specifically, if there is the application being associated with the combination of key value, to the application
The operation such as it is hidden, shows, starts or exits.
For convenience of describing, illustrate by taking the mobile phone plane plate using android system as an example, but the present invention is not obviously limited
The encrypted mobile terminal of system and its type of system, in other embodiments, the mobile terminal of encryption can be computer, TV
Machine, or the mobile phone plane plate using systems such as iOS, Firefox OS, but it is not limited only to this.
After user lights screen, TP system (TenProtect, Tengxun's security system) interrupts listening state in a kind of, when
When user presses respective combination button, TP system can be by interrupting informing Kernel (operating system nucleus), so as to deposit to IC
Device coordinate is read out to reach the purpose of key range, then by Kernel Input subsystem, key value is carried out
Report, application layer monitors the key combination for pre-setting preservation in sequencing matching database of the service according to the key value for receiving
Value, so as to UI layer (User Interface, user interface refer to the operation interface of user) to being accordingly hidden, showing,
The operation such as start or exit.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application
Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two
Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as
The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should
With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual
Ensure.
As shown in figure 4, the structural representation of one embodiment of mobile terminal that the present invention is encrypted based on combination button, including:
Processor 41 and memorizer 42.Memorizer 42 is attached with processor 41 by bus.
Processor 41 controls the operation of mobile terminal, and processor 41 can also be referred to as CPU (Central Processing
Unit, CPU).Processor 41 is probably a kind of IC chip, the disposal ability with signal.Processor 41
Can also be general processor, digital signal processor (DSP), special IC (ASIC), ready-made programmable gate array
Or other PLDs, discrete gate or transistor logic, discrete hardware components (FPGA).General processor
Can be microprocessor or the processor can also be any conventional processor, but be not limited only to this.
Processor 41 is used for:Incidence relation between key combination value and application is set;Detection is pressed with obtaining at least two
Key presses produced key combination value;Judge whether that the application being associated with key combination value needs operation;For
When there is the application being associated with key combination value, application is operated.
Memorizer 42 is used for storing processor 41 and works necessary instruction and data, storage key combination value and application
Between incidence relation, store operational order, operational order can hide, show, start or exit application.
The mobile terminal of the present embodiment is the equipment such as mobile phone, flat board, computer, television set, but is not limited only to this;Application is permissible
It is photograph album, wechat, video, Mobile banking, Alipay, but is not limited only to this;For realizing the variation of key combination value, detect with
The key combination value of acquisition can be two or more virtual keys as " home&search ", " search&home " and
The permutation and combination of the key value that " home&search&back " is produced, but it is not limited only to this;Can also be two or more
Physical button such as " key in power key & volume ", " key & power key in volume " and " key & power key & volume lower key in volume " is produced
Key value permutation and combination, but be not limited only to this;Can also be two or more virtual keys and physical button such as " electricity
The key value that source Jian &home ", " power key & volume Xia Jian &back " and " key in search&home&back& volume " are produced
Permutation and combination, but this is not limited only to, practical application can determine as needed;In an application examples, user is looked for by arranging menu
List is set to hiden application, the application for needing to hide is chosen, the key combination value being associated with application is set, as shown in Fig. 2
Functional schematic of the present invention based on one embodiment of encryption method of combination button, the corresponding key combination value of in figure application
Incidence relation be only and illustrate, practical application can determine as needed.In other application example, a key combination value can also
It is associated with two or more applications.
In an application examples, after user presses combination button, associated application would indicate that and, and exit application
Afterwards, application is hidden again, needs to press again combination button and could show the application again.Wherein, detection is to obtain at least two
Before, during or after individual button presses produced key combination value, system does not all point out the operation information for being related to apply, such as
The information such as " password is correct ", " code error ", " showing/hide XX application ".If do not exist be associated with key combination value should
With operation is needed, then system keeps current state.
In an application examples, function lock can be set to the application that hides, to protect personal secrets further, provide dual
Ensure.
On this basis, embodiments of the invention are the foregoing is only, the scope of the claims of the present invention is not thereby limited, all
Made using description of the invention and accompanying drawing content, but be not limited only to this effect module conversion, such as skill between each embodiment
The be combineding with each other of art feature, or other related technical fields are directly or indirectly used in, all include in the special of the present invention in the same manner
In sharp protection domain.
Claims (10)
1. a kind of encryption method based on combination button, it is characterised in that include:
Detect to obtain at least two buttons and press produced key combination value;
Judge whether that the application being associated with the key combination value needs operation;
If existing, the operation is carried out to the application.
2. method according to claim 1, it is characterised in that described judge whether related to the key combination value
The application of connection needs operation to include:Judge whether that the application needs being associated with the combination of the key value are hiding, show,
Start or exit.
3. method according to claim 1, it is characterised in that the detection is to obtain produced by least two buttons press
Key combination value include:Detect to obtain at least two virtual keys and press produced key combination value.
4. method according to claim 1, it is characterised in that pre-set and store the key combination value with described should
With between incidence relation.
5. the method according to any one of claim 1-4, it is characterised in that the detection is pressed with obtaining at least two buttons
Before, during or after key combination value produced by lower, system is not all pointed out to be related to the operation information of the application.
6. method according to claim 1, it is characterised in that if do not exist be associated with the key combination value should
With then system keeps current state.
7. a kind of system based on combination button encryption, it is characterised in that include:
Detection module, presses produced key combination value for detection to obtain at least two buttons;
Judge module, for judge whether the application being associated with the key combination value need operation;
Operation module, for when there is the application being associated with the key combination value, carrying out the operation to the application.
8. system according to claim 7, it is characterised in that the operation includes to hide, show, start or exit described
Application.
9. method according to claim 7, it is characterised in that further include:
Setup module, for pre-setting the incidence relation between the key combination value and the application;
Memory module, for storing the incidence relation.
10. system according to claim 7, it is characterised in that the detection is produced with obtaining at least two buttons and pressing
Before, during or after raw key combination value, system is not all pointed out to be related to the operation information of the application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948076.6A CN106446669A (en) | 2016-10-26 | 2016-10-26 | Encryption method and system based on combined keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610948076.6A CN106446669A (en) | 2016-10-26 | 2016-10-26 | Encryption method and system based on combined keys |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106446669A true CN106446669A (en) | 2017-02-22 |
Family
ID=58178801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610948076.6A Pending CN106446669A (en) | 2016-10-26 | 2016-10-26 | Encryption method and system based on combined keys |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106446669A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110837230A (en) * | 2019-10-28 | 2020-02-25 | 珠海格力电器股份有限公司 | Method and device for controlling equipment, computing equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103593187A (en) * | 2013-11-12 | 2014-02-19 | 浪潮齐鲁软件产业有限公司 | Implementation method for awakening App or Activity through combination keys |
CN103793657A (en) * | 2014-02-18 | 2014-05-14 | 北京网秦天下科技有限公司 | System and method used for hiding application on mobile terminal |
CN103870007A (en) * | 2014-03-10 | 2014-06-18 | 广东欧珀移动通信有限公司 | Control method and control system for key combination of mobile terminal |
CN104063218A (en) * | 2012-03-15 | 2014-09-24 | 北京奇虎科技有限公司 | Management method aiming at processes of multiple applications |
CN104951093A (en) * | 2014-03-31 | 2015-09-30 | 维沃移动通信有限公司 | Mobile terminal capable of calling programs or functions by customizing keys and method of mobile terminal |
CN105022940A (en) * | 2015-06-19 | 2015-11-04 | 上海卓易科技股份有限公司 | Method and system for identifying combination keys |
-
2016
- 2016-10-26 CN CN201610948076.6A patent/CN106446669A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104063218A (en) * | 2012-03-15 | 2014-09-24 | 北京奇虎科技有限公司 | Management method aiming at processes of multiple applications |
CN103593187A (en) * | 2013-11-12 | 2014-02-19 | 浪潮齐鲁软件产业有限公司 | Implementation method for awakening App or Activity through combination keys |
CN103793657A (en) * | 2014-02-18 | 2014-05-14 | 北京网秦天下科技有限公司 | System and method used for hiding application on mobile terminal |
CN103870007A (en) * | 2014-03-10 | 2014-06-18 | 广东欧珀移动通信有限公司 | Control method and control system for key combination of mobile terminal |
CN104951093A (en) * | 2014-03-31 | 2015-09-30 | 维沃移动通信有限公司 | Mobile terminal capable of calling programs or functions by customizing keys and method of mobile terminal |
CN105022940A (en) * | 2015-06-19 | 2015-11-04 | 上海卓易科技股份有限公司 | Method and system for identifying combination keys |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110837230A (en) * | 2019-10-28 | 2020-02-25 | 珠海格力电器股份有限公司 | Method and device for controlling equipment, computing equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103092484B (en) | The method of unlock screen, device and terminal | |
CN105117663A (en) | Encrypted object display method and device for application | |
CN103336924A (en) | Starting lock for mobile terminal application program | |
CN106874727B (en) | Double-screen terminal application processing method and device and terminal | |
CN104239815A (en) | Electronic document encryption and decryption method and method based on iris identification | |
CN101813992A (en) | Touch screen and password-inputting method thereof | |
CN105205374A (en) | Application program encrypting method and user terminal | |
CN105574418A (en) | Data encryption method and apparatus | |
CN105095719B (en) | A kind of unlocked by fingerprint method and its system and the electronic equipment with the system | |
WO2018045767A1 (en) | Terminal control method and apparatus, and user terminal | |
CN103577280A (en) | Method and system for duplicating data | |
CN103034417A (en) | Unlocking method for touch screen and terminal equipment | |
US20150047019A1 (en) | Information processing method and electronic device | |
CN101795450A (en) | Method and device for carrying out security protection on mobile phone data | |
CN104768148A (en) | Message encryption method and device | |
CN111818469B (en) | Calling method, calling device, electronic equipment and network equipment | |
CN104318137A (en) | Activating or switching method, device and terminal for operating system and/or application program | |
CN103595532A (en) | Multi-functional composite password key based on USBKEY and OTP technology | |
CN106446669A (en) | Encryption method and system based on combined keys | |
US20170337788A1 (en) | Electronic device and anti-theft method | |
CN104239809A (en) | File protecting method, file protecting device, file decryption method, file decryption device and terminal | |
CN205160564U (en) | System security starting drive and intelligent terminal | |
CN105279406B (en) | A kind of method and device using Data Access Security | |
WO2016026333A1 (en) | Data protection method, device and storage medium in connection between terminal and pc | |
WO2017000353A1 (en) | Encryption and decryption method, encryption and decryption device and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170222 |
|
RJ01 | Rejection of invention patent application after publication |