CN109376545A - Method for secret protection and device - Google Patents
Method for secret protection and device Download PDFInfo
- Publication number
- CN109376545A CN109376545A CN201811088944.3A CN201811088944A CN109376545A CN 109376545 A CN109376545 A CN 109376545A CN 201811088944 A CN201811088944 A CN 201811088944A CN 109376545 A CN109376545 A CN 109376545A
- Authority
- CN
- China
- Prior art keywords
- application
- user
- specific
- privacy
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the present application provides a kind of method for secret protection and device, and wherein method includes: the application attribute of the application program in the user behavior and mobile terminal according to acquisition, screens application-specific in the mobile terminal;The application-specific is for saving privacy of user data;The application-specific is hidden in the display interface of the mobile terminal;Receive the input operation that user executes in the display interface;If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user data.Through this embodiment, the safety of privacy of user data can be improved.
Description
Technical field
This application involves technical field of mobile terminals more particularly to a kind of method for secret protection and device.
Background technique
The mobile terminals such as mobile phone have become essential appliance and electronic in people's life.User is using mobile terminal
During, several private datas can be saved in the terminal, and private data can be picture, video, bill etc..It is based on
This, once mobile terminal, by the user's operation other than owner, the private data of owner just faces the risk of leakage, this is by serious shadow
Ring the safety of private data.
Therefore, it is necessary to a kind of secret protection scheme be provided, to improve the safety of private data.
Summary of the invention
The purpose of the embodiment of the present application is to provide a kind of method for secret protection and device, to improve the safety of private data
Property.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, the embodiment of the present application provides a kind of method for secret protection, comprising:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal
Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user
Data.
Second aspect, the embodiment of the present application provide a kind of privacy protection device, comprising:
Program determining module, for the application attribute of the application program in the user behavior and mobile terminal according to acquisition,
Application-specific is screened in the mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module is inputted, the input operation executed in the display interface for receiving user;
Program starting module starts the specific application journey if meeting predetermined registration operation rule for input operation
Sequence, to show privacy of user data.
The third aspect, the embodiment of the present application provide a kind of secret protection equipment, comprising: memory, processor and storage
On the memory and the computer executable instructions that can run on the processor, the computer executable instructions quilt
The step of method for secret protection as described in above-mentioned first aspect is realized when the processor executes.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage
Medium realizes such as above-mentioned first for storing computer executable instructions when the computer executable instructions are executed by processor
The step of method for secret protection described in aspect.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal
Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated
Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear
It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's
The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal
The safety of private data.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property
Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram for the method for secret protection that one embodiment of the application provides;
Fig. 2 is the schematic diagram of a scenario for the method for secret protection that one embodiment of the application provides;
Fig. 3 is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 4 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 4 b is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 5 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 5 b is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 6 is the structural schematic diagram for the privacy protection device that one embodiment of the application provides;
Fig. 7 is the structural schematic diagram for the secret protection equipment that one embodiment of the application provides.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
The application protection all should belong in technical staff's every other embodiment obtained without creative efforts
Range.
The embodiment of the present application provides a kind of method for secret protection and device, to improve the safety of private data.This reality
Applying the method for secret protection in example can apply in mobile terminal side, by mobile terminal execution, the mobile terminal can be mobile phone,
The intelligent terminals such as tablet computer, vehicle-mounted computer, wearable device.
Fig. 1 is the flow diagram for the method for secret protection that one embodiment of the application provides, as shown in Figure 1, the process packet
It includes:
Step S102, according to the application attribute of the application program in the user behavior and mobile terminal of acquisition, mobile whole
Application-specific is screened in end, application-specific is for saving privacy of user data;
Step S104 hides the application-specific in the display interface of mobile terminal;
Step S106 receives the input operation that user executes in display interface;
Step S108 starts the application-specific, if input operation meets predetermined registration operation rule to show user
Private data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal
Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated
Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear
It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's
The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal
The safety of private data.
In the present embodiment, privacy of user data include but is not limited to the data such as picture, document, video, types of applications program.
In above-mentioned steps S102, according to the application attribute of the application program in the user behavior and mobile terminal of acquisition,
Application-specific is screened in mobile terminal, be may is that and is screened in the terminal according to the user behavior of acquisition for saving
First application program of designated user's data, in the first application program, screening applicating category is the first application of specified classification
Program is as application-specific.
Specifically, the user behavior for acquiring user first, screens in the terminal according to the user behavior of acquisition and is used for
Save the first application program of designated user's data, wherein designated user's data include but is not limited to picture, video, finance letter
At least one of in breath.Then, in the first application program that screening obtains, the application journey that applicating category is specified classification is chosen
Sequence, for example financial class application program is screened, or screening private data guard class application program, the application program that screening is obtained
It is determined as application-specific.
In the present embodiment, application-specific can also be determined using other modes, for example, acquisition for mobile terminal itself is
The application list of installation, search for application title includes the application program of specific character in the list, will be searched
Application program as the application-specific for saving privacy of user data.Wherein, specific character may include " privacy ",
Words such as " safety boxs ".
Alternatively, the mounted the application list of acquisition for mobile terminal itself, search for application classification in the list
For the application program of particular category, using the application program searched as the specific application journey for being used to save privacy of user data
Sequence.Wherein, each application program in the application list has corresponding application category, such as life kind application journey
Sequence, shopping class application program etc., particular category is the corresponding classification of application program for saving privacy of user data.
Alternatively, the mounted the application list of acquisition for mobile terminal itself, determines each application program in the list
Function determines the application-specific for saving privacy of user data according to the function of each application program in the list.
After determining application-specific, application-specific is hidden in the display interface of mobile terminal.Specifically,
The application icon of application-specific can be hidden in the desktop of mobile terminal, for example, the application of setting application-specific
The transparency of icon be 100%, thus achieve the effect that it is hiding so that user watches in the desktop of mobile terminal less than specific
Application program.
In the present embodiment, after hiding application-specific, receive what user executed on the display interface of the mobile terminal
Input operation, and judge whether input operation meets predetermined registration operation rule, if meeting, start application-specific, with aobvious
Show privacy of user data, if not meeting, input operation is not responding to, so as to the case where hiding application-specific
Under, by specific input operation starting application-specific, so that starting is special when preventing other people from using the mobile terminal of owner
The problem of determining application program, the private data of owner is caused to be leaked improves the safety of privacy of user data in mobile terminal.
In a kind of situation, the input operation that user executes on mobile terminals includes gesture operation, in the present embodiment, if should
The corresponding operation figure of gesture operation is assignment graph, and/or, the finger print information of obtained user is determined according to the gesture operation
For legal finger print information, it is determined that input operation meets predetermined registration operation rule.
In a kind of situation, the corresponding operation figure of the gesture operation can be determined, if the operation figure is assignment graph,
Determine that the input operation of user meets predetermined registration operation rule, if the operation figure is not assignment graph, it is determined that the input of user
Operation does not meet predetermined registration operation rule.
For example, user executes gesture operation in the desktop of mobile terminal, the desktop of mobile terminal detects the gesture operation
Whether corresponding operation figure is assignment graph, and assignment graph can be round or zigzag, if assignment graph, then mobile whole
The desktop at end determines that the input operation of user meets predetermined registration operation rule, notifies the os starting specific application of mobile terminal
Program, to show privacy of user data, if not assignment graph, then the desktop of mobile terminal is not responded.It is understood that specified
The quantity of figure can be one or more, be illustrated for multiple here, one situation does not repeat them here.
In the example, assignment graph can be by user setting, for example, mobile terminal after installing application-specific, is shown
Show set interface, prompts user's graphing in set interface, and the figure that user draws is determined as assignment graph, specify
Figure is after hiding application-specific, for starting the figure of application-specific.
In the example, user can be by executing the gesture operation of assignment graph, as in mobile terminal in the terminal
Round or zigzag mode is drawn on desktop, is started application-specific to browse privacy of user data and has been reached obstructed
Cross the effect of application icon starting application-specific.In the mobile terminal of the borrow owner of the user other than owner,
Since the user other than owner does not know which kind of figure is assignment graph be, and browsed again less than application-specific, therefore owner
User in addition is difficult to start application-specific, to effectively increase the safety of privacy of user data.
In another case, the finger print information of user is determined according to the gesture operation, if the finger print information of user is legal
Finger print information, it is determined that the input operation of user meets predetermined registration operation rule.
For example, the finger print information of the preparatory typing user of mobile terminal, executing in the display interface of the mobile terminal of user should
When gesture operation, the finger print information of acquisition for mobile terminal user, if the finger print information and the finger print information phase of preparatory typing that obtain
Unanimously, then mobile terminal determines that the finger print information of user is legal finger print information, it is determined that the input operation of user meets default
Operation rules.
In another situation, input that user executes on mobile terminals operation includes gesture operation, can be in the present embodiment
The finger print information of user is determined according to the gesture operation, and, the corresponding operation figure of the gesture operation is determined, if the finger of user
Line information is legal finger print information, and, determine that obtained operation figure is assignment graph, it is determined that the input operation of user meets
Predetermined registration operation rule, if the finger print information of user is not legal finger print information, alternatively, determining that obtained operation figure is not specified
Figure, it is determined that the input operation of user does not meet predetermined registration operation rule.
For example, user executes gesture operation in the desktop of mobile terminal, the desktop of mobile terminal detects the gesture operation
Whether corresponding operation figure is assignment graph, for example detects whether the corresponding operation figure of the gesture operation is round or Z-shaped
Shape, also, mobile terminal obtains the finger print information of user during user executes gesture operation, judges the fingerprint letter of user
Whether breath is legal finger print information, if operation figure is assignment graph, and, the finger print information of user is legal finger print information, then
The desktop of mobile terminal determines that the input operation of user meets predetermined registration operation rule, notifies the os starting of mobile terminal special
Application program is determined, to show privacy of user data, if operation figure is not assignment graph, alternatively, the finger print information of user is not
Legal finger print information, then the desktop of mobile terminal does not respond.It is understood that the quantity of assignment graph can be one or more
It is a, it is illustrated for multiple here, one situation does not repeat them here.
In the example, assignment graph can be by user setting, for example, mobile terminal after installing application-specific, is shown
Show set interface, prompts user's graphing in set interface, and the figure that user draws is determined as assignment graph, specify
Figure is after hiding application-specific, for starting the figure of application-specific.
In one embodiment, a variety of figures can be preset inside mobile terminal, user chooses from a variety of figures
Assignment graph.
In the example, legal finger print information can by user setting, for example, mobile terminal installation application-specific it
Afterwards, it shows finger print information set interface, prompts user to be based on finger print information set interface and input finger print information, and user is inputted
Finger print information be determined as legal finger print information, legal finger print information is after hiding application-specific, for starting spy
Determine the finger print information of application program.
In the example, mobile terminal determines the finger print information of user according to the gesture operation of user, and judges the fingerprint of user
Whether information is legal finger print information, Ke Yiwei, when user executes gesture operation, the finger of the screen capture user of mobile terminal
Line information, and collected finger print information compared with legal finger print information pair, if the two similarity reaches default similarity threshold
Value, it is determined that the finger print information of user is legal finger print information, otherwise, it determines the finger print information of user is not legal fingerprint letter
Breath.Wherein, mobile terminal can be comprehensive screen mobile phone.
Compared with previous embodiment, in the embodiment, only the corresponding user of legal finger print information in the terminal
When drawing assignment graph, it can determine that the input operation of user meets predetermined registration operation rule, and start application-specific.?
When the mobile terminal of the borrow owner of the user other than owner, even if the user other than owner knows which kind of figure is assignment graph be
Shape, if however the finger print information of the user other than owner is not legal finger print information, the user other than owner is difficult to start spy
Application program is determined, to further improve the safety of privacy of user data.
Fig. 2 is the schematic diagram of a scenario for the method for secret protection that one embodiment of the application provides, as shown in Fig. 2, in the movement
In the desktop of terminal, the application-specific for saving privacy of user data has been hidden.Desktop of the user in mobile terminal
White space in or mobile terminal put out screen interface in execute gesture operation, if the corresponding operation figure of gesture operation is specified
Figure (ellipse as shown in Figure 2), then mobile terminal starts application-specific, to show privacy of user data.Alternatively,
If the corresponding operation figure of gesture operation is assignment graph (ellipse as shown in Figure 2), and is determined according to the gesture operation
The finger print information of user is legal finger print information, then mobile terminal starts application-specific, to show privacy of user data, or
Person, if determining that the finger print information of user is legal finger print information according to the gesture operation, mobile terminal starts specific application journey
Sequence, to show privacy of user data.
User input operation can also include voice input operation, such as user pin mobile terminal record button or
Home key sends voice messaging to mobile terminal, then in the present embodiment, can also be inputted and be operated according to the voice, determine that user is defeated
The audio content entered, if the audio content includes specific audio frequency content, it is determined that the input operation of user meets predetermined registration operation rule
Then.
For example, the voice that mobile terminal receives user inputs operation, inputted and operated according to the voice, determines user's input
Whether audio content judge in the audio content comprising specific audio frequency content, for example, judge be in audio content that user inputs
No includes the preset specific audio frequency contents such as " display secret file ", " display private file ", if comprising, it is determined that user's is defeated
Enter operation and meet predetermined registration operation rule, if not including, it is determined that the input operation of user does not meet predetermined registration operation rule.
In the example, general audio content extraction algorithm can use, inputted and operated according to the voice of user, determine user
The audio content of input, and whether judge in the audio content comprising specific audio frequency content.Specific audio frequency content can be by user
Setting prompts in user setting specific audio frequency for example, mobile terminal after installing application-specific, shows set interface
Hold, specific audio frequency content is after hiding application-specific, for starting the audio content of application-specific.
In the example, user can start application-specific by way of input audio in the terminal, with browsing
Privacy of user data have achieved the effect that not start application-specific by application icon.User other than owner
Borrow owner mobile terminal when, since the user other than owner does not know specific audio frequency content, and browsed again less than specific
Application program, therefore the user other than owner is difficult to start application-specific, to effectively increase privacy of user data
Safety.
Fig. 3 is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, as shown in figure 3, in the shifting
In the desktop of dynamic terminal, the application-specific for saving privacy of user data has been hidden.User pins mobile terminal
Home key, executes voice input operation, and the voice that mobile terminal receives user inputs operation, inputted and grasped according to the voice of user
Make, determine the audio content of user's input, if the audio content of user's input includes specific audio frequency content, mobile terminal starting
Application-specific, to show privacy of user data.In Fig. 3, mobile terminal may be at putting out screen state, may be at unlock shape
State.
In view of there are many data type, such as picture, video, document, application program etc., this realities for privacy of user data
It applies in example, starts application-specific, it, can be with to show privacy of user data are as follows: when input operation includes gesture operation, really
Determine the corresponding operation figure of gesture operation, according to the corresponding relationship between preset gesture operation figure and private data type,
It determines target private data type corresponding to the operation figure, starts application-specific, at the interface of application-specific
The corresponding privacy of user data of middle displaying target private data type.
Specifically, the corresponding relationship being preset in mobile terminal between gesture operation figure and private data type, this is right
Should be related to can be as shown in table 1 below.Mobile terminal is after receiving the gesture operation of user, however, it is determined that the gesture operation meets pre-
If operation rules, it is determined that the corresponding operation figure of the gesture operation, and based on gesture operation figure and private data type it
Between corresponding relationship, determine the corresponding target private data type of the operation figure, and start application-specific, answered specific
With the corresponding privacy of user data of displaying target private data type in the interface of program.
Table 1
Gesture operation figure | Private data type |
Ellipse | Picture |
V-shaped | Video |
M font | Document |
In one example, three kinds of gesture operation figures are assignment graph shown by above-mentioned table 1.Mobile terminal, which receives, to be used
The gesture operation at family determines the corresponding operation figure of the gesture operation, if the operation figure is three kinds of hands shown by above-mentioned table 1
Gesture operates any one in figure, it is determined that and the gesture operation of user meets predetermined registration operation rule, starts application-specific,
And the corresponding relationship according to shown in the corresponding operation figure of user gesture operation and above-mentioned table 1, determine target private data type,
In the interface of application-specific, the corresponding privacy of user data of displaying target private data type.If the gesture of user is grasped
Make corresponding operation figure as ellipse, then the privacy picture of user is shown, if the corresponding operation figure of the gesture operation of user
For V-shaped, then the privacy video of user is shown, if the corresponding operation figure of the gesture operation of user is M font, show user
Privacy document.
If in the privacy of user data that application-specific saves, there is no the corresponding user of target private data type is hidden
Private data can then show the printed words of " there is no the private datas of corresponding data type " in the interface of application-specific, with
User is prompted.
As it can be seen that through this embodiment, can be determined whether to start application-specific according to the gesture operation of user, may be used also
To determine the data type of privacy of user data that application-specific is shown, to facilitate user clear by a gesture operation
It lookes at the private data of certain data type, improves the display efficiency of privacy of user data.
In the present embodiment, when input operation includes voice input operation, start application-specific, to show that user is hidden
Private data, can be with are as follows: is inputted and is operated according to the voice of user, determines the audio content of user's input, according to the audio content, really
The data type of fixed privacy of user data to be shown, starts application-specific, shows in the interface of application-specific
The corresponding privacy of user data of the data type.
Specifically, the voice that mobile terminal receives user inputs operation, is inputted and is operated according to the voice of user, determines user
The audio content of input, and judge whether comprising specific audio frequency content in the audio content, for example judge the audio of user's input
Whether comprising the preset specific audio frequency content such as " display secret file ", " display private file " in content, if comprising, it is determined that
The input operation of user meets predetermined registration operation rule, if not including, it is determined that the input operation of user does not meet predetermined registration operation rule
Then.
After the input operation for determining user meets predetermined registration operation rule, it can use general audio content and extract calculation
Method extracts content relevant to the data type of privacy of user data from the audio content that user inputs, for example extracts " text
Shelves ", " picture ", " photo ", the contents such as " video " will be extracted data type represented by obtained content, are determined as to be shown
Privacy of user data data type, and start application-specific, the data shown in the interface of application-specific
The corresponding privacy of user data of type.
In one specific example, the voice that mobile terminal receives user inputs operation, is inputted and is grasped according to the voice of user
Make, determines that the audio content of user's input is " display privacy picture ", since the audio content includes that specific audio frequency content is " aobvious
Show " and " privacy ", therefore mobile terminal determines that the input operation of user meets predetermined registration operation rule.Since the audio content includes
Content " picture " relevant to the data type of privacy of user data, it is thus determined that the data class of privacy of user data to be shown
Type is " picture ", therefore mobile terminal starts application-specific, and the privacy of user is shown in the interface of application-specific
Picture.
If there is no the privacy of user numbers to be shown of above-mentioned determination in the privacy of user data that application-specific saves
According to data type corresponding to privacy of user data, then can show that " there is no corresponding numbers in the interface of application-specific
According to the private data of type " printed words, to prompt user.
As it can be seen that through this embodiment, operation can be inputted according to the voice of user and determines whether to start application-specific,
The data type for the privacy of user data that application-specific is shown can also be determined, so that user be facilitated to pass through an input behaviour
Make the private data of certain data type of browsing, improves the display efficiency of privacy of user data.
Fig. 4 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, and Fig. 4 b is that the application is another
The schematic diagram of a scenario for the method for secret protection that embodiment provides, as shown in fig. 4 a, in the desktop of the mobile terminal, for saving
The application-specific of privacy of user data has been hidden.User executes gesture operation in the white space of the desktop, if with
The corresponding operation figure of gesture operation that family executes is assignment graph, and determines that the finger print information of user is according to the gesture operation
Legal finger print information, then as shown in Figure 4 b, mobile terminal start application-specific, and determine that the operation figure of user is corresponding
Data type shows the corresponding privacy of user data of the data type in the interface of application-specific, and Fig. 4 b is to show figure
Illustrated for piece.
Fig. 5 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, and Fig. 5 b is that the application is another
The schematic diagram of a scenario for the method for secret protection that embodiment provides, as shown in Figure 5 a, in the desktop of the mobile terminal, for saving
The application-specific of privacy of user data has been hidden.User pins the Home key of mobile terminal, executes voice input operation,
The voice that mobile terminal receives user inputs operation, is inputted and is operated according to the voice of user, determines the audio content of user's input,
If the audio content of user's input includes specific audio frequency content, as shown in Figure 5 b, mobile terminal starts application-specific, and
According to the audio content that user inputs, the data type of privacy of user data to be shown is determined, on the boundary of application-specific
The corresponding privacy of user data of the data type are shown in face, Fig. 5 b is illustrated for showing video.
Further, in this embodiment starting application-specific, to enhance the safety of private data to show use
Family private data, can be with are as follows: starting application-specific, and show secret order input interface, it receives user and is based on secret order input
The secret order information of interface input shows use if the secret order information is legal secret order information in the interface of application-specific
Family private data.
Specifically, legal secret order information can by user setting, for example, mobile terminal installation application-specific it
Afterwards, it shows information set interface, prompts user to be based on information set interface and input secret order information, and the secret order of user's input is believed
Breath is determined as legal secret order information, and legal secret order information is after starting application-specific, for showing privacy of user data
Secret order information.Legal secret order information may include password, figure, iris, fingerprint etc..
In the present embodiment, after starting application-specific, secret order input interface is shown, and it is close based on this to receive user
The secret order information for enabling input interface input, which is compared with pre-set legal secret order information, if comparing
Confirm that the secret order information is legal secret order information, then show privacy of user data in the interface of application-specific, if comparing
Confirm that the secret order information is not legal secret order information, then exits application-specific.
In one example, after user starts application-specific by assignment graph, inputted in secret order input interface
Encrypted message, if the encrypted message is legal secret order information, mobile terminal shows user in the interface of application-specific
Private data.
As it can be seen that after starting application-specific, can also be obtained using secret order input interface by the embodiment of the present application
The secret order information at family is taken, and the secret order information based on user determines the need for display privacy of user data, thus further
Enhance the safety of privacy of user data.
, can be with further, in this embodiment display privacy of user data are as follows: the user account for obtaining user, according to
The user account at family obtains the private data of user and display from cloud server.In the present embodiment, it can service beyond the clouds
The private data for storing user in device according to the account of user, to obtain the private data of user and display.Accordingly, due to
The private data storage of user beyond the clouds, therefore after user's replacement mobile terminal, directly can obtain privacy using user account
Data realize migration of the private data between different mobile terminal, remove user from and migrate manually between different mobile terminal
The trouble of private data.
In one embodiment, user installs application-specific, and login user account in first movement terminal, and
Provided with assignment graph.The input operation of user is gesture operation, and mobile terminal is by judging that the gesture operation of user is corresponding
Operate whether figure is assignment graph, it is determined whether starting application-specific.After user replaces mobile terminal, if user exists
Application-specific, and login user account are installed on second mobile terminal of replacement, then user is without being once again set up specified figure
Whole setting informations (including but not limited to assignment graph) of shape, application-specific can be applied to together based on user account
On second mobile terminal.In the example, assignment graph can be to replace with legal finger print information, specific audio frequency content, preset hand
Gesture operates the setting informations such as corresponding relationship, the legal secret order information between figure and private data type.
In one embodiment, the input operation of user is gesture operation, and mobile terminal passes through the gesture behaviour for judging user
Make whether corresponding operation figure is assignment graph, it is determined whether starting application-specific, in the embodiment, to prevent user
Forget assignment graph, cryptoguard problem can also be arranged in user in the terminal, can be with when user forgets assignment graph
Give or reset assignment graph for change by cryptoguard problem.Similarly, user can also be given for change or be reset by cryptoguard problem
The information such as assignment graph, legal finger print information, specific audio frequency content, legal secret order information.
The method for secret protection in the present embodiment is further illustrated by taking a special scenes as an example below.In the scene, move
Application-specific is installed in dynamic terminal, private data is preserved in application-specific, such as video, photo, vital document
With privacy application program etc..In the scene, mobile terminal is stated with properties: < category android:name="
Android.intent.category.HOME "/>, which is Launcher class App distinctive attributes, can show and manage
The application of all installations on customer mobile terminal.
Mobile terminal safeguards two list of application A and B, list of application A for recording the application program that can normally access,
List of application B is for recording the privacy application program that user is saved using application-specific.
Mobile terminal can show that all list of application A of user, user can carry out daily application when initialization
It uses.When user setting some application program a is privacy application program, application program a will be removed from list of application A, together
This is no longer shown in step Launcher using entrance, application program a is added in list of application B by mobile terminal, so that can only
After starting application-specific, the access application a in secret protection interface.
When user enables the privacy protection function of application-specific for the first time, needs to be arranged preset gesture and password is used
In protection private data.After being arranged successfully, user can arrive selection interface, selection need application to be protected, picture, video,
Document etc..
User can wake up privacy protection function by preset gesture such as " 7 " shape gesture, and specific implementation details is as follows:
Mobile terminal using gesture identification class GestureDetector carry out user gesture identification, when gesture on the screen
When face is slided, onFling method is called, in this method includes MotionEvent event, for detecting user gesture sliding
Direction and distance.
First check " cross " part gesture, specific judgment method: end point x2- starting point x1 > 200px, and absolute value (terminates
Point y1- starting point y2) be less than 10px, then regard as " cross " gesture." perpendicular " part gesture is reexamined, specific judgment method: terminated
Point y3- starting point y2 > 200px, and absolute value (end point x3- starting point x2) is less than 10px, then regards as " erecting " gesture.
After mobile terminal, which detects, inputs correct gesture, it will start application-specific and show numerical ciphers circle
Face, user input password in the interface, and mobile terminal shows secret protection interface after password match success, in the interface
Display is by contents such as the application program of secret protection, video, photo, documents.
To sum up, through this embodiment in method, application-specific can be hidden, by specific input operation starting
Application-specific leads to the privacy of owner to prevent from starting application-specific when other people mobile terminals using owner
The problem of data are leaked improves the safety of privacy of user data in mobile terminal.
Corresponding above-mentioned method for secret protection, the embodiment of the present application also provides a kind of privacy protection device, Fig. 6 is this Shen
Please an embodiment provide privacy protection device structural schematic diagram, as shown in fig. 6, the device includes:
Program determining module 61, the application for the application program in the user behavior and mobile terminal according to acquisition belong to
Property, application-specific is screened in the mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module 62, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module 63 is inputted, the input operation executed in the display interface for receiving user;
Program starting module 64 starts the specific application if meeting predetermined registration operation rule for input operation
Program, to show privacy of user data.
Optionally, described program determining module is specifically used for: being sieved in the mobile terminal according to the user behavior of acquisition
It is selected to save the first application program of designated user's data;In first application program, screening applicating category is specified
First application program of classification is as application-specific.
Optionally, the input operation includes gesture operation;Described device further include: the first regular determining module is used for
If the corresponding operation figure of the gesture operation is assignment graph, and/or, determine obtained user's according to the gesture operation
Finger print information is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule;Alternatively, the input behaviour
Make to include voice input operation;Described device further include: Second Rule determining module is operated for being inputted according to the voice,
Determine the audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets
The predetermined registration operation rule.
Optionally, the input operation includes gesture operation;Described program starting module is specifically used for: determining the gesture
Operate corresponding operation figure;According to the corresponding relationship between preset gesture operation figure and private data type, institute is determined
State target private data type corresponding to operation figure;Start the application-specific, in the application-specific
The corresponding privacy of user data of the target private data type are shown in interface;Alternatively, the input operation includes that voice is defeated
Enter operation;Described program starting module is specifically used for: being inputted and is operated according to the voice, determines the audio content of user's input;
According to the audio content, the data type of privacy of user data to be shown is determined;Start the application-specific, in institute
It states and shows the corresponding privacy of user data of the data type in the interface of application-specific.
Optionally, described program starting module is specifically used for: starting the application-specific, and shows that secret order inputs boundary
Face;Receive the secret order information that user is inputted based on the secret order input interface;If the secret order information is legal secret order information,
Privacy of user data are shown in the interface of the application-specific.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal
Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated
Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear
It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's
The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal
The safety of private data.
Above-mentioned method for secret protection can be performed in the privacy protection device of the embodiment of the present application, and reaches identical effect,
Details are not described herein.
Further, the embodiment of the present application also provides a kind of secret protection equipment, Fig. 7 provides for one embodiment of the application
Secret protection equipment structural schematic diagram, as shown in fig. 7, the equipment includes: memory 701, processor 702,703 and of bus
Communication interface 704.Memory 701, processor 702 and communication interface 704 are communicated by bus 703, and communication interface 704 can
To include input/output interface, input/output interface includes but is not limited to keyboard, mouse, display, microphone, loudspeaker etc..
In Fig. 7, the computer executable instructions that can be run on the processor 702 are stored on the memory 701,
The computer executable instructions realize following below scheme when being executed by the processor 702:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal
Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user
Data.
Optionally, when the computer executable instructions are executed by the processor, according to the user behavior of acquisition and shifting
The application attribute of application program in dynamic terminal, screens application-specific in the mobile terminal, comprising:
The first application for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition
Program;
In first application program, screening applicating category is the first application program of specified classification as specific application
Program.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped
Make;The method also includes: if the corresponding operation figure of the gesture operation is assignment graph, and/or, it is grasped according to the gesture
The finger print information for making to determine obtained user is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule
Then;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determined
The audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described
Predetermined registration operation rule.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped
Make;The starting application-specific, to show privacy of user data, comprising: determine the corresponding behaviour of the gesture operation
Make figure;According to the corresponding relationship between preset gesture operation figure and private data type, operation figure institute is determined
Corresponding target private data type;Start the application-specific, institute is shown in the interface of the application-specific
State the corresponding privacy of user data of target private data type;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user
Data, comprising: inputted and operated according to the voice, determine the audio content of user's input;According to the audio content, determine to
The data type of the privacy of user data of display;Start the application-specific, in the interface of the application-specific
Show the corresponding privacy of user data of the data type.
Optionally, when the computer executable instructions are executed by the processor, the starting specific application journey
Sequence, to show privacy of user data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user is shown in the interface of the application-specific
Data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal
Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated
Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear
It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's
The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal
The safety of private data.
Further, described computer-readable to deposit the embodiment of the present application also provides a kind of computer readable storage medium
Storage media is realized for storing computer executable instructions, when the computer executable instructions are executed by processor to flow down
Journey:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal
Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user
Data.
Optionally, when the computer executable instructions are executed by the processor, according to the user behavior of acquisition and shifting
The application attribute of application program in dynamic terminal, screens application-specific in the mobile terminal, comprising:
The first application for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition
Program;
In first application program, screening applicating category is the first application program of specified classification as specific application
Program.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped
Make;The method also includes: if the corresponding operation figure of the gesture operation is assignment graph, and/or, it is grasped according to the gesture
The finger print information for making to determine obtained user is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule
Then;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determined
The audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described
Predetermined registration operation rule.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped
Make;The starting application-specific, to show privacy of user data, comprising: determine the corresponding behaviour of the gesture operation
Make figure;According to the corresponding relationship between preset gesture operation figure and private data type, operation figure institute is determined
Corresponding target private data type;Start the application-specific, institute is shown in the interface of the application-specific
State the corresponding privacy of user data of target private data type;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user
Data, comprising: inputted and operated according to the voice, determine the audio content of user's input;According to the audio content, determine to
The data type of the privacy of user data of display;Start the application-specific, in the interface of the application-specific
Show the corresponding privacy of user data of the data type.
Optionally, when the computer executable instructions are executed by the processor, the starting specific application journey
Sequence, to show privacy of user data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user is shown in the interface of the application-specific
Data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal
Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated
Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear
It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's
The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal
The safety of private data.
Wherein, the computer readable storage medium includes read-only memory (Read-Only Memory, abbreviation
ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.
Claims (10)
1. a kind of method for secret protection characterized by comprising
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, screened in the mobile terminal special
Determine application program;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user data.
2. the method according to claim 1, wherein according to the application in the user behavior and mobile terminal of acquisition
The application attribute of program screens application-specific in the mobile terminal, comprising:
The first application program for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition;
In first application program, screening applicating category is the first application program of specified classification as specific application journey
Sequence.
3. the method according to claim 1, wherein
The input operation includes gesture operation;The method also includes: if the corresponding operation figure of the gesture operation is to refer to
Determine figure, and/or, determine that the finger print information of obtained user is legal finger print information according to the gesture operation, it is determined that institute
It states input operation and meets the predetermined registration operation rule;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determine user
The audio content of input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described default
Operation rules.
4. the method according to claim 1, wherein
The input operation includes gesture operation;The starting application-specific, to show privacy of user data, packet
It includes: determining the corresponding operation figure of the gesture operation;According between preset gesture operation figure and private data type
Corresponding relationship determines target private data type corresponding to the operation figure;Start the application-specific, described
The corresponding privacy of user data of the target private data type are shown in the interface of application-specific;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user data,
Include: to be inputted to operate according to the voice, determines the audio content of user's input;According to the audio content, determine to be shown
Privacy of user data data type;Start the application-specific, is shown in the interface of the application-specific
The corresponding privacy of user data of the data type.
5. the method according to claim 1, wherein described start the application-specific, to show user
Private data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user number is shown in the interface of the application-specific
According to.
6. a kind of privacy protection device characterized by comprising
Program determining module, for the application attribute of the application program in the user behavior and mobile terminal according to acquisition, in institute
It states and screens application-specific in mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module is inputted, the input operation executed in the display interface for receiving user;
Program starting module starts the application-specific if meeting predetermined registration operation rule for input operation, with
Show privacy of user data.
7. device according to claim 6, which is characterized in that described program determining module is specifically used for:
The first application program for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition;
In first application program, screening applicating category is the first application program of specified classification as specific application journey
Sequence.
8. device according to claim 6, which is characterized in that
The input operation includes gesture operation;Described device further include: the first regular determining module, if being grasped for the gesture
Making corresponding operation figure is assignment graph, and/or, the finger print information of obtained user is determined according to the gesture operation to close
Method finger print information, it is determined that the input operation meets the predetermined registration operation rule;
Alternatively,
The input operation includes voice input operation;Described device further include: Second Rule determining module, for according to
Voice input operation, determines the audio content of user's input;If the audio content includes specific audio frequency content, it is determined that described
Input operation meets the predetermined registration operation rule.
9. device according to claim 6, which is characterized in that
The input operation includes gesture operation;Described program starting module is specifically used for: determining that the gesture operation is corresponding
Operate figure;According to the corresponding relationship between preset gesture operation figure and private data type, the operation figure is determined
Corresponding target private data type;Start the application-specific, is shown in the interface of the application-specific
The corresponding privacy of user data of the target private data type;
Alternatively,
The input operation includes voice input operation;Described program starting module is specifically used for: being inputted and is grasped according to the voice
Make, determines the audio content of user's input;According to the audio content, the data class of privacy of user data to be shown is determined
Type;Start the application-specific, the corresponding user of the data type is shown in the interface of the application-specific
Private data.
10. device according to claim 6, which is characterized in that described program starting module is specifically used for:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user number is shown in the interface of the application-specific
According to.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811088944.3A CN109376545A (en) | 2018-09-17 | 2018-09-17 | Method for secret protection and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811088944.3A CN109376545A (en) | 2018-09-17 | 2018-09-17 | Method for secret protection and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109376545A true CN109376545A (en) | 2019-02-22 |
Family
ID=65405650
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811088944.3A Pending CN109376545A (en) | 2018-09-17 | 2018-09-17 | Method for secret protection and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109376545A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795133A (en) * | 2019-10-14 | 2020-02-14 | 广州微算互联信息技术有限公司 | Automatic protection method and device for auxiliary application |
CN111460481A (en) * | 2020-04-14 | 2020-07-28 | Oppo广东移动通信有限公司 | Privacy protection method, device and equipment based on terminal equipment |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN116702184A (en) * | 2022-11-15 | 2023-09-05 | 荣耀终端有限公司 | Application starting method and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014169600A1 (en) * | 2013-09-06 | 2014-10-23 | 中兴通讯股份有限公司 | Method, device and terminal for processing hidden file folder |
CN104239804A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | Data protecting method and device |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
CN106295294A (en) * | 2016-07-29 | 2017-01-04 | 北京小米移动软件有限公司 | Method for controlling mobile terminal and device |
CN107679411A (en) * | 2017-09-07 | 2018-02-09 | 深圳支点电子智能科技有限公司 | A kind of mobile terminal privacy processing method and mobile terminal |
CN108171034A (en) * | 2017-12-20 | 2018-06-15 | 维沃移动通信有限公司 | A kind of method and terminal for protecting privacy |
-
2018
- 2018-09-17 CN CN201811088944.3A patent/CN109376545A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239804A (en) * | 2013-06-07 | 2014-12-24 | 腾讯科技(深圳)有限公司 | Data protecting method and device |
WO2014169600A1 (en) * | 2013-09-06 | 2014-10-23 | 中兴通讯股份有限公司 | Method, device and terminal for processing hidden file folder |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
CN106295294A (en) * | 2016-07-29 | 2017-01-04 | 北京小米移动软件有限公司 | Method for controlling mobile terminal and device |
CN107679411A (en) * | 2017-09-07 | 2018-02-09 | 深圳支点电子智能科技有限公司 | A kind of mobile terminal privacy processing method and mobile terminal |
CN108171034A (en) * | 2017-12-20 | 2018-06-15 | 维沃移动通信有限公司 | A kind of method and terminal for protecting privacy |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110795133A (en) * | 2019-10-14 | 2020-02-14 | 广州微算互联信息技术有限公司 | Automatic protection method and device for auxiliary application |
CN110795133B (en) * | 2019-10-14 | 2024-03-15 | 广州微算互联信息技术有限公司 | Automatic protection method and device for auxiliary application |
CN111460481A (en) * | 2020-04-14 | 2020-07-28 | Oppo广东移动通信有限公司 | Privacy protection method, device and equipment based on terminal equipment |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN112231758B (en) * | 2020-11-03 | 2023-11-17 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN116702184A (en) * | 2022-11-15 | 2023-09-05 | 荣耀终端有限公司 | Application starting method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11882221B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN109376545A (en) | Method for secret protection and device | |
EP3547604B1 (en) | Method and apparatus for security question generation and identity verification | |
US20070198933A1 (en) | Permitting Multiple Tasks Requiring Elevated Rights | |
CN104077512A (en) | Personnel information safety management method and management device | |
CN106716436A (en) | Information display method and system | |
WO2016112468A1 (en) | Automated classification and detection of sensitive content using virtual keyboard on mobile devices | |
CN111767554B (en) | Screen sharing method and device, storage medium and electronic equipment | |
WO2020252951A1 (en) | Screenshot processing method and mobile terminal | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN106547451A (en) | Open application program method more, open application programmer and terminal more | |
CN107992545A (en) | A kind of searching method, device, terminal and readable storage medium storing program for executing | |
US20220222953A1 (en) | Managing camera actions | |
CN107422976A (en) | Control method, device, storage medium and mobile terminal based on blank screen gesture | |
CN108717516A (en) | File label method, terminal and medium | |
US20080102894A1 (en) | Mobile terminal and data display method by individual sim cards | |
CN112533072A (en) | Image sending method and device and electronic equipment | |
EP4276595A1 (en) | Content display method and apparatus, and device and storage medium | |
CN105468947A (en) | Information processing method and device and electronic equipment | |
CN110351432A (en) | Communicate the display methods and mobile terminal of card information | |
CN106254675A (en) | The method of system language setting and terminal | |
CN106874718A (en) | privacy processing method, device and terminal | |
CN111898159A (en) | Risk prompting method and device, electronic equipment and readable storage medium | |
KR101320473B1 (en) | Method for setting up security level of information and communication device | |
CN106933666B (en) | Method for calling information input program and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |