CN109376545A - Method for secret protection and device - Google Patents

Method for secret protection and device Download PDF

Info

Publication number
CN109376545A
CN109376545A CN201811088944.3A CN201811088944A CN109376545A CN 109376545 A CN109376545 A CN 109376545A CN 201811088944 A CN201811088944 A CN 201811088944A CN 109376545 A CN109376545 A CN 109376545A
Authority
CN
China
Prior art keywords
application
user
specific
privacy
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811088944.3A
Other languages
Chinese (zh)
Inventor
吕天
李涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kylin Seing Network Technology Ltd By Share Ltd
Original Assignee
Kylin Seing Network Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kylin Seing Network Technology Ltd By Share Ltd filed Critical Kylin Seing Network Technology Ltd By Share Ltd
Priority to CN201811088944.3A priority Critical patent/CN109376545A/en
Publication of CN109376545A publication Critical patent/CN109376545A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the present application provides a kind of method for secret protection and device, and wherein method includes: the application attribute of the application program in the user behavior and mobile terminal according to acquisition, screens application-specific in the mobile terminal;The application-specific is for saving privacy of user data;The application-specific is hidden in the display interface of the mobile terminal;Receive the input operation that user executes in the display interface;If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user data.Through this embodiment, the safety of privacy of user data can be improved.

Description

Method for secret protection and device
Technical field
This application involves technical field of mobile terminals more particularly to a kind of method for secret protection and device.
Background technique
The mobile terminals such as mobile phone have become essential appliance and electronic in people's life.User is using mobile terminal During, several private datas can be saved in the terminal, and private data can be picture, video, bill etc..It is based on This, once mobile terminal, by the user's operation other than owner, the private data of owner just faces the risk of leakage, this is by serious shadow Ring the safety of private data.
Therefore, it is necessary to a kind of secret protection scheme be provided, to improve the safety of private data.
Summary of the invention
The purpose of the embodiment of the present application is to provide a kind of method for secret protection and device, to improve the safety of private data Property.
In order to solve the above technical problems, the embodiment of the present application is achieved in that
In a first aspect, the embodiment of the present application provides a kind of method for secret protection, comprising:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user Data.
Second aspect, the embodiment of the present application provide a kind of privacy protection device, comprising:
Program determining module, for the application attribute of the application program in the user behavior and mobile terminal according to acquisition, Application-specific is screened in the mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module is inputted, the input operation executed in the display interface for receiving user;
Program starting module starts the specific application journey if meeting predetermined registration operation rule for input operation Sequence, to show privacy of user data.
The third aspect, the embodiment of the present application provide a kind of secret protection equipment, comprising: memory, processor and storage On the memory and the computer executable instructions that can run on the processor, the computer executable instructions quilt The step of method for secret protection as described in above-mentioned first aspect is realized when the processor executes.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Medium realizes such as above-mentioned first for storing computer executable instructions when the computer executable instructions are executed by processor The step of method for secret protection described in aspect.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal The safety of private data.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram for the method for secret protection that one embodiment of the application provides;
Fig. 2 is the schematic diagram of a scenario for the method for secret protection that one embodiment of the application provides;
Fig. 3 is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 4 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 4 b is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 5 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 5 b is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides;
Fig. 6 is the structural schematic diagram for the privacy protection device that one embodiment of the application provides;
Fig. 7 is the structural schematic diagram for the secret protection equipment that one embodiment of the application provides.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
The embodiment of the present application provides a kind of method for secret protection and device, to improve the safety of private data.This reality Applying the method for secret protection in example can apply in mobile terminal side, by mobile terminal execution, the mobile terminal can be mobile phone, The intelligent terminals such as tablet computer, vehicle-mounted computer, wearable device.
Fig. 1 is the flow diagram for the method for secret protection that one embodiment of the application provides, as shown in Figure 1, the process packet It includes:
Step S102, according to the application attribute of the application program in the user behavior and mobile terminal of acquisition, mobile whole Application-specific is screened in end, application-specific is for saving privacy of user data;
Step S104 hides the application-specific in the display interface of mobile terminal;
Step S106 receives the input operation that user executes in display interface;
Step S108 starts the application-specific, if input operation meets predetermined registration operation rule to show user Private data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal The safety of private data.
In the present embodiment, privacy of user data include but is not limited to the data such as picture, document, video, types of applications program.
In above-mentioned steps S102, according to the application attribute of the application program in the user behavior and mobile terminal of acquisition, Application-specific is screened in mobile terminal, be may is that and is screened in the terminal according to the user behavior of acquisition for saving First application program of designated user's data, in the first application program, screening applicating category is the first application of specified classification Program is as application-specific.
Specifically, the user behavior for acquiring user first, screens in the terminal according to the user behavior of acquisition and is used for Save the first application program of designated user's data, wherein designated user's data include but is not limited to picture, video, finance letter At least one of in breath.Then, in the first application program that screening obtains, the application journey that applicating category is specified classification is chosen Sequence, for example financial class application program is screened, or screening private data guard class application program, the application program that screening is obtained It is determined as application-specific.
In the present embodiment, application-specific can also be determined using other modes, for example, acquisition for mobile terminal itself is The application list of installation, search for application title includes the application program of specific character in the list, will be searched Application program as the application-specific for saving privacy of user data.Wherein, specific character may include " privacy ", Words such as " safety boxs ".
Alternatively, the mounted the application list of acquisition for mobile terminal itself, search for application classification in the list For the application program of particular category, using the application program searched as the specific application journey for being used to save privacy of user data Sequence.Wherein, each application program in the application list has corresponding application category, such as life kind application journey Sequence, shopping class application program etc., particular category is the corresponding classification of application program for saving privacy of user data.
Alternatively, the mounted the application list of acquisition for mobile terminal itself, determines each application program in the list Function determines the application-specific for saving privacy of user data according to the function of each application program in the list.
After determining application-specific, application-specific is hidden in the display interface of mobile terminal.Specifically, The application icon of application-specific can be hidden in the desktop of mobile terminal, for example, the application of setting application-specific The transparency of icon be 100%, thus achieve the effect that it is hiding so that user watches in the desktop of mobile terminal less than specific Application program.
In the present embodiment, after hiding application-specific, receive what user executed on the display interface of the mobile terminal Input operation, and judge whether input operation meets predetermined registration operation rule, if meeting, start application-specific, with aobvious Show privacy of user data, if not meeting, input operation is not responding to, so as to the case where hiding application-specific Under, by specific input operation starting application-specific, so that starting is special when preventing other people from using the mobile terminal of owner The problem of determining application program, the private data of owner is caused to be leaked improves the safety of privacy of user data in mobile terminal.
In a kind of situation, the input operation that user executes on mobile terminals includes gesture operation, in the present embodiment, if should The corresponding operation figure of gesture operation is assignment graph, and/or, the finger print information of obtained user is determined according to the gesture operation For legal finger print information, it is determined that input operation meets predetermined registration operation rule.
In a kind of situation, the corresponding operation figure of the gesture operation can be determined, if the operation figure is assignment graph, Determine that the input operation of user meets predetermined registration operation rule, if the operation figure is not assignment graph, it is determined that the input of user Operation does not meet predetermined registration operation rule.
For example, user executes gesture operation in the desktop of mobile terminal, the desktop of mobile terminal detects the gesture operation Whether corresponding operation figure is assignment graph, and assignment graph can be round or zigzag, if assignment graph, then mobile whole The desktop at end determines that the input operation of user meets predetermined registration operation rule, notifies the os starting specific application of mobile terminal Program, to show privacy of user data, if not assignment graph, then the desktop of mobile terminal is not responded.It is understood that specified The quantity of figure can be one or more, be illustrated for multiple here, one situation does not repeat them here.
In the example, assignment graph can be by user setting, for example, mobile terminal after installing application-specific, is shown Show set interface, prompts user's graphing in set interface, and the figure that user draws is determined as assignment graph, specify Figure is after hiding application-specific, for starting the figure of application-specific.
In the example, user can be by executing the gesture operation of assignment graph, as in mobile terminal in the terminal Round or zigzag mode is drawn on desktop, is started application-specific to browse privacy of user data and has been reached obstructed Cross the effect of application icon starting application-specific.In the mobile terminal of the borrow owner of the user other than owner, Since the user other than owner does not know which kind of figure is assignment graph be, and browsed again less than application-specific, therefore owner User in addition is difficult to start application-specific, to effectively increase the safety of privacy of user data.
In another case, the finger print information of user is determined according to the gesture operation, if the finger print information of user is legal Finger print information, it is determined that the input operation of user meets predetermined registration operation rule.
For example, the finger print information of the preparatory typing user of mobile terminal, executing in the display interface of the mobile terminal of user should When gesture operation, the finger print information of acquisition for mobile terminal user, if the finger print information and the finger print information phase of preparatory typing that obtain Unanimously, then mobile terminal determines that the finger print information of user is legal finger print information, it is determined that the input operation of user meets default Operation rules.
In another situation, input that user executes on mobile terminals operation includes gesture operation, can be in the present embodiment The finger print information of user is determined according to the gesture operation, and, the corresponding operation figure of the gesture operation is determined, if the finger of user Line information is legal finger print information, and, determine that obtained operation figure is assignment graph, it is determined that the input operation of user meets Predetermined registration operation rule, if the finger print information of user is not legal finger print information, alternatively, determining that obtained operation figure is not specified Figure, it is determined that the input operation of user does not meet predetermined registration operation rule.
For example, user executes gesture operation in the desktop of mobile terminal, the desktop of mobile terminal detects the gesture operation Whether corresponding operation figure is assignment graph, for example detects whether the corresponding operation figure of the gesture operation is round or Z-shaped Shape, also, mobile terminal obtains the finger print information of user during user executes gesture operation, judges the fingerprint letter of user Whether breath is legal finger print information, if operation figure is assignment graph, and, the finger print information of user is legal finger print information, then The desktop of mobile terminal determines that the input operation of user meets predetermined registration operation rule, notifies the os starting of mobile terminal special Application program is determined, to show privacy of user data, if operation figure is not assignment graph, alternatively, the finger print information of user is not Legal finger print information, then the desktop of mobile terminal does not respond.It is understood that the quantity of assignment graph can be one or more It is a, it is illustrated for multiple here, one situation does not repeat them here.
In the example, assignment graph can be by user setting, for example, mobile terminal after installing application-specific, is shown Show set interface, prompts user's graphing in set interface, and the figure that user draws is determined as assignment graph, specify Figure is after hiding application-specific, for starting the figure of application-specific.
In one embodiment, a variety of figures can be preset inside mobile terminal, user chooses from a variety of figures Assignment graph.
In the example, legal finger print information can by user setting, for example, mobile terminal installation application-specific it Afterwards, it shows finger print information set interface, prompts user to be based on finger print information set interface and input finger print information, and user is inputted Finger print information be determined as legal finger print information, legal finger print information is after hiding application-specific, for starting spy Determine the finger print information of application program.
In the example, mobile terminal determines the finger print information of user according to the gesture operation of user, and judges the fingerprint of user Whether information is legal finger print information, Ke Yiwei, when user executes gesture operation, the finger of the screen capture user of mobile terminal Line information, and collected finger print information compared with legal finger print information pair, if the two similarity reaches default similarity threshold Value, it is determined that the finger print information of user is legal finger print information, otherwise, it determines the finger print information of user is not legal fingerprint letter Breath.Wherein, mobile terminal can be comprehensive screen mobile phone.
Compared with previous embodiment, in the embodiment, only the corresponding user of legal finger print information in the terminal When drawing assignment graph, it can determine that the input operation of user meets predetermined registration operation rule, and start application-specific.? When the mobile terminal of the borrow owner of the user other than owner, even if the user other than owner knows which kind of figure is assignment graph be Shape, if however the finger print information of the user other than owner is not legal finger print information, the user other than owner is difficult to start spy Application program is determined, to further improve the safety of privacy of user data.
Fig. 2 is the schematic diagram of a scenario for the method for secret protection that one embodiment of the application provides, as shown in Fig. 2, in the movement In the desktop of terminal, the application-specific for saving privacy of user data has been hidden.Desktop of the user in mobile terminal White space in or mobile terminal put out screen interface in execute gesture operation, if the corresponding operation figure of gesture operation is specified Figure (ellipse as shown in Figure 2), then mobile terminal starts application-specific, to show privacy of user data.Alternatively, If the corresponding operation figure of gesture operation is assignment graph (ellipse as shown in Figure 2), and is determined according to the gesture operation The finger print information of user is legal finger print information, then mobile terminal starts application-specific, to show privacy of user data, or Person, if determining that the finger print information of user is legal finger print information according to the gesture operation, mobile terminal starts specific application journey Sequence, to show privacy of user data.
User input operation can also include voice input operation, such as user pin mobile terminal record button or Home key sends voice messaging to mobile terminal, then in the present embodiment, can also be inputted and be operated according to the voice, determine that user is defeated The audio content entered, if the audio content includes specific audio frequency content, it is determined that the input operation of user meets predetermined registration operation rule Then.
For example, the voice that mobile terminal receives user inputs operation, inputted and operated according to the voice, determines user's input Whether audio content judge in the audio content comprising specific audio frequency content, for example, judge be in audio content that user inputs No includes the preset specific audio frequency contents such as " display secret file ", " display private file ", if comprising, it is determined that user's is defeated Enter operation and meet predetermined registration operation rule, if not including, it is determined that the input operation of user does not meet predetermined registration operation rule.
In the example, general audio content extraction algorithm can use, inputted and operated according to the voice of user, determine user The audio content of input, and whether judge in the audio content comprising specific audio frequency content.Specific audio frequency content can be by user Setting prompts in user setting specific audio frequency for example, mobile terminal after installing application-specific, shows set interface Hold, specific audio frequency content is after hiding application-specific, for starting the audio content of application-specific.
In the example, user can start application-specific by way of input audio in the terminal, with browsing Privacy of user data have achieved the effect that not start application-specific by application icon.User other than owner Borrow owner mobile terminal when, since the user other than owner does not know specific audio frequency content, and browsed again less than specific Application program, therefore the user other than owner is difficult to start application-specific, to effectively increase privacy of user data Safety.
Fig. 3 is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, as shown in figure 3, in the shifting In the desktop of dynamic terminal, the application-specific for saving privacy of user data has been hidden.User pins mobile terminal Home key, executes voice input operation, and the voice that mobile terminal receives user inputs operation, inputted and grasped according to the voice of user Make, determine the audio content of user's input, if the audio content of user's input includes specific audio frequency content, mobile terminal starting Application-specific, to show privacy of user data.In Fig. 3, mobile terminal may be at putting out screen state, may be at unlock shape State.
In view of there are many data type, such as picture, video, document, application program etc., this realities for privacy of user data It applies in example, starts application-specific, it, can be with to show privacy of user data are as follows: when input operation includes gesture operation, really Determine the corresponding operation figure of gesture operation, according to the corresponding relationship between preset gesture operation figure and private data type, It determines target private data type corresponding to the operation figure, starts application-specific, at the interface of application-specific The corresponding privacy of user data of middle displaying target private data type.
Specifically, the corresponding relationship being preset in mobile terminal between gesture operation figure and private data type, this is right Should be related to can be as shown in table 1 below.Mobile terminal is after receiving the gesture operation of user, however, it is determined that the gesture operation meets pre- If operation rules, it is determined that the corresponding operation figure of the gesture operation, and based on gesture operation figure and private data type it Between corresponding relationship, determine the corresponding target private data type of the operation figure, and start application-specific, answered specific With the corresponding privacy of user data of displaying target private data type in the interface of program.
Table 1
Gesture operation figure Private data type
Ellipse Picture
V-shaped Video
M font Document
In one example, three kinds of gesture operation figures are assignment graph shown by above-mentioned table 1.Mobile terminal, which receives, to be used The gesture operation at family determines the corresponding operation figure of the gesture operation, if the operation figure is three kinds of hands shown by above-mentioned table 1 Gesture operates any one in figure, it is determined that and the gesture operation of user meets predetermined registration operation rule, starts application-specific, And the corresponding relationship according to shown in the corresponding operation figure of user gesture operation and above-mentioned table 1, determine target private data type, In the interface of application-specific, the corresponding privacy of user data of displaying target private data type.If the gesture of user is grasped Make corresponding operation figure as ellipse, then the privacy picture of user is shown, if the corresponding operation figure of the gesture operation of user For V-shaped, then the privacy video of user is shown, if the corresponding operation figure of the gesture operation of user is M font, show user Privacy document.
If in the privacy of user data that application-specific saves, there is no the corresponding user of target private data type is hidden Private data can then show the printed words of " there is no the private datas of corresponding data type " in the interface of application-specific, with User is prompted.
As it can be seen that through this embodiment, can be determined whether to start application-specific according to the gesture operation of user, may be used also To determine the data type of privacy of user data that application-specific is shown, to facilitate user clear by a gesture operation It lookes at the private data of certain data type, improves the display efficiency of privacy of user data.
In the present embodiment, when input operation includes voice input operation, start application-specific, to show that user is hidden Private data, can be with are as follows: is inputted and is operated according to the voice of user, determines the audio content of user's input, according to the audio content, really The data type of fixed privacy of user data to be shown, starts application-specific, shows in the interface of application-specific The corresponding privacy of user data of the data type.
Specifically, the voice that mobile terminal receives user inputs operation, is inputted and is operated according to the voice of user, determines user The audio content of input, and judge whether comprising specific audio frequency content in the audio content, for example judge the audio of user's input Whether comprising the preset specific audio frequency content such as " display secret file ", " display private file " in content, if comprising, it is determined that The input operation of user meets predetermined registration operation rule, if not including, it is determined that the input operation of user does not meet predetermined registration operation rule Then.
After the input operation for determining user meets predetermined registration operation rule, it can use general audio content and extract calculation Method extracts content relevant to the data type of privacy of user data from the audio content that user inputs, for example extracts " text Shelves ", " picture ", " photo ", the contents such as " video " will be extracted data type represented by obtained content, are determined as to be shown Privacy of user data data type, and start application-specific, the data shown in the interface of application-specific The corresponding privacy of user data of type.
In one specific example, the voice that mobile terminal receives user inputs operation, is inputted and is grasped according to the voice of user Make, determines that the audio content of user's input is " display privacy picture ", since the audio content includes that specific audio frequency content is " aobvious Show " and " privacy ", therefore mobile terminal determines that the input operation of user meets predetermined registration operation rule.Since the audio content includes Content " picture " relevant to the data type of privacy of user data, it is thus determined that the data class of privacy of user data to be shown Type is " picture ", therefore mobile terminal starts application-specific, and the privacy of user is shown in the interface of application-specific Picture.
If there is no the privacy of user numbers to be shown of above-mentioned determination in the privacy of user data that application-specific saves According to data type corresponding to privacy of user data, then can show that " there is no corresponding numbers in the interface of application-specific According to the private data of type " printed words, to prompt user.
As it can be seen that through this embodiment, operation can be inputted according to the voice of user and determines whether to start application-specific, The data type for the privacy of user data that application-specific is shown can also be determined, so that user be facilitated to pass through an input behaviour Make the private data of certain data type of browsing, improves the display efficiency of privacy of user data.
Fig. 4 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, and Fig. 4 b is that the application is another The schematic diagram of a scenario for the method for secret protection that embodiment provides, as shown in fig. 4 a, in the desktop of the mobile terminal, for saving The application-specific of privacy of user data has been hidden.User executes gesture operation in the white space of the desktop, if with The corresponding operation figure of gesture operation that family executes is assignment graph, and determines that the finger print information of user is according to the gesture operation Legal finger print information, then as shown in Figure 4 b, mobile terminal start application-specific, and determine that the operation figure of user is corresponding Data type shows the corresponding privacy of user data of the data type in the interface of application-specific, and Fig. 4 b is to show figure Illustrated for piece.
Fig. 5 a is the schematic diagram of a scenario for the method for secret protection that another embodiment of the application provides, and Fig. 5 b is that the application is another The schematic diagram of a scenario for the method for secret protection that embodiment provides, as shown in Figure 5 a, in the desktop of the mobile terminal, for saving The application-specific of privacy of user data has been hidden.User pins the Home key of mobile terminal, executes voice input operation, The voice that mobile terminal receives user inputs operation, is inputted and is operated according to the voice of user, determines the audio content of user's input, If the audio content of user's input includes specific audio frequency content, as shown in Figure 5 b, mobile terminal starts application-specific, and According to the audio content that user inputs, the data type of privacy of user data to be shown is determined, on the boundary of application-specific The corresponding privacy of user data of the data type are shown in face, Fig. 5 b is illustrated for showing video.
Further, in this embodiment starting application-specific, to enhance the safety of private data to show use Family private data, can be with are as follows: starting application-specific, and show secret order input interface, it receives user and is based on secret order input The secret order information of interface input shows use if the secret order information is legal secret order information in the interface of application-specific Family private data.
Specifically, legal secret order information can by user setting, for example, mobile terminal installation application-specific it Afterwards, it shows information set interface, prompts user to be based on information set interface and input secret order information, and the secret order of user's input is believed Breath is determined as legal secret order information, and legal secret order information is after starting application-specific, for showing privacy of user data Secret order information.Legal secret order information may include password, figure, iris, fingerprint etc..
In the present embodiment, after starting application-specific, secret order input interface is shown, and it is close based on this to receive user The secret order information for enabling input interface input, which is compared with pre-set legal secret order information, if comparing Confirm that the secret order information is legal secret order information, then show privacy of user data in the interface of application-specific, if comparing Confirm that the secret order information is not legal secret order information, then exits application-specific.
In one example, after user starts application-specific by assignment graph, inputted in secret order input interface Encrypted message, if the encrypted message is legal secret order information, mobile terminal shows user in the interface of application-specific Private data.
As it can be seen that after starting application-specific, can also be obtained using secret order input interface by the embodiment of the present application The secret order information at family is taken, and the secret order information based on user determines the need for display privacy of user data, thus further Enhance the safety of privacy of user data.
, can be with further, in this embodiment display privacy of user data are as follows: the user account for obtaining user, according to The user account at family obtains the private data of user and display from cloud server.In the present embodiment, it can service beyond the clouds The private data for storing user in device according to the account of user, to obtain the private data of user and display.Accordingly, due to The private data storage of user beyond the clouds, therefore after user's replacement mobile terminal, directly can obtain privacy using user account Data realize migration of the private data between different mobile terminal, remove user from and migrate manually between different mobile terminal The trouble of private data.
In one embodiment, user installs application-specific, and login user account in first movement terminal, and Provided with assignment graph.The input operation of user is gesture operation, and mobile terminal is by judging that the gesture operation of user is corresponding Operate whether figure is assignment graph, it is determined whether starting application-specific.After user replaces mobile terminal, if user exists Application-specific, and login user account are installed on second mobile terminal of replacement, then user is without being once again set up specified figure Whole setting informations (including but not limited to assignment graph) of shape, application-specific can be applied to together based on user account On second mobile terminal.In the example, assignment graph can be to replace with legal finger print information, specific audio frequency content, preset hand Gesture operates the setting informations such as corresponding relationship, the legal secret order information between figure and private data type.
In one embodiment, the input operation of user is gesture operation, and mobile terminal passes through the gesture behaviour for judging user Make whether corresponding operation figure is assignment graph, it is determined whether starting application-specific, in the embodiment, to prevent user Forget assignment graph, cryptoguard problem can also be arranged in user in the terminal, can be with when user forgets assignment graph Give or reset assignment graph for change by cryptoguard problem.Similarly, user can also be given for change or be reset by cryptoguard problem The information such as assignment graph, legal finger print information, specific audio frequency content, legal secret order information.
The method for secret protection in the present embodiment is further illustrated by taking a special scenes as an example below.In the scene, move Application-specific is installed in dynamic terminal, private data is preserved in application-specific, such as video, photo, vital document With privacy application program etc..In the scene, mobile terminal is stated with properties: < category android:name=" Android.intent.category.HOME "/>, which is Launcher class App distinctive attributes, can show and manage The application of all installations on customer mobile terminal.
Mobile terminal safeguards two list of application A and B, list of application A for recording the application program that can normally access, List of application B is for recording the privacy application program that user is saved using application-specific.
Mobile terminal can show that all list of application A of user, user can carry out daily application when initialization It uses.When user setting some application program a is privacy application program, application program a will be removed from list of application A, together This is no longer shown in step Launcher using entrance, application program a is added in list of application B by mobile terminal, so that can only After starting application-specific, the access application a in secret protection interface.
When user enables the privacy protection function of application-specific for the first time, needs to be arranged preset gesture and password is used In protection private data.After being arranged successfully, user can arrive selection interface, selection need application to be protected, picture, video, Document etc..
User can wake up privacy protection function by preset gesture such as " 7 " shape gesture, and specific implementation details is as follows:
Mobile terminal using gesture identification class GestureDetector carry out user gesture identification, when gesture on the screen When face is slided, onFling method is called, in this method includes MotionEvent event, for detecting user gesture sliding Direction and distance.
First check " cross " part gesture, specific judgment method: end point x2- starting point x1 > 200px, and absolute value (terminates Point y1- starting point y2) be less than 10px, then regard as " cross " gesture." perpendicular " part gesture is reexamined, specific judgment method: terminated Point y3- starting point y2 > 200px, and absolute value (end point x3- starting point x2) is less than 10px, then regards as " erecting " gesture.
After mobile terminal, which detects, inputs correct gesture, it will start application-specific and show numerical ciphers circle Face, user input password in the interface, and mobile terminal shows secret protection interface after password match success, in the interface Display is by contents such as the application program of secret protection, video, photo, documents.
To sum up, through this embodiment in method, application-specific can be hidden, by specific input operation starting Application-specific leads to the privacy of owner to prevent from starting application-specific when other people mobile terminals using owner The problem of data are leaked improves the safety of privacy of user data in mobile terminal.
Corresponding above-mentioned method for secret protection, the embodiment of the present application also provides a kind of privacy protection device, Fig. 6 is this Shen Please an embodiment provide privacy protection device structural schematic diagram, as shown in fig. 6, the device includes:
Program determining module 61, the application for the application program in the user behavior and mobile terminal according to acquisition belong to Property, application-specific is screened in the mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module 62, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module 63 is inputted, the input operation executed in the display interface for receiving user;
Program starting module 64 starts the specific application if meeting predetermined registration operation rule for input operation Program, to show privacy of user data.
Optionally, described program determining module is specifically used for: being sieved in the mobile terminal according to the user behavior of acquisition It is selected to save the first application program of designated user's data;In first application program, screening applicating category is specified First application program of classification is as application-specific.
Optionally, the input operation includes gesture operation;Described device further include: the first regular determining module is used for If the corresponding operation figure of the gesture operation is assignment graph, and/or, determine obtained user's according to the gesture operation Finger print information is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule;Alternatively, the input behaviour Make to include voice input operation;Described device further include: Second Rule determining module is operated for being inputted according to the voice, Determine the audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets The predetermined registration operation rule.
Optionally, the input operation includes gesture operation;Described program starting module is specifically used for: determining the gesture Operate corresponding operation figure;According to the corresponding relationship between preset gesture operation figure and private data type, institute is determined State target private data type corresponding to operation figure;Start the application-specific, in the application-specific The corresponding privacy of user data of the target private data type are shown in interface;Alternatively, the input operation includes that voice is defeated Enter operation;Described program starting module is specifically used for: being inputted and is operated according to the voice, determines the audio content of user's input; According to the audio content, the data type of privacy of user data to be shown is determined;Start the application-specific, in institute It states and shows the corresponding privacy of user data of the data type in the interface of application-specific.
Optionally, described program starting module is specifically used for: starting the application-specific, and shows that secret order inputs boundary Face;Receive the secret order information that user is inputted based on the secret order input interface;If the secret order information is legal secret order information, Privacy of user data are shown in the interface of the application-specific.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal The safety of private data.
Above-mentioned method for secret protection can be performed in the privacy protection device of the embodiment of the present application, and reaches identical effect, Details are not described herein.
Further, the embodiment of the present application also provides a kind of secret protection equipment, Fig. 7 provides for one embodiment of the application Secret protection equipment structural schematic diagram, as shown in fig. 7, the equipment includes: memory 701, processor 702,703 and of bus Communication interface 704.Memory 701, processor 702 and communication interface 704 are communicated by bus 703, and communication interface 704 can To include input/output interface, input/output interface includes but is not limited to keyboard, mouse, display, microphone, loudspeaker etc..
In Fig. 7, the computer executable instructions that can be run on the processor 702 are stored on the memory 701, The computer executable instructions realize following below scheme when being executed by the processor 702:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user Data.
Optionally, when the computer executable instructions are executed by the processor, according to the user behavior of acquisition and shifting The application attribute of application program in dynamic terminal, screens application-specific in the mobile terminal, comprising:
The first application for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition Program;
In first application program, screening applicating category is the first application program of specified classification as specific application Program.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped Make;The method also includes: if the corresponding operation figure of the gesture operation is assignment graph, and/or, it is grasped according to the gesture The finger print information for making to determine obtained user is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule Then;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determined The audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described Predetermined registration operation rule.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped Make;The starting application-specific, to show privacy of user data, comprising: determine the corresponding behaviour of the gesture operation Make figure;According to the corresponding relationship between preset gesture operation figure and private data type, operation figure institute is determined Corresponding target private data type;Start the application-specific, institute is shown in the interface of the application-specific State the corresponding privacy of user data of target private data type;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user Data, comprising: inputted and operated according to the voice, determine the audio content of user's input;According to the audio content, determine to The data type of the privacy of user data of display;Start the application-specific, in the interface of the application-specific Show the corresponding privacy of user data of the data type.
Optionally, when the computer executable instructions are executed by the processor, the starting specific application journey Sequence, to show privacy of user data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user is shown in the interface of the application-specific Data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal The safety of private data.
Further, described computer-readable to deposit the embodiment of the present application also provides a kind of computer readable storage medium Storage media is realized for storing computer executable instructions, when the computer executable instructions are executed by processor to flow down Journey:
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, sieved in the mobile terminal Select application-specific;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user Data.
Optionally, when the computer executable instructions are executed by the processor, according to the user behavior of acquisition and shifting The application attribute of application program in dynamic terminal, screens application-specific in the mobile terminal, comprising:
The first application for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition Program;
In first application program, screening applicating category is the first application program of specified classification as specific application Program.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped Make;The method also includes: if the corresponding operation figure of the gesture operation is assignment graph, and/or, it is grasped according to the gesture The finger print information for making to determine obtained user is legal finger print information, it is determined that the input operation meets the predetermined registration operation rule Then;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determined The audio content of user's input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described Predetermined registration operation rule.
Optionally, when the computer executable instructions are executed by the processor, the input operation includes that gesture is grasped Make;The starting application-specific, to show privacy of user data, comprising: determine the corresponding behaviour of the gesture operation Make figure;According to the corresponding relationship between preset gesture operation figure and private data type, operation figure institute is determined Corresponding target private data type;Start the application-specific, institute is shown in the interface of the application-specific State the corresponding privacy of user data of target private data type;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user Data, comprising: inputted and operated according to the voice, determine the audio content of user's input;According to the audio content, determine to The data type of the privacy of user data of display;Start the application-specific, in the interface of the application-specific Show the corresponding privacy of user data of the data type.
Optionally, when the computer executable instructions are executed by the processor, the starting specific application journey Sequence, to show privacy of user data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user is shown in the interface of the application-specific Data.
In the embodiment of the present application, by hiding application-specific, the specific application in the display interface of mobile terminal Program receives the input operation that user executes on the display interface of the mobile terminal for saving privacy of user data, if defeated Enter operation and meet predetermined registration operation rule, then starts the application-specific, to show privacy of user data, enable to user clear It lookes at less than application-specific, by specific input operation starting application-specific, to prevent other people from using owner's The problem of starting application-specific when mobile terminal, the private data of owner is caused to be leaked improves user in mobile terminal The safety of private data.
Wherein, the computer readable storage medium includes read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (10)

1. a kind of method for secret protection characterized by comprising
According to the application attribute of the application program in the user behavior and mobile terminal of acquisition, screened in the mobile terminal special Determine application program;The application-specific is for saving privacy of user data;
The application-specific is hidden in the display interface of the mobile terminal;
Receive the input operation that user executes in the display interface;
If the input operation meets predetermined registration operation rule, start the application-specific, to show privacy of user data.
2. the method according to claim 1, wherein according to the application in the user behavior and mobile terminal of acquisition The application attribute of program screens application-specific in the mobile terminal, comprising:
The first application program for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition;
In first application program, screening applicating category is the first application program of specified classification as specific application journey Sequence.
3. the method according to claim 1, wherein
The input operation includes gesture operation;The method also includes: if the corresponding operation figure of the gesture operation is to refer to Determine figure, and/or, determine that the finger print information of obtained user is legal finger print information according to the gesture operation, it is determined that institute It states input operation and meets the predetermined registration operation rule;
Alternatively,
The input operation includes voice input operation;The method also includes: it is inputted and is operated according to the voice, determine user The audio content of input;If the audio content includes specific audio frequency content, it is determined that the input operation meets described default Operation rules.
4. the method according to claim 1, wherein
The input operation includes gesture operation;The starting application-specific, to show privacy of user data, packet It includes: determining the corresponding operation figure of the gesture operation;According between preset gesture operation figure and private data type Corresponding relationship determines target private data type corresponding to the operation figure;Start the application-specific, described The corresponding privacy of user data of the target private data type are shown in the interface of application-specific;
Alternatively,
The input operation includes voice input operation;The starting application-specific, to show privacy of user data, Include: to be inputted to operate according to the voice, determines the audio content of user's input;According to the audio content, determine to be shown Privacy of user data data type;Start the application-specific, is shown in the interface of the application-specific The corresponding privacy of user data of the data type.
5. the method according to claim 1, wherein described start the application-specific, to show user Private data, comprising:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user number is shown in the interface of the application-specific According to.
6. a kind of privacy protection device characterized by comprising
Program determining module, for the application attribute of the application program in the user behavior and mobile terminal according to acquisition, in institute It states and screens application-specific in mobile terminal;The application-specific is for saving privacy of user data;
Program hidden module, for hiding the application-specific in the display interface of the mobile terminal;
Receiving module is inputted, the input operation executed in the display interface for receiving user;
Program starting module starts the application-specific if meeting predetermined registration operation rule for input operation, with Show privacy of user data.
7. device according to claim 6, which is characterized in that described program determining module is specifically used for:
The first application program for saving designated user's data is screened in the mobile terminal according to the user behavior of acquisition;
In first application program, screening applicating category is the first application program of specified classification as specific application journey Sequence.
8. device according to claim 6, which is characterized in that
The input operation includes gesture operation;Described device further include: the first regular determining module, if being grasped for the gesture Making corresponding operation figure is assignment graph, and/or, the finger print information of obtained user is determined according to the gesture operation to close Method finger print information, it is determined that the input operation meets the predetermined registration operation rule;
Alternatively,
The input operation includes voice input operation;Described device further include: Second Rule determining module, for according to Voice input operation, determines the audio content of user's input;If the audio content includes specific audio frequency content, it is determined that described Input operation meets the predetermined registration operation rule.
9. device according to claim 6, which is characterized in that
The input operation includes gesture operation;Described program starting module is specifically used for: determining that the gesture operation is corresponding Operate figure;According to the corresponding relationship between preset gesture operation figure and private data type, the operation figure is determined Corresponding target private data type;Start the application-specific, is shown in the interface of the application-specific The corresponding privacy of user data of the target private data type;
Alternatively,
The input operation includes voice input operation;Described program starting module is specifically used for: being inputted and is grasped according to the voice Make, determines the audio content of user's input;According to the audio content, the data class of privacy of user data to be shown is determined Type;Start the application-specific, the corresponding user of the data type is shown in the interface of the application-specific Private data.
10. device according to claim 6, which is characterized in that described program starting module is specifically used for:
Start the application-specific, and shows secret order input interface;
Receive the secret order information that user is inputted based on the secret order input interface;
If the secret order information is legal secret order information, privacy of user number is shown in the interface of the application-specific According to.
CN201811088944.3A 2018-09-17 2018-09-17 Method for secret protection and device Pending CN109376545A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811088944.3A CN109376545A (en) 2018-09-17 2018-09-17 Method for secret protection and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811088944.3A CN109376545A (en) 2018-09-17 2018-09-17 Method for secret protection and device

Publications (1)

Publication Number Publication Date
CN109376545A true CN109376545A (en) 2019-02-22

Family

ID=65405650

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811088944.3A Pending CN109376545A (en) 2018-09-17 2018-09-17 Method for secret protection and device

Country Status (1)

Country Link
CN (1) CN109376545A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795133A (en) * 2019-10-14 2020-02-14 广州微算互联信息技术有限公司 Automatic protection method and device for auxiliary application
CN111460481A (en) * 2020-04-14 2020-07-28 Oppo广东移动通信有限公司 Privacy protection method, device and equipment based on terminal equipment
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN116702184A (en) * 2022-11-15 2023-09-05 荣耀终端有限公司 Application starting method and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014169600A1 (en) * 2013-09-06 2014-10-23 中兴通讯股份有限公司 Method, device and terminal for processing hidden file folder
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN106295294A (en) * 2016-07-29 2017-01-04 北京小米移动软件有限公司 Method for controlling mobile terminal and device
CN107679411A (en) * 2017-09-07 2018-02-09 深圳支点电子智能科技有限公司 A kind of mobile terminal privacy processing method and mobile terminal
CN108171034A (en) * 2017-12-20 2018-06-15 维沃移动通信有限公司 A kind of method and terminal for protecting privacy

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239804A (en) * 2013-06-07 2014-12-24 腾讯科技(深圳)有限公司 Data protecting method and device
WO2014169600A1 (en) * 2013-09-06 2014-10-23 中兴通讯股份有限公司 Method, device and terminal for processing hidden file folder
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN106295294A (en) * 2016-07-29 2017-01-04 北京小米移动软件有限公司 Method for controlling mobile terminal and device
CN107679411A (en) * 2017-09-07 2018-02-09 深圳支点电子智能科技有限公司 A kind of mobile terminal privacy processing method and mobile terminal
CN108171034A (en) * 2017-12-20 2018-06-15 维沃移动通信有限公司 A kind of method and terminal for protecting privacy

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110795133A (en) * 2019-10-14 2020-02-14 广州微算互联信息技术有限公司 Automatic protection method and device for auxiliary application
CN110795133B (en) * 2019-10-14 2024-03-15 广州微算互联信息技术有限公司 Automatic protection method and device for auxiliary application
CN111460481A (en) * 2020-04-14 2020-07-28 Oppo广东移动通信有限公司 Privacy protection method, device and equipment based on terminal equipment
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN116702184A (en) * 2022-11-15 2023-09-05 荣耀终端有限公司 Application starting method and electronic equipment

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN109376545A (en) Method for secret protection and device
EP3547604B1 (en) Method and apparatus for security question generation and identity verification
US20070198933A1 (en) Permitting Multiple Tasks Requiring Elevated Rights
CN104077512A (en) Personnel information safety management method and management device
CN106716436A (en) Information display method and system
WO2016112468A1 (en) Automated classification and detection of sensitive content using virtual keyboard on mobile devices
CN111767554B (en) Screen sharing method and device, storage medium and electronic equipment
WO2020252951A1 (en) Screenshot processing method and mobile terminal
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN106547451A (en) Open application program method more, open application programmer and terminal more
CN107992545A (en) A kind of searching method, device, terminal and readable storage medium storing program for executing
US20220222953A1 (en) Managing camera actions
CN107422976A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN108717516A (en) File label method, terminal and medium
US20080102894A1 (en) Mobile terminal and data display method by individual sim cards
CN112533072A (en) Image sending method and device and electronic equipment
EP4276595A1 (en) Content display method and apparatus, and device and storage medium
CN105468947A (en) Information processing method and device and electronic equipment
CN110351432A (en) Communicate the display methods and mobile terminal of card information
CN106254675A (en) The method of system language setting and terminal
CN106874718A (en) privacy processing method, device and terminal
CN111898159A (en) Risk prompting method and device, electronic equipment and readable storage medium
KR101320473B1 (en) Method for setting up security level of information and communication device
CN106933666B (en) Method for calling information input program and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222