CN109522709A - Security processing and electronic equipment - Google Patents

Security processing and electronic equipment Download PDF

Info

Publication number
CN109522709A
CN109522709A CN201811213385.4A CN201811213385A CN109522709A CN 109522709 A CN109522709 A CN 109522709A CN 201811213385 A CN201811213385 A CN 201811213385A CN 109522709 A CN109522709 A CN 109522709A
Authority
CN
China
Prior art keywords
security application
stack
application
security
application stack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811213385.4A
Other languages
Chinese (zh)
Other versions
CN109522709B (en
Inventor
黄世光
冯荣峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201811213385.4A priority Critical patent/CN109522709B/en
Publication of CN109522709A publication Critical patent/CN109522709A/en
Application granted granted Critical
Publication of CN109522709B publication Critical patent/CN109522709B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

Present disclose provides a kind of security processings, comprising: obtains the first trigger event, first trigger event shows the first security application for characterizing;First security application is located in the security application stack of lock state;Wherein, the security application if the security application stack is in the lock state in the security application stack is in guard mode;Based on first trigger event, subscriber identity information is obtained;If subscriber identity information is verified, unlock the security application stack and the security application stack it is in the unlocked state it is lower first security application is switched in common application stack so that first security application is shown and is able to use.The disclosure additionally provides a kind of electronic equipment.

Description

Security processing and electronic equipment
Technical field
This disclosure relates to a kind of security processing and electronic equipment.
Background technique
In the prior art, when user's starting is protected in application, popping up user authentication interface, after user authentication passes through The shielded application can be operated, however, being protected since user authentication interface has just been started after protected application has been adjusted The related content of shield application can be seen before user authentication interface display, lead to the information leakage of shielded application, Such as short message, picture, address list content.In addition, in the case where protected application has been turned on, the related content of protected application It can be seen during protected application is switched over other application, also result in the information leakage of protected application.
Summary of the invention
An aspect of this disclosure provides a kind of security processing, comprising: obtains the first trigger event, the first triggering Event shows that the first security application, the first security application are located in the security application stack of lock state for characterizing, wherein Security application if security application stack is in the lock state in security application stack is in guard mode;Based on the first triggering thing Part obtains subscriber identity information;If subscriber identity information is verified, unlocks security application stack and be in security application stack The first security application is switched in common application stack under unlocked state, so that the first security application is shown and can make With.
Optionally, common application stack is isolated with security application stack.
Optionally, the above method further include: obtain the second trigger event, the second trigger event is for characterizing the first safety Application switching is to from the background;Based on the second trigger event, the first security application is switched to the security application stack being in the lock state It is interior;Corresponding first level of first security application is set in common application stack, sets empty state for the first level, first Level is in the position in common application stack for characterizing position of first security application in common application stack;Establish common application The index relative of the first security application in the first level and security application stack in stack.
Optionally, when the first security application is located in security application stack, the first level is for storing the first security application Interface identification so that during responding multiple application switchings with the interface identification characterize the first security application, the mark Interface does not include the content of the first security application.
Optionally, the first trigger event is starting event.It is above-mentioned to be based on first trigger event, obtain user identity packet It includes: judging whether the application to be started of starting event institute has safety label, if the application to be started of starting event institute has Safety label, then by application to be started be loaded onto the security application stack being in the lock state, while calling authentication interface, To prompt user to input subscriber identity information by the authentication interface.Wherein, the application is the first security application.
Optionally, above-mentioned to be based on first trigger event, obtain user identity further include: by institute's application to be started When being loaded onto the security application stack being in the lock state, in the corresponding first layer of common application stack creation institute application to be started First level is set empty state by grade.Above-mentioned calling authentication interface include: common application stack the first level it The corresponding level of upper creation authentication interface, wherein when subscriber identity information is verified, the corresponding level of the authentication interface It is destroyed.
Optionally, the above method further include: obtain default trigger action, respond the default trigger action, create and initial Change security application stack;Alternatively, before the first security application is loaded onto the security application stack, if there is no security application Stack creates and initializes security application stack to load the first security application.
Optionally, the above method further include: if security application all exits in security application stack, destroy the safety and answer Use stack.
Optionally, security application stack is in the unlocked state automatically switches back into lock state when meeting the predetermined time;Alternatively, If completed in security application stack lower first security application is switched in common application stack in the unlocked state, security application stack Automatically switch back into lock state.
Another aspect of the disclosure provides a kind of electronic equipment, including first obtains module, authentication module and first Secure processing module.First, which obtains module, shows for characterizing for obtaining the first trigger event, first trigger event One security application, first security application are located in the security application stack of lock state, wherein if the safety is answered Guard mode is in the security application that stack is in the lock state in the then security application stack.Authentication module is used for based on described First trigger event obtains subscriber identity information.First secure processing module is used for when subscriber identity information is verified, solution It locks the security application stack and lower is switched to first security application commonly the security application stack is in the unlocked state Using in stack, so that first security application is shown and is able to use.
Optionally, common application stack is isolated with security application stack.
Optionally, above-mentioned electronic equipment further includes the second acquisition module and the second secure processing module.Second obtains module For obtaining the second trigger event, the first security application is switched to backstage for characterizing by the second trigger event.Second safe place It manages module to be used to be based on the second trigger event, the first security application is switched in the security application stack being in the lock state;? First security application corresponding first level is set in common application stack, sets empty state, the first level for the first level In the position in common application stack for characterizing position of first security application in common application stack;It establishes in common application stack The first level and security application stack in the first security application index relative.
Optionally, when the first security application is located in security application stack, the first level is for storing the first security application Interface identification so that during responding multiple application switchings with the interface identification characterize the first security application, the mark Interface does not include the content of the first security application.
Optionally, the first trigger event is starting event.Authentication module is based on first trigger event, obtains user's body Part includes: authentication module for judging whether the application to be started of starting event institute has safety label, if starting event institute Application to be started have safety label, then by application to be started be loaded onto the security application stack being in the lock state, Authentication interface is called simultaneously, to prompt user to input subscriber identity information by the authentication interface.Wherein, the application is first Security application.
Optionally, authentication module is based on first trigger event, obtains user identity further include: authentication module is also used to By application to be started be loaded onto the security application stack being in the lock state when, common application stack creation to be started Using corresponding first level, set empty state for the first level.It includes: certification mould that authentication module, which calls authentication interface, Block on the first level of common application stack for creating the corresponding level of the authentication interface, wherein works as subscriber identity information When being verified, the corresponding level of the authentication interface is destroyed.
Optionally, above-mentioned electronic equipment further includes creation module, for obtaining default trigger action, responds the default triggering Operation, creates and initializes security application stack;Alternatively, for before the first security application is loaded onto the security application stack, If there is no security application stack, creates and initialize security application stack to load the first security application.
Optionally, above-mentioned electronic equipment further includes destroying module, is all exited for working as security application in security application stack When, destroy the security application stack.
Optionally, security application stack is in the unlocked state automatically switches back into lock state when meeting the predetermined time;Alternatively, If completed in security application stack lower first security application is switched in common application stack in the unlocked state, security application stack Automatically switch back into lock state.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions, Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the application scenarios of security processing and electronic equipment according to an embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the flow chart of security processing according to an embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the flow chart of security processing according to another embodiment of the present disclosure;
Fig. 4 A diagrammatically illustrates the flow chart of security processing according to another embodiment of the present disclosure;
Fig. 4 B diagrammatically illustrates the schematic diagram of common application stack and security application stack according to an embodiment of the present disclosure;
Fig. 4 C diagrammatically illustrates the signal of common application stack and security application stack according to another embodiment of the present disclosure Figure;
Fig. 4 D diagrammatically illustrates the signal of common application stack and security application stack according to another embodiment of the present disclosure Figure;
Fig. 5 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure;
Fig. 6 diagrammatically illustrates the block diagram of electronic equipment according to another embodiment of the present disclosure;And
Fig. 7 diagrammatically illustrates the block diagram of electronic equipment according to another embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of security processing and can apply the electronic equipment of this method.The party Method includes triggering stage, authentication phase and shows the stage, in the triggering stage, obtains the first triggering that characterization shows security application Event, security application are deposited in the security application stack of locking in advance and are protected, and in authentication phase, obtain the first trigger event Corresponding subscriber identity information is verified so that whether the clearly triggering is legal, then enters the displaying stage if the verification passes, right The unlock of security application stack, security application is transferred to from security application stack be shown in common application stack and allow using.
Fig. 1 diagrammatically illustrates the application scenarios of security processing and electronic equipment according to an embodiment of the present disclosure. It should be noted that being only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, to help those skilled in the art Understand the technology contents of the disclosure, but is not meant to that the embodiment of the present disclosure may not be usable for other equipment, system, environment or field Scape.
As shown in Figure 1, showing the electronic equipment 100 using security processing, electronic equipment 100 is in the present embodiment Smart phone, in other embodiments electronic equipment 100 can be plate, smartwatch, smart television, PC, etc. Various types of electronic equipments, herein with no restrictions.
It places on the desktop of electronic equipment 100 there are three application icon, corresponds respectively to using A, using B and using C, It is middle higher using the security level of B, it is related to payment, individual privacy etc., sets shielded security application using B for this, Security level using A and application C is lower, can be unprotected non-security application.
When obtaining the trigger event about application B, needing to guarantee will not be by can not credit household or can not using the content of B Letter application obtain, for example, using B be activated when, it is thus necessary to determine that the promoter of the starting event whether be it is believable, applying When B is switched to backstage, guarantees to be obtained by illegal side using the content of B, when being switched to foreground using B, guarantee to answer It will not be obtained by illegal side with the content of B.
Fig. 2 diagrammatically illustrates the flow chart of security processing according to an embodiment of the present disclosure.
As shown in Fig. 2, this method includes operation S201~S203.
In operation S201, the first trigger event is obtained, the first trigger event shows the first security application for characterizing, first Security application is located in the security application stack of lock state.
Wherein, the first security application is that security level is higher, needs to be protected for representing any security application, security application The application of shield.When security application stack is in the lock state, the content stored in security application stack cannot be accessed, i.e., in lock The security application determined in the security application stack under state is in guard mode, when security application stack is in the unlocked state, safety It can be accessed using the content stored in stack.
In operation S202, it is based on the first trigger event, subscriber identity information is obtained and is verified.
The subscriber identity information that user's input can be wherein obtained by prompt, can also directly acquire user without prompt Identity information can take a variety of prompting modes, such as voice prompting, display reminding, subscriber identity information when being prompted It may include such as finger print information, image information, iris information, encrypted message, herein with no restrictions.
In operation S203, when subscriber identity information is verified, unlocks security application stack and be in security application stack The first security application is switched in common application stack under unlocked state, so that the first security application is shown and can make With.
Wherein, the application that the application in common application stack can be demonstrated and use, and be located in security application stack It cannot be demonstrated and use, applying in security application stack is needing to be demonstrated and in use, needing passing through user's body Part Information Authentication determine it is legal after be transferred in common application stack.
As it can be seen that for any security application on the one hand method shown in Fig. 2 is protected using the safety of security application stack Security application, security application be not demonstrated and using when security application is placed in locking security application stack in, ensure that peace The safety in the stage being not yet demonstrated is applied entirely, is on the other hand obtaining the first trigger event for characterizing displaying security application When, verify the first trigger event source it is whether legal, determine it is legal after security application stack is unlocked again, safety is answered It is shown and is used with common application stack is switched to from security application stack, ensure that security application is being demonstrated and service stage Safety.
In embodiment of the disclosure, common application stack is isolated with security application stack.For non-security application, appoint When one non-security application is activated, which is pressed into common application stack, when the non-security application When corresponding level is located at the stack top of common application stack, which is demonstrated, and user can see the non-security application Interface, when the non-security application is exited, the corresponding level destroyed recycling from common application stack of non-security application, i.e., Common application stack is used only in non-security application, and the method as shown in figure 2 above, security application use common application stack and safety Using stack.Wherein, in common application stack, the content for being not only located at stack top can be directly visible, and in common application stack Content can be fully retrieved by some interfaces of system level, for example, being ordered in android system by dumpsys The content of common application stack can be enumerated by enabling, and the security application stack being in the lock state either from user level still from System level can not all be got.
Wherein, security application stack is by system creation and management, and system dynamically distributes security application stack and manages safety Using the operating status of stack, the state of security application stack includes creation, initialization, locking, unlock and destroys.It is optional as one Embodiment, method shown in Fig. 2 further include: obtain default trigger action, respond the default trigger action, create simultaneously initial Change the security application stack.For example, for a user, the icon of security application is placed in a file of system desktop In, when user opens this document folder, that is, default trigger action occurs, is created in response to the operation and initializes security application Stack.Alternatively, before above-mentioned first security application is loaded onto security application stack, needing to sentence as another optional embodiment Whether existing security application stack creates if there is no security application stack and initializes security application stack to add in disconnected system Carry first security application.
In accordance with an embodiment of the present disclosure, method shown in Fig. 2 further include: if security application is complete in the security application stack When portion exits, the security application stack is destroyed.
Fig. 3 diagrammatically illustrates the flow chart of security processing according to another embodiment of the present disclosure.
As shown in figure 3, this method include operation S201~S207, wherein operation S201~S203 hereinbefore it is stated that, It is not repeated herein.
In operation S204, the second trigger event is obtained, the first security application is switched to by the second trigger event for characterizing From the background.
This operation executes after operating S203, operation S203 by subscriber identity information verify by the first security application from Security application stack switches to after common application stack is shown, this operation obtains characterization and the first security application is switched to backstage Second trigger event.
In operation S205, it is based on the second trigger event, the first security application is switched to the safety being in the lock state and is answered With in stack.
In operation S206, corresponding first level of the first security application is set in common application stack, the first level is set It is set to empty state, the first level is in the position in common application stack for characterizing the first security application in common application stack Position.
It wherein, is that the first empty level stays in commonly by state when removing the first security application from common application stack Using position of the first security application in stack where original, for example, the first security application should be at the 2nd layer of common application stack Place the first empty level is arranged at the 2nd layer of common application stack, and the first level after removing the second security application Position can pop and change with the stacking of content in common application stack subsequent, the position of the first level characterizes first If security level be not switched to security application stack its ought to where position.
In operation S207, the index of the first security application in the first level in common application stack and security application stack is established Relationship.
Wherein it is possible to synchronously the position using the first level corresponding with the first security application in common application stack as Index can continue to execute operation S201~S203, when being verified, by the safety under unlocked state after operating S207 It is switched in common application stack using the first security application in stack, can be the rope according to the first security application and the first level Draw relationship, the first security application is switched to currently common using in stack on the position of the first level.
As it can be seen that method shown in Fig. 3 not only includes the process being shown in method shown in Fig. 2 to security application, also wrap It includes after being shown to security application, security application is fallen back on to the process on backstage.It is right after subscriber identity information is verified Security application is shown, and security application is switched in common application stack, when needing security application switching to backstage, Retain the corresponding dead level grade of security application in common application stack, security application is switched to security application stack under lock state into Row protection, the corresponding dead level grade of security application are the first security application occupy-place in common application stack.
In one embodiment of the present disclosure, the first trigger event is starting event.Based on described in aforesaid operations S202 Whether first trigger event, obtaining user identity includes: judge the application to be started of starting event institute with safety label, when opening When the application to be started of dynamic event institute has safety label, show the application to be started of starting event institute to need protected peace First security application, then be loaded onto the security application stack being in the lock state, simultaneously by full application, such as the first security application Authentication interface is called, to prompt user to input subscriber identity information by the authentication interface.Then to subscriber identity information into Row verifying, if the verification passes, authentication interface disappears, while being unlocked to security application stack, by the first security application from solution Security application stack under lock status is transferred to the stack top of common application stack, and the interface that user can see the first security application is gone forward side by side It exercises and uses.When the application to be started of the event of starting institute does not have safety label, show that the application to be started of starting event institute is The non-security application is then loaded directly into the stack top of common application stack by non-security application, and user can see this and non-security answer It is used with going forward side by side to exercise.
In another embodiment of the disclosure, the first trigger event is that will apply from the switching thing for switching to foreground from the background Part, judges whether the application on the handover event foreground of being switched to has safety label, when the handover event to be switched to When the application on foreground has safety label, show the application on the handover event foreground of being switched to need protected safety Using, such as the first security application, from method shown in Fig. 3 it is found that the first security application is when being in backstage, the first security application It is stored in the security application stack of locking, calls authentication interface at this time, used with prompting user to input by the authentication interface Family identity information.Then subscriber identity information is verified, if the verification passes, authentication interface disappears, while answering safety It is unlocked with stack, the first security application is transferred to the stack top of common application stack from the security application stack under unlocked state, i.e., First security application is switched to foreground, and the interface that user can see the first security application is gone forward side by side to exercise and be used.When the switching thing When the application on the part foreground of being switched to does not have safety label, show that the application on the handover event foreground of being switched to is non- Security application, non-security apply are located in common application stack when in backstage, then non-security apply this in common application stack In position be adjusted to the stack top of common application stack, i.e. the non-security application is switched to foreground, and user can see the non-peace Full application is gone forward side by side to exercise and be used.
It should be noted that security application stack is generally in lock state, the unlocked state of security application stack be it is interim, Security application stack can automatically switch back into lock state after being unlocked, in response to some scheduled conditions, to protect security application Content safety in stack.For example, the security application stack time in the unlocked state meets predetermined after security application stack is unlocked When the time, security application stack automatically switches back into lock state.It is verified, needs the first peace alternatively, working as subscriber identity information In the case that full application switches to common application stack from security application stack, to can be monitored after the unlock of security application stack by the first peace Full application switches to this event of common application stack from security application stack, and after the completion of this event, security application stack is cut automatically Gain lock state.
Below with reference to Fig. 4 A~Fig. 4 D, Fig. 2~method shown in Fig. 3 is described further in conjunction with specific embodiments.
Fig. 4 A diagrammatically illustrates the flow chart of security processing according to another embodiment of the present disclosure.
As shown in Figure 4 A, this method includes operation S401~S408.
In operation S401, the starting event for applying B is obtained.
In operation S402, judges whether institute application B to be started is security application, be to execute operation S403, otherwise hold Row operation S408.
It in operation S403, will be loaded onto the security application stack being in the lock state using B, answered in the creation of common application stack With the corresponding level B ' of B, it will be set as empty state using the corresponding level B ' of B, establish level B ' in common application stack The index relative of position and application B, while the corresponding level b of authentication interface is created on level B '.
In operation S404, obtains subscriber identity information and verified, when being verified, the corresponding level b of authentication interface It is destroyed, security application stack is unlocked, according to position of the level B ' in common application stack and application B index relative, By the position for switching to level B ' in common application stack using B in the security application stack of unlocked state.
Illustrate aforesaid operations S401~S404:
In this example, electronic equipment is smart phone, and the operating system of electronic equipment is android system, in other examples In, other electronic equipments can be used, other types operating system can be used, herein with no restrictions.In the table of electronic equipment There are multiple application icons on face, is had been turned on using A.At this point, user click using B icon with start apply B, system in response to The event starts StartActivity component, and StartActivity component gives starting using the message transmission of this event of B Administrative decision service (PMS service), StartActivity component pass an Intent message to PMS service, the Intent message In with the relevant informations such as packet name using B, PMS service for the decision Intent message whether effectively and B is applied in judgement Whether it is security application, is that then one confirmation message of PMS service passback gives StartActivity component, StartActivity group Part will be loaded onto the security application stack being in the lock state using B, after knowing using B and being security application in common application The corresponding level B ' of B is applied in indentation in stack, sends authorization messages (Auth Intent) to authentication interface, to have adjusted authentication interface, Authentication interface corresponding level b is pressed into when authentication interface has been adjusted in common application stack.
Fig. 4 B diagrammatically illustrates the schematic diagram of common application stack and security application stack according to an embodiment of the present disclosure.
As shown in Figure 4 B, original desktop and A is applied in common application stack, desktop is located at the 0th layer of common application stack, application A is located at the 1st layer of common application stack.When obtaining starting using the event of B and determining that applying B is security application, common application The corresponding level B ' of B is applied in indentation in stack, and the state of level B ' is sky, and level B ' is located at the 2nd layer of common application stack at this time, and It will be put into the security application stack of lock state using B, then the corresponding level b of authentication interface is pressed into common application stack, level b Positioned at the 2.1st layer of common application stack, the position of the adjacent level B ' of level b and on level B ', record level B ' is as answering With the index of B.User can see authentication interface on the screen of the electronic device at this time, and due to being authenticated in common application stack Next level of the corresponding level b in interface is empty level B ', even if user also can't see application before authentication interface is shown The content of B.
After having adjusted authentication interface, user inputs subscriber identity information according to the prompt of authentication interface, to the user of input Identity information is verified, and specifically be can be and is compared with the legitimate user's identity information prestored, after being verified, certification Boundary's system-oriented returns authorization messages, and system is unlocked security application stack, according to the index of application B, by security application stack In switch in common application stack in level B ' using B, while the corresponding level b of authentication interface is destroyed, at this point, existing using B Position in common application stack is stack top, and user can see after the authentication interface on the screen of electronic equipment disappears and show glibly Content using B is shown.
In operation S405, first handover event on backstage will be switched to using B by obtaining, and will be cut using B from common application stack Security application stack is shifted to, retains and applies the corresponding level B ' of B in common application stack.
Whether it is security application that this operation is also required to judgement using B, and only this process is according to preceding step default application B For security application, repeat no more.
Above example is continued to use, B will applied to apply after in the level B ' that security application stack switches to common application stack B is located at the stack top of common application stack, and the interface of B is applied in display on the screen of electronic equipment, at this point, start using C, application again C is non-security application, is pressed directly into common application stack, and backstage will be switched to using B, then will cut using B from common application stack Shift to security application stack, retain and apply the corresponding level B ' of B in common application stack, the state of level B ' is sky, using B always with Position of the level B ' in common application stack is index.
Fig. 4 C diagrammatically illustrates the signal of common application stack and security application stack according to another embodiment of the present disclosure Figure.
As shown in Figure 4 C, in common application stack, using in C indentation common application stack, it is located at using the level where C general The logical stack top using stack, desktop are located at the 0th layer of common application stack, are located at the 1st layer of common application stack using A, right using B institute The level B ' answered is located at the 2nd layer of common application stack, and the 3rd layer (stack top) for being located at common application stack using C is switched using B Into the security application stack of locking.User can see the content using C at this time, and due to applying B with sky in common application stack Level B ' replace, the content using B will not be seen in handoff procedure.
In operation S406, second handover event on foreground will be switched to using B by obtaining, corresponding using B in common application stack Level B ' move to the stack top of common application stack, the corresponding level b of authentication interface is created on level B '.
In operation S407, obtains subscriber identity information and verified, when being verified, the corresponding level b of authentication interface It is destroyed, security application stack is unlocked, according to position of the level B ' in common application stack and application B index relative, By the position for switching to level B ' in common application stack using B in the security application stack of unlocked state.
It continues to use above example and illustrates aforesaid operations S406~S407:
It is located at the 0th layer of common application stack in desktop, is located at the 1st layer of common application stack using A, using corresponding to B Level B ' is located at the 2nd layer of common application stack, and in the case where the 3rd layer (stack top) that common application stack is located at using C, user wants Foreground will be switched back into using B, and send authorization messages to authentication interface in response to the event system, to have adjusted authentication interface, certification Authentication interface corresponding level b is pressed into when interface has been adjusted in common application stack.
Fig. 4 D diagrammatically illustrates the signal of common application stack and security application stack according to another embodiment of the present disclosure Figure.
As shown in Figure 4 D, originally desktop is located at the 0th layer of common application stack, is located at the 1st layer of common application stack using A, It is located at the 2nd layer of common application stack using level B ' corresponding to B, is located at the 3rd layer (stack top) of common application stack using C, uses Family wants that foreground will be switched to using B, due to applying B in common application stack is substituted with level B ' at this time, then level B ' quilt Foreground is switched to, level B ' becomes the 3rd layer from the 2nd layer of common application stack, becomes " 3 " using the index of B from " 2 ", then will recognize It demonstrate,proves the corresponding level b in interface and is pressed into common application stack, level b is located at the 3.1st layer of common application stack, the adjacent level B ' of level b And on level B '.User can see authentication interface on the screen of the electronic device at this time, and due in common application stack Next level of the corresponding level b of middle authentication interface is empty level B ', even if user also sees not before authentication interface is shown To the content of application B.
After having adjusted authentication interface, user inputs subscriber identity information according to the prompt of authentication interface, to the user of input Identity information is verified, and after being verified, authentication interface returns authorization messages to system, and system carries out security application stack Unlock, according to the index " 3 " of application B, by being switched in common application stack in level B ', simultaneously using B in security application stack The corresponding level b of authentication interface is destroyed, at this point, being stack top using position of the B in common application stack, user can see electronics Authentication interface on the screen of equipment shows the content using B glibly after disappearing.
In operation S408, B is applied in load directly in common application stack.
In the above example, when application B is at backstage, using B in the security application stack of locking, and it is corresponding using B Level B ' is in common application stack for using B occupy-place, and when application B is on backstage, level B ' is located at non-stack top in common application stack Position, in such cases, as an optional embodiment, can be used in the first level storage apply B mark circle Face, so that B is applied during responding multiple application switchings with the interface identification characterization of application B, to prompt this task of user Corresponding to B is applied, due to not including the substantive content using B in the interface identification of application B, user is in a multi-tasking mode Only it can be seen that can't see the content using B using information such as the title of B, icon, particular hint languages.
In above-mentioned lifted example, the first trigger event and the second trigger event are by Client-initiated, in other realities It applies in example, the first trigger event can be initiated by other application, and the second trigger event can also be initiated by other application, herein not It is limited.
As it can be seen that authentication interface can't see the content of security application, safety in the start-up course of security application before showing Using guard mode is also in the security application stack for depositing in locking, in the handoff procedure of security application, it is switched to every time Foreground will be authenticated, and authentication interface can't see the content of security application before showing, and security application is stored at backstage Guard mode is in the security application stack of locking, either starting or switching state, the content of security application will not It is illegally accessed and reveals, greatly ensure safety the safety of application.
In accordance with an embodiment of the present disclosure, by introduce security application stack management module, dynamically distribute security application stack and Manage the operating status of safe stack, including creation, initialization, the states such as locking and unlocking, and destruction.Security application stack by It creates and initializes before the security application starting of protection, for storing security application in the stack state of system, and in security application During security application stack, lock state is set by security application stack, once security application stack is in locking shape State, current security application stack can not be accessed by other application or system interface, realize system layer common application stack and safety Using the completely isolated of stack, after user completes authentication, have stack management module and unlock current safety application stack, and cut The security application in the security application stack is changed to common application stack, so that it is normally shown to user, it is ensured that in subscriber identity information Not over before, protected content will not be shown for verifying.
Fig. 5 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure.
As shown in figure 5, electronic equipment 500 includes the first acquisition module 510, authentication module 520 and the first safe handling mould Block 530.The electronic equipment 500 can execute the method described above with reference to Fig. 2~Fig. 4 D, to realize to security application in system Effective protection.
First, which obtains module 510, shows first for characterizing for obtaining the first trigger event, first trigger event Security application, first security application are located in the security application stack of lock state, wherein if the security application The security application that stack is in the lock state in the then security application stack is in guard mode.
Authentication module 520 is used to be based on first trigger event, obtains subscriber identity information to be verified.
First secure processing module 530 be used for when subscriber identity information is verified, unlock the security application stack and The security application stack it is in the unlocked state it is lower first security application is switched in common application stack so that described First security application is shown and is able to use.
In embodiment of the disclosure, common application stack is isolated with security application stack.
In accordance with an embodiment of the present disclosure, the first trigger event is starting event.Authentication module 520 is based on first triggering Event, obtaining user identity includes: authentication module 520 for judging whether the application to be started of starting event institute has safety post Institute's application to be started is loaded onto locking shape by note if the application to be started of starting event institute has safety label In the security application stack of state, while authentication interface is called, to prompt user to input subscriber identity information by the authentication interface.Its In, the application is the first security application.
Specifically, as an optional embodiment, authentication module 520 is based on first trigger event, obtains user Identity further include: authentication module 520 be also used to by application to be started be loaded onto the security application stack being in the lock state When interior, in corresponding first level of common application stack creation institute application to be started, empty state is set by the first level.Recognize It includes: authentication module 520 for creating the certification on the first level of common application stack that card module 520, which calls authentication interface, The corresponding level in interface, wherein when subscriber identity information is verified, the corresponding level of the authentication interface is destroyed.
Fig. 6 diagrammatically illustrates the block diagram of electronic equipment according to another embodiment of the present disclosure.
As shown in fig. 6, electronic equipment 600 includes the first acquisition module 510, authentication module 520, the first secure processing module 530, second module 540, the second secure processing module 550, creation module 560 is obtained and destroys module 570.
Wherein, first obtain module 510, authentication module 520 and the first secure processing module 530 hereinbefore it is stated that, Duplicate part repeats no more.
Second, which obtains module 540, answers the first safety for characterizing for obtaining the second trigger event, the second trigger event Be switched to backstage.
Second secure processing module 550 is used to be based on the second trigger event, and the first security application is switched in locking In the security application stack of state;Corresponding first level of first security application is set in common application stack, the first level is set It is set to empty state, the first level is in the position in common application stack for characterizing the first security application in common application stack Position;Establish the index relative of the first level in common application stack and the first security application in security application stack.
In one embodiment of the present disclosure, creation module 560 responds the default triggering for obtaining default trigger action Operation, creates and initializes security application stack;Alternatively, for before the first security application is loaded onto the security application stack, If there is no security application stack, creates and initialize security application stack to load the first security application.
In one embodiment of the present disclosure, module 570 is destroyed to be used for when security application all exits in security application stack When, destroy the security application stack.
As an optional embodiment, when the first security application is located in security application stack, the first level is for depositing The interface identification of the first security application is put, so that with the first peace of interface identification characterization during responding multiple application switchings Full application, which does not include the content of the first security application.
As an optional embodiment, security application stack is in the unlocked state to be automatically switched back into when meeting the predetermined time Lock state;Alternatively, if lower first security application is switched in common application stack security application stack is in the unlocked state It completes, security application stack automatically switches back into lock state.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, first obtain module 510, authentication module 520, the first secure processing module 530, second obtain module 540, Second secure processing module 550, creation module 560 and destroy any number of may be incorporated in a module in module 570 It realizes or any one module therein can be split into multiple modules.Alternatively, one or more moulds in these modules At least partly function of block can be combined at least partly function of other modules, and be realized in a module.According to this Disclosed embodiment, identification signals sending module 410, identification signals receiving module 420, identification module 430, And at least one of information signal transceiver module 440 can at least be implemented partly as hardware circuit, such as scene can It programs gate array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated Integrated circuit (ASIC), or can be by carrying out hardware or the firmwares such as any other rational method that is integrated or encapsulating to circuit It realizes, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined To realize.Alternatively, first obtain module 510, authentication module 520, the first secure processing module 530, second obtain module 540, At least one of second secure processing module 550, creation module 560 and destruction module 570 can be at least at least partially implemented Corresponding function can be executed when the computer program module is run for computer program module.
Fig. 7 diagrammatically illustrates the electronics for being adapted for carrying out method as described above according to another embodiment of the present disclosure and sets Standby block diagram.Electronic equipment shown in Fig. 7 is only an example, should not function and use scope band to the embodiment of the present disclosure Carry out any restrictions.
As shown in fig. 7, electronic equipment 700 includes processor 710 and computer readable storage medium 720.The electronic equipment 700 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 710 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 710 can also include using for caching The onboard storage device on way.Processor 710 can be the different movements for executing the method flow according to the embodiment of the present disclosure Single treatment unit either multiple processing units.
Computer readable storage medium 720, such as can be non-volatile computer readable storage medium, specific example Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 720 may include computer program 721, which may include generation Code/computer executable instructions execute processor 710 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 721 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 721 may include one or more program modules, for example including 721A, module 721B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 710 When execution, processor 710 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, first obtains module 510, authentication module 520, the first secure processing module 530, the Two obtain at least one of module 540, the second secure processing module 550, creation module 560 and destruction module 570 can be real It is now the computer program module described with reference to Fig. 7, when being executed by processor 710, may be implemented described above corresponding Operation.
The above embodiment of the present invention manages shielded application by security application stack, that is, shielded to apply journey Tagmeme will be located in the security application stack in backstage Shi Qi, and only there are its corresponding dead level grades in common application stack.So Shielded application during switching is done for multiple applications in common application stack just no longer shows any content, only one A icon for prompt, does not show any content of the application program, thus safer.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of security processing, comprising:
The first trigger event is obtained, first trigger event shows the first security application for characterizing;First safety is answered With in the security application stack for being located in lock state;Wherein, the peace if the security application stack is in the lock state The full security application using in stack is in guard mode;
Based on first trigger event, subscriber identity information is obtained;
If subscriber identity information is verified, the security application stack and in the unlocked state in the security application stack is unlocked It is lower that first security application is switched in common application stack, so that first security application is shown and can make With.
2. according to the method described in claim 1, wherein, the common application stack is isolated with the security application stack.
3. according to the method described in claim 1, further include:
The second trigger event is obtained, first security application is switched to backstage for characterizing by second trigger event;
Based on second trigger event, first security application is switched to the security application stack being in the lock state It is interior;Corresponding first level of first security application is set in the common application stack, sets sky for the first level State, position of first level in common application stack is for characterizing first security application in the common application stack In position;
Establish the rope of first security application in first level in the common application stack and the security application stack Draw relationship.
4. according to the method described in claim 3, wherein:
When first security application is located in security application stack, first level is for storing first security application Interface identification so that characterize first security application during responding multiple application switchings with the interface identification, The interface identification does not include the content of first security application.
5. according to the method described in claim 1, wherein:
First trigger event is starting event;
Described to be based on first trigger event, obtaining user identity includes:
Judge whether the application to be started of starting event institute has safety label;
If the application to be started of the event of starting institute has safety label, the application is loaded onto the institute being in the lock state It states in security application stack, while calling authentication interface,
To prompt user to input subscriber identity information by the authentication interface;
Wherein, the application is the first security application.
6. according to the method described in claim 5, wherein:
It is described to be based on first trigger event, obtain user identity further include: the application is loaded onto lock described It, will be described in corresponding first level of the common application stack creation application when determining in the security application stack of state First level is set as empty state;
The calling authentication interface includes: that create the authentication interface on the first level of the common application stack corresponding Level, wherein when subscriber identity information is verified, the corresponding level of the authentication interface is destroyed.
7. according to the method described in claim 5, further include:
Default trigger action is obtained, the default trigger action is responded, creates and initialize the security application stack;Or
Before the first security application is loaded onto the security application stack, if there is no the security application stack, create and first The beginningization security application stack is to load first security application.
8. according to the method described in claim 1, further include:
If security application all exits in the security application stack, the security application stack is destroyed.
9. according to the method described in claim 1, wherein:
The security application stack is in the unlocked state to automatically switch back into the lock state when meeting the predetermined time;Or
If lower first security application is switched to the common application stack the security application stack is in the unlocked state Interior completion, the security application stack automatically switch back into the lock state.
10. a kind of electronic equipment, comprising:
First obtains module, and for obtaining the first trigger event, first trigger event shows that the first safety is answered for characterizing With;First security application is located in the security application stack of lock state;Wherein, if the security application stack is in Security application of the lock state then in the security application stack is in guard mode;
Authentication module obtains subscriber identity information for being based on first trigger event;
First secure processing module, for when subscriber identity information is verified, unlocking the security application stack and described Security application stack it is in the unlocked state it is lower first security application is switched in common application stack so that it is described first peace Full application is shown and is able to use.
CN201811213385.4A 2018-10-17 2018-10-17 Security processing method and electronic device Active CN109522709B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811213385.4A CN109522709B (en) 2018-10-17 2018-10-17 Security processing method and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811213385.4A CN109522709B (en) 2018-10-17 2018-10-17 Security processing method and electronic device

Publications (2)

Publication Number Publication Date
CN109522709A true CN109522709A (en) 2019-03-26
CN109522709B CN109522709B (en) 2021-06-15

Family

ID=65772061

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811213385.4A Active CN109522709B (en) 2018-10-17 2018-10-17 Security processing method and electronic device

Country Status (1)

Country Link
CN (1) CN109522709B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023071415A1 (en) * 2021-10-26 2023-05-04 华为技术有限公司 Application display method, electronic device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014025458A1 (en) * 2012-08-09 2014-02-13 Cisco Technology, Inc. Secure mobile client with assertions for access to service provider applications
CN103593619A (en) * 2013-11-13 2014-02-19 宇龙计算机通信科技(深圳)有限公司 Method and system applied to data protection
CN105472147A (en) * 2015-11-23 2016-04-06 努比亚技术有限公司 Application lock processing method based on eye print identification and apparatus thereof
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility
CN106716432A (en) * 2014-09-22 2017-05-24 迈克菲股份有限公司 Pre-launch process vulnerability assessment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014025458A1 (en) * 2012-08-09 2014-02-13 Cisco Technology, Inc. Secure mobile client with assertions for access to service provider applications
CN103593619A (en) * 2013-11-13 2014-02-19 宇龙计算机通信科技(深圳)有限公司 Method and system applied to data protection
CN106716432A (en) * 2014-09-22 2017-05-24 迈克菲股份有限公司 Pre-launch process vulnerability assessment
CN105472147A (en) * 2015-11-23 2016-04-06 努比亚技术有限公司 Application lock processing method based on eye print identification and apparatus thereof
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023071415A1 (en) * 2021-10-26 2023-05-04 华为技术有限公司 Application display method, electronic device, and storage medium

Also Published As

Publication number Publication date
CN109522709B (en) 2021-06-15

Similar Documents

Publication Publication Date Title
US20200404019A1 (en) Mutual authentication security system with detection and mitigation of active man-in-the-middle browser attacks, phishing, and malware and other security improvements
CN109522722A (en) System method and device of safe processing
EP2764462B1 (en) Method of generating, from an initial package file comprising an application to be secured and an initial configuration file, a package file for securing the application, and associated computer program product and computing device
CN105830477A (en) Operating system integrated domain management
CN104427089B (en) Mobile terminal and mobile terminal authority management method
CN104850768A (en) Access control method and device on the basis of application security level
CN105530261B (en) The guard method of privacy information and device
CN105320891B (en) A kind of method and device of computer security loading system mirror image
CN103632107B (en) A kind of information of mobile terminal security protection system and method
CN111259421A (en) Privacy authority anti-disclosure processing method and device, electronic equipment and storage medium
CN105678192A (en) Smart card based secret key application method and application apparatus
CN104184900A (en) Data processing method, system and mobile terminal
CN106650373A (en) SIM card information protection method and device
CN110096881A (en) Malice calls means of defence, device, equipment and computer-readable medium
EP3336734B1 (en) Fingerprint information secure call method, apparatus, and mobile terminal
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
US20170201528A1 (en) Method for providing trusted service based on secure area and apparatus using the same
US20150047019A1 (en) Information processing method and electronic device
CN113051542A (en) Two-dimensional code processing method and equipment
CN104751028B (en) The method and device of application program encryption, decryption
CN109522709A (en) Security processing and electronic equipment
US10719456B2 (en) Method and apparatus for accessing private data in physical memory of electronic device
CN106503570A (en) The method and device of protection Root authority
KR20160065261A (en) System for preventing forgery of application and method therefor
CN104955043B (en) A kind of intelligent terminal security protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant