CN113704797A - Program encryption method and device, electronic equipment and storage medium - Google Patents

Program encryption method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113704797A
CN113704797A CN202111037559.8A CN202111037559A CN113704797A CN 113704797 A CN113704797 A CN 113704797A CN 202111037559 A CN202111037559 A CN 202111037559A CN 113704797 A CN113704797 A CN 113704797A
Authority
CN
China
Prior art keywords
application program
state
authority
opened
unencrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111037559.8A
Other languages
Chinese (zh)
Inventor
陶勇
李廷
曹东升
蔡蓉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Thunder Software Technology Co ltd
Original Assignee
Chengdu Thunder Software Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Thunder Software Technology Co ltd filed Critical Chengdu Thunder Software Technology Co ltd
Priority to CN202111037559.8A priority Critical patent/CN113704797A/en
Publication of CN113704797A publication Critical patent/CN113704797A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/0486Drag-and-drop

Abstract

The embodiment of the invention provides a program encryption method, a program encryption device, electronic equipment and a storage medium, wherein an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop, and the unencrypted state of the application program is changed into an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified to not have the authority, the displayed authority verification interface is kept, so that when the application program is encrypted, the operation is simple and convenient, the time consumption for operation is reduced, the usability of the encrypted application program is improved, and the risk of information leakage is reduced.

Description

Program encryption method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a program encryption method and apparatus, an electronic device, and a storage medium.
Background
Application (APP) encryption, i.e. encryption of any Application on the mobile terminal that wants to be protected. After the application program is encrypted, when the application program is accessed, a set password needs to be input. The birth of application encryption helps to prevent privacy leakage and is a sharp instrument for protecting privacy.
Currently, a mobile terminal already has an application encryption function, and the steps generally include: entering setting, finding an application encryption function, finding an application program needing encryption, turning on a switch behind, and turning off the switch behind the application in the above steps under the condition that the application is encrypted, namely, decrypting the application. For different operating systems, the application of the encryption process requires roughly 5-7 steps, and the whole process requires roughly more than 30 seconds.
The applicant finds that the steps of applying encryption and applying decryption are tedious, inconvenient and time-consuming. And the user can not encrypt the application program temporarily under some conditions when the user needs to use the mobile phone by others, and if the application is not encrypted due to difficult operation and long time consumption, the risk of information leakage exists.
Disclosure of Invention
The embodiment of the invention aims to provide a program encryption method, a program encryption device, electronic equipment and a storage medium, so that the problems of inconvenience in operation and long time consumption during encryption of an application program are solved.
In order to solve the above problem, in a first aspect of the present invention, there is provided a program encryption method, including:
dragging the icon of the application program in an unencrypted state to a target area on an operation desktop;
changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
dragging an icon of the application program in the encrypted state out of the target area;
verifying the authority of the user;
and if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
generating the target area on the operation desktop, and creating an application program record file corresponding to the target area;
the changing the unencrypted state of the application to the encrypted state includes:
adding the unique identification of the unencrypted application to the application record file.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area;
adding the unique identification of the application program in the existing area to the application program record file.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program;
if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed;
and if the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
Optionally, the region comprises at least one of: pages, folders.
In a second aspect of the present invention, there is provided a program encrypting apparatus comprising:
the first dragging module is used for dragging the icon of the application program in an unencrypted state to a target area on the operation desktop;
the first state changing module is used for changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, the apparatus further comprises:
the second dragging module is used for dragging the icon of the application program in the encrypted state out of the target area after the unencrypted state of the application program is changed into the encrypted state;
the authority verification module is used for verifying the authority of the user;
and the second state changing module is used for changing the encrypted state of the application program into the unencrypted state if the user is verified to have the authority, and keeping the encrypted state of the application program if the user is verified not to have the authority.
Optionally, the apparatus further comprises:
the area generation module is used for generating a target area on an operation desktop before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
the first state change module includes:
and the identification adding submodule is used for adding the unique identification of the unencrypted application program into the application program record file.
Optionally, the apparatus further comprises:
the area changing module is used for changing an existing area on an operation desktop into a target area before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
and the identification adding module is used for adding the unique identification of the application program in the existing area into the application program record file.
Optionally, the apparatus further comprises:
the matching module is used for matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program when the application program is opened after the unencrypted state of the application program is changed into the encrypted state;
the first display module is used for displaying an interface of the opened application program if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an unencrypted state;
and the second display module is used for displaying the authority verification interface if the unique identifier recorded in the application program recording file is matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an encrypted state.
Optionally, the region comprises at least one of: pages, folders.
In another aspect of the present invention, there is also provided an electronic device, including a processor, a communication interface, a memory and a communication bus, where the processor, the communication interface, and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing any of the above method steps when executing a program stored in the memory.
In yet another aspect of the present invention, there is also provided a computer-readable storage medium having stored therein instructions, which when run on a computer, cause the computer to perform any of the methods described above.
In yet another aspect of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the methods described above.
The embodiment of the invention provides a program encryption method, a program encryption device, electronic equipment and a storage medium, wherein an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop, and the unencrypted state of the application program is changed into an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified to not have the authority, the displayed authority verification interface is kept, so that when the application program is encrypted, the operation is simple and convenient, the time consumption for operation is reduced, the usability of the encrypted application program is improved, and the risk of information leakage is reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
FIG. 1 is a flow chart illustrating the steps of one embodiment of a method of program encryption of the present invention;
FIG. 2 shows a schematic diagram of application encryption and access flow;
FIG. 3 is a flow chart illustrating the steps of one embodiment of a method of program encryption of the present invention;
FIG. 4 is a schematic diagram illustrating the application decryption flow;
FIG. 5 is a flow chart illustrating the steps of one embodiment of a method of program encryption of the present invention;
FIG. 6 is a flow chart illustrating the steps of one embodiment of a method of program encryption of the present invention;
FIG. 7 is a schematic diagram illustrating an application encryption and access flow;
FIG. 8 is a block diagram showing the construction of an embodiment of a program encrypting apparatus according to the present invention;
fig. 9 shows a schematic diagram of an electronic device according to an embodiment of the invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a program encryption method according to the present invention is shown, which may specifically include the following steps:
step 101, dragging the icon of the application program in the unencrypted state to a target area on the operation desktop.
In an embodiment of the present invention, the unencrypted and encrypted states of an application are a pair of opposing concepts. In an unencrypted state, when the application program is opened, the interface of the application program is directly displayed without permission verification, namely the application program can be directly accessed. In the encrypted state, when the application program is opened, the interface of the application program needs to be intercepted, the authority verification interface is displayed, and the interface of the application program can be displayed only after the authority verification is successful, so that the protection of user information is realized.
In the embodiment of the invention, the operation desktop comprises each page of the operation system on the electronic equipment such as a mobile phone, a tablet computer and the like. The icon of the application program is positioned on the operation desktop, and the icon can move in position on the operation desktop. The target area may be one or more pages of the operation desktop, or may be a partial area in one page on the operation desktop, or may be a folder on the operation desktop, or any other suitable preset area, which is not limited in this embodiment of the present invention. One or more target areas can be set simultaneously on the operation desktop.
In an alternative embodiment of the invention, the zone comprises at least one of: pages, folders. There may be one or more target pages and one or more target folders. For example, an icon of a certain application program is dragged into a set target page on the operation desktop, or an icon of a certain application program is dragged into a set target folder on the operation desktop.
Step 102, changing the unencrypted state of the application program into an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
In the embodiment of the invention, after the icon of the application program is dragged into the target area, the unencrypted state of the application program can be changed into the encrypted state. Specific implementations may include a variety. For example, a unique identification of an unencrypted application is added to the application record file, with all applications uniquely identified in the application record file meant to be in an encrypted state. For another example, the application records the state of all applications in a file, and changes the unencrypted state recorded in the file to the encrypted state.
In the embodiment of the present invention, the permission verification manner may include multiple manners, for example, password verification, fingerprint verification, face verification, gesture verification, or any other suitable verification manner, which is not limited in this embodiment of the present invention. When an application program in an encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, and the authority of a user is verified. And displaying the interface of the application program in the encrypted state only under the condition that the user is verified to have the authority, otherwise, keeping displaying the authority verification interface. The permission verification interface may be a password input interface, a gesture input interface, a fingerprint verification interface, a face verification interface, or any other suitable interface, which is not limited in this embodiment of the present invention.
For example, a schematic diagram of the application encryption and access flow shown in fig. 2. And opening an application encryption function, automatically generating a blank folder on the operation desktop, wherein the name of the folder can be customized, and setting the password of the folder. And dragging the icon of the application program to be encrypted to the encrypted folder, thereby realizing the encryption of the application program. Accessing the application program in the encrypted state, intercepting an interface of the application program, displaying an authority verification interface, inputting a password in the authority verification interface, allowing the application program in the encrypted state to be accessed if the password is correct, and refusing the application program to be accessed if the password is incorrect.
The embodiment of the invention provides a program encryption method, a program encryption device, electronic equipment and a storage medium, wherein an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop, and the unencrypted state of the application program is changed into an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified to not have the authority, the displayed authority verification interface is kept, so that when the application program is encrypted, the operation is simple and convenient, the time consumption for operation is reduced, the usability of the encrypted application program is improved, and the risk of information leakage is reduced.
In an alternative embodiment of the present invention, as shown in the step flowchart of an embodiment of a program encryption method in fig. 3, after step 102, the method may further include:
step 103, dragging the icon of the application program in the encrypted state out of the target area.
And 104, verifying the authority of the user.
And 105, if the user is verified to have the authority, changing the encrypted state of the application program into an unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
When the encrypted application no longer needs to be encrypted, the operation is also simple, i.e., the icon of the encrypted application is dragged outside the target area. After the dragging is completed, the authority of the user needs to be verified first, and specifically, the authority can be verified through password verification, fingerprint verification, face verification and the like, or any other applicable verification method, which is not limited in the embodiment of the present invention. And if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program. The decryption of the application program is simple and convenient to operate, the time consumption of the operation is reduced, and the use efficiency of a user is improved.
For example, the schematic diagram of the application program decryption flow shown in fig. 4. For applications in an encrypted state, access from an encrypted folder on the desktop is required. Application a is removed from the encrypted folder, i.e., dragged out of the encrypted folder. The application a changes from an encrypted state to an unencrypted state. And the application program A is accessed again, and the application program A can be directly accessed without permission verification.
In an optional embodiment of the present invention, before the step 101, the method may further include: and generating the target area on the operation desktop, and creating an application program record file corresponding to the target area. Step 102 comprises: adding the unique identification of the unencrypted application to the application record file.
And generating an empty target area on the operation desktop, namely generating an icon of the application program in the target area. And creating an application program recording file corresponding to the target area, wherein all the application programs recorded in the file are the application programs in an encrypted state. When an application needs to be changed to an encrypted state, only the unique identification of the unencrypted application needs to be added to the application record file. Wherein the unique identifier may be a package name of the application.
In an alternative embodiment of the present invention, as shown in the step flowchart of an embodiment of a program encryption method in fig. 5, before step 101, the method may further include:
and 106, changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area.
And step 107, adding the unique identifier of the application program in the existing area into the application program record file.
The existing region on the operation desktop can be changed to the target region by setting. For example, on the operation desktop, a certain folder or page is set, and the folder or page is changed into an encrypted folder or page. For another example, in the setup, the application encryption function is found, the application encryption function is opened, and an existing folder or page is selected to be set to the encrypted state. Any suitable implementation may be specifically adopted, and the embodiment of the present invention is not limited thereto. And creating an application program recording file corresponding to the target area, and then adding the unique identifier of the application program in the existing area into the application program recording file, thereby realizing the encryption of the application program in the existing area.
Referring to fig. 6, a flowchart illustrating steps of an embodiment of a program encryption method according to the present invention is shown, which may specifically include the following steps:
in step 201, an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop.
Step 202, adding the unique identifier of the unencrypted application program into the application program record file.
Step 203, when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program.
In the embodiment of the invention, when the application program is opened, the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program. And if the unique identifier of the opened application program is consistent with the unique identifier recorded in the application program record file, matching the unique identifier recorded in the application program record file with the unique identifier of the opened application program. And if the process identification of the opened application program comprises the unique identification recorded in the application program record file, matching the process identification recorded in the application program record file with the unique identification of the opened application program.
For example, the application record file is an SQL (Structured Query Language) database. When the icon of the application program is moved to the encrypted folder, the package name of the application program is added to the SQL database. When opening a certain application program, firstly matching whether the packet name exists in the database or not. If the package name does not exist in the database, the application can directly access the package name and display an interface of the opened application program. If the package name exists in the database, the application program cannot be directly accessed, an authority verification interface is newly generated, the interface of the application program is intercepted, and the authority verification interface is displayed.
Also for example, a schematic diagram of an application encryption and access flow is shown in FIG. 7. For applications that have run in the background. And opening an application encryption function, automatically generating a blank folder on the operation desktop, wherein the name of the folder can be customized, and setting the password of the folder. And opening the application program A in an unencrypted state, wherein the application program A is operated, clicking the Home key to return to the operation desktop, and operating the application program A in the background. And dragging the icon of the application program A to be encrypted to the encrypted folder, thereby realizing the encryption of the application program. When accessing the application program in the encrypted state, all processes currently running are acquired first, and matching is performed according to the process name and the recorded unique identifier of the application program in the encrypted state, wherein the common process name comprises the unique identifier of the application program. When the application program in the encrypted state in the process is matched, before the background application is started, intercepting an interface of the application program, displaying an authority verification interface, inputting a password in the authority verification interface, allowing the application program in the encrypted state to be accessed if the password is correct, and refusing the application program to be accessed if the password is incorrect.
And 204, if the unique identifier recorded in the application program record file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed.
Step 205, if the unique identifier recorded in the application program record file matches the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
The embodiment of the invention provides a program encryption method, a device, electronic equipment and a storage medium, wherein an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop, a unique identifier of the unencrypted application program is added into an application program recording file, when the application program is opened, the unique identifier recorded in the application program recording file is matched with the unique identifier and/or a process identifier of the opened application program, if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, an interface of the opened application program is displayed, and if the unique identifier recorded in the application program recording file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed, so that the operation is simple and convenient when the application program is encrypted, the time consumption of the operation is reduced, the usability of the encrypted application program is improved, and the risk of information leakage is favorably reduced.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 8, a block diagram of a program encryption device according to an embodiment of the present invention is shown, which may specifically include the following modules:
a first dragging module 301, configured to drag an icon of an application program in an unencrypted state to a target area on an operation desktop;
the first state changing module 302 is configured to change an unencrypted state of the application program to an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, the apparatus further comprises:
the second dragging module is used for dragging the icon of the application program in the encrypted state out of the target area after the unencrypted state of the application program is changed into the encrypted state;
the authority verification module is used for verifying the authority of the user;
and the second state changing module is used for changing the encrypted state of the application program into the unencrypted state if the user is verified to have the authority, and keeping the encrypted state of the application program if the user is verified not to have the authority.
Optionally, the apparatus further comprises:
the area generation module is used for generating a target area on an operation desktop before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
the first state change module includes:
and the identification adding submodule is used for adding the unique identification of the unencrypted application program into the application program record file.
Optionally, the apparatus further comprises:
the area changing module is used for changing an existing area on an operation desktop into a target area before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
and the identification adding module is used for adding the unique identification of the application program in the existing area into the application program record file.
Optionally, the apparatus further comprises:
the matching module is used for matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program when the application program is opened after the unencrypted state of the application program is changed into the encrypted state;
the first display module is used for displaying an interface of the opened application program if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an unencrypted state;
and the second display module is used for displaying the authority verification interface if the unique identifier recorded in the application program recording file is matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an encrypted state.
Optionally, the region comprises at least one of: pages, folders.
The embodiment of the invention provides a program encryption method, a program encryption device, electronic equipment and a storage medium, wherein an icon of an application program in an unencrypted state is dragged to a target area on an operation desktop, and the unencrypted state of the application program is changed into an encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified to not have the authority, the displayed authority verification interface is kept, so that when the application program is encrypted, the operation is simple and convenient, the time consumption for operation is reduced, the usability of the encrypted application program is improved, and the risk of information leakage is reduced.
An embodiment of the present invention further provides an electronic device, as shown in fig. 9, which includes a processor 901, a communication interface 902, a memory 903, and a communication bus 904, where the processor 901, the communication interface 902, and the memory 903 complete mutual communication through the communication bus 904,
a memory 903 for storing computer programs;
the processor 901 is configured to implement the following steps when executing the program stored in the memory 903:
dragging the icon of the application program in an unencrypted state to a target area on an operation desktop;
changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
dragging an icon of the application program in the encrypted state out of the target area;
verifying the authority of the user;
and if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
generating the target area on the operation desktop, and creating an application program record file corresponding to the target area;
the changing the unencrypted state of the application to the encrypted state includes:
adding the unique identification of the unencrypted application to the application record file.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area;
adding the unique identification of the application program in the existing area to the application program record file.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program;
if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed;
and if the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
Optionally, the region comprises at least one of: pages, folders.
The communication bus mentioned in the above terminal may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the terminal and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
In yet another embodiment provided by the present invention, there is also provided a computer-readable storage medium having stored therein instructions, which when executed on a computer, cause the computer to perform the steps of:
dragging the icon of the application program in an unencrypted state to a target area on an operation desktop;
changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
dragging an icon of the application program in the encrypted state out of the target area;
verifying the authority of the user;
and if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
generating the target area on the operation desktop, and creating an application program record file corresponding to the target area;
the changing the unencrypted state of the application to the encrypted state includes:
adding the unique identification of the unencrypted application to the application record file.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area;
adding the unique identification of the application program in the existing area to the application program record file.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program;
if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed;
and if the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
Optionally, the region comprises at least one of: pages, folders.
In yet another embodiment provided by the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the steps of:
dragging the icon of the application program in an unencrypted state to a target area on an operation desktop;
changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
dragging an icon of the application program in the encrypted state out of the target area;
verifying the authority of the user;
and if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
generating the target area on the operation desktop, and creating an application program record file corresponding to the target area;
the changing the unencrypted state of the application to the encrypted state includes:
adding the unique identification of the unencrypted application to the application record file.
Optionally, before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further includes:
changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area;
adding the unique identification of the application program in the existing area to the application program record file.
Optionally, after the changing the unencrypted state of the application program to the encrypted state, the method further includes:
when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program;
if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed;
and if the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
Optionally, the region comprises at least one of: pages, folders.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (14)

1. A program encryption method, comprising:
dragging the icon of the application program in an unencrypted state to a target area on an operation desktop;
changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
2. The method of claim 1, wherein after the changing the unencrypted state of the application to the encrypted state, the method further comprises:
dragging an icon of the application program in the encrypted state out of the target area;
verifying the authority of the user;
and if the user is verified to have the authority, changing the encrypted state of the application program into the unencrypted state, and if the user is verified to not have the authority, keeping the encrypted state of the application program.
3. The method according to claim 1, wherein before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further comprises:
generating the target area on the operation desktop, and creating an application program record file corresponding to the target area;
the changing the unencrypted state of the application to the encrypted state includes:
adding the unique identification of the unencrypted application to the application record file.
4. The method according to claim 1, wherein before the dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, the method further comprises:
changing the existing area on the operation desktop into the target area, and creating an application program record file corresponding to the target area;
adding the unique identification of the application program in the existing area to the application program record file.
5. The method of claim 3 or 4, wherein after said changing the unencrypted state of the application to the encrypted state, the method further comprises:
when the application program is opened, matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program;
if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an unencrypted state, and an interface of the opened application program is displayed;
and if the unique identifier recorded in the application program record file is matched with the unique identifier and/or the process identifier of the opened application program, the opened application program is in an encrypted state, and the permission verification interface is displayed.
6. The method of any one of claims 1-4, wherein the region comprises at least one of: pages, folders.
7. A program encrypting apparatus, comprising:
the first dragging module is used for dragging the icon of the application program in an unencrypted state to a target area on the operation desktop;
the first state changing module is used for changing the unencrypted state of the application program into the encrypted state, so that when the application program in the encrypted state is opened, an interface of the application program in the encrypted state is intercepted, an authority verification interface is displayed, the authority of a user is verified, if the user is verified to have the authority, the interface of the application program in the encrypted state is displayed, and if the user is verified not to have the authority, the authority verification interface is kept displayed.
8. The apparatus of claim 7, further comprising:
the second dragging module is used for dragging the icon of the application program in the encrypted state out of the target area after the unencrypted state of the application program is changed into the encrypted state;
the authority verification module is used for verifying the authority of the user;
and the second state changing module is used for changing the encrypted state of the application program into the unencrypted state if the user is verified to have the authority, and keeping the encrypted state of the application program if the user is verified not to have the authority.
9. The apparatus of claim 7, further comprising:
the area generation module is used for generating a target area on an operation desktop before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
the first state change module includes:
and the identification adding submodule is used for adding the unique identification of the unencrypted application program into the application program record file.
10. The apparatus of claim 7, further comprising:
the area changing module is used for changing an existing area on an operation desktop into a target area before dragging the icon of the application program in the unencrypted state into the target area on the operation desktop, and creating an application program recording file corresponding to the target area;
and the identification adding module is used for adding the unique identification of the application program in the existing area into the application program record file.
11. The apparatus of claim 9 or 10, further comprising:
the matching module is used for matching the unique identifier recorded in the application program record file with the unique identifier and/or the process identifier of the opened application program when the application program is opened after the unencrypted state of the application program is changed into the encrypted state;
the first display module is used for displaying an interface of the opened application program if the unique identifier recorded in the application program recording file is not matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an unencrypted state;
and the second display module is used for displaying the authority verification interface if the unique identifier recorded in the application program recording file is matched with the unique identifier and/or the process identifier of the opened application program, and the opened application program is in an encrypted state.
12. The apparatus of any of claims 7-10, wherein the region comprises at least one of: pages, folders.
13. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1-6 when executing a program stored in the memory.
14. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202111037559.8A 2021-09-06 2021-09-06 Program encryption method and device, electronic equipment and storage medium Pending CN113704797A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111037559.8A CN113704797A (en) 2021-09-06 2021-09-06 Program encryption method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111037559.8A CN113704797A (en) 2021-09-06 2021-09-06 Program encryption method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113704797A true CN113704797A (en) 2021-11-26

Family

ID=78660360

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111037559.8A Pending CN113704797A (en) 2021-09-06 2021-09-06 Program encryption method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113704797A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5577125A (en) * 1993-06-14 1996-11-19 International Business Machines Corporation Graphical manipulation of encryption
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN105447357A (en) * 2015-12-03 2016-03-30 上海卓易科技股份有限公司 Application processing method and terminal
CN106529338A (en) * 2016-11-22 2017-03-22 北京奇虎科技有限公司 Safe processing method and equipment of data file
CN107784212A (en) * 2017-11-20 2018-03-09 北京小米移动软件有限公司 Icon display method and device
CN108491133A (en) * 2018-03-28 2018-09-04 维沃移动通信有限公司 A kind of application control method and terminal
WO2019047148A1 (en) * 2017-09-08 2019-03-14 深圳传音通讯有限公司 Password verification method, terminal, and computer readable storage medium
CN111338524A (en) * 2020-02-20 2020-06-26 维沃移动通信有限公司 Application program control method and electronic equipment
CN113221095A (en) * 2021-05-26 2021-08-06 珠海市魅族科技有限公司 Application program protection method and device, electronic equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5577125A (en) * 1993-06-14 1996-11-19 International Business Machines Corporation Graphical manipulation of encryption
CN103793663A (en) * 2013-12-26 2014-05-14 北京奇虎科技有限公司 Folder locking and unlocking methods and folder locking and unlocking devices
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN105447357A (en) * 2015-12-03 2016-03-30 上海卓易科技股份有限公司 Application processing method and terminal
CN106529338A (en) * 2016-11-22 2017-03-22 北京奇虎科技有限公司 Safe processing method and equipment of data file
WO2019047148A1 (en) * 2017-09-08 2019-03-14 深圳传音通讯有限公司 Password verification method, terminal, and computer readable storage medium
CN107784212A (en) * 2017-11-20 2018-03-09 北京小米移动软件有限公司 Icon display method and device
CN108491133A (en) * 2018-03-28 2018-09-04 维沃移动通信有限公司 A kind of application control method and terminal
CN111338524A (en) * 2020-02-20 2020-06-26 维沃移动通信有限公司 Application program control method and electronic equipment
CN113221095A (en) * 2021-05-26 2021-08-06 珠海市魅族科技有限公司 Application program protection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111539813B (en) Method, device, equipment and system for backtracking processing of business behaviors
US10762229B2 (en) Secure searchable and shareable remote storage system and method
WO2021003980A1 (en) Blacklist sharing method and apparatus, computer device and storage medium
EP3256967B1 (en) Increasing search ability of private, encrypted data
US10917394B2 (en) Data operations using a proxy encryption key
WO2017143879A1 (en) File permission management method and device
US10666647B2 (en) Access to data stored in a cloud
US20060018484A1 (en) Information processing device, information processing system, and program
US20110131418A1 (en) Method of password management and authentication suitable for trusted platform module
EP1698991A2 (en) Method and computer-readable medium for generating usage rights for an item based upon access rights
US11328082B2 (en) Differential privacy for encrypted data
CN115329389B (en) File protection system and method based on data sandbox
KR102071438B1 (en) Payment authentication method and apparatus of mobile terminal and mobile terminal
CN112733180A (en) Data query method and device and electronic equipment
US9819663B1 (en) Data protection file system
CN116956308A (en) Database processing method, device, equipment and medium
US20050071662A1 (en) Method of managing file structure in memory card and its related technology
CN101192263A (en) Information processing system and method
CN113704797A (en) Program encryption method and device, electronic equipment and storage medium
CN111966996A (en) Data processing method and device
EP3975024A1 (en) System and method of granting a user data processor access to a container of user data
CN112162923A (en) Interface testing method and device
CN114006695B (en) Hard disk data protection method and device, trusted platform chip and electronic equipment
CN113946864B (en) Confidential information acquisition method, device, equipment and storage medium
KR102005534B1 (en) Smart device based remote access control and multi factor authentication system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination