WO2017000523A1 - 一种应用程序的保密方法及装置、电子设备 - Google Patents
一种应用程序的保密方法及装置、电子设备 Download PDFInfo
- Publication number
- WO2017000523A1 WO2017000523A1 PCT/CN2015/099421 CN2015099421W WO2017000523A1 WO 2017000523 A1 WO2017000523 A1 WO 2017000523A1 CN 2015099421 W CN2015099421 W CN 2015099421W WO 2017000523 A1 WO2017000523 A1 WO 2017000523A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- electronic device
- program
- user
- fingerprint key
- display
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Definitions
- the invention relates to a method for securing an application, a security device and an electronic device.
- the user's security requirements for electronic devices are becoming more and more intense, and electronic devices with security setting functions are also increasing.
- the mobile terminal's alpha/numeric combination is turned on and unlocked, and the IPAD fingerprint is turned on and unlocked.
- the electronic device with the power-on unlock function leaks user information frequently. That is to say, the security mode of the above electronic device can only be encrypted by using the Home button or a simple digital/letter combination. Once the power-on password is leaked or the electronic device is directly opened and used by other users, the electronic device is in the electronic device. User information for each application is quickly leaked.
- the security function of the above electronic device cannot separately keep a single application in the device confidential, that is, it is impossible to perform separate security settings for some or all applications in the mobile phone, so that user information of various applications in the electronic device is easily leaked.
- the present disclosure provides a method and device for securing an application, and an electronic device, which can set different encryption fingerprint keys for each application in the electronic device to achieve better protection. User information to improve the user experience.
- a method of securing an application includes:
- determining, according to the matching result, whether to open the first program including:
- the matching result is a mismatch, displaying the first prompt information prompting the fingerprint key input error in the electronic device interface, and/or displaying the second prompt of the N input opportunities in the electronic device interface a prompt information, and displaying the first display frame, where N is a positive integer greater than or equal to 1.
- the method before the displaying, in the electronic device interface, the first display frame for prompting the user to input the fingerprint key, the method further includes:
- step of displaying the first display frame in the electronic device interface is performed, otherwise, the interface of the first program is directly displayed in the electronic device interface.
- the method further includes:
- the encrypted fingerprint key is stored.
- a security device includes:
- a first display unit configured to display, in the electronic device interface, a first display frame for prompting the user to input the fingerprint key after receiving the touch instruction for the user to open the first program
- a receiving unit configured to receive a fingerprint key input by the user through the first display frame
- a matching unit configured to match the received fingerprint key with a preset encrypted fingerprint key to obtain a matching result, where the encrypted fingerprint key is a preset preset by the user for protecting the first program Key;
- a processing unit configured to determine whether to open the first program according to the matching result.
- processing unit is further configured to be configured to
- the interface of the first program is displayed in the electronic device interface according to the touch instruction;
- the device further comprises a viewing unit.
- the viewing unit is configured to view whether the first program belongs to a program in the list of confidential programs.
- the first display unit is configured to display the first display frame when the viewing unit determines that the first program belongs to a program in the confidential program list, otherwise, directly display in the electronic device interface The interface of the first program.
- the device further includes a second display unit and a storage unit.
- the second display unit is configured to display a second display frame for prompting the user to input the encrypted fingerprint key in the electronic device interface if the user triggers the encryption button/key modification button of the first program in the electronic device.
- the receiving unit is further configured to receive an encrypted fingerprint key input by the user through the second display frame.
- the storage unit is configured to store the encrypted fingerprint key.
- an electronic device is provided. There are multiple applications installed on the electronic device.
- the electronic device also includes the security device of any of the above.
- the security device is integrated in the application, or the security device is communicatively coupled to the application.
- the electronic device includes: a touch display substrate, a touch display panel, or a touch display device.
- the touch display substrate, the touch display panel or the touch display device implements a full screen fingerprint recognition technology.
- the method and device for securing an application may display a prompt for prompting the user to input a fingerprint key after receiving a touch command triggered by the user for opening the corresponding program.
- a display box further receives a fingerprint key input by the user through the first display frame, matches the received fingerprint key with a preset encrypted fingerprint key, and determines whether to open the program corresponding to the current touch instruction according to the matching result.
- the present invention can achieve at least one of the following beneficial effects and/or Or other beneficial effects: better protection of user information in the program, setting different encryption fingerprint keys for each application in the electronic device, better protecting user information, and improving user experience.
- FIG. 1 is a schematic flowchart of a method for securing an application according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of a method for securing an application according to another embodiment of the present invention.
- FIG. 3 is a schematic diagram of a program to be opened in a user touch electronic device according to an embodiment of the invention.
- FIG. 4 is a schematic structural diagram of a security device according to an embodiment of the present invention.
- FIG. 1 is a schematic flow chart of a method for securing an application according to an embodiment of the present invention. As shown in FIG. 1, the privacy method of the application of this embodiment is as follows.
- Step 101 After receiving a touch command for the user to open the first program, the first display frame for prompting the user to input the fingerprint key is displayed in the electronic device interface.
- the first display frame can be an interface for entering a fingerprint key, such as a fingerprint entry interface.
- Step 102 Receive a fingerprint key input by the user through the first display box.
- the fingerprint of the current finger of the user is scanned to obtain a fingerprint key.
- the fingerprint key here can be one finger or a fingerprint key of two or more fingers.
- the fingerprint key there may also be a fingerprint and other letters/numbers
- the fingerprint key is not limited, and the fingerprint key can be set according to actual needs.
- Step 103 Match the received fingerprint key with a preset encrypted fingerprint key to obtain a matching result, where the encrypted fingerprint key is a key preset by the user for protecting the first program.
- Step 104 Determine, according to the matching result, whether to open the first program.
- the interface of the first program is displayed in the electronic device interface, for example, the main interface of the first program, that is, the triggering of the trigger instruction corresponding to the opening a program.
- the first prompt information prompting the fingerprint key input error is displayed in the electronic device interface, and/or the prompt is displayed in the electronic device interface.
- a second prompt information of the secondary input opportunity, and displaying the first display frame where N is a positive integer greater than or equal to 1. That is, when the fingerprints do not match, the user can be allowed to perform fingerprint input and recognition again.
- N can be 2, 3 or 5.
- the method for securing the application of the embodiment may display a first display frame for prompting the user to input a fingerprint key after receiving the touch command triggered by the user to the application, and then receiving the fingerprint input by the user through the first display frame.
- the key matches the received fingerprint key with the preset encrypted fingerprint key, and determines whether to open the program corresponding to the current touch instruction according to the matching result.
- the foregoing method shown in FIG. 1 may further include a step 100 not shown in the figure before step 101.
- Step 100 After receiving the touch command triggered by the user for opening the first program, check whether the first program belongs to the program in the confidential program list. If yes, the step of displaying the first display frame for prompting the user to input the fingerprint key in the electronic device interface in step 101 is performed. Otherwise, the main interface of the first program is directly displayed in the electronic device interface.
- the security device of each electronic device may be pre-set with a list of security programs according to user instructions.
- the user opens each program it can be checked whether the program belongs to the program in the confidential program list, thereby better protecting the user information in the electronic device.
- the second user does not want the first user to view the short message, WeChat, and Alipay.
- you can take the short message The sequence, WeChat program, and Alipay program are added to the list of confidential programs.
- the encrypted fingerprint key for each program can be set in the second display box displayed by the security device.
- a full-screen fingerprint recognition technology can be combined to perform different fingerprint recognition for different applications.
- the fingerprint may be input in the designated interface of the electronic device display interface or the display screen to match the preset encrypted fingerprint key, and according to the matching result, whether to open the application that the user wants to open is opened, thereby effectively reducing the applications of the electronic device.
- FIG. 2 is a schematic flowchart diagram of a method for securing an application according to an embodiment of the present invention.
- 3 shows a schematic diagram of a program to be opened in a user's touch electronic device in accordance with one embodiment of the present invention.
- the security method of the application of this embodiment includes the following steps:
- Step 201 If the user triggers the encryption button of the first program in the electronic device, displaying a second display frame for prompting the user to input the encrypted fingerprint key in the electronic device interface.
- the second display frame can be an interface for entering an encrypted fingerprint key, such as a fingerprint entry interface.
- Step 202 Receive an encrypted fingerprint key input by the user through the second display frame.
- Step 203 Store the encrypted fingerprint key.
- the encrypted fingerprint key is not limited to one fingerprint, and two or more fingerprints may be selected as the encrypted fingerprint key, and the combination of the fingerprint and the letter/number/sliding direction may be used as the encrypted fingerprint key.
- the encrypted fingerprint key for different applications can be different.
- Step 204 If receiving a touch command for the user to open the first program, the user may check whether the first program belongs to the program in the confidential program list. If yes, step 205 is performed; otherwise, the main interface of the first program is directly displayed in the electronic device interface.
- the first program triggered by the user in FIG. 3 is WeChat, it can be checked whether the WeChat belongs to the program in the confidential program list.
- Step 205 When it is observed in step 204 that the first program belongs to the program in the confidential program list, the first display frame for prompting the user to input the fingerprint key is displayed in the electronic device interface.
- Step 206 Receive a fingerprint key input by the user through the first display box.
- Step 207 Match the received fingerprint key with a preset encrypted fingerprint key to obtain a matching result, where the encrypted fingerprint key is preset by the user for entering the first program. Line protected key.
- Step 208 Determine, according to the matching result, whether to open the first program. For example, if the matching result in step 207 is a perfect match, the main interface of the first program is displayed in the electronic device interface.
- step 207 if the matching result in step 207 is a mismatch, the second prompt information for prompting the fingerprint key verification error is displayed in the electronic device interface, and the first program is not opened.
- the user can also modify the set encrypted fingerprint key. For example, if the user triggers a key modification button for key opening of the first program (such as Alipay, WeChat, etc.) in the electronic device, a second display for prompting the user to input the encrypted fingerprint key may be displayed in the electronic device interface. frame.
- a key modification button for key opening of the first program such as Alipay, WeChat, etc.
- an encryption button/key modification button of the security program/secure device may be embedded in a menu of an application (such as WeChat, Alipay), etc., and when the user triggers the encryption button/key modification button.
- the second display frame can be displayed in the electronic device interface by the security program/secure device.
- an application to be kept secret such as Alipay, WeChat, etc.
- an application to be kept secret is added to the list in the security device, thereby real-time monitoring the user's touch command for triggering the application in the electronic device. If the touch command is monitored, it is checked whether the program corresponding to the touch command belongs to the program in the confidential program list. If yes, the first display frame is displayed, and the touch command is masked to the program corresponding to the touch command, and only when the verified fingerprint key matches the preset encrypted fingerprint key, the touch command is triggered. The program opens.
- the email, short message, and photo programs in the mobile phone can be added to the confidential program list. , thereby effectively protecting the user information in the mobile phone.
- the unprotected application such as time, weather, news client, etc. in the mobile phone may not be added to the confidential program list, and the specific application needs to input a specific fingerprint identification to be opened, and the unlocking of the mobile phone itself in the prior art is no longer limited. It can effectively avoid the leakage of user information and enhance the user experience.
- FIG. 4 is a schematic structural diagram of a security device according to an embodiment of the present invention.
- the security device of this embodiment includes: a first display unit 41 and a receiving unit. 42. Matching unit 43 and processing unit 44.
- the first display unit 41 is configured to display a first display frame for prompting the user to input the fingerprint key in the electronic device interface after receiving the touch instruction for the user to open the first program.
- the receiving unit 42 is configured to receive a fingerprint key input by the user through the first display frame.
- the matching unit 43 is configured to match the received fingerprint key with a preset encrypted fingerprint key to obtain a matching result, where the encrypted fingerprint key is a password preset by the user for protecting the first program. key.
- the processing unit 44 is configured to determine whether to open the first program based on the matching result.
- processing unit 44 is further configured for
- the main interface of the first program is displayed in the electronic device interface according to the touch instruction;
- the security device may further include a viewing unit 40, not shown, configured to view whether the first program belongs to a program in the confidential program list.
- the first display unit 41 is further configured to display the first display frame when the viewing unit 40 determines that the first program belongs to a program in the secret program list, otherwise, at the electronic device interface The main interface of the first program is directly displayed.
- the security device in FIG. 4 above may further include a second display unit not shown in the following figure.
- the second display unit is configured to: before the first display unit 41 displays the first display frame, if the user triggers an encryption button/key modification button of the first program in the electronic device, in the electronic device interface A second display box is displayed for prompting the user to enter an encrypted fingerprint key.
- the receiving slip 42 is further configured to receive an encryption input by the user through the second display frame. Fingerprint key.
- the security device may further comprise a storage unit not shown, the storage unit being configured to store the encrypted fingerprint key.
- the encrypted fingerprint key can be stored in a fingerprint database.
- the second display unit of the embodiment is connected to the storage unit, and the second display unit is connected to the first display unit 41.
- the security device can set different encryption fingerprint keys for each application to be kept secret in the electronic device, thereby implementing confidentiality of the programs, so as to achieve better protection of user information and improve user experience.
- the security device may be an APP program based on full screen fingerprint recognition technology in an electronic device.
- the functions of the security device according to some embodiments of the present invention may also be integrated into any application of the electronic device such as WeChat, Alipay, and the like.
- an electronic device in accordance with some embodiments of the present invention, can include a plurality of applications. Further, the electronic device may further include the security device described in any of the above embodiments.
- the security device can be integrated in the application, or the security device can be communicatively/electrically connected to the application.
- the electronic device in the above embodiments may include a touch display substrate, a touch display panel, or a touch display device.
- the electronic device can be: a tablet, a smart terminal, an IPAD, a smart TV, an advertising device, or the like, any product or component having a touch display function. If the electronic device is a smart TV or a smart advertising device, it is possible to set different permissions for the user/member without viewing and setting various contents.
- the aforementioned program can be stored in a computer readable storage medium.
- the program when executed, performs the steps including the various method embodiments described above.
- the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.
- any reference signs placed in parentheses shall not be construed as limiting the claim.
- the word “comprising” does not exclude the presence of the elements or the The word “a” or “an” or “an”
- the invention may be implemented by means of hardware comprising several discrete elements, or by suitably programmed software or firmware, or by any combination thereof.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Biomedical Technology (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Biodiversity & Conservation Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims (11)
- 一种应用程序的保密方法,包括:接收用户触发用于打开第一程序的触控指令之后,在电子设备界面中展示用于提示用户输入指纹密钥的第一展示框;接收用户通过第一展示框输入的指纹密钥;将接收的指纹密钥与预设的加密指纹密钥进行匹配,获得匹配结果,所述加密指纹密钥为用户预先设定的用于对第一程序进行保护的密钥;根据匹配结果,确定是否打开所述第一程序。
- 根据权利要求1所述的方法,其中,所述根据匹配结果,确定是否打开所述第一程序,包括:若匹配结果为完全匹配,则在所述电子设备界面中展示所述第一程序的界面;或者,若匹配结果为不匹配,则在所述电子设备界面中显示提示指纹密钥输入错误的第一提示信息,和/或,在所述电子设备界面中显示提示还有N次输入机会的第二提示信息,以及展示所述第一展示框,N为大于等于1的正整数。
- 根据权利要求1所述的方法,其中,所述在电子设备界面中展示用于提示用户输入指纹密钥的第一展示框之前,所述方法还包括:查看所述第一程序是否属于保密程序列表中的程序;如果是,则执行在电子设备界面中展示第一展示框的步骤,否则,在所述电子设备界面中直接展示所述第一程序的界面。
- 根据权利要求1或2所述的方法,其中,在电子设备界面中展示用于提示用户输入指纹密钥的第一展示框之前,所述方法还包括:若用户触发电子设备中第一程序的加密按钮/密钥修改按钮,则在电子设备界面中显示用于提示用户输入加密指纹密钥的第二展示框;接收用户通过第二展示框输入的加密指纹密钥;存储所述加密指纹密钥。
- 一种保密装置,包括:第一展示单元,被配置用于在接收用户触发用于打开第一程序的 触控指令之后,在电子设备界面中展示用于提示用户输入指纹密钥的第一展示框;接收单元,被配置用于接收用户通过第一展示框输入的指纹密钥;匹配单元,被配置用于将接收的指纹密钥与预设的加密指纹密钥进行匹配,获得匹配结果,所述加密指纹密钥为用户预先设定的用于对第一程序进行保护的密钥;以及处理单元,被配置用于根据匹配结果,确定是否打开所述第一程序。
- 根据权利要求5所述的装置,其中,所述处理单元进一步被配置用于在匹配结果为完全匹配时,根据所述触控指令在所述电子设备界面中展示所述第一程序的界面;或者,在匹配结果为不匹配时,在所述电子设备界面中显示提示指纹密钥输入错误的第一提示信息,和/或,在所述电子设备界面中显示提示还有N次输入机会的第二提示信息,以及展示所述第一展示框,N为大于等于1的正整数。
- 根据权利要求5所述的装置,其中,所述装置还包括:查看单元,被配置用于查看所述第一程序是否属于保密程序列表中的程序;所述第一展示单元被配置用于在查看单元确定所述第一程序属于保密程序列表中的程序时,展示所述第一展示框,否则,在所述电子设备界面中直接展示所述第一程序的界面。
- 根据权利要求5或6所述的装置,其中,所述装置还包括第二展示单元和存储单元;所述第二展示单元被配置用于若用户触发电子设备中第一程序的加密按钮/密钥修改按钮,则在电子设备界面中显示用于提示用户输入加密指纹密钥的第二展示框;所述接收单元还被配置用于接收用户通过第二展示框输入的加密指纹密钥;所述存储单元被配置用于存储所述加密指纹密钥。
- 一种电子设备,其上安装有多个应用程序,其中,所述电子设 备还包括上述权利要求5至8中任一项所述的保密装置;所述保密装置集成在所述应用程序中,或者,所述保密装置与所述应用程序通信连接。
- 根据权利要求9所述的电子设备,其中,所述电子设备包括:触控显示基板、触控显示面板或触控显示装置。
- 根据权利要求10所述的电子设备,其中,所述触控显示基板、触控显示面板或触控显示装置实现了全屏指纹识别技术。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/105,697 US20180198619A1 (en) | 2015-07-01 | 2015-12-29 | A securing apparatus for an application in an electronic device and method thereof |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510380058.8 | 2015-07-01 | ||
CN201510380058.8A CN104933343A (zh) | 2015-07-01 | 2015-07-01 | 一种应用程序的保密方法及装置、电子设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017000523A1 true WO2017000523A1 (zh) | 2017-01-05 |
Family
ID=54120506
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/099421 WO2017000523A1 (zh) | 2015-07-01 | 2015-12-29 | 一种应用程序的保密方法及装置、电子设备 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20180198619A1 (zh) |
CN (1) | CN104933343A (zh) |
WO (1) | WO2017000523A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113378136A (zh) * | 2021-06-08 | 2021-09-10 | 罗克佳华(重庆)科技有限公司 | 一种指纹识别方法、装置、密码钥匙及存储介质 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933343A (zh) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | 一种应用程序的保密方法及装置、电子设备 |
CN105243307A (zh) * | 2015-09-18 | 2016-01-13 | 京东方科技集团股份有限公司 | 一种触摸屏的指纹识别方法及装置 |
CN106778297B (zh) * | 2016-11-30 | 2020-02-14 | Oppo广东移动通信有限公司 | 应用程序的运行方法、装置及移动终端 |
CN108369618A (zh) * | 2016-12-14 | 2018-08-03 | 华为技术有限公司 | 一种指纹识别方法及终端设备 |
CN107133500A (zh) * | 2017-06-07 | 2017-09-05 | 深圳天珑无线科技有限公司 | 一种应用程序的加密方法及移动终端 |
JP6921654B2 (ja) * | 2017-06-29 | 2021-08-18 | キヤノン株式会社 | 情報処理装置、方法、及びプログラム |
CN107729722A (zh) * | 2017-10-31 | 2018-02-23 | 深圳依偎控股有限公司 | 一种应用程序的保密操作方法和系统 |
KR101893950B1 (ko) * | 2018-02-06 | 2018-08-31 | 주식회사 이스트시큐리티 | 랜부팅 환경 기반 파일 보안 및 중앙화를 위한 장치, 이를 위한 방법 및 이 방법을 수행하기 위한 프로그램이 기록된 컴퓨터 판독 가능한 기록매체 |
CN111104044B (zh) * | 2018-10-25 | 2024-04-30 | 上海宝存信息科技有限公司 | 数据储存装置及其适应性数据读取方法 |
CN110162241A (zh) * | 2019-05-24 | 2019-08-23 | 维沃移动通信有限公司 | 一种消息处理方法及终端 |
CN111818376A (zh) * | 2020-07-08 | 2020-10-23 | 深圳创维-Rgb电子有限公司 | 一种密码设置方法、智能电视、电子设备及可读存储介质 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103279411A (zh) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | 基于指纹识别进入应用程序的方法及系统 |
CN103366107A (zh) * | 2013-06-27 | 2013-10-23 | 广东欧珀移动通信有限公司 | 一种保护应用程序访问权限的方法、装置及手机 |
CN103617382A (zh) * | 2013-11-22 | 2014-03-05 | 北京奇虎科技有限公司 | 隐私保护方法及其装置 |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN104573485A (zh) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | 一种终端应用的启动方法及装置 |
CN104933343A (zh) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | 一种应用程序的保密方法及装置、电子设备 |
-
2015
- 2015-07-01 CN CN201510380058.8A patent/CN104933343A/zh active Pending
- 2015-12-29 WO PCT/CN2015/099421 patent/WO2017000523A1/zh active Application Filing
- 2015-12-29 US US15/105,697 patent/US20180198619A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103279411A (zh) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | 基于指纹识别进入应用程序的方法及系统 |
CN103366107A (zh) * | 2013-06-27 | 2013-10-23 | 广东欧珀移动通信有限公司 | 一种保护应用程序访问权限的方法、装置及手机 |
US20150067827A1 (en) * | 2013-08-29 | 2015-03-05 | Pantech Co., Ltd. | Apparatus and method for setting a user-defined pattern for an application |
CN103617382A (zh) * | 2013-11-22 | 2014-03-05 | 北京奇虎科技有限公司 | 隐私保护方法及其装置 |
CN104573485A (zh) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | 一种终端应用的启动方法及装置 |
CN104933343A (zh) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | 一种应用程序的保密方法及装置、电子设备 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113378136A (zh) * | 2021-06-08 | 2021-09-10 | 罗克佳华(重庆)科技有限公司 | 一种指纹识别方法、装置、密码钥匙及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN104933343A (zh) | 2015-09-23 |
US20180198619A1 (en) | 2018-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017000523A1 (zh) | 一种应用程序的保密方法及装置、电子设备 | |
KR102299261B1 (ko) | 어플리케이션의 잠금 상태를 제어하는 방법 및 이를 지원하는 전자장치 | |
US9262616B2 (en) | Simplified multi-factor authentication | |
JP6571203B2 (ja) | モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末 | |
RU2608243C2 (ru) | Способ и устройство для разблокирования экрана и терминала | |
US20170097900A1 (en) | Secure island computing system and method | |
WO2017012302A1 (zh) | 一种消息显示方法及装置 | |
US9286451B2 (en) | Password authentication | |
US20100009658A1 (en) | Method for identity authentication by mobile terminal | |
WO2018205456A1 (zh) | 密码输入方法、计算机设备和存储介质 | |
CN103886237A (zh) | 具有指纹传感器和触摸屏的电子设备的控制方法及系统 | |
CN112804445B (zh) | 显示方法、装置和电子设备 | |
US20140245457A1 (en) | Method and device for initiating privacy mode of data processing apparatus | |
TW201539247A (zh) | 密碼輸入與確認方法及其系統 | |
CN108027853B (zh) | 多用户强认证令牌 | |
US10474804B2 (en) | Login mechanism for operating system | |
US20150047019A1 (en) | Information processing method and electronic device | |
US20240232417A1 (en) | Object Movement Method, Apparatus and Electronic Device | |
US10009341B1 (en) | External keyboard with OTP capability | |
CN105703909A (zh) | 一种认证方法及电子设备 | |
JP6938579B2 (ja) | モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末 | |
WO2022247865A1 (zh) | 显示控制方法、装置、电子设备及介质 | |
CN113672886A (zh) | 提示方法和装置 | |
US20200311234A1 (en) | Electronic device security | |
CN108846272A (zh) | 应用安全管理方法、装置及电子设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15897048 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15897048 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/06/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15897048 Country of ref document: EP Kind code of ref document: A1 |