WO2017114391A1 - Procédé, appareil et dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes - Google Patents

Procédé, appareil et dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes Download PDF

Info

Publication number
WO2017114391A1
WO2017114391A1 PCT/CN2016/112426 CN2016112426W WO2017114391A1 WO 2017114391 A1 WO2017114391 A1 WO 2017114391A1 CN 2016112426 W CN2016112426 W CN 2016112426W WO 2017114391 A1 WO2017114391 A1 WO 2017114391A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
password
privacy
lock
user
Prior art date
Application number
PCT/CN2016/112426
Other languages
English (en)
Chinese (zh)
Inventor
潘琦
陈勇
Original Assignee
北京金山安全软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京金山安全软件有限公司 filed Critical 北京金山安全软件有限公司
Publication of WO2017114391A1 publication Critical patent/WO2017114391A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Definitions

  • the invention relates to a computer multi-account technology, in particular to a method, a device and an electronic device based on multi-account multiplexing electronic devices.
  • the multi-account technology is a technology for satisfying the use of one electronic device by multiple users.
  • each device can be used.
  • the user establishes an account, allows the user to install the application and run the application under the account, and the users of different accounts log in to the system through the corresponding account password, and manage the application and data under the account respectively, thereby effectively protecting the user. privacy.
  • the electronic device runs an account. If other users need to use the electronic device, the account can be switched to the operating system corresponding to the user's account. Thereby, multiple users can share the electronic device, which can effectively reduce the cost of the user using the electronic device.
  • the method for multiplexing electronic devices based on multiple accounts requires establishing an account for each user in the electronic device, each system is independently configured for the system, and the application is installed, and thus, a large amount of storage space of the electronic device needs to be occupied.
  • the electronic device is used for other application services with less storage space and lower storage space utilization.
  • most programs in the same electronic device can be used by many people. Only the privacy of individual programs involved in personal use needs to be treated differently.
  • the embodiments of the present invention provide a method, a device, and an electronic device based on a multi-account multiplexing electronic device, which improve the storage space utilization rate of the electronic device.
  • an embodiment of the present invention provides a method for multiplexing an electronic device based on multiple accounts, including:
  • the method before the receiving the application privacy setting request, the method further includes:
  • the method further includes:
  • Determining whether the system enables privacy protection if yes, performing a step of determining whether the received system lock screen password is the same as any system lock screen password in a preset system lock screen password set;
  • the system is enabled to open privacy protection through a privacy setting interface of the system or a preset hidden portal interface.
  • the receiving application privacy setting request includes:
  • the setting an application lock password for the application includes:
  • setting the application lock password for the application and writing it to the application lock password set also includes:
  • the password is centralized.
  • the receiving application privacy setting request includes:
  • the application portal includes: a desktop application icon entry, a system notification entry, and a history entry of the most recently used application.
  • an embodiment of the present invention provides an apparatus for multiplexing an electronic device based on a multi-account, including: an application lock password setting module, a privacy data setting module, and an application account verification module, where
  • An application lock password setting module configured to receive an application privacy setting request, set an application lock password for the application, and write the application lock password set, wherein the application lock password in the application lock password set is respectively A user account capable of logging into the electronic device is associated;
  • a privacy data setting module configured to set, for each of the user accounts, privacy data of one or more applications mapped thereto;
  • An application account verification module configured to receive an application lock password input by the user for accessing an application, if the application lock password is the same as any application lock password in the application lock password set, according to the application
  • the user account associated with the program lock password accesses the application and invokes the privacy data of the application mapped by the user account.
  • the device further includes: a system login module; the system login module includes: a system lock screen password receiving unit, a lock screen password determining unit, and a user account entering unit, wherein:
  • the system lock screen password receiving unit is configured to receive a system lock screen password when the system is locked or first started;
  • the lock screen password determining unit is configured to determine whether the received system lock screen password is the same as any system lock screen password in a preset system lock screen password set;
  • the user account entry unit is configured to enter the system according to the received user account of the system lock screen password if the received system lock screen password is the same as any system lock screen password in the preset system lock screen password set. .
  • system login module further includes: a privacy initiation determining unit, where
  • the privacy initiation determining unit is configured to determine whether the system enables privacy protection, and if yes, trigger the lock screen password a judging unit; if not, determining whether the received system lock screen password is the same as a pre-set non-privacy protection system login password, and if so, entering a non-privacy protected system; if not, prompting the user to re-enter the login password to enter the non-privacy system Privacy protection system.
  • the system is enabled to open privacy protection through a privacy setting interface of the system or a preset hidden portal interface.
  • the application lock password setting module includes: a privacy application set request unit, a device privacy application set obtaining unit, a privacy setting control building unit, a monitoring unit, and an application lock password setting unit, where
  • a privacy application set requesting unit configured to send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server;
  • a device privacy application set obtaining unit configured to filter out an application not installed in the electronic device in the received privacy application set, to obtain a device privacy application set;
  • a privacy setting control building unit configured to construct a privacy setting control according to the device privacy application set
  • a monitoring unit configured to trigger the privacy setting control to output an application privacy setting request after monitoring the user operating the privacy setting control
  • the application lock password setting unit is used to set the application lock password for the application and write it to the application lock password set.
  • the application lock password setting unit is further configured to:
  • the application lock password setting unit includes:
  • the application lock password query subunit is configured to query the stored application lock password set; determine whether the application lock password set for the user account currently logged into the electronic device is set with the application lock password for other user accounts.
  • the application lock password is the same; if yes, the prompt resets the application lock password for the user account currently logged into the electronic device; if not, the application lock password is associated with the user account currently logged into the electronic device Write to the application lock password set.
  • the application lock password setting module includes: a privacy application set request unit, a device privacy application set obtaining unit, an identifier unit, a request generating unit, and an application lock password setting unit, where
  • a privacy application set requesting unit configured to send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server;
  • a device privacy application set obtaining unit configured to filter out an application not installed in the electronic device in the received privacy application set, to obtain a device privacy application set;
  • An identifier unit configured to identify an application portal corresponding to each application in the device privacy application set
  • a request generating unit configured to receive an instruction that the user operates an application portal, and trigger the application portal to output an application privacy setting request
  • the application lock password setting unit is used to set the application lock password for the application and write it to the application lock password set.
  • the application portal includes: a desktop application icon entry, a system notification entry, and a history entry of the most recently used application.
  • an embodiment of the present invention provides an electronic device, including: a housing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the housing, and the processor And a memory disposed on the circuit board; a power supply circuit for powering each circuit or device of the electronic device; a memory for storing executable program code; and the processor operating by reading executable program code stored in the memory Executing a program corresponding to the program code, for performing the multi-account multiplexing electronic device-based method according to any of the foregoing.
  • an embodiment of the present invention provides a method for multiplexing an electronic device based on multiple accounts, including:
  • an application instance corresponding to the user account is presented according to a user account corresponding to the access password.
  • the preset password set includes a correspondence between a user account, a system lock screen password, and an application identifier set.
  • the receiving an access password input by the user includes: receiving, when the electronic device is in a system lock screen state, a system lock screen password input by the user, where the preset password set includes a user account and a system lock screen. The correspondence between the password and the available application instances.
  • the receiving an access password input by the user includes: receiving, by the portal of the target application, an application lock password input by the user to start the target application, when the electronic device is not in a system lock screen state,
  • the pre-set password set includes the correspondence between the user account, the application lock password, and the target application instance.
  • the portal of the target application includes: a desktop icon of the target application, a system notification associated with the target application, a history startup record of the target application, and a third application Push information.
  • presenting an application instance corresponding to the user account including: obtaining, according to a system lock screen password input by the user, from the preset password set
  • the user-entered system lock screen password corresponds to an available application instance; displaying an icon of the available application instance on a desktop of the electronic device, and loading user-related data of the available application instance to enable the user User data associated with the user can be accessed through an icon of the available application instance.
  • the method further includes: setting a system lock screen password of the current user account and creating an available application instance of the current user account to obtain the preset password set; wherein setting a system lock screen password of the current user account includes: passing The privacy setting interface of the system or the hidden entrance interface preset, and setting the current user account according to user input The system lock screen password;
  • the available application instance for creating the current user account includes: sending an application set acquisition request to the cloud server, receiving the application set returned from the cloud server; filtering the electronic in the received application set An application not installed in the device, obtaining an application set available to the device; selecting an available application set corresponding to the current user account from the available application set of the device according to a user instruction, and targeting each of the available application sets A program is available to create an available application instance for the current user account.
  • presenting an application instance corresponding to the user account including: obtaining, according to the application lock password input by the user, from the preset password set And the target application instance corresponding to the application lock password input by the user; loading user-related data of the target application instance, so that the user-related data is presented after the target application is started.
  • the method further includes: setting an application lock password of the target application corresponding to the current user account and creating a target application instance corresponding to the current user account, to create a current user account, an application lock password of the target application, and a target application.
  • the correspondence of the instances thus obtains the pre-set cipher set.
  • an embodiment of the present invention provides a computer readable storage medium having instructions stored therein, when the processor of the electronic device executes the instruction, the electronic device performs the first aspect of the present invention.
  • an embodiment of the present invention provides a computer readable storage medium having instructions stored therein, when the processor of the electronic device executes the instruction, the electronic device performs the fourth aspect of the present invention.
  • the method, device and electronic device based on the multi-account multiplexing electronic device use the application lock password to realize different user accounts of different entries of the application, share the same electronic device in multiple users, and electronically
  • the corresponding application lock password is input by using different entries of the privacy application, so that the corresponding user account can be accessed, and each user account does not need to be separately configured with an account and an application.
  • the installation of the program can effectively save the storage space of the electronic device and improve the storage space utilization of the electronic device.
  • FIG. 1 is a schematic flowchart of a method for multiplexing an electronic device based on multiple accounts according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of receiving an application privacy setting request according to a first embodiment of the present invention
  • FIG. 3 is a schematic flowchart of receiving an application privacy setting request according to a second embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of an apparatus based on a multi-account multiplexing electronic device according to an embodiment of the present invention
  • FIG. 5 is a schematic structural diagram of an embodiment of an electronic device according to the present invention.
  • FIG. 6 is a schematic flowchart of a method for multiplexing an electronic device based on multiple accounts according to another embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for multiplexing an electronic device based on multiple accounts according to an embodiment of the present invention. Referring to Figure 1, the method includes:
  • Step 11 receiving an application privacy setting request, setting an application lock password for the application and writing it to the application lock password set, and the application lock password in the application lock password set respectively and a user account capable of logging in to the electronic device Associated;
  • FIG. 2 is the first implementation of the present invention.
  • Example of a process for receiving an application privacy settings request includes:
  • Step 21 Send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server.
  • the cloud server can collect the application of the application by analyzing the application installed by each electronic device, and obtain a set of privacy applications, for example, a set of privacy applications, including but not limited to: short message, social software, finance Software, call software, address book, mail, etc. In this way, through the analysis of the relevant technicians of the cloud server, it is possible to avoid the omission of the application requiring privacy protection caused by the user setting the privacy application set.
  • a set of privacy applications including but not limited to: short message, social software, finance Software, call software, address book, mail, etc.
  • Step 22 In the received privacy application set, filtering out an application not installed in the electronic device to obtain a device privacy application set;
  • the device privacy application set is a shared application of each application installed in the electronic device and each application in the privacy application set, that is, the installed application in the electronic device is extracted from the privacy application set. , get the device privacy application set.
  • Step 23 Construct a privacy setting control according to the device privacy application set
  • this step by setting a privacy setting control for all applications in the device privacy application set, it is convenient for the user to select one or more required applications to perform corresponding privacy settings after entering the interface corresponding to the privacy setting control. .
  • Step 24 monitoring the user operating the privacy setting control, triggering the privacy setting control to output the application privacy setting request.
  • the user clicks the privacy setting control or touches the privacy setting control, and triggers the privacy setting control to output an application privacy setting request to the electronic device, and the electronic device receives the application privacy setting request, and performs subsequent processing.
  • the application lock password setting for the application includes:
  • each application may correspond to an application lock password, and the application lock password of each application is different, or multiple applications may correspond to the same application lock password, and each user corresponds to A user account, that is, an application lock password of a different application set by the user, is associated with the user account.
  • a user account that is, an application lock password of a different application set by the user, is associated with the user account.
  • each user can also set multiple user accounts.
  • each user account corresponds to an instance of an application.
  • the method may further include:
  • the prompt re-applies the application lock password setting for the user account currently logged into the electronic device; if not, writes the application lock password to the application lock password set in association with the user account of the currently logged-in electronic device.
  • FIG. 3 is a schematic flowchart of receiving an application privacy setting request according to a second embodiment of the present invention. Referring to Figure 3, the process includes:
  • Step 31 Send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server.
  • Step 32 In the received privacy application set, filtering out an application not installed in the electronic device to obtain a device privacy application set;
  • Step 33 Identify an application portal corresponding to each application in the device privacy application set
  • the application portal includes, but is not limited to, a desktop application icon portal, a system notification portal, a recent application history entry (Recent) portal, and the like.
  • a desktop application icon portal for example, a desktop application icon portal, a system notification portal, a recent application history entry (Recent) portal, and the like.
  • the user can obtain access to the application and input the corresponding application lock password through the application portal, thereby Properly open access to your own running instance, for example, through the desktop application icon entry, system notification bar message pop-up entry (system notification entry), recent application history entry, third-party application sharing portal, etc.
  • the application's application locks the password input interface.
  • a desktop application icon of a privacy application that needs privacy protection may be set on the desktop, for example, a privacy word is set, so that the user can target the application icon. , know that you need to enter the application lock password to access, so you can directly launch the application privacy settings request.
  • Step 34 Receive an instruction that the user operates the application portal, triggering the application portal to output an application privacy setting request.
  • the user may also trigger the application portal output application by directly clicking the application portal corresponding to the privacy application to be set according to the privacy application that needs to be set. Privacy settings request.
  • Step 12 setting privacy data of one or more applications mapped to each of the user accounts
  • one user account maps one or more privacy applications, and each privacy application corresponds to a private data.
  • each privacy application corresponds to a private data.
  • multiple applications may also correspond to one private data.
  • the private data stored in each user account is private data determined by the user.
  • the privacy data may be a contact name, a contact nickname, a call record, a short message, a picture, a video, an audio, and an online shopping information.
  • the online payment information, instant messaging information, etc. are generated for the user to use the privacy application process, and the information cannot be known by other users.
  • the application lock password and privacy data are saved to the SQLite database.
  • step 11 and step 12 only need to be performed once.
  • Step 13 Receive an application lock password of the access application input by the user. If the application lock password is the same as any application lock password in the application lock password set, access the user account associated with the application lock password. The application and invoking the privacy data of the application mapped by the user account.
  • each application icon corresponds to one or more application lock (AppLocker) passwords, and each application lock (password) maps the user account of the application.
  • AppLocker application lock
  • password application lock
  • an application lock In mobile electronic devices, an application lock (password) is usually a technique used to protect the privacy of a user.
  • a special way is to make a user access a protected application. You need to enter the special password, password, etc. to access the application correctly.
  • Dual instance/multi-instance means that the same application in the operating system can have multiple instances running at the same time without conflicting with each other. In this way, with dual instance ⁇ multi-instance technology, one user can be allowed to log in to the same application with different accounts at the same time.
  • the application lock password and the dual/multi-instance technology are combined, so that different users can enter different instances of the application by setting different application lock passwords.
  • different users can use the same electronic device together through application locks, plus a combination of dual-multi-instance technologies – applications that can be used simultaneously by multiple users do not require additional protection, and need to be used separately for multiple users.
  • multi-instance technology can be used to generate multiple running instances and one-to-one correspondence with multiple users.
  • multiple instances are turned on for an application, only one program icon can appear on the desktop.
  • Different users use different application lock passwords to find a running instance corresponding to themselves.
  • weChat taking WeChat as an example, if the application lock password input by the user is the same as the application lock password associated with the first user account, after opening the WeChat with the application lock password, only the first user account is used.
  • An instance of the mapping can be seen by the system, the user can use the WeChat instance corresponding to the first user account, and other WeChat instances that may be running are invisible to the user; if the user enters the application lock password and the second user account If the associated application lock password is the same, after the WeChat is opened by using the application lock password, only the instance mapped with the second user account can be seen by the system, and the user can use the WeChat instance corresponding to the second user account.
  • Other WeChat instances that may be running are invisible to the user, ie, after the user enters the accessed application, the application instance of the other user account is also loaded, but the application instance pair of the other user account loaded is loaded. The user is hidden.
  • each sensitive application is protected by AppLocker, and the AppLocker can be opened by a different application lock password.
  • the user presses the power button to turn off the screen, when the user needs to select the correct instance belonging to him/her again. , you need to enter the correct application lock password corresponding to the application through the application portal.
  • the method may further include:
  • the user restarts after the user shuts down, or when the user performs unlocking after the system locks the electronic device, the system lock screen password box is provided on the system interface, and the user inputs the corresponding system lock in the system lock screen password box.
  • the screen password is activated, the operation process of unlocking the system lock screen or entering the system is triggered.
  • the system lock screen password set includes one or more system lock screen passwords, and each system lock screen password maps a user account.
  • the system corresponding to each user account shares an operating system and an application, except that the privacy data corresponding to each user account is different for the privacy application in the application.
  • the system lock screen password set includes a system lock screen password corresponding to one or more user accounts, and the WeChat is taken as an example. If the input system lock screen password is corresponding to the system lock screen of the first user account, If the password is the same, after entering the system with the input system lock screen password, only the WeChat instance corresponding to the first user account can be seen by the user, and other WeChat instances that may be running are invisible to the user; if the input is The system lock screen password is the same as the system lock screen password corresponding to the second user account. After entering the system using the input system lock screen password, only the WeChat instance corresponding to the second user account can be seen by the user, and others may be running. The WeChat instance is not visible to the user.
  • the process may be ended.
  • the method may further include :
  • the system can set whether to enable privacy protection in the electronic device in advance, and if the system sets the privacy protection to be enabled, the system needs to enter the privacy-protected scenario that the system needs to enter, and can enter the instance scenario corresponding to the user account; If the system does not set privacy protection or disables privacy protection, it is determined whether the received system lock screen password is the same as the preset non-privacy protection system login password. If yes, enter the non-privacy protection system; if not, prompt the user to restart Enter to enter a non-private protected system.
  • the embodiment of the present invention may be executed. method.
  • setting whether to enable privacy protection may be set through a privacy setting interface of the system.
  • the system lock screen password, and/or the application lock password are used to implement different user accounts of different application accounts, and the same electronic device is shared by multiple users, and only one set is installed in the electronic device.
  • the corresponding system lock screen password and/or the application lock password are input by using different entries of the privacy application, so that the corresponding user account can be accessed, and the data protection and data can be well realized.
  • the protection of privacy enables the isolation and protection of privacy applications and data without the need to separately configure accounts and application installation for each user account, which effectively saves the storage space of electronic devices and improves the storage space utilization of electronic devices.
  • each user shares the download of the operating system installation package and the application installation package for installation, and the required time is short, which enhances the user's service experience; moreover, the method of the embodiment of the present invention can be extended to a lightweight multi-user.
  • User privacy protection for certain applications in the usage scenario The system lock screen password, and/or application lock password is equivalent to simply removing the restrictions on application content access, extending to help different users select the correct running instance, extending the system lock screen password, and / or, the application lock password is applied.
  • FIG. 4 is a schematic structural diagram of an apparatus based on a multi-account multiplexing electronic device according to an embodiment of the present invention.
  • the apparatus includes: an application lock password setting module 41, a privacy data setting module 42 and an application account verification module 43, wherein
  • the application lock password setting module 41 is configured to receive an application privacy setting request, set an application lock password for the application, and write the application lock password set, where the application lock password in the application lock password set is respectively A user account capable of logging into the electronic device is associated;
  • the application lock password function is utilized and extended, so that the access password for multiple user accounts can be separately set for the same application.
  • the application lock password setting module 41 includes: a privacy application set request unit, a device privacy application set obtaining unit, a privacy setting control building unit, a monitoring unit, and an application lock password setting unit (not shown in the figure) Show) where,
  • a privacy application set requesting unit configured to send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server;
  • the cloud server obtains a privacy application set by analyzing an application installed by each electronic device and analyzing each application.
  • a device privacy application set obtaining unit configured to filter out an application not installed in the electronic device in the received privacy application set, to obtain a device privacy application set;
  • a privacy setting control building unit configured to construct a privacy setting control according to the device privacy application set
  • a monitoring unit configured to trigger a privacy setting control to output an application privacy setting request after monitoring the user operating the privacy setting control
  • the application lock password setting unit is used to set the application lock password for the application and write it to the application lock password set.
  • the applying the application lock password setting to the application includes:
  • the application lock password setting module 41 includes: a privacy application set request unit, a device privacy application set obtaining unit, an identification unit, a request generating unit, and an application lock password setting unit, where
  • a privacy application set requesting unit configured to send a privacy application set acquisition request to the cloud server, and receive a privacy application set returned from the cloud server;
  • a device privacy application set obtaining unit configured to filter out an application not installed in the electronic device in the received privacy application set, to obtain a device privacy application set;
  • An identifier unit configured to identify an application portal corresponding to each application in the device privacy application set
  • a request generating unit configured to receive an instruction that the user operates the application portal, triggering the application portal to output an application privacy setting request
  • the application lock password setting unit is used to set the application lock password for the application and write it to the application lock password set.
  • the application portal includes: a desktop application icon entry, a system notification entry, and a history entry of the most recently used application.
  • the privacy data setting module 42 is configured to set privacy data of one or more applications mapped thereto for each of the user accounts.
  • one user account maps one or more privacy applications, and each privacy application corresponds to a private data.
  • the privacy data stored in each user account is user-identified private data.
  • the privacy data may be a contact name, a contact nickname, a call record, a short message, a picture, a video, an audio, an online shopping information, an online payment information, an instant.
  • Communication information and the like are information generated during the process of using the privacy application by the user.
  • the application account verification module 43 is configured to receive an application lock password input by the user for accessing the application, if the application lock password is the same as any application lock password in the application lock password set, according to the application.
  • the user account associated with the lock password accesses the application and invokes the privacy data of the application mapped by the user account.
  • each user account corresponds to an instance, and different users can enter corresponding instances of the application by setting different application lock passwords.
  • the input application lock password is the same as the application lock password corresponding to a certain user account, after the WeChat is opened by using the input application lock password, only an instance corresponding to a certain user account can be As seen by the system, the user can use the WeChat instance corresponding to the certain user account, while other WeChat instances that may be running are invisible to the user.
  • the apparatus further includes: a system login module 44.
  • the system login module includes: a system lock screen password receiving unit, a lock screen password judging unit, and a user account entry unit.
  • the system lock screen password receiving unit is used to receive the system lock screen password when the system is locked or first started.
  • the lock screen password determining unit is configured to determine whether the received system lock screen password is the same as any system lock screen password in the preset system lock screen password set.
  • the user account entry unit is configured to enter the system according to the received user account mapped by the system lock screen password when the received system lock screen password is the same as any system lock screen password in the preset system lock screen password set.
  • the system may be set to open privacy protection through a privacy setting interface of the system or a hidden entry interface preset.
  • setting the privacy protection of the system by using a preset hidden portal interface includes:
  • the inputting the preset characters in the preset third-party application interface includes:
  • system login module 44 further includes: a privacy initiation determination unit (not shown), wherein
  • a privacy opening determination unit configured to determine whether the system has privacy protection enabled, and if yes, triggering the lock screen password determining unit; if not, determining whether the received system lock screen password is a preset non-privacy protection system login password The same, if yes, enter the non-privacy protection system; if not, prompt the user to re-enter the login password to enter the non-privacy protected system.
  • the device further includes:
  • the application lock password query module 45 is configured to query the stored application lock password set, and determine whether the application lock password set for the user account currently logged into the electronic device is related to another user account in the application lock password set.
  • the set application lock password is the same; if yes, the prompt resets the application lock password for the user account currently logged into the electronic device; if not, the application lock password is associated with the user account currently logged into the electronic device Write to the application lock password set.
  • An embodiment of the present invention further provides an electronic device, where the electronic device includes the device described in any of the foregoing embodiments.
  • FIG. 5 is a schematic structural diagram of an embodiment of an electronic device according to the present invention, which can implement the process of the embodiment shown in FIG. 1-4 of the present invention.
  • the electronic device may include: a housing 51, a processor 52, and a memory. 53.
  • the circuit board 54 and the power supply circuit 55 wherein the circuit board 54 is disposed inside the space surrounded by the housing 51, the processor 52 and the memory 53 are disposed on the circuit board 54, and the power supply circuit 55 is used for the electronic device
  • Each circuit or device is powered;
  • the memory 53 is for storing executable program code;
  • the processor 52 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 53, for performing any of the foregoing embodiments The method based on multi-account multiplexing electronic device.
  • the electronic device exists in a variety of forms including, but not limited to:
  • Mobile communication devices These devices are characterized by mobile communication functions and are mainly aimed at providing voice and data communication.
  • Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
  • Ultra-mobile personal computer equipment This type of equipment belongs to the category of personal computers, has computing and processing functions, and generally has mobile Internet access.
  • Such terminals include: PDAs, MIDs, and UMPC devices, such as the iPad.
  • Portable entertainment devices These devices can display and play multimedia content. Such devices include: audio, video players (such as iPod), handheld game consoles, e-books, and smart toys and portable car navigation devices.
  • the server consists of a processor, a hard disk, a memory, a system bus, etc.
  • the server is similar to a general-purpose computer architecture, but because of the need to provide highly reliable services, processing power and stability High reliability in terms of reliability, security, scalability, and manageability.
  • FIG. 6 is a schematic flowchart of a method for multiplexing an electronic device based on multiple accounts according to another embodiment of the present invention. Referring to Figure 6, the method includes:
  • Step 61 Receive an access password input by a user.
  • Step 62 Determine whether the access password is the same as any password in a preset password set, where the advance The set passwords are collectively recorded with passwords respectively corresponding to user accounts that can log in to the electronic device;
  • Step 63 If the access password is the same as a password in the preset password set, an application instance corresponding to the user account is presented according to a user account corresponding to the access password.
  • Each of the applications can correspond to multiple application instances, and the multiple application instances can respectively correspond to different user related data.
  • multiple instances may be presented on the electronic device, such as WeChat instance 1, WeChat instance 2, etc., where WeChat instance 1 corresponds to User 1's data, ie when WeChat instance 1 is presented, only The data of User 1 is obtained; and WeChat instance 1 corresponds to the data of User 2.
  • receiving an access password input by the user includes receiving a system lock screen password input by the user, the advance
  • the set of passwords includes the user account, the system lock screen password, and the corresponding relationship of the available application instances.
  • presenting an application instance corresponding to the user account including: obtaining, according to a system lock screen password input by the user, from the preset password set An available application instance corresponding to the system lock screen password entered by the user; displaying an icon of the available application instance on a desktop of the electronic device, and loading user related data of the available application instance such that After the user accesses the available application through an icon of the available application instance, the user presents the user related data.
  • the preset password set may include a system lock screen password corresponding to one or more user accounts and an application instance available for each user account.
  • the system corresponding to each user account shares an operating system and an application, except that the privacy data corresponding to each user account is different for the privacy application in the application.
  • the application WeChat including WeChat instance 1 and WeChat instance 2 the application Facebook including Facebook instance 1 and Facebook instance 2, for example, if the input system lock screen password corresponds to the system lock of the first user account The screen password is the same, and the application available to the first user account includes WeChat and the corresponding instance is WeChat instance 1.
  • WeChat After entering the system with the input system lock screen password, only WeChat can be seen by the user and when the user When accessing WeChat, only the relevant content of WeChat instance 1 will be presented to the user, and Facebook is not visible to the user; if the input system lock screen password is the same as the system lock screen password corresponding to the second user account, the first The applications visible to the user account include WeChat and Facebook and the corresponding instances are WeChat instance 2 and Facebook instance 2.
  • WeChat and Facebook After entering the system with the input system lock screen password, both WeChat and Facebook can be seen by the user. When the user accesses WeChat, only the relevant content of WeChat instance 2 will be presented to the user, and when the user accesses Facebook, only Faceboo The relevant content of k instance 2 will be presented to the user.
  • the method may further include: setting a system lock screen password of the current user account and creating an available application instance of the current user account to obtain the preset password set.
  • Setting the system lock screen password of the current user account includes: setting the system lock screen password for the current user account according to user input through a privacy setting interface of the system or a preset hidden portal interface; creating an available application of the current user account Instance package Include: sending an application set acquisition request to the cloud server, receiving the application set returned from the cloud server; filtering the application not installed in the electronic device in the received application set, and obtaining the device available application set according to A user instruction to select an available set of applications corresponding to the current user account from the set of available applications of the device, and to create an available application instance of the current user account for each available program in the set of available applications.
  • the receiving an access password input by the user includes: receiving an application lock password input by the user through an entry of the target application to start the target application.
  • the preset password set includes a correspondence between a user account, an application lock password, and a target application instance.
  • the application instance corresponding to the user account is presented according to the user account corresponding to the access password, including: according to the application lock password input by the user, from the preset password set Obtaining a target application instance corresponding to the application lock password input by the user; loading user related data of the target application instance such that the user related data is presented after the target application is launched.
  • WeChat instance 1 when the WeChat is opened, if the input application lock password is the same as the application lock password corresponding to the first user account, If the application instance corresponding to a user account is WeChat instance 1, after the target application is started by using the input application lock password, only the related content of WeChat instance 1 will be presented to the user, and the content of WeChat instance 2 will not be User presentation.
  • the entry of the target application includes: a desktop icon of the target application, a system notification associated with the target application, and a history startup record of the target application , the push information of the third application.
  • the user can start the target application by operating the icon of the target application on the desktop; the notification related to the target application can also be found from the system notification, and the target application can be started by operating the notification;
  • the startup record of the target application is found in the history startup record, and the target application is started by operating the record;
  • the target application related content can also be obtained in the push information of the third application, and the target is started by operating the related content. application.
  • the method may further include: setting an application lock password of the target application corresponding to the current user account and creating a target application instance corresponding to the current user account, to create a current user account. Corresponding relationship between the application lock password of the target application and the target application instance to obtain the preset password set. Specifically, for the target application, setting an application lock password corresponding to the current user account, and creating a target application instance of the current user, thereby obtaining a correspondence between the current user account, the application lock password, and the target application instance, and the corresponding relationship is stored. In the preset password set, therefore, when the user accesses the target application with the current user account, after inputting the corresponding application lock password, the corresponding target application instance can be obtained from the password set.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Abstract

La présente invention porte, dans des modes de réalisation, sur un procédé, sur un appareil et sur un dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes. Le procédé consiste : à recevoir une demande de paramètres de confidentialité d'application, à définir un mot de passe de verrouillage d'application pour l'application et à écrire ce dernier dans un ensemble de mots de passe de verrouillage d'application, les mots de passe de verrouillage d'application dans ledit ensemble de mots de passe de verrouillage d'application étant associés à des comptes utilisateurs qui peuvent se connecter à l'appareil électronique; pour chacun desdits comptes utilisateurs, à définir des données de confidentialité pour une application ou une pluralité d'applications mises en correspondance avec ledit compte; à recevoir un mot de passe de verrouillage d'application saisi par un utilisateur et utilisé pour avoir accès à une application; si ledit mot de passe de verrouillage d'application est le même que l'un quelconque des mots de passe de verrouillage d'application dans l'ensemble de mots de passe de verrouillage d'application, à avoir alors accès à ladite application en fonction du compte d'utilisateur associé au dit mot de passe de verrouillage d'application, et à appeler les données de confidentialité de l'application mise en correspondance avec ledit compte utilisateur. La présente invention améliore l'utilisation d'un espace de stockage sur un dispositif électronique.
PCT/CN2016/112426 2015-12-31 2016-12-27 Procédé, appareil et dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes WO2017114391A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201511026693.2 2015-12-31
CN201511026693.2A CN105701414B (zh) 2015-12-31 2015-12-31 一种基于多账户复用电子设备的方法、装置及电子设备

Publications (1)

Publication Number Publication Date
WO2017114391A1 true WO2017114391A1 (fr) 2017-07-06

Family

ID=56226736

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/112426 WO2017114391A1 (fr) 2015-12-31 2016-12-27 Procédé, appareil et dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes

Country Status (2)

Country Link
CN (1) CN105701414B (fr)
WO (1) WO2017114391A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846272A (zh) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 应用安全管理方法、装置及电子设备

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701414B (zh) * 2015-12-31 2018-09-21 北京金山安全软件有限公司 一种基于多账户复用电子设备的方法、装置及电子设备
CN106156553B (zh) * 2016-06-29 2020-06-19 北京小米移动软件有限公司 应用显示方法及装置
CN106203143A (zh) * 2016-07-21 2016-12-07 北京奇虎科技有限公司 一种应用程序锁定的方法、装置及移动终端
CN106897608A (zh) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 一种应用程序的权限处理方法、装置和移动终端
CN106934267A (zh) * 2017-03-29 2017-07-07 联想(北京)有限公司 电子设备和控制方法
CN107798231B (zh) * 2017-11-20 2021-05-04 北京小米移动软件有限公司 操作界面的显示方法、装置、终端及存储介质
CN108319828A (zh) * 2018-02-07 2018-07-24 北京小米移动软件有限公司 锁屏管理方法及装置
CN109871680A (zh) * 2019-03-22 2019-06-11 山东浪潮云信息技术有限公司 一种基于Openstack的物理机密码设置方法
CN110598441B (zh) * 2019-09-06 2021-07-23 腾讯科技(深圳)有限公司 用户隐私保护方法及装置
CN112380588A (zh) * 2020-11-17 2021-02-19 惠州Tcl移动通信有限公司 隐私信息显示方法、装置、存储介质及移动终端

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022297A1 (en) * 2005-07-25 2007-01-25 Britti Michael A Screening using a personal identification code
CN104158947A (zh) * 2014-07-30 2014-11-19 张剑文 手机隐私保护系统
CN104966005A (zh) * 2014-05-12 2015-10-07 腾讯科技(深圳)有限公司 一种访问控制方法,及终端设备
CN105574437A (zh) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 一种保护隐私信息的方法、装置及电子设备
CN105701414A (zh) * 2015-12-31 2016-06-22 北京金山安全软件有限公司 一种基于多账户复用电子设备的方法、装置及电子设备

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8127254B2 (en) * 2007-06-29 2012-02-28 Nokia Corporation Unlocking a touch screen device
CN103425914A (zh) * 2012-05-17 2013-12-04 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法及通信终端
CN103902862B (zh) * 2012-12-30 2018-04-27 联想(北京)有限公司 一种移动设备管理方法、装置及一种移动设备
CN104715178B (zh) * 2013-12-11 2020-04-03 深圳富泰宏精密工业有限公司 电子装置的解锁系统及方法
CN105184132A (zh) * 2015-10-22 2015-12-23 上海斐讯数据通信技术有限公司 一种电子设备隐私权限管理方法及管理系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070022297A1 (en) * 2005-07-25 2007-01-25 Britti Michael A Screening using a personal identification code
CN104966005A (zh) * 2014-05-12 2015-10-07 腾讯科技(深圳)有限公司 一种访问控制方法,及终端设备
CN104158947A (zh) * 2014-07-30 2014-11-19 张剑文 手机隐私保护系统
CN105574437A (zh) * 2015-12-31 2016-05-11 北京金山安全软件有限公司 一种保护隐私信息的方法、装置及电子设备
CN105701414A (zh) * 2015-12-31 2016-06-22 北京金山安全软件有限公司 一种基于多账户复用电子设备的方法、装置及电子设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108846272A (zh) * 2018-07-13 2018-11-20 厦门美图移动科技有限公司 应用安全管理方法、装置及电子设备

Also Published As

Publication number Publication date
CN105701414B (zh) 2018-09-21
CN105701414A (zh) 2016-06-22

Similar Documents

Publication Publication Date Title
WO2017114391A1 (fr) Procédé, appareil et dispositif électronique faisant appel à l'utilisation d'un dispositif électronique au moyen de multiples comptes
KR102511811B1 (ko) 봇 사용자를 안전하게 인증하는 기법
WO2017114476A1 (fr) Procédé et dispositif permettant de protéger des informations confidentielles et dispositif électronique
US10169564B2 (en) Variable image presentation for authenticating a user
US10572639B2 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
US8881245B2 (en) System and method for enhancing self-service security applications
US9706401B2 (en) User-authentication-based approval of a first device via communication with a second device
US20150319173A1 (en) Co-verification method, two dimensional code generation method, and device and system therefor
WO2017054622A1 (fr) Procédé et appareil d'affichage de message et dispositif électronique
CN107450839B (zh) 基于黑屏手势的控制方法、装置、存储介质及移动终端
CN108470123A (zh) 利用二级批准者的认证
US20170192646A1 (en) Method and electronic device for hiding application icons and mobile phone
CN108475304B (zh) 一种关联应用程序和生物特征的方法、装置以及移动终端
WO2018054387A1 (fr) Procédé et dispositif de gestion de permission de terminal
CN107422860B (zh) 基于黑屏手势的控制方法、装置、存储介质及移动终端
WO2020253197A1 (fr) Procédé et appareil pour gérer une carte d'identification d'utilisateur virtuel, dispositif terminal et support de stockage
WO2017088745A1 (fr) Procédé et appareil de traitement d'informations, et dispositif électronique
US11681419B2 (en) Method for disguising a computer system's login interface
US9112856B2 (en) Generation of one time use login pairs via a secure mobile communication device for login on an unsecure communication device
CN106874718A (zh) 隐私处理方法、装置及终端
CN105335631A (zh) 一种登录信息的配置方法、装置和移动终端
US8966592B1 (en) Authenticating access to a private account at a public computing device
CN112286632B (zh) 云平台、云平台管理方法、装置、电子设备及储存介质
CN104036203A (zh) 信息安全管理的方法和信息安全管理系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16881180

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16881180

Country of ref document: EP

Kind code of ref document: A1