CN104700001A - Information encryption method and device of application program - Google Patents

Information encryption method and device of application program Download PDF

Info

Publication number
CN104700001A
CN104700001A CN201310648284.0A CN201310648284A CN104700001A CN 104700001 A CN104700001 A CN 104700001A CN 201310648284 A CN201310648284 A CN 201310648284A CN 104700001 A CN104700001 A CN 104700001A
Authority
CN
China
Prior art keywords
application program
information
encryption
user
encryption control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310648284.0A
Other languages
Chinese (zh)
Other versions
CN104700001B (en
Inventor
林晓丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201310648284.0A priority Critical patent/CN104700001B/en
Priority to PCT/CN2014/090053 priority patent/WO2015081777A1/en
Priority to TW103140679A priority patent/TW201523324A/en
Publication of CN104700001A publication Critical patent/CN104700001A/en
Application granted granted Critical
Publication of CN104700001B publication Critical patent/CN104700001B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an information encryption method and an information encryption device of an application program. According to the information encryption method and the information encryption device of the application program, during the operation process of the application program, the information encryption function corresponding to an encryption control is started while the starting instruction used for triggering the encryption control corresponding to the special function of the application program for a user is monitored; the encryption and/or decryption operation for the information corresponding to the application program appointed by an operation event is executed based on the started information encryption function, according to the operation event triggered by the user; the information encryption method and the information encryption device have the benefits for encrypting a special function module of the application program without affecting the other functions of the application program.

Description

The information ciphering method of application program and device
Technical field
The present invention relates to internet arena, particularly relate to a kind of information ciphering method and device of application program.
Background technology
At present, in terminal, some application program can provide the function of software locks when starting, can all operations information corresponding to current whole application program be encrypted, but this software locks can only be applied in the encryption to whole software, can not be encrypted functional module specific in program, terminal also cannot only be encrypted separately the partial function in this application program or historical record corresponding to part operation and hide; For the browser in terminal, current browser can not realize following function: encipher only bookmark and network address access history record, and does not affect the normal use of other functions of browser.
Summary of the invention
Given this, information ciphering method and device that a kind of application program is provided is necessary, the object be encrypted with the certain functional modules reaching only application programs.
The embodiment of the invention discloses a kind of information ciphering method of application program, comprise the following steps:
In the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
Based on the described information encryption function started, according to the Action Events that user triggers, perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to.
The embodiment of the invention also discloses a kind of information encryption device of application program, comprising:
Start module, in the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
Execution module, for based on the described information encryption function started, according to the Action Events that user triggers, performs encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to.
The embodiment of the present invention, in the operational process of application program, monitors user when triggering the enabled instruction of encryption control corresponding to application program one specific function, starts the information encryption function that described encryption control is corresponding; Based on the described information encryption function started, according to the Action Events that user triggers, perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to; Compared in prior art, the method that only can be encrypted whole application program, the embodiment of the present invention has can only for the beneficial effect that the certain functional modules of application program is encrypted.
Accompanying drawing explanation
Fig. 1 is the information ciphering method first embodiment schematic flow sheet of application program of the present invention;
Fig. 2 is the information ciphering method second embodiment schematic flow sheet of application program of the present invention;
Fig. 3 is in the information ciphering method of application program of the present invention, opens the user interface schematic diagram that this embody rule scene of encryption control of the bookmark/history private space of browser is corresponding;
Fig. 4 is information ciphering method the 3rd embodiment schematic flow sheet of application program of the present invention;
Fig. 5 is in the information ciphering method of application program of the present invention, the first embodiment user interface schematic diagram corresponding for this embody rule scene of user's input reference password that terminal provides;
Fig. 6 is in the information ciphering method of application program of the present invention, the second embodiment user interface schematic diagram corresponding for this embody rule scene of user's input reference password that terminal provides;
Fig. 7 is the information encryption device first embodiment high-level schematic functional block diagram of application program of the present invention;
Fig. 8 is the information encryption device second embodiment high-level schematic functional block diagram of application program of the present invention;
Fig. 9 is information encryption device the 3rd embodiment high-level schematic functional block diagram of application program of the present invention.
The realization of embodiment of the present invention object, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Technical scheme of the present invention is further illustrated below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
Fig. 1 is the information ciphering method first embodiment schematic flow sheet of application program of the present invention; As shown in Figure 1, the information ciphering method of application program of the present invention comprises the following steps:
Step S01, in the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
In the embodiment of the present invention, terminal in the operational process of application program, all operations instruction that real-time supervisory user triggers; Such as, the operational order for the specific function corresponding to this application program that triggers based on the application program run of user; Or, the operational order etc. of the still off-duty application program of unlatching that user triggers.Wherein, the specific function corresponding to this application program can be understood as, arbitrary function that this application program has, as long as have corresponding encryption and decryption program for this function setting; Such as, this function of historical viewings record in browser, this function of bookmark etc. in reader, the present embodiment does not carry out exhaustive one by one to it.
In the present embodiment, in the operational process of application program, when terminal monitoring is to the enabled instruction of encryption control corresponding to this application program one specific function that user triggers, the enabled instruction that this encryption control that terminal response user triggers is corresponding, starts the information encryption function that this encryption control is corresponding; In the present embodiment, this encryption control comprises the encryption control that in one of them application program that terminal is being run, a specific function is corresponding; Namely this encryption control is only for this specific function of this application program, does not affect the use of other functions of this application program.Certainly, this encryption control also can for open a certain encryption in terminal application program corresponding to encryption control.
Further, in the embodiment of the present invention, after terminal starts information encryption function corresponding to encryption control, all information of having preserved under showing the storage directory of this encryption control sensing.
Further, all information of having preserved under the storage directory that above-mentioned encryption control points to comprise: the bookmark information preserved corresponding to the Action Events that user triggers based on browser, and user based on this browser encryption control corresponding to historical viewings record.
Step S02, based on the described information encryption function started, according to the Action Events that user triggers, perform the encryption of described application program corresponding part information and/or decryption oprerations that described Action Events points to;
Based on the information encryption function started, terminal continues the Action Events that supervisory user triggers based on this information encryption function; When monitoring the Action Events that user triggers, according to the Action Events that user triggers, performing the operation pointed by this Action Events, such as performing the information encryption that in application programs, this encryption control points to and/or decryption oprerations.
In the preferred embodiment of the present invention, described application program is browser, and described application program corresponding part information is the bookmark information and historical viewings record preserved.
The embodiment of the present invention, in the operational process of application program, monitors user when triggering the enabled instruction of encryption control corresponding to application program one specific function, starts the information encryption function that described encryption control is corresponding; Based on the described information encryption function started, according to the Action Events that user triggers, perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to; Compared in prior art, the method that only can be encrypted whole application program, the embodiment of the present invention has and only can be encrypted for the certain functional modules of application program and not affect the beneficial effect that other functions of this application program use.
Fig. 2 is the information ciphering method second embodiment schematic flow sheet of application program of the present invention; The difference of embodiment described in the embodiment of the present invention and Fig. 1 is, when terminal receives the out code to encryption control that user triggers, terminal closes information encryption function corresponding to encryption control, and continues the operational order that supervisory user triggers.
Based on the description of embodiment described in Fig. 1, as shown in Figure 2, the information ciphering method of application program of the present invention " step S02, based on the described information encryption function started; according to the Action Events that user triggers; perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to ", also comprise afterwards:
Step S03, when receiving the out code of described encryption control that user triggers, close the information encryption function that described encryption control is corresponding, and continue other functional commands of the described application program that supervisory user triggers.
While all operations event that terminal triggers in supervisory user, if when receiving the out code of this encryption control that user triggers, the out code of this encryption control of terminal response, closes the information encryption function that in application program, this encryption control is corresponding.In the present embodiment, terminal closes the encryption control in application program, does not represent that terminal directly closes this application program; And the terminal encryption control of closing in this application program only represents that terminal closes function corresponding to this encryption control, under normal circumstances, terminal closes this encryption control, does not affect the use of other any functions in this application program except this encryption control at all.After terminal closes this encryption control, terminal continues operational order corresponding to other functions of this application program that supervisory user triggers.
Further, in the present embodiment, the information encryption function that terminal closes this encryption control corresponding comprises: all information that terminal has been preserved under hiding this storage directory pointed by encryption control; The bookmark information preserved in such as browser and history access record are after closedown encryption control, and all bookmark informations preserved based on this encryption control and history access record will be invisible to user.
When embodiment of the present invention terminal receives the out code of the described encryption control that user triggers, close the information encryption function that described encryption control is corresponding, and continue other functional commands of the described application program that supervisory user triggers; There is the beneficial effect of protection user privacy information, also improve the security of user profile.
Below for browser in terminal, the implementation process of the information ciphering method of embodiment of the present invention application program is described again.
In concrete application scenarios, as shown in Figure 3, Fig. 3 is in the information ciphering method of application program of the present invention, opens the user interface schematic diagram that this embody rule scene of encryption control of the bookmark/history private space of browser is corresponding; When user opens " bookmark/history private space " this functionality controls on the operation interface shown in Fig. 3, on the browser that terminal response user triggers, the enabled instruction of " bookmark/history private space " this functionality controls, starts and is somebody's turn to do " bookmark/history private space " information encryption function that control is corresponding; Based on the described information encryption function started, the Action Events that terminal triggers according to user, performs encryption and/or the decryption oprerations of the described application program corresponding informance that described Action Events points to.Such as, user can select to be saved in bookmark private space file for the new bookmark added, and also can use the bookmark preserved in private space; Or after terminal response opens the operational order of " bookmark/history private space " control, the secret network address record that terminal demonstration was accessed in history, checks for user.The Action Events that terminal also can trigger according to user, is directly recorded in the web page access record of user in private space, then the Visitor Logs be recorded in private space there will not be in acquiescence historical record.Receive after user closes the operational order of above-mentioned " bookmark/history private space " control in terminal, terminal will hide all information stored under storage directory corresponding to this " bookmark/history private space " control, and the above-mentioned bookmark that user preserves and the historical record that user browses will be hidden invisible.
Aforesaid operations process is for user side, user is after unlatching " bookmark/history private space " control, can use bookmarks all in private space, also can add new secret bookmark wherein, network address record accessed in the meantime also can be deposited in private space.User is after closedown private space functionality controls, and the bookmark in private space and historical record will be hidden.User can only see disclosed bookmark and historical record.
The embodiment of the present invention by the way, has and only can be encrypted for the certain functional modules of application program and not affect the beneficial effect that other functions of this application program use; Further, the embodiment of the present invention also has the beneficial effect of protection user privacy information, also improves the security of user profile.
Fig. 4 is information ciphering method the 3rd embodiment schematic flow sheet of application program of the present invention; Described in embodiment described in Fig. 4 and Fig. 1 or Fig. 2, the difference of embodiment adds step S11 and step S12; Namely when terminal monitoring triggers the enabled instruction of encryption control corresponding to application program one specific function to user, first one user interface is provided, access code corresponding to encryption control is inputted for user, and after access code is verified, then perform follow-up corresponding operating.
Based on the description of above-described embodiment, as shown in Figure 4, based on embodiment described in Fig. 2, the information ciphering method of embodiment of the present invention application program, in step S01, starts information encryption function corresponding to described encryption control, also comprises before:
Step S11, provide one user's access application encryption control operation interface, input the access code of encryption control corresponding to described application program one specific function for user;
The described access code of step S12, authentication of users input.
When terminal monitoring triggers the enabled instruction of encryption control corresponding to application program one specific function to user, first a user interface is provided, inputs the access code of encryption control corresponding to this application program one specific function for user.If user does not know the access code of this encryption control, then user is only this specific function can not accessing or use this application program, does not affect the use of user to these other functions of application program.
In the embodiment of the present invention, the operation interface that terminal provides comprises the Password Input frame for user inputs character information, and supplies the password icon of user's input trajectory information.In the information ciphering method of application program of the present invention please with reference to Fig. 5 and Fig. 6, Fig. 5, the first embodiment user interface schematic diagram corresponding for this embody rule scene of user's input reference password that terminal provides; Fig. 6 is in the information ciphering method of application program of the present invention, the second embodiment user interface schematic diagram corresponding for this embody rule scene of user's input reference password that terminal provides; The Password Input frame that user shows based on Fig. 5, the character password that input is corresponding, the Password Input pattern password shown based on Fig. 6 or gesture password etc.
After user inputs corresponding access code, whether the access code of terminal authentication user input is correct; When authentication password is incorrect, forbids all information of having preserved under user accesses the storage directory of this encryption control sensing, and forbid that user uses this specific function of the application program that this encryption control is corresponding.Such as, other access code operation interface input reference passwords that user provides based on Fig. 5 or Fig. 6 or terminal, when this access code of terminal authentication is incorrect, the bookmark information preserved that " bookmark/history private space " this control corresponding to this user's access browser of terminal disables is corresponding and historical viewings record, but do not affect this user at all and use browser access webpage, and the historical record that user's access browser produces be kept at acquiescence browse record storage directory under.
When authentication password is correct, all information that terminal has been preserved under allowing user to access the storage directory of this encryption spatial direction, and allow user to perform corresponding information encryption and/or decryption oprerations based on this encryption control.Such as, other access code operation interface input reference passwords that user provides based on Fig. 5 or Fig. 6 or terminal, when this access code of terminal authentication is correct, the bookmark information preserved that " bookmark/history private space " this control that terminal allows this user's access browser corresponding is corresponding and historical viewings record, and the web page browsing record that user is accessed in this course, under being all kept at storage directory corresponding to " bookmark/history private space " this control, and under the storage directory of acquiescence, historical viewings record less than user's accessed web page in this will be checked in period.
Further, in the embodiment of the present invention, when user arranges access code for the first time, prompting user is inputted the related information of this access code by terminal, and is bound by the related information that this access code is corresponding with this access code; For user when forgetting access code, the related information according to binding with access code is given access code for change or resets access code.This related information comprises the information such as email address, phone number of user's input; When user forgets access code, the authentication instruction that terminal triggers according to user, by sending identifying code to email address with the form of mail, or send identifying code to mobile phone by the form of short message, to unlock after the identifying code checking of user is correct or to reset access code.
The embodiment of the present invention provides the operation interface of user's access application encryption control, for user's input reference password; The access code of authentication of users input, and after being verified, allow user to use encryption control; There is the beneficial effect improving user information safety.
Fig. 7 is the information encryption device first embodiment high-level schematic functional block diagram of application program of the present invention; As shown in Figure 7, the information encryption device of application program of the present invention comprises: start module 01 and execution module 02.
Start module 01, in the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
In the embodiment of the present invention, terminal in the operational process of application program, all operations instruction that real-time supervisory user triggers; Such as, the operational order for the specific function corresponding to this application program that triggers based on the application program run of user; Or, the operational order etc. of the still off-duty application program of unlatching that user triggers.Wherein, the specific function corresponding to this application program can be understood as, arbitrary function that this application program has, as long as have corresponding encryption and decryption program for this function setting; Such as, this function of historical viewings record in browser, this function of bookmark etc. in reader, the present embodiment does not carry out exhaustive one by one to it.
In the present embodiment, in the operational process of application program, when terminal monitoring is to the enabled instruction of encryption control corresponding to this application program one specific function that user triggers, start module 01 and respond enabled instruction corresponding to this encryption control that user triggers, start the information encryption function that this encryption control is corresponding; In the present embodiment, this encryption control comprises the encryption control that in one of them application program that terminal is being run, a specific function is corresponding; Namely this encryption control is only for this specific function of this application program, does not affect the use of other functions of this application program.Certainly, this encryption control also can for open a certain encryption in terminal application program corresponding to encryption control.
Further, in the embodiment of the present invention, after starting information encryption function corresponding to module 01 startup encryption control, all information of having preserved under showing the storage directory of this encryption control sensing.
Further, all information of having preserved under the storage directory that above-mentioned encryption control points to comprise: the bookmark information preserved corresponding to the Action Events that user triggers based on browser, and user based on this browser encryption control corresponding to historical viewings record.
Execution module 02, for based on the described information encryption function started, according to the Action Events that user triggers, performs encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to;
Based on the information encryption function starting module 01 startup, terminal continues the Action Events that supervisory user triggers based on this information encryption function; When monitoring the Action Events that user triggers, the Action Events that execution module 02 triggers according to user, performs the operation pointed by this Action Events, and such as execution module 02 performs the information encryption and/or decryption oprerations that in application programs, this encryption control points to.
In the preferred embodiment of the present invention, described application program is browser, and described application program corresponding part information is the bookmark information and historical viewings record preserved.
The embodiment of the present invention, in the operational process of application program, monitors user when triggering the enabled instruction of encryption control corresponding to application program one specific function, starts the information encryption function that described encryption control is corresponding; Based on the described information encryption function started, according to the Action Events that user triggers, perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to; Compared in prior art, the method that only can be encrypted whole application program, the embodiment of the present invention has and only can be encrypted for the certain functional modules of application program and not affect the beneficial effect that other functions of this application program use.
Fig. 8 is the information encryption device second embodiment high-level schematic functional block diagram of application program of the present invention; The difference of embodiment described in the embodiment of the present invention and Fig. 7 is, when terminal receives the out code to encryption control that user triggers, terminal closes information encryption function corresponding to encryption control, and continues the operational order that supervisory user triggers.
Based on the description of embodiment described in Fig. 7, as shown in Figure 8, the information encryption device of application program of the present invention also comprises:
Closing module 03, during for receiving the out code of described encryption control that user triggers, closing the information encryption function that described encryption control is corresponding, and continuing other functional commands of the described application program that supervisory user triggers.
While all operations event that terminal triggers in supervisory user, if when receiving the out code of this encryption control that user triggers, closing module 03 responds the out code of this encryption control, close the information encryption function that in application program, this encryption control is corresponding.In the present embodiment, closing module 03 closes the encryption control in application program, does not represent that terminal directly closes this application program; And the closing module 03 encryption control of closing in this application program only represents that closing module 03 closes function corresponding to this encryption control, under normal circumstances, closing module 03 closes this encryption control, does not affect the use of other any functions in this application program except this encryption control at all.After closing module 03 closes this encryption control, terminal continues operational order corresponding to other functions of this application program that supervisory user triggers.
Further, in the present embodiment, the information encryption function that closing module 03 closes this encryption control corresponding comprises: all information that closing module 03 has been preserved under hiding this storage directory pointed by encryption control; The bookmark information preserved in such as browser and history access record are after closedown encryption control, and all bookmark informations preserved based on this encryption control and history access record will be invisible to user.
When embodiment of the present invention terminal receives the out code of the described encryption control that user triggers, close the information encryption function that described encryption control is corresponding, and continue other functional commands of the described application program that supervisory user triggers; There is the beneficial effect of protection user privacy information, also improve the security of user profile.
Below for browser in terminal, the course of work of the information encryption device of embodiment of the present invention application program is described again.
In concrete application scenarios, as shown in Figure 3, when user opens " bookmark/history private space " this functionality controls on the operation interface shown in Fig. 3, start module 01 and respond the enabled instruction of " bookmark/history private space " this functionality controls on browser that user triggers, starting should " bookmark/history private space " information encryption function that control is corresponding; Based on the described information encryption function starting module 01 startup, according to the Action Events that user triggers, execution module 02 performs encryption and/or the decryption oprerations of the described application program corresponding informance of the Action Events sensing that user triggers.Such as, user, for being selected by the bookmark newly added to be saved in bookmark private space file, also can use the bookmark preserved in private space; Or after starting the operational order of module 01 response unlatching " bookmark/history private space " control, the secret network address record that terminal demonstration was accessed in history, checks for user.The Action Events that execution module 02 also can trigger according to user, is directly recorded in the web page access record of user in private space, then the Visitor Logs be recorded in private space there will not be in acquiescence historical record.Receive after user closes the operational order of above-mentioned " bookmark/history private space " control in terminal, closing module 03 will hide all information stored under storage directory corresponding to this " bookmark/history private space " control, and the above-mentioned bookmark that user preserves and the historical record that user browses will be hidden invisible.
Aforesaid operations process is for user side, user is after unlatching " bookmark/history private space " control, can use bookmarks all in private space, also can add new secret bookmark wherein, network address record accessed in the meantime also can be deposited in private space.User is after closedown private space functionality controls, and the bookmark in private space and historical record will be hidden.User can only see disclosed bookmark and historical record.
The embodiment of the present invention by the way, has and only can be encrypted for the certain functional modules of application program and not affect the beneficial effect that other functions of this application program use; Further, the embodiment of the present invention also has the beneficial effect of protection user privacy information, also improves the security of user profile.
Fig. 9 is information encryption device the 3rd embodiment high-level schematic functional block diagram of application program of the present invention.Described in the present embodiment and Fig. 7 or Fig. 8, the difference of embodiment adds interface module 04 and authentication module 05.The present embodiment, based on embodiment described in Fig. 8, is only described interface module 04 and authentication module 05, about application program of the present invention information encryption device involved by other functional modules please refer to the specific descriptions of related embodiment, do not repeat them here.
Based on the description of above-described embodiment, as shown in Figure 9, the information encryption device of application program of the present invention also comprises:
Interface module 04, for providing the operation interface of user's access application encryption control, inputs the access code of encryption control corresponding to described application program one specific function for user;
Authentication module 05, for the described access code of authentication of users input, and when described access code is verified, starts information encryption function corresponding to described encryption control by described startup module.
When terminal monitoring triggers the enabled instruction of encryption control corresponding to application program one specific function to user, interface module 04 provides a user interface, inputs the access code of encryption control corresponding to this application program one specific function for user.If user does not know the access code of this encryption control, then user is only this specific function can not accessing or use this application program, does not affect the use of user to these other functions of application program.
In the embodiment of the present invention, the operation interface that interface module 04 provides comprises the Password Input frame for user inputs character information, and supplies the password icon of user's input trajectory information.Please with reference to Fig. 5 and Fig. 6, the Password Input frame that user shows based on Fig. 5, the character password that input is corresponding, the Password Input pattern password shown based on Fig. 6 or gesture password etc.
After user inputs corresponding access code, whether the access code of authentication module 05 authentication of users input is correct; When authentication password is incorrect, forbids all information of having preserved under user accesses the storage directory of this encryption control sensing, and forbid that user uses this specific function of the application program that this encryption control is corresponding.Such as, other access code operation interface input reference passwords that user provides based on Fig. 5 or Fig. 6 or terminal, when authentication module 05 verifies that this access code is incorrect, the bookmark information preserved that " bookmark/history private space " this control corresponding to this user's access browser of terminal disables is corresponding and historical viewings record, but do not affect this user at all and use browser access webpage, and the historical record that user's access browser produces be kept at acquiescence browse record storage directory under.
When authentication module 05 authentication password is correct, all information that terminal has been preserved under allowing user to access the storage directory of this encryption spatial direction, and allow user to perform corresponding information encryption and/or decryption oprerations based on this encryption control.Such as, other access code operation interface input reference passwords that user provides based on Fig. 5 or Fig. 6 or interface module 04, when authentication module 05 verifies that this access code is correct, the bookmark information preserved that " bookmark/history private space " this control that terminal allows this user's access browser corresponding is corresponding and historical viewings record, and the web page browsing record that user is accessed in this course, under being all kept at storage directory corresponding to " bookmark/history private space " this control, and under the storage directory of acquiescence, historical viewings record less than user's accessed web page in this will be checked in period.
Further, in the embodiment of the present invention, when user arranges access code for the first time, prompting user is inputted the related information of this access code by interface module 04, and is bound by the related information that this access code is corresponding with this access code; For user when forgetting access code, the related information according to binding with access code is given access code for change or resets access code.This related information comprises the information such as email address, phone number of user's input; When user forgets access code, the authentication instruction that interface module 04 triggers according to user, by sending identifying code to email address with the form of mail, or send identifying code to mobile phone by the form of short message, to unlock after the identifying code checking of user is correct or to reset access code.
The embodiment of the present invention provides the operation interface of user's access application encryption control, for user's input reference password; The access code of authentication of users input, and after being verified, allow user to use encryption control; There is the beneficial effect improving user information safety.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better embodiment.Based on such understanding, technical scheme of the present invention can embody the part that prior art contributes in essence in other words in form of a computer software product, this computer software product is stored in a Fig. 7, the storage medium of the information encryption device of the application program described in Fig. 8 or Fig. 9 is (as ROM/RAM, magnetic disc, CD) in, it (can be mobile phone that this storage medium comprises some instructions in order to make a station terminal equipment, computing machine, server, or the network equipment, or Fig. 7, Fig. 8, the information encryption device etc. of the application program described in Fig. 9) perform method described in the present invention each embodiment.
The foregoing is only the preferred embodiments of the present invention; not thereby its scope of the claims is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; directly or indirectly be used in the technical field that other are relevant, be all in like manner included in scope of patent protection of the present invention.

Claims (14)

1. an information ciphering method for application program, is characterized in that, comprises the following steps:
In the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
Based on the described information encryption function started, according to the Action Events that user triggers, perform encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to.
2. the method for claim 1, is characterized in that, the encryption of the described application program corresponding part information that the described Action Events of described execution points to and/or decryption oprerations, also comprise afterwards:
When receiving the out code of the described encryption control that user triggers, close the information encryption function that described encryption control is corresponding, and continue other functional commands of the described application program that supervisory user triggers.
3. the method for claim 1, is characterized in that, the information encryption function that described startup described encryption control is corresponding, also comprises before:
The operation interface of one user's access application encryption control is provided, inputs the access code of encryption control corresponding to described application program one specific function for user;
The described access code of authentication of users input, when described access code is verified, performs described step:
Start the information encryption function that described encryption control is corresponding.
4. method as claimed in claim 3, is characterized in that, described in the operation interface of user's access application encryption control is provided, for the access code that user inputs encryption control corresponding to described application program one specific function, comprising:
When user arranges described access code for the first time, the related information of described access code and described access code is bound.
5. the method as described in claim 1 or 2 or 3, is characterized in that, the information encryption function that described startup described encryption control is corresponding comprises:
All information of having preserved under showing the storage directory of described encryption control sensing.
6. the method for claim 1, is characterized in that, described application program is browser, and described application program corresponding part information is the bookmark information and historical viewings record preserved.
7. method as claimed in claim 2, it is characterized in that, the information encryption function that described closedown described encryption control is corresponding comprises:
All information of having preserved under hiding the storage directory of described encryption control sensing.
8. an information encryption device for application program, is characterized in that, comprising:
Start module, in the operational process of application program, monitor user when triggering the enabled instruction of encryption control corresponding to application program one specific function, start the information encryption function that described encryption control is corresponding;
Execution module, for based on the described information encryption function started, according to the Action Events that user triggers, performs encryption and/or the decryption oprerations of the described application program corresponding part information that described Action Events points to.
9. device as claimed in claim 8, is characterized in that, also comprise:
Closing module, during for receiving the out code of described encryption control that user triggers, closing the information encryption function that described encryption control is corresponding, and continuing other functional commands of the described application program that supervisory user triggers.
10. device as claimed in claim 8, is characterized in that, also comprise:
Interface module, for providing the operation interface of user's access application encryption control, inputs the access code of encryption control corresponding to described application program one specific function for user;
Authentication module, for the described access code of authentication of users input, when described access code is verified, starts information encryption function corresponding to described encryption control by described startup module.
11. devices as claimed in claim 10, is characterized in that, described interface module also for:
When user arranges described access code for the first time, the related information of described access code and described access code is bound.
12. devices as described in claim 8 or 9 or 10, is characterized in that, described startup module also for:
All information of having preserved under showing the storage directory of described encryption control sensing.
13. devices as claimed in claim 8, it is characterized in that, described application program is browser, and described application program corresponding part information is the bookmark information and historical viewings record preserved.
14. devices as claimed in claim 9, is characterized in that, described closing module also for:
All information of having preserved under hiding the storage directory of described encryption control sensing.
CN201310648284.0A 2013-12-04 2013-12-04 Information encryption method and device for application program Active CN104700001B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201310648284.0A CN104700001B (en) 2013-12-04 2013-12-04 Information encryption method and device for application program
PCT/CN2014/090053 WO2015081777A1 (en) 2013-12-04 2014-10-31 Method and device for encrypting information of an application
TW103140679A TW201523324A (en) 2013-12-04 2014-11-24 Method and device for encrypting information of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310648284.0A CN104700001B (en) 2013-12-04 2013-12-04 Information encryption method and device for application program

Publications (2)

Publication Number Publication Date
CN104700001A true CN104700001A (en) 2015-06-10
CN104700001B CN104700001B (en) 2020-01-10

Family

ID=53272859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310648284.0A Active CN104700001B (en) 2013-12-04 2013-12-04 Information encryption method and device for application program

Country Status (3)

Country Link
CN (1) CN104700001B (en)
TW (1) TW201523324A (en)
WO (1) WO2015081777A1 (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN105046144A (en) * 2015-07-02 2015-11-11 成都亿邻通科技有限公司 Protection method for application program of mobile terminal
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device
CN106102223A (en) * 2016-06-16 2016-11-09 中山市欧日光电科技有限公司 A kind of Intelligent lamp control system based on Quick Response Code scanning technique
CN106610966A (en) * 2015-10-21 2017-05-03 阿里巴巴集团控股有限公司 Information providing method and device
CN106681616A (en) * 2015-11-06 2017-05-17 广州市动景计算机科技有限公司 Browser function bar display method, browser function bar display device and processing equipment
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN109871706A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN109871707A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
EP3519931A4 (en) * 2017-01-16 2019-10-23 Samsung Electronics Co., Ltd. Electronic device and method for creating shortcut to web page in electronic device
CN111258689A (en) * 2020-01-09 2020-06-09 成都市新筑路桥机械股份有限公司 Tramcar man-machine interaction interface page management method
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
CN117235700A (en) * 2023-11-16 2023-12-15 荣耀终端有限公司 Data acquisition method, electronic device and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101408916A (en) * 2008-08-27 2009-04-15 上海第二工业大学 Internet software internet privacy protection method
CN102708141A (en) * 2011-03-14 2012-10-03 国际商业机器公司 System and method for in-private browsing
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof
WO2014187168A1 (en) * 2013-05-22 2014-11-27 福建联迪商用设备有限公司 Information storage and management method and apparatus based on webkit browser

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101408916A (en) * 2008-08-27 2009-04-15 上海第二工业大学 Internet software internet privacy protection method
CN102708141A (en) * 2011-03-14 2012-10-03 国际商业机器公司 System and method for in-private browsing
WO2014187168A1 (en) * 2013-05-22 2014-11-27 福建联迪商用设备有限公司 Information storage and management method and apparatus based on webkit browser
CN103390026A (en) * 2013-06-20 2013-11-13 中国软件与技术服务股份有限公司 Mobile intelligent terminal security browser and working method thereof

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016045504A1 (en) * 2014-09-22 2016-03-31 中兴通讯股份有限公司 Method and system for transmitting information safely, receiving terminal and transmission terminal
CN104917603A (en) * 2014-09-22 2015-09-16 中兴通讯股份有限公司 Information secure transmission method, receiving terminal and sending terminal
CN105046144A (en) * 2015-07-02 2015-11-11 成都亿邻通科技有限公司 Protection method for application program of mobile terminal
CN106610966A (en) * 2015-10-21 2017-05-03 阿里巴巴集团控股有限公司 Information providing method and device
CN106681616A (en) * 2015-11-06 2017-05-17 广州市动景计算机科技有限公司 Browser function bar display method, browser function bar display device and processing equipment
CN106022148A (en) * 2016-05-26 2016-10-12 北京金山安全软件有限公司 File encryption method and device
CN106102223A (en) * 2016-06-16 2016-11-09 中山市欧日光电科技有限公司 A kind of Intelligent lamp control system based on Quick Response Code scanning technique
EP3519931A4 (en) * 2017-01-16 2019-10-23 Samsung Electronics Co., Ltd. Electronic device and method for creating shortcut to web page in electronic device
CN107846351A (en) * 2017-10-23 2018-03-27 苏州亿科赛卓电子科技有限公司 A kind of chat messages sensitive information encryption method and device
CN109871706A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN109871707A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN111258689A (en) * 2020-01-09 2020-06-09 成都市新筑路桥机械股份有限公司 Tramcar man-machine interaction interface page management method
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium
CN117235700A (en) * 2023-11-16 2023-12-15 荣耀终端有限公司 Data acquisition method, electronic device and readable storage medium

Also Published As

Publication number Publication date
WO2015081777A1 (en) 2015-06-11
TW201523324A (en) 2015-06-16
CN104700001B (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN104700001A (en) Information encryption method and device of application program
CN103377332B (en) The method of access application and device
US9990481B2 (en) Behavior-based identity system
US10445487B2 (en) Methods and apparatus for authentication of joint account login
CN102509055B (en) Mobile terminal and method for hiding programs of mobile terminal
EP2442601B1 (en) Method and system for automatically logging in client
EP2905715B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104253805B (en) The data guard method and browser of a kind of browser
CN103109510A (en) Resource safety access method and device
CN104184900A (en) Data processing method, system and mobile terminal
CN107124279B (en) Method and device for erasing terminal data
CN102368230A (en) Mobile memory and access control method thereof as well as system
KR101625785B1 (en) Method and device for information security management of mobile terminal, and mobile terminal
KR20240024112A (en) System and method for contactless card communication and multi-device key pair cryptographic authentication
CN104883341A (en) Application management device, terminal and application management method
CN110472429A (en) Data verification method, device, electronic equipment and storage medium
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN103379478A (en) Control method, control system, client terminal and server
CN107147617A (en) A kind of single-point logging method and device
CN115442798A (en) Mobile terminal touch screen failure substitution device and method
CN112422281B (en) Method and system for changing secret key in security module
CN105451201A (en) Mobile terminal, remote control method of mobile terminal, remote control device of mobile terminal and remote control system of mobile terminal
WO2017185461A1 (en) Method and system for recovering tampered key information of virtual subscriber identity module
CN104995635A (en) Image transmission method, device and terminal device
CN104967512A (en) Security verification prompting method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant