CN104866752A - Application protection method and user terminal - Google Patents

Application protection method and user terminal Download PDF

Info

Publication number
CN104866752A
CN104866752A CN201510239540.XA CN201510239540A CN104866752A CN 104866752 A CN104866752 A CN 104866752A CN 201510239540 A CN201510239540 A CN 201510239540A CN 104866752 A CN104866752 A CN 104866752A
Authority
CN
China
Prior art keywords
information
privacy
application
verified
intended application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510239540.XA
Other languages
Chinese (zh)
Other versions
CN104866752B (en
Inventor
曾元清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510239540.XA priority Critical patent/CN104866752B/en
Publication of CN104866752A publication Critical patent/CN104866752A/en
Application granted granted Critical
Publication of CN104866752B publication Critical patent/CN104866752B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Embodiments of the present invention disclose an application protection method and a user terminal. The method comprises: detecting an operation instruction for a target application; in response to the operation instruction, determining whether the target application has an associated privacy application; if yes, outputting first prompt information, wherein the first prompt information is used for prompting a user to perform identity verification; receiving to-be-verified information input in response to the first prompt information, and verifying the to-be-verified information; and when the to-be-verified information is consistent with first preset verification information, running the privacy application. Using the embodiments of the present invention can improve application security, and effectively protect application privacy of users.

Description

A kind of application guard method and user terminal
Technical field
The present invention relates to Internet technical field, particularly relate to a kind of application guard method and user terminal.
Background technology
At present, mobile phone becomes an indispensable part in everyone life gradually, and the application of installing inside mobile phone also gets more and more.And mobile phone is used by the people of surrounding, or to other people, oneself shows that the situation of oneself handset content is a lot of again, this is just inevitably seen by other people the application privacy oneself do not want known to other people, although had various application lock to be encrypted application at present, guarantee only has and oneself just can enter application and check relevant information, if but when the strong curiosity of layman requires to open, still can how-do-you-do be caused.
Summary of the invention
The embodiment of the invention discloses a kind of application guard method and user terminal, the security of application can be improved, effectively ensure the application privacy of user.
Embodiment of the present invention first aspect discloses a kind of application guard method, comprising:
Detect the operating instruction for intended application;
Respond described operating instruction, judge whether described intended application exists the privacy application of association;
If exist, export the first information, described first information carries out authentication for pointing out user;
Receive the information to be verified of the described first information input of response, and described information to be verified is verified;
When described information to be verified and first preset authorization information consistent time, run described privacy application.
Wherein, described described information to be verified is verified after, also comprise:
When described information to be verified and second preset authorization information consistent time, run described intended application.
Wherein, before the operating instruction of described detection for intended application, also comprise:
Set up the incidence relation that described intended application and described privacy are applied.
Wherein, set up the incidence relation that described intended application and described privacy are applied, comprising:
What reception was applied with described privacy for described intended application associates request;
Respond described association request, export the second information, described second information arranges authentication information for pointing out user;
Receive the authentication information of the described second information input of response;
Described authentication information is stored as described first and presets authorization information, and set up the incidence relation that described intended application and described privacy apply.
Wherein, when there is the privacy application of multiple association in described intended application,
It is consistent that described information to be verified and first presets authorization information, comprising:
It is consistent that described information to be verified and described multiple privacy apply multiple first corresponding any one presetting in authorization information; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset;
The described privacy application of described operation, comprising:
Run first privacy of presetting authorization information corresponding consistent with described information to be verified to apply.
Embodiment of the present invention second aspect discloses a kind of user terminal, comprising:
Detection module, for detecting the operating instruction for intended application;
Judge module, for responding described operating instruction, judges whether described intended application exists the privacy application of association;
Output module, for when described judge module is judged as existing, exports the first information, and described first information carries out authentication for pointing out user;
Receiver module, for receiving the information to be verified of the described first information input of response;
Authentication module, for verifying described information to be verified;
Run module, for when described information to be verified is consistent with the first default authorization information, runs described privacy and apply.
Wherein, described operation module, also for when described information to be verified and second preset authorization information consistent time, run described intended application.
Wherein, described user terminal also comprises:
Set up module, for setting up the incidence relation that described intended application and described privacy are applied.
Wherein, described module of setting up comprises:
Receiving element, for receive apply with described privacy for described intended application associate request;
Output unit, for responding described association request, export the second information, described second information arranges authentication information for pointing out user;
Receiving element, for receiving the authentication information of the described second information input of response;
Storage unit, presets authorization information for described authentication information being stored as described first;
Set up unit, for setting up the incidence relation that described intended application and described privacy are applied.
Wherein, when there is the privacy application of multiple association in described intended application,
Described operation module, specifically for apply when described information to be verified and described multiple privacy corresponding multiple first preset any one in authorization information consistent time, the privacy running the first default authorization information consistent with described information to be verified corresponding is applied; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset.
Implement the embodiment of the present invention, there is following beneficial effect:
By detecting the operating instruction for intended application, and respond this operating instruction, judge whether intended application exists the privacy application of association, if exist, export the first information, authentication is carried out to point out user, when receiving the information to be verified of response first information input, this information to be verified is verified, and when this information to be verified and first preset authorization information consistent time, run the application of this privacy, due to invisible to user when the privacy of installing in user terminal is applied in off-duty, need the intended application by running this privacy association, and after authentication passes through, the application of this privacy could be run, thus the security of application can be improved, effectively ensure the application privacy of user.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, below the accompanying drawing used required in describing embodiment is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet applying guard method that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the another kind application guard method that the embodiment of the present invention provides;
Fig. 3 is the schematic flow sheet of the another kind application guard method that the embodiment of the present invention provides;
Fig. 4 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 5 is the structural representation of the another kind of terminal that the embodiment of the present invention provides;
Fig. 6 is the structural representation of the another kind of terminal that the embodiment of the present invention provides;
Fig. 7 is the structural representation of the another kind of terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only a part of embodiment of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
The embodiment of the invention discloses a kind of application guard method and user terminal, the security of application can be improved, effectively ensure the application privacy of user.Below be described in detail respectively.
Refer to Fig. 1, Fig. 1 is a kind of schematic flow sheet applying guard method disclosed in the embodiment of the present invention.As shown in Figure 1, this application guard method can comprise the following steps:
S101, detect operating instruction for intended application.
In the embodiment of the present invention, said method can be applied to user terminals such as including but not limited to mobile phone, panel computer, palm PC.
In the embodiment of the present invention, intended application can comprise in user terminal has installed and to the visible application program of user, it can include but not limited to QQ, micro-letter, PPS etc.; Operating instruction for intended application can include but not limited to that user double-clicks the shortcut icon of intended application, or the operation option etc. in the right-click menu of user's select target application.
S102, respond this operating instruction, judge whether this intended application exists the privacy application of association.If so, S103 is gone to step; Otherwise, go to step S106.
In the embodiment of the present invention, in order to protect the application privacy of terminal user, part application-specific mounted in user terminal can be wanted the accole application of the appointment application (i.e. privacy application) protected as user, wherein, when the privacy of installing in user terminal is applied in off-duty, invisible to user; User by the application of access accole, can visit the privacy associated with it and applies.
Correspondingly, in embodiments of the present invention, when user terminal receives the operating instruction for intended application, as user terminal detects the shortcut icon of user by double mouse click intended application, user terminal can judge whether this intended application exists the privacy application of association; If intended application exists the privacy application of association, then perform step S103; Otherwise, perform step S106.
S103, export the first information, this first information carries out authentication for pointing out user.
In the embodiment of the present invention, the authorization information that the privacy that associated with it by accole application access is applied can be pre-set, when user wants the privacy associated with it by accole application access to apply, need to input information to be verified and carry out authentication, and after authentication is passed through, the privacy associated with it could be accessed and apply.
Correspondingly, in embodiments of the present invention, when user terminal judge intended application exist the privacy associated with it apply (i.e. this intended application belong to accole apply) time, user terminal can export information (the first information), carries out authentication to point out user.
The information to be verified of S104, the input of this first information of reception response, and this information to be verified is verified.
In the embodiment of the present invention, when user terminal receive user respond first information input information to be verified time, the authorization information (the first authorization information) pre-set can be obtained, and by this first authorization information, the information to be verified that user inputs is verified.
S105, when information to be verified and first preset authorization information consistent time, run this privacy application.
In the embodiment of the present invention, when user terminal determines information to be verified and the first default authorization information is consistent, the privacy associated with this intended application can be run and apply.
In the embodiment of the present invention, this information to be verified can include but not limited to any one and several combinations in password to be verified, finger print information to be verified, shape of face information to be verified, iris information to be verified, retinal information to be verified and voiceprint to be verified.
In the embodiment of the present invention, this default authorization information pre-set (first preset authorization information) can include but not limited to default authentication password, preset checking finger print information, preset checking shape of face information, preset checking iris information, preset checking retinal information and preset any one and several combinations in checking voiceprint.
Concrete, above-mentioned first presets authorization information can comprise fingerprint string information and input time corresponding to each fingerprint; So correspondingly, verify that whether information to be verified is consistent with default authorization information can comprise the following steps:
Whether checking fingerprint string is identical with the fingerprint string that default authorization information comprises, and whether the difference of the input time of identical fingerprints is all less than preset value, if checking fingerprint string is identical with the fingerprint string that default authorization information comprises, and the difference of the input time of identical fingerprints is all less than preset value, so can verify that information to be verified is consistent with default authorization information; Otherwise, verify information to be verified and default authorization information inconsistent.
In the embodiment of the present invention, when information to be verified and first preset authorization information inconsistent time, user terminal can run this intended application, or prompting user authentication information mistake, application runs unsuccessfully.
S106, run this intended application.
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and when judging that this intended application does not exist the privacy application of association, user terminal can respond this operating instruction, runs this intended application.
Visible, in the method flow described by Fig. 1, by arranging the incidence relation of privacy application and intended application, and corresponding authorization information is set, when the operating instruction for intended application being detected, and when determining that intended application exists the privacy application of association, user can be pointed out to carry out authentication, and after authentication is passed through, run the privacy application of this intended application association, due to invisible to user when the privacy of installing in user terminal is applied in off-duty, need the intended application by running this privacy association, and after authentication passes through, the application of this privacy could be run, thus the security of application can be improved, effectively ensure the application privacy of user.
Refer to Fig. 2, Fig. 2 is the schematic flow sheet of the disclosed another kind of application guard method of the embodiment of the present invention.As shown in Figure 2, this application guard method can comprise the following steps:
S201, detect operating instruction for intended application.
In the embodiment of the present invention, said method can be applied to user terminals such as including but not limited to mobile phone, panel computer, palm PC.
In the embodiment of the present invention, intended application can comprise in user terminal has installed and to the visible application program of user, it can include but not limited to QQ, micro-letter, PPS etc.; Operating instruction for intended application can include but not limited to that user double-clicks the shortcut icon of intended application, or the operation option etc. in the right-click menu of user's select target application.
S202, respond this operating instruction, judge whether this intended application exists the privacy application of association.If so, S203 is gone to step; Otherwise, go to step S207.
In the embodiment of the present invention, in order to protect the application privacy of terminal user, part application-specific mounted in user terminal can be wanted the accole application of the appointment application (i.e. privacy application) protected as user, wherein, when the privacy of installing in user terminal is applied in off-duty, invisible to user; User by the application of access accole, can visit the privacy associated with it and applies.
Correspondingly, in embodiments of the present invention, when user terminal receives the operating instruction for intended application, as user terminal detects the shortcut icon of user by double mouse click intended application, user terminal can judge whether this intended application exists the privacy application of association; If intended application exists the privacy application of association, then perform step S203; Otherwise, perform step S207.
S203, export the first information, this first information carries out authentication for pointing out user.
In the embodiment of the present invention, the authorization information (first presets authorization information) that the privacy that associated with it by accole application access is applied can be pre-set, when user wants the privacy associated with it by accole application access to apply, need to input information to be verified and carry out authentication, and after authentication is passed through, the privacy associated with it could be accessed and apply.
In the embodiment of the present invention, accole for the privacy application that there is association is applied, the authorization information (second presets authorization information) of this accole of access application can also be pre-set, when user wants to access the application of this accole, also need to input information to be verified and carry out authentication, and after authentication is passed through, this intended application could be accessed.
Correspondingly, in embodiments of the present invention, when user terminal judge intended application exist the privacy associated with it apply (i.e. this intended application belong to accole apply) time, user terminal can export information (the first information), carries out authentication to point out user.
The information to be verified of S204, the input of this first information of reception response, and this information to be verified is verified.
In the embodiment of the present invention, when user terminal receive user respond first information input information to be verified time, the authorization information pre-set can be obtained, and by this authorization information, the information to be verified that user inputs is verified.
In the embodiment of the present invention, when information to be verified and first preset authorization information consistent time, perform step S205; When information to be verified and second preset authorization information consistent time, perform step S206.
S205, when information to be verified and first preset authorization information consistent time, run this privacy application.
In the embodiment of the present invention, when user terminal determines information to be verified and the first default authorization information is consistent, the privacy associated with this intended application can be run and apply.
S206, when information to be verified and second preset authorization information consistent time, run this intended application.
In the embodiment of the present invention, when user terminal determines information to be verified and the second default authorization information is consistent, this intended application can be run.
Wherein, in above-mentioned steps S205 and step S206, user terminal determines that the specific implementation that whether consistent information to be verified and first preset authorization information (or second presets authorization information) can see the associated description in above-mentioned steps S105, and the embodiment of the present invention does not repeat them here.
In the embodiment of the present invention, when user terminal determines that information to be verified and first presets authorization information, and when the second default authorization information is all inconsistent, user terminal can point out user authentication information mistake, and application runs unsuccessfully.
S207, run this intended application
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and when judging that this intended application does not exist the privacy application of association, user terminal can respond this operating instruction, runs this intended application.
Visible, in the method flow described by Fig. 2, accole for the privacy application that there is association is applied, pre-set the authorization information (first presets authorization information) by the privacy application of this accole application access association respectively, and access the authorization information (second presets authorization information) of this accole application, when the operating instruction for intended application being detected, and when determining that this intended application exists the privacy application of association, user can be pointed out to carry out authentication, and when the information to be verified received and first preset authorization information consistent time, run the privacy application of this intended application association, when the information to be verified received and second preset authorization information consistent time, run this intended application, on the one hand, avoid the privacy application of the random access destination application of disabled user or intended application association, on the other hand, when specific user (as relatives and friends) is strongly required to inform password, the consistent information to be verified of authorization information can be preset by input and second, control terminal runs this intended application, further increase the security of application, effectively ensure the application privacy of user.
Refer to Fig. 3, Fig. 3 is a kind of schematic flow sheet applying guard method disclosed in the embodiment of the present invention.As shown in Figure 3, this application guard method can comprise the following steps:
S301, set up the incidence relation that intended application and privacy apply.
In the embodiment of the present invention, said method can be applied to user terminals such as including but not limited to mobile phone, panel computer, palm PC.
In the embodiment of the present invention, in order to protect the application privacy of terminal user, part application-specific mounted in user terminal can be wanted the accole application of the appointment application (i.e. privacy application) protected as user, wherein, when the privacy of installing in user terminal is applied in off-duty, invisible to user; User by the application of access accole, can visit the privacy associated with it and applies.
In the embodiment of the present invention, intended application can comprise in user terminal has installed and to the visible application program of user, it can include but not limited to QQ, micro-letter, PPS etc.
In the optional embodiment of one, set up the incidence relation that intended application and privacy are applied, can comprise the following steps:
Step 11, receive apply with privacy for intended application associate request;
Step 12, respond this association request, export the second information, this second information, arranges authentication information for pointing out user;
The authentication information of step 13, the input of this second information of reception response;
Step 14, this authentication information is stored as first and presets authorization information, and set up the incidence relation that intended application and privacy apply.
In this embodiment, a specific function button can be set in the installation interface of privacy application, what to user terminal requests, user can set up that intended application applies with privacy by this function button associates request, or, increase by one in the right-click menu can applied in the privacy of installation and set up the option with the incidence relation of intended application, what to user terminal requests, user can set up that intended application applies with privacy by this option of selection associates request.
For example, be applied as on " footpath between fields, footpath between fields " with privacy, intended application (accole application) is " QQ " is example, when user installs application " footpath between fields, footpath between fields " in mobile phone, can by the specific function button arranged in installation interface, as " association " or " depending on " etc., and selective gist " QQ " (" QQ " is application mounted in mobile phone) is as intended application, sends associate request for " footpath between fields, footpath between fields " and " QQ " to mobile phone.
Again for example, be applied as " broadcasting soon " with privacy, intended application is " QQ " is example, user installs in the terminal " broadcasting soon " and after " QQ ", user can by clicking the shortcut icon that application " is broadcast " soon by mouse right button, in right-click menu, select " association " or " depending on " option, and " QQ " will be applied be defined as intended application, associate request to PC transmission for " broadcasting soon " and " QQ ".
In this embodiment, when user terminal receive apply for intended application and privacy associate request after, this association request can be responded, export information (the second information), to point out user, authentication information is set, this authentication information is applied by access destination for user, visits the authorization information that the privacy that associates with this intended application is applied; When user terminal receive user respond the authentication information of this second information input time, this authentication information is stored as first and presets authorization information, and set up the incidence relation that intended application and privacy apply.Wherein, after setting up the incidence relation that intended application and privacy apply, user terminal can hide the application of this privacy, when namely this privacy is applied in off-duty, invisible to user.
Further, as the optional embodiment of one, in embodiments of the present invention, the second information that user terminal response association request exports arranges for being applied by access destination except pointing out user, visit outside authorization information that the privacy that associates with this intended application applies, can also point out user that authorization information for access destination application is set; When receiving user and responding the authentication information of the second information input, can by the former (for being applied by access destination, visit the authorization information that the privacy that associates with this intended application is applied) be stored as first and preset authorization information, the latter's (authorization information for access destination application) is stored as second and presets authorization information, and set up the incidence relation that intended application applies in privacy.
S302, detect operating instruction for intended application.
In the embodiment of the present invention, the operating instruction for intended application can include but not limited to that user double-clicks the shortcut icon of intended application, or the operation option etc. in the right-click menu of user's select target application.
S303, respond this operating instruction, judge whether this intended application exists the privacy application of association.If so, S304 is gone to step; Otherwise, go to step S307.
In the embodiment of the present invention, when user terminal receives the operating instruction for intended application, as user terminal detects the shortcut icon of user by double mouse click intended application, user terminal can judge whether this intended application exists the privacy application of association; If intended application exists the privacy application of association, then perform step S303; Otherwise, perform step S307.
S304, export the first information, this first information carries out authentication for pointing out user.
In the embodiment of the present invention, when user terminal judge intended application exist the privacy associated with it apply (i.e. this intended application belong to accole apply) time, user terminal can export information (the first information), carries out authentication to point out user.
The information to be verified of S305, the input of this first information of reception response, and this information to be verified is verified.
In the embodiment of the present invention, when user terminal receive user respond first information input information to be verified time, the authorization information pre-set can be obtained, and by this authorization information, the information to be verified that user inputs is verified.
S306, when information to be verified and first preset authorization information consistent time, run this privacy application.
In the embodiment of the present invention, when user terminal determines information to be verified and the first default authorization information is consistent, the privacy associated with this intended application can be run and apply.
Further, in embodiments of the present invention, if be also provided with the authorization information (second presets authorization information) for access destination application in advance, then, when user terminal determines information to be verified and the second default authorization information is consistent, this intended application can be run.
In the embodiment of the present invention, when user terminal determines that information to be verified and first presets authorization information, and when the second default authorization information is all inconsistent, user terminal can point out user authentication information mistake, and application runs unsuccessfully.
S307, run this intended application.
In the embodiment of the present invention, when user terminal detects the operating instruction for intended application, and when judging that this intended application does not exist the privacy application of association, user terminal can respond this operating instruction, runs this intended application.
As the optional embodiment of one, an intended application can associate the application of multiple privacy, namely an intended application can simultaneously as the accole application that multiple privacy is applied, in this case, user terminal stores first when presetting authorization information, needs storage first to preset authorization information and first presets the application identities that privacy corresponding to authorization information apply with this.
Correspondingly, in this embodiment, in above-mentioned steps S306 (or step S105 or step S205), it is consistent that information to be verified and first presets authorization information, can comprise:
It is consistent that information to be verified and multiple privacy apply multiple first corresponding any one presetting in authorization information; Wherein, the plurality of first authorization information and the plurality of privacy application one_to_one corresponding is preset.
In above-mentioned steps S306 (or step S105 or step S205), run the application of described privacy, comprising:
Run first privacy of presetting authorization information corresponding consistent with this information to be verified to apply.
For example, suppose to apply " QQ " in user terminal simultaneously as the accole application of application " footpath between fields, footpath between fields " and " broadcasting soon ", and the authorization information by " QQ " access " footpath between fields, footpath between fields " pre-set (first presets authorization information) is " 123456 ", the authorization information (first presets authorization information) " broadcast soon " by " QQ " access is " 234567 ", then when user terminal detects the operating instruction for " QQ ", user terminal can judge whether " QQ " exists the privacy application of association, because " QQ " exists application " footpath between fields, footpath between fields " and " broadcasting soon " of association, therefore, user terminal can export the first information, information to be verified is inputted to point out user, when receiving user and responding the information to be verified of this first information input, user terminal can be preset authorization information according to prestore first and verify this information to be verified, if this authorization information is 123456, then user terminal can run application " footpath between fields, footpath between fields ", if this authorization information is 234567, then user terminal can run application and " broadcasts soon ".
By describing above and can finding out, in the technical scheme that the embodiment of the present invention provides, by detecting the operating instruction for intended application, and respond this operating instruction, judge whether intended application exists the privacy application of association, if exist, export the first information, authentication is carried out to point out user, when receiving the information to be verified of response first information input, this information to be verified is verified, and when this information to be verified and first preset authorization information consistent time, run the application of this privacy, due to invisible to user when the privacy of installing in user terminal is applied in off-duty, need the intended application by running this privacy association, and after authentication passes through, the application of this privacy could be run, thus the security of application can be improved, effectively ensure the application privacy of user.
Be apparatus of the present invention embodiment below, apparatus of the present invention embodiment and the inventive method embodiment belong to same design, for performing the method described in the inventive method embodiment.For convenience of explanation, apparatus of the present invention embodiment only illustrates the part relevant to apparatus of the present invention embodiment, and concrete ins and outs do not disclose, and please refer to the description of the inventive method embodiment, repeats no longer one by one herein.
Refer to Fig. 4, a kind of structural representation of user terminal disclosed in the embodiment of the present invention.As shown in Figure 4, this user terminal can comprise:
Detection module 401, for detecting the operating instruction for intended application;
Judge module 402, for responding described operating instruction, judges whether described intended application exists the privacy application of association;
Output module 403, for when described judge module 402 is judged as existing, exports the first information, and described first information carries out authentication for pointing out user;
Receiver module 404, for receiving the information to be verified of the described first information input of response;
Authentication module 405, for verifying described information to be verified;
Run module 406, for when described information to be verified is consistent with the first default authorization information, runs described privacy and apply.
In an alternative embodiment, described operation module 406, can also be used for when described information to be verified and second preset authorization information consistent time, run described intended application.
In an alternative embodiment, when there is the privacy application of multiple association in described intended application,
Described operation module 406, can specifically for apply when described information to be verified and described multiple privacy corresponding multiple first preset any one in authorization information consistent time, the privacy running the first default authorization information consistent with described information to be verified corresponding is applied; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset.
See also Fig. 5, Fig. 5 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.Wherein, the user terminal shown in Fig. 5 is that user terminal is as shown in Figure 4 optimized and obtains, and compared with the user terminal shown in Fig. 4, the user terminal shown in Fig. 5 can also comprise:
Set up module 407, for setting up the incidence relation that described intended application and described privacy are applied.
See also Fig. 6, Fig. 6 is the structural representation of another kind of user terminal disclosed in the embodiment of the present invention.Wherein, the user terminal shown in Fig. 6 is that user terminal is as shown in Figure 5 optimized and obtains, and compared with the user terminal shown in Fig. 5, in the user terminal shown in Fig. 6, described module 407 of setting up can comprise:
Receiving element 4071, for receive apply with described privacy for described intended application associate request;
Output unit 4072, for responding described association request, export the second information, described second information arranges authentication information for pointing out user;
Receiving element 4073, for receiving the authentication information of the described second information input of response;
Storage unit 4074, presets authorization information for described authentication information being stored as described first;
Set up unit 4075, for setting up the incidence relation that described intended application and described privacy are applied.
Refer to Fig. 7, Fig. 7 is the structural representation of the another kind of user terminal provided in the embodiment of the present invention.As shown in Figure 7, this user terminal comprises: at least one processor, and 701, such as CPU, user interface 703, storer 704, at least one communication bus 702.Wherein, communication bus 702 is for realizing the connection communication between these assemblies.Wherein, user interface 703 can comprise display screen (Display), and optional user interface 703 can also comprise wireline interface, the wave point of standard.Storer 704 can be high-speed RAM storer, also can be non-labile storer (non-volatile memory), such as at least one magnetic disk memory.Storer 704 can also be optionally that at least one is positioned at the memory storage away from aforementioned processor 701.Wherein store batch processing code in storer 704, and processor 701 calls the program code stored in storer 704, for performing following operation:
Detect the operating instruction for intended application;
Respond described operating instruction, judge whether described intended application exists the privacy application of association;
If exist, export the first information, described first information carries out authentication for pointing out user;
Receive the information to be verified of the described first information input of response, and described information to be verified is verified;
When described information to be verified and first preset authorization information consistent time, run described privacy application.
In an alternative embodiment, processor 701 call in storer 704 store program code described information to be verified is verified after, following operation can also be performed:
When described information to be verified and second preset authorization information consistent time, run described intended application.
In an alternative embodiment, processor 701 calls before the program code stored in storer 704 detects operating instruction for intended application, can also perform following operation:
Set up the incidence relation that described intended application and described privacy are applied.
In an alternative embodiment, processor 701 calls the program code stored in storer 704 and detects the incidence relation set up described intended application and described privacy and apply, and can specifically comprise following operation:
What reception was applied with described privacy for described intended application associates request;
Respond described association request, export the second information, described second information arranges authentication information for pointing out user;
Receive the authentication information of the described second information input of response;
Described authentication information is stored as described first and presets authorization information, and set up the incidence relation that described intended application and described privacy apply.
In an alternative embodiment, when there is the privacy application of multiple association in described intended application,
It is consistent that described information to be verified and first presets authorization information, comprising:
It is consistent that described information to be verified and described multiple privacy apply multiple first corresponding any one presetting in authorization information; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset;
Processor 701 calls the program code stored in storer 704 and runs the application of described privacy, can specifically comprise following operation:
Run first privacy of presetting authorization information corresponding consistent with described information to be verified to apply.
In the description of this instructions, specific features, structure, material or feature that the description of reference term " embodiment ", " some embodiments ", " example ", " concrete example " or " some examples " etc. means to describe in conjunction with this embodiment or example are contained at least one embodiment of the present invention or example.In this manual, not necessarily must for identical embodiment or example to the schematic representation of above-mentioned term.And the specific features of description, structure, material or feature can combine in one or more embodiment in office or example in an appropriate manner.In addition, when not conflicting, the feature of the different embodiment described in this instructions or example and different embodiment or example can carry out combining and combining by those skilled in the art.
The feature of the different embodiment described in this instructions and different embodiment can carry out combining and combining by those skilled in the art.Module in all embodiments of the present invention or unit, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (ApplicationSpecific Integrated Circuit, special IC).
Step in all embodiment methods of the present invention can be carried out order according to actual needs and be adjusted, merges and delete; Module in all embodiment device of the present invention or unit can carry out merging, divide and deleting according to actual needs.
Describe and can be understood in process flow diagram or in this any process otherwise described or method, represent and comprise one or more for realizing the module of the code of the executable instruction of the step of specific logical function or process, fragment or part, and the scope of the preferred embodiment of the present invention comprises other realization, wherein can not according to order that is shown or that discuss, comprise according to involved function by the mode while of basic or by contrary order, carry out n-back test, this should understand by embodiments of the invention person of ordinary skill in the field.
In flow charts represent or in this logic otherwise described and/or step, such as, the sequencing list of the executable instruction for realizing logic function can be considered to, may be embodied in any computer-readable medium, for instruction execution system, device or equipment (as computer based system, comprise the system of processor or other can from instruction execution system, device or equipment instruction fetch and perform the system of instruction) use, or to use in conjunction with these instruction execution systems, device or equipment.With regard to this instructions, " computer-readable medium " can be anyly can to comprise, store, communicate, propagate or transmission procedure for instruction execution system, device or equipment or the device that uses in conjunction with these instruction execution systems, device or equipment.The example more specifically (non-exhaustive list) of computer-readable medium comprises following: the electrical connection section (electronic installation) with one or more wiring, portable computer diskette box (magnetic device), random access memory (RAM), ROM (read-only memory) (ROM), erasablely edit ROM (read-only memory) (EPROM or flash memory), fiber device, and portable optic disk ROM (read-only memory) (CDROM).In addition, computer-readable medium can be even paper or other suitable media that can print described program thereon, because can such as by carrying out optical scanning to paper or other media, then carry out editing, decipher or carry out process with other suitable methods if desired and electronically obtain described program, be then stored in computer memory.
Those skilled in the art are appreciated that realizing all or part of step that above-described embodiment method carries is that the hardware that can carry out instruction relevant by program completes, described program can be stored in a kind of computer-readable recording medium, this program perform time, step comprising embodiment of the method one or a combination set of.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, also can be that the independent physics of unit exists, also can be integrated in a module by two or more unit.Above-mentioned integrated module both can adopt the form of hardware to realize, and the form of software function module also can be adopted to realize.If described integrated module using the form of software function module realize and as independently production marketing or use time, also can be stored in a computer read/write memory medium.
The above-mentioned storage medium mentioned can be ROM (read-only memory), disk or CD etc.Although illustrate and describe embodiments of the invention above, be understandable that, above-described embodiment is exemplary, can not be interpreted as limitation of the present invention, and those of ordinary skill in the art can change above-described embodiment within the scope of the invention, revises, replace and modification.
Above disclosedly be only preferred embodiment of the present invention, certainly the interest field of the present invention can not be limited with this, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, and according to the equivalent variations that the claims in the present invention are done, still belong to the scope that invention is contained.

Claims (10)

1. apply a guard method, it is characterized in that, comprising:
Detect the operating instruction for intended application;
Respond described operating instruction, judge whether described intended application exists the privacy application of association;
If exist, export the first information, described first information carries out authentication for pointing out user;
Receive the information to be verified of the described first information input of response, and described information to be verified is verified;
When described information to be verified and first preset authorization information consistent time, run described privacy application.
2. method according to claim 1, is characterized in that, described described information to be verified is verified after, also comprise:
When described information to be verified and second preset authorization information consistent time, run described intended application.
3. method according to claim 1, is characterized in that, before the operating instruction of described detection for intended application, also comprises:
Set up the incidence relation that described intended application and described privacy are applied.
4. method according to claim 3, is characterized in that, sets up the incidence relation that described intended application and described privacy are applied, comprising:
What reception was applied with described privacy for described intended application associates request;
Respond described association request, export the second information, described second information arranges authentication information for pointing out user;
Receive the authentication information of the described second information input of response;
Described authentication information is stored as described first and presets authorization information, and set up the incidence relation that described intended application and described privacy apply.
5. method according to claim 1, is characterized in that, when there is the privacy application of multiple association in described intended application,
It is consistent that described information to be verified and first presets authorization information, comprising:
It is consistent that described information to be verified and described multiple privacy apply multiple first corresponding any one presetting in authorization information; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset;
The described privacy application of described operation, comprising:
Run first privacy of presetting authorization information corresponding consistent with described information to be verified to apply.
6. a user terminal, is characterized in that, comprising:
Detection module, for detecting the operating instruction for intended application;
Judge module, for responding described operating instruction, judges whether described intended application exists the privacy application of association;
Output module, for when described judge module is judged as existing, exports the first information, and described first information carries out authentication for pointing out user;
Receiver module, for receiving the information to be verified of the described first information input of response;
Authentication module, for verifying described information to be verified;
Run module, for when described information to be verified is consistent with the first default authorization information, runs described privacy and apply.
7. user terminal according to claim 6, is characterized in that,
Described operation module, also for when described information to be verified and second preset authorization information consistent time, run described intended application.
8. user terminal according to claim 6, is characterized in that, described user terminal also comprises:
Set up module, for setting up the incidence relation that described intended application and described privacy are applied.
9. user terminal according to claim 8, is characterized in that, described module of setting up comprises:
Receiving element, for receive apply with described privacy for described intended application associate request;
Output unit, for responding described association request, export the second information, described second information arranges authentication information for pointing out user;
Receiving element, for receiving the authentication information of the described second information input of response;
Storage unit, presets authorization information for described authentication information being stored as described first;
Set up unit, for setting up the incidence relation that described intended application and described privacy are applied.
10. user terminal according to claim 6, is characterized in that, when there is the privacy application of multiple association in described intended application,
Described operation module, specifically for apply when described information to be verified and described multiple privacy corresponding multiple first preset any one in authorization information consistent time, the privacy running the first default authorization information consistent with described information to be verified corresponding is applied; Wherein, described multiple first authorization information and described multiple privacy application one_to_one corresponding is preset.
CN201510239540.XA 2015-05-12 2015-05-12 A kind of application guard method and user terminal Active CN104866752B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510239540.XA CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510239540.XA CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Publications (2)

Publication Number Publication Date
CN104866752A true CN104866752A (en) 2015-08-26
CN104866752B CN104866752B (en) 2018-09-04

Family

ID=53912575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510239540.XA Active CN104866752B (en) 2015-05-12 2015-05-12 A kind of application guard method and user terminal

Country Status (1)

Country Link
CN (1) CN104866752B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941780A (en) * 2015-09-29 2017-07-11 华为技术有限公司 A kind of man-machine interaction method of user terminal, device and user terminal
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN107451448A (en) * 2017-07-21 2017-12-08 广东欧珀移动通信有限公司 The application process and Related product of more bio-identification orders in terminal
CN107480493A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN107480491A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN107818783A (en) * 2017-09-12 2018-03-20 普强信息技术(北京)有限公司 A kind of mutual method and device of man-machine multi-modal on-vehicle safety sexual intercourse based on vocal print technology
CN108460259A (en) * 2016-12-13 2018-08-28 中兴通讯股份有限公司 A kind of information processing method, device and terminal
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN110750408A (en) * 2019-09-30 2020-02-04 湖南新云网科技有限公司 Method, device and apparatus for controlling USB debug mode switch, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
US20130298138A1 (en) * 2012-05-01 2013-11-07 Qualcomm Innovation Center, Inc. Privacy application and method
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application
US20150052355A1 (en) * 2010-04-19 2015-02-19 Amaani Munshi Method of Transmission of Encrypted Documents From An Email Application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150052355A1 (en) * 2010-04-19 2015-02-19 Amaani Munshi Method of Transmission of Encrypted Documents From An Email Application
CN103294941A (en) * 2012-02-22 2013-09-11 腾讯科技(深圳)有限公司 Method for accessing private space and mobile device
CN103366105A (en) * 2012-03-29 2013-10-23 宇龙计算机通信科技(深圳)有限公司 Method and communication terminal for implementing private space
US20130298138A1 (en) * 2012-05-01 2013-11-07 Qualcomm Innovation Center, Inc. Privacy application and method
CN103778363A (en) * 2014-01-20 2014-05-07 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for protecting application

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106941780A (en) * 2015-09-29 2017-07-11 华为技术有限公司 A kind of man-machine interaction method of user terminal, device and user terminal
US11314386B2 (en) 2015-09-29 2022-04-26 Huawei Technologies Co., Ltd. Human-computer interaction method of user terminal, apparatus, and user terminal
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN108460259A (en) * 2016-12-13 2018-08-28 中兴通讯股份有限公司 A kind of information processing method, device and terminal
CN107480493A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN107480491A (en) * 2017-07-19 2017-12-15 广东欧珀移动通信有限公司 Information processing method and related product
CN107480493B (en) * 2017-07-19 2020-05-05 Oppo广东移动通信有限公司 Information processing method and related product
CN107451448A (en) * 2017-07-21 2017-12-08 广东欧珀移动通信有限公司 The application process and Related product of more bio-identification orders in terminal
CN107818783A (en) * 2017-09-12 2018-03-20 普强信息技术(北京)有限公司 A kind of mutual method and device of man-machine multi-modal on-vehicle safety sexual intercourse based on vocal print technology
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN110750408A (en) * 2019-09-30 2020-02-04 湖南新云网科技有限公司 Method, device and apparatus for controlling USB debug mode switch, and storage medium

Also Published As

Publication number Publication date
CN104866752B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN104866752A (en) Application protection method and user terminal
CN109388532B (en) Test method, test device, electronic equipment and computer readable storage medium
CN108632253B (en) Client data security access method and device based on mobile terminal
US8640213B2 (en) Method and system for automatic authentication
CN105303086A (en) Application starting method and terminal
CN105389171A (en) Application start-up method and system for mobile terminal and mobile terminal
CN109313535B (en) Providing remote keyboard services
CN108737638B (en) Application control method and device, mobile terminal and computer readable medium
JP6456970B2 (en) Method, apparatus, program, and recording medium for acquiring certification material
CN104123164A (en) Application program starting method and device
CN105868617B (en) Application program encryption method and mobile terminal
CN109597727B (en) Detection method, detection device, server and detection system of electronic equipment
CN105323218A (en) Identity verifying method and device
EP3175635B1 (en) Device activity control
CN109063504B (en) Private file access method, mobile terminal and storage medium
CN104853095A (en) Photographing method and user terminal
CN110598384A (en) Information protection method, information protection device and mobile terminal
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN113032805B (en) Data access method and device, electronic equipment and storage medium
CN106599676A (en) Trusted process identification method and device
CN111866557B (en) Configuration method and device of large-screen display equipment, storage medium and electronic equipment
CN105373715A (en) Wearable device based data access method and apparatus
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN104346161A (en) Information processing method and electronic equipment
CN106066967A (en) Permission setting method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Patentee before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.