CN105740670B - Using encryption, starting method and apparatus - Google Patents

Using encryption, starting method and apparatus Download PDF

Info

Publication number
CN105740670B
CN105740670B CN201610060250.3A CN201610060250A CN105740670B CN 105740670 B CN105740670 B CN 105740670B CN 201610060250 A CN201610060250 A CN 201610060250A CN 105740670 B CN105740670 B CN 105740670B
Authority
CN
China
Prior art keywords
application
starting
encryption
encrypted
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610060250.3A
Other languages
Chinese (zh)
Other versions
CN105740670A (en
Inventor
李丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201610060250.3A priority Critical patent/CN105740670B/en
Publication of CN105740670A publication Critical patent/CN105740670A/en
Application granted granted Critical
Publication of CN105740670B publication Critical patent/CN105740670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses application encryptions, starting method and apparatus.One specific embodiment of the method includes: to be compared the encryption permission verification information that received user inputs with the Authority Verification information for the encryption permission for being used to verify user, judges to encrypt permission verification information and whether Authority Verification information is identical;If identical, the encrypted instruction information of user's input is received, encrypted instruction information includes application message to be encrypted and encryption application message, the encryption starting icon that application message includes that encryption is applied;The first calling script for starting application to be encrypted and second for starting encryption application, which is obtained, according to application message to be encrypted and encryption application message calls script;Starting icon, the first calling script and the second calling script are associated with application to be encrypted and encryption application, it is corresponding for starting the starting interface of application and encryption application to be encrypted to generate starting icon.This embodiment improves the safeties of application.

Description

Using encryption, starting method and apparatus
Technical field
This application involves field of computer technology, and in particular to terminal device technical field, more particularly to application are encrypted, opened Dynamic method and apparatus.
Background technique
With the rapid development of electronic technology, the use of terminal device is also more and more extensive.Currently, user can be in terminal Various applications are installed, these applications bring great convenience to the daily life of user in equipment.
Since the application installed on terminal device may be related to the private information of user, (the example when occurring unexpected As terminal device is stolen, loses) the huge security risk that will also be faced with of user.For example, the net installed and shown on mobile phone Silver gives the payment band of user convenience, but when hand-set from stolen, the property safety of user will be on the hazard.
Summary of the invention
The purpose of the application is to propose that a kind of improved application encrypts, starts method and apparatus, to solve background above The technical issues of technology segment is mentioned.
In a first aspect, applying encryption method this application provides a kind of, which comprises input received user Encryption permission verification information is compared with the Authority Verification information of the pre-stored encryption permission for verifying the user, Judge whether the encryption permission verification information and the Authority Verification information are identical;If identical, it is defeated to receive the user The encrypted instruction information entered, wherein the encrypted instruction information includes application message to be encrypted and encryption application message, described The encryption starting icon that application message includes that encryption is applied;According to the application message to be encrypted and the encryption with answering It is used to start the first calling script of application to be encrypted with acquisition of information and is called for starting the encryption with second applied Script;Starting icon, the first calling script and the second calling script are carried out with application to be encrypted and encryption with application Association generates the starting and is connect with the corresponding starting for starting the application to be encrypted and the encryption application of icon Mouthful.
In some embodiments, the method also includes: to other than the starting interface it is other for start it is described to The interface of encryption application or the encryption application is hidden or delete processing.
In some embodiments, to generate the starting icon corresponding for starting the application to be encrypted and described After starting interface of the encryption with application, the method also includes: detecting that the user holds for the starting with icon After capable clicking operation for the first time, corresponding input circle is shown according to the information for choosing verification mode of user input Face;By the input interface receive and store user input, for being verified described in the starting interface starts The starting verification information of application to be encrypted;According to starting verification information setting for receiving testing for user's input Demonstrate,prove the verifying interface of information.
In some embodiments, the starting with verification information include at least one of the following: encrypted message, finger print information, Problem information, gesture information, operation information.
Second aspect, this application provides a kind of applications to start method, which comprises is used according to user for starting The clicking operation that icon executes is shown preset for receiving the verifying interface of verification information, wherein starting figure The starting interface conjunctionn of mark and encryption application and non-encrypted application;It receives the user and passes through the verifying of verifying interface input Information;Judge whether the verification information and pre-stored starting verification information are identical, if identical, calls for opening Move the encryption application first calls script, starts the encryption application.
In some embodiments, judge the verification information and pre-stored starting verification information it is whether identical it Afterwards, the method also includes: if it is not the same, then call for start the non-encrypted application second call script, starting The non-encrypted application.
In some embodiments, the verification information includes at least one of the following: encrypted message, finger print information, answer letter Breath, gesture information, operation information.
The third aspect applies encryption device this application provides a kind of, and described device includes: the first receiving unit, configuration Encryption permission verification information and the pre-stored encryption permission for being used to verify the user for inputting received user Authority Verification information be compared, judge whether the encryption permission verification information and the Authority Verification information identical;The Two receiving units receive the encrypted instruction information of user input, wherein the encryption refers to if being configured to identical Enabling information includes application message to be encrypted and encryption application message, and the encryption application message includes opening for encryption application Employ icon;Acquiring unit is configured to be used for according to the application message to be encrypted and encryption application message acquisition Start the first calling script of application to be encrypted and second for starting encryption application calls script;Encryption unit, Be configured to by the starting icon, first call script and second call script and it is to be encrypted application and encryption with application into Row association generates the starting and is connect with the corresponding starting for starting the application to be encrypted and the encryption application of icon Mouthful.
In some embodiments, described device further include: processing unit, be configured to it is described starting interface other than its It is used to start the application to be encrypted or the interface for encrypting application is hidden or delete processing.
In some embodiments, described device further include: display unit is configured to detecting the user for institute It is aobvious according to the information for choosing verification mode of user input after the clicking operation for the first time for stating the execution of starting icon Show corresponding input interface;Third receiving unit is configured to the input interface and receives and stores user's input , for being verified the starting interface start the starting verification information of the application to be encrypted;Setting unit, configuration are used In the verifying interface of the verification information according to starting verification information setting for receiving user's input.
In some embodiments, the starting with verification information include at least one of the following: encrypted message, finger print information, Problem information, gesture information, operation information.
Fourth aspect applies starter this application provides a kind of, and described device includes: display unit, is configured to It is directed to the clicking operation that starting is executed with icon according to user, is shown preset for receiving verifying circle of verification information Face, wherein the starting interface conjunctionn of the starting icon and encryption application and non-encrypted application;Receiving unit is configured to It receives the user and passes through the verification information of verifying interface input;First start unit is configured to judge the verifying Whether information is identical with verification information as pre-stored starting, if identical, calls for starting the encryption application First calls script, starts the encryption application.
In some embodiments, described device further include: the second start unit is configured to judging the verification information With pre-stored starting with verification information it is whether identical after, if it is not the same, then calling for starting described non-encrypted answer Second calls script, starts the non-encrypted application.
In some embodiments, the verification information includes at least one of the following: encrypted message, finger print information, answer letter Breath, gesture information, operation information.
Application provided by the present application encrypts, starts method and apparatus, judges that user has by encrypting permission verification information Encrypt permission after, according to user input encrypted instruction acquisition of information be used for start application to be encrypted first call script and Second for starting encryption application calls script, then calls script and second to call script starting icon, first It is associated with application to be encrypted and encryption application, it is corresponding for starting application and encryption to be encrypted to generate starting icon The safety of application is improved to realize hiding for the starting interface of application to be encrypted with the starting interface of application.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that this application can be applied to exemplary system architecture figures therein;
Fig. 2 is the flow chart according to one embodiment using encryption method of the application;
Fig. 3 is the flow chart according to one embodiment using starting method of the application;
Fig. 4 a-4c is the schematic diagram according to the application scenarios using starting method of the application
Fig. 5 is the structural schematic diagram according to one embodiment using encryption device of the application;
Fig. 6 is the structural schematic diagram according to one embodiment using starter of the application;
Fig. 7 is adapted for the structural representation of the computer system for the terminal device or server of realizing the embodiment of the present application Figure.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is shown can be using the embodiment of the application encryption of the application, starting method or application encryption, starter Exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105. Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out Send message etc..Various telecommunication customer end applications, such as the application of financing class, purchase can be installed on terminal device 101,102,103 Species application, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be with display screen and support the various electronic equipments of user's input, packet Include but be not limited to smart phone, tablet computer, E-book reader, MP3 player (Moving Picture Experts Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) it is player, on knee portable Computer and desktop computer etc..
Server 105 can be to provide the server of various services, and for example, terminal device 101,102,103 sends information Background server.Background server can be requested according to the transmission of terminal device 101,102,103 by pre-stored information Feed back to terminal device 101,102,103.
In some cases, the information that server 105 is sent to terminal device 101,102,103 can be prestored to end End equipment 101,102,103 is local, since these information are stored in advance in terminal device 101,102,103, does not need to lead to Server transmission is crossed, system architecture used in this application at this time can not also be related to above-mentioned network 104 and server 105.
It should be noted that application encryption method provided by the embodiment of the present application and application starting method are generally by terminal Equipment 101,102,103 execute, correspondingly, using encryption device and using starter be generally positioned at terminal device 101, 102, in 103.
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and server.
With continued reference to Fig. 2, the process 200 of one embodiment using encryption method according to the application is shown.It is described Application encryption method, comprising the following steps:
Step 201, the encryption permission verification information that received user inputs is used to verify user's with pre-stored The Authority Verification information of encryption permission is compared, and judges to encrypt permission verification information and whether Authority Verification information is identical.
In the present embodiment, using encryption method operation thereon electronic equipment (example terminal device 101 as shown in figure 1, 102,103) the encryption permission verification information that can by various modes receive user's input, if for example, above-mentioned electronic equipment User is detected to the clicking operation of special icon, then shows that the preset information for inputting information for receiving user receives Interface can receive the encryption permission verification information of user's input by the above-mentioned electronic equipment of information reception interface, wherein on Stating special icon can be the icon (such as application icon) of various patterns, can be by above-mentioned electronic equipment according to current What system version, theme, existing icon and mounted application message etc. were chosen automatically from Local or Remote server, At this moment for different system versions, the icon of theme there are many needing to be stored in advance in Local or Remote server, in addition, above-mentioned What special icon can also be chosen by user according to oneself use habit, hobby etc..Above-mentioned electronic equipment can will connect The above-mentioned encryption permission verification information that receives and it is pre-stored for verify the Authority Verification information of the encryption permission of user into Row compares, to judge whether above-mentioned encryption permission verification information and above-mentioned Authority Verification information are identical, wherein above-mentioned permission is tested Card information can be user and be prestored on above-mentioned electronic equipment, and above-mentioned Authority Verification information can be password, fingerprint, test The various forms such as answer, operation, the gesture of card problem.
In general, terminal device can be shown for receiving user after user clicks the special icon shown on terminal device Input information information reception interface, user can pass through the information reception interface input encryption permission verification information.
Step 202, if it is identical, receive the encrypted instruction information of user's input.
In the present embodiment, the judgement based on step 201, if above-mentioned encryption permission verification information and above-mentioned Authority Verification Information is identical, and above-mentioned electronic equipment can further receive the encrypted instruction information of user's input, wherein above-mentioned encrypted instruction letter Breath includes application message to be encrypted and encryption application message, and above-mentioned encryption application message includes that the starting of encryption application is used Icon.Above-mentioned application message to be encrypted and encryption icon, the title, version that can include but is not limited to application in application message This.Herein, application to be encrypted can be that the security level required that user chooses from mounted application is relatively high, user It is desired with the application of encryption, such as Internetbank, Alipay, financing class application.Encryption can be user from mounted with applying The security level required chosen in is relatively low, user does not dislike externally exposed application.
Step 203, for starting application to be encrypted is obtained according to application message to be encrypted and encryption application message One calling script and the second calling script that application is used for starting encryption.
In the present embodiment, above-mentioned electronic equipment can according to the application message to be encrypted that is received in step 202 and plus Close first obtained from locally or remotely server with application message for starting application to be encrypted calls script and is used for The second of starting encryption application calls script.Herein, it can locally or remotely be previously stored in server for opening Move the various calling scripts of various applications.
Step 204, it by starting icon, the first calling script and the second calling script and application to be encrypted and encrypts with answering With being associated, it is corresponding for starting the starting interface of application and encryption application to be encrypted to generate starting icon.
In the present embodiment, above-mentioned electronic equipment can adjust the starting icon of above-mentioned encryption application, above-mentioned first It is associated with script and the second calling script with application to be encrypted and encryption application, generates the corresponding use of starting icon In the starting interface for starting application and encryption application to be encrypted.Above-mentioned starting interface can be for start it is to be encrypted application and The encryption software interface of application, user can call the starting interface with icon by clicking the starting, to start to be added Close application or encryption application.
In some optional implementations of the present embodiment, other than above-mentioned electronic equipment can also be to above-mentioned starting interface It is other for start it is above-mentioned it is to be encrypted application or above-mentioned encryption application interface (such as starting with icon, menu item, fast Mode) it is hidden or delete processing.
In some optional implementations of the present embodiment, above-mentioned electronic equipment is generating the corresponding use of starting icon After starting the starting interface of the application to be encrypted and the encryption with application, the starting can also be directed in detection user After clicking operation for the first time with icon execution, shown according to the information for choosing verification mode of user's input corresponding defeated Enter interface, wherein above-mentioned verification mode can be various verification modes, such as password authentification mode, fingerprint authentication mode, problem Verification mode, gesture verification mode, operation demonstration mode, and all corresponding at least one of every kind of verification mode and the verification mode phase Corresponding input interface.For example, password authentification mode can correspond to Password Input frame, fingerprint authentication mode can correspond to fingerprint and mention Interface is taken, problem verification mode can be to the interface for being applied to the selection of carry out problem or problem input and answer input, gesture Verification mode can be to the preset interface for being applied to detection user gesture (such as kneading gesture), and operation demonstration mode can (such as successively to execute and click specified object run, upward sliding to being applied to sequence of operations that detection user's sequence executes Operation, clicking operation) specific interface.Then, above-mentioned electronic equipment can receive and store user by above-mentioned input interface Starting verification information inputting, starting above-mentioned application to be encrypted for being verified above-mentioned starting interface.Optionally, above-mentioned Starting includes at least one of the following: encrypted message, finger print information, problem information, gesture information, operation information with verification information. Finally, testing for the verification information for receiving user's input can be arranged in above-mentioned electronic equipment according to above-mentioned starting verification information Interface is demonstrate,proved, above-mentioned verifying interface is the non-interface clicking above-mentioned electronic equipment after above-mentioned starting icon for the first time and showing of user, The interface and the pre-stored starting of above-mentioned electronic equipment are corresponding with verification information, such as when starting with verification information is password When information, which can be the password box popped up for inputting password.When starting is finger print information with verification information, The interface can be a fingerprint and obtain interface.When starting is problem information with verification information, which can be one and shows It is shown with the interface of the problem of user pre-selects or inputs and input frame.When starting is gesture information with verification information, the boundary Face can be the interface of a detection user gesture.When starting is operation information with verification information, which can be user Input the input interface that the starting is with verification information.
The method provided by the above embodiment of the application, which passes through, calls script and second to call foot starting icon, first This is associated with application to be encrypted and encryption application, and it is corresponding for starting application to be encrypted and adding to generate starting icon The close starting interface with application improves the safety of application to realize hiding for the starting interface of application to be encrypted.
With further reference to Fig. 3, it illustrates the processes 300 according to one embodiment using starting method of the application. This applies the process 300 of starting method, comprising the following steps:
Step 301, the clicking operation that starting is executed with icon is directed to according to user, display is preset to test for receiving Demonstrate,prove the verifying interface of information.
In the present embodiment, electronic equipment (such as the terminal device shown in FIG. 1 using the operation of starting method thereon 101,102,103) clicking operation that starting icon execute can be directed to according to user, shows and preset is tested for receiving Demonstrate,prove the verifying interface of information, wherein the starting interface conjunctionn of above-mentioned starting icon and encryption application and non-encrypted application.At this In, above-mentioned clicking operation is the non-clicking operation for the first time that user is directed to that the starting icon executes.Above-mentioned encryption is applied to be added with non- Close application can be after application and encryption to be encrypted are encrypted with application by the application encryption method of the application and obtain 's.
Step 302, it receives user and passes through the verification information of verifying interface input.
In the present embodiment, the verifying interface input that above-mentioned electronic equipment can receive that user is shown by step 301 is tested Demonstrate,prove information.
In some optional implementations of the present embodiment, above-mentioned verification information includes at least one of the following: message in cipher Breath, finger print information, answer information, gesture information, operation information.Herein, above-mentioned answer information can be user for above-mentioned The answer that the problem of showing on verifying interface is answered.
Step 303, judge whether verification information and pre-stored starting verification information are identical, if identical, adjust Script, starting encryption application are called with first for starting encryption application.
In the present embodiment, above-mentioned electronic equipment can be believed by received verifying in the means judgment steps 302 such as comparison Whether breath is identical with verification information as pre-stored starting, if identical, above-mentioned electronic equipment is called answers for starting encryption First calls script, to start encryption application.
In some optional implementations of the present embodiment, above-mentioned electronic equipment can also judge verification information and pre- The starting first stored with verification information it is whether identical after, if it is not the same, then call for starting the non-encrypted application Second calls script, starts non-encrypted application.
With continued reference to Fig. 4 a-4c, Fig. 4 a-4c is shown according to one of the application scenarios using starting method of the present embodiment It is intended to.User first clicks on the icon 401 of starting as shown in fig. 4 a shown on terminal device, and terminal device is according to user's needle To the starting clicking operation of icon 401, verifying circle for being used to receive verification information preset, as shown in Figure 4 b is shown Face.User inputs encrypted message by the verifying interface that Fig. 4 b is shown, and by clicking confirmation 402 confirmation input of control.Terminal Whether the encrypted message of device authentication user input is identical with verification information as pre-stored starting, if identical, calls First for starting Internetbank calls script, starts Internetbank program, will be as illustrated in fig. 4 c.If encrypted message is with starting with testing Card information is not identical, then calls second for starting calculator application to call script, start calculator.
The method provided by the above embodiment of the application starts encryption application by starting icon, and needs to test before starting The verification information of user's input is demonstrate,proved, therefore ensure that the safety of encryption application.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides a kind of application encryptions to fill The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, which specifically can be applied to respectively In kind electronic equipment.
As shown in figure 5, applying encryption device 500 described in the present embodiment includes: that the first receiving unit 501, second receives Unit 502, acquiring unit 503 and encryption unit 504.Wherein, the first receiving unit 501 is configured to received user is defeated The encryption permission verification information and the pre-stored Authority Verification information for verifying the encryption permission of above-mentioned user entered carries out Compare, judges whether above-mentioned encryption permission verification information and above-mentioned Authority Verification information are identical;Second receiving unit 502, configuration If receiving the encrypted instruction information of above-mentioned user's input, wherein above-mentioned encrypted instruction information includes to be encrypted for identical Application message and encryption application message, the above-mentioned encryption starting icon that application message includes that encryption is applied;It obtains single Member 503 is configured to be obtained according to above-mentioned application message to be encrypted and above-mentioned encryption application message for starting to be encrypted answer First calling script and the second calling script applied for starting above-mentioned encryption;Encryption unit 504, be configured to by Above-mentioned starting icon, the first calling script and the second calling script are associated with application to be encrypted and encryption application, raw It is corresponding for starting the starting interface of above-mentioned application to be encrypted and above-mentioned encryption application at above-mentioned starting icon.
In the present embodiment, the first receiving unit 501, the second receiving unit 502, acquiring unit 503 and encryption unit 504 Specific processing can refer to step 201, step 202, step 203, step 204 in Fig. 2 corresponding embodiment.
In some optional implementations of the present embodiment, above-mentioned application encryption device 500 further include: processing unit is (not Show), it is configured to other for starting above-mentioned application to be encrypted or above-mentioned encryption application other than above-mentioned starting interface Interface be hidden or delete processing.
In some optional implementations of the present embodiment, above-mentioned application encryption device 500 further include: display unit is (not Show), it is configured to after detecting the clicking operation for the first time that above-mentioned user executes for above-mentioned starting icon, according to upper The information for choosing verification mode for stating user's input shows corresponding input interface;Third receiving unit (not shown), matches Set for by above-mentioned input interface receive and store above-mentioned user input, start for being verified above-mentioned starting interface State the starting verification information of application to be encrypted;Setting unit (not shown) is configured to according to above-mentioned starting verification information The verifying interface of verification information for receiving above-mentioned user's input is set.
In some optional implementations of the present embodiment, above-mentioned starting is included at least one of the following: close with verification information Code information, finger print information, problem information, gesture information, operation information.
With further reference to Fig. 6, as the realization to method shown in above-mentioned each figure, this application provides a kind of application startings to fill The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in Fig. 3, which specifically can be applied to respectively In kind electronic equipment.
As shown in fig. 6, application starter 600 described in the present embodiment includes: display unit 601,602 and of receiving unit First start unit 603.Wherein, display unit 601 are configured to the click behaviour executed according to user for starting icon Make, show preset for receiving the verifying interface of verification information, wherein above-mentioned starting icon and encryption using and it is non- Encrypt the starting interface conjunctionn of application;Receiving unit 602 is configured to receive what above-mentioned user was inputted by above-mentioned verifying interface Verification information;First start unit 603 is configured to judge that above-mentioned verification information is with verification information with pre-stored starting It is no identical, if identical, call first for starting above-mentioned encryption application to call script, start above-mentioned encryption application.
In some optional implementations of the present embodiment, above-mentioned application starter 600 further include: the second start unit (not shown) is configured to after judging whether above-mentioned verification information and pre-stored starting verification information are identical, such as Fruit is not identical, then calls second for starting above-mentioned non-encrypted application to call script, start above-mentioned non-encrypted application.
In some optional implementations of the present embodiment, above-mentioned verification information include at least one of the following: encrypted message, Finger print information, answer information, gesture information, operation information.
Below with reference to Fig. 7, it illustrates the calculating of the terminal device or server that are suitable for being used to realize the embodiment of the present application The structural schematic diagram of machine system 700.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and Execute various movements appropriate and processing.In RAM 703, also it is stored with system 700 and operates required various programs and data. CPU 701, ROM 702 and RAM 703 are connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to always Line 704.
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.; And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon Computer program be mounted into storage section 708 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this In the embodiment of sample, which can be downloaded and installed from network by communications portion 709, and/or from removable Medium 711 is unloaded to be mounted.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yiyong The dedicated hardware based system of defined functions or operations is executed to realize, or can be referred to specialized hardware and computer The combination of order is realized.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard The mode of part is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor packet Include the first receiving unit, the second receiving unit, acquiring unit and encryption unit.Wherein, the title of these units is in certain situation Under do not constitute restriction to the unit itself, for example, the first receiving unit is also described as " inputting received user Encryption permission verification information and the Authority Verification information of the pre-stored encryption permission for verifying the user compare Compared with judging the encryption permission verification information and the whether identical unit of the Authority Verification information ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media, the non-volatile calculating Machine storage medium can be nonvolatile computer storage media included in device described in above-described embodiment;It is also possible to Individualism, without the nonvolatile computer storage media in supplying terminal.Above-mentioned nonvolatile computer storage media is deposited One or more program is contained, when one or more of programs are executed by an equipment, so that the equipment: will connect The encryption permission verification information and the permission of the pre-stored encryption permission for verifying the user of user's input of receipts are tested Card information is compared, and judges whether the encryption permission verification information and the Authority Verification information are identical;If identical, Receive the encrypted instruction information of user's input, wherein the encrypted instruction information includes application message to be encrypted and encryption With application message, the encryption starting icon that application message includes that encryption is applied;Believed according to the application to be encrypted Breath and encryption application message acquisition are for starting the first calling script of application to be encrypted and for starting the encryption Script is called with the second of application;Script and second is called to call script and application to be encrypted the starting icon, first It is associated with encryption application, it is corresponding for starting the application to be encrypted and the encryption to generate the starting icon With the starting interface of application.Alternatively, above-mentioned nonvolatile computer storage media is stored with one or more program, when described When one or more program is executed by an equipment, so that the equipment: being directed to the point that starting icon executes according to user Operation is hit, is shown preset for receiving the verifying interface of verification information, wherein the starting icon and encryption are applied With the starting interface conjunctionn of non-encrypted application;It receives the user and passes through the verification information of verifying interface input;Judge institute It states verification information and whether pre-stored starting verification information is identical, if identical, call for starting the encryption The first of application calls script, starts the encryption application.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the inventive concept, it is carried out by above-mentioned technical characteristic or its equivalent feature Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein Can technical characteristic replaced mutually and the technical solution that is formed.

Claims (14)

1. a kind of apply encryption method, which is characterized in that the described method includes:
By the encryption permission verification information and the pre-stored encryption permission for being used to verify the user that received user inputs Authority Verification information be compared, judge whether the encryption permission verification information and the Authority Verification information identical;
If identical, the encrypted instruction information of user's input is received, wherein the encrypted instruction information includes to be encrypted Application message and encryption application message, the encryption starting icon that application message includes that encryption is applied;
The first tune for starting application to be encrypted is obtained according to the application message to be encrypted and the encryption application message Script is called with script and second for starting encryption application;
Starting icon, the first calling script and the second calling script are closed with application to be encrypted and encryption with application It is corresponding for starting the starting interface of the application to be encrypted and the encryption application to generate the starting icon for connection.
2. the method according to claim 1, wherein the method also includes:
Other interfaces for starting the application to be encrypted or the encryption application other than the starting interface are carried out Hiding or delete processing.
3. the method according to claim 1, wherein corresponding for starting institute generating the starting icon After stating the starting interface of application to be encrypted and the encryption with application, the method also includes:
After detecting the clicking operation for the first time that the user executes for the starting icon, inputted according to the user The information for choosing verification mode show corresponding input interface;
By the input interface receive and store user input, for being verified described in the starting interface starts The starting verification information of application to be encrypted;
The verifying interface of verification information according to starting verification information setting for receiving user's input.
4. according to the method described in claim 3, it is characterized in that, the starting is included at least one of the following: with verification information
Encrypted message, finger print information, problem information, gesture information, operation information.
5. a kind of application starts method, which is characterized in that the described method includes:
It is directed to the clicking operation that starting is executed with icon according to user, is shown preset for receiving the verifying of verification information Interface, wherein the starting interface conjunctionn of the starting icon and encryption application and non-encrypted application, wherein the click behaviour Work is the non-clicking operation for the first time that user is directed to that the starting icon executes;
It receives the user and passes through the verification information of verifying interface input;
Judge whether the verification information and pre-stored starting verification information are identical, if identical, calls for opening Move the encryption application first calls script, starts the encryption application.
6. according to the method described in claim 5, it is characterized in that, judging the verification information and pre-stored starting use After whether verification information is identical, the method also includes:
If it is not the same, then calling second for starting the non-encrypted application to call script, start the non-encrypted application.
7. according to the method described in claim 5, it is characterized in that, the verification information includes at least one of the following:
Encrypted message, finger print information, answer information, gesture information, operation information.
8. a kind of apply encryption device, which is characterized in that described device includes:
First receiving unit is configured to be used to test with pre-stored by the encryption permission verification information that received user inputs The Authority Verification information for demonstrate,proving the encryption permission of the user is compared, and judges the encryption permission verification information and the permission Whether verification information is identical;
Second receiving unit receives the encrypted instruction information of user input, wherein described if being configured to identical Encrypted instruction information includes application message to be encrypted and encryption application message, and the encryption application message includes encryption with answering Starting icon;
Acquiring unit, be configured to be obtained according to the application message to be encrypted and the encryption application message for start to The first of encryption application calls script and uses the second of application to call script for starting the encryption;
Encryption unit is configured to call script and second to call script and application to be encrypted the starting icon, first It is associated with encryption application, it is corresponding for starting the application to be encrypted and the encryption to generate the starting icon With the starting interface of application.
9. device according to claim 8, which is characterized in that described device further include:
Processing unit is configured to other for starting the application to be encrypted or the encryption other than the starting interface It is hidden with the interface of application or delete processing.
10. device according to claim 8, which is characterized in that described device further include:
Display unit, be configured to detect the user for the starting icon execute clicking operation for the first time it Afterwards, corresponding input interface is shown according to the information for choosing verification mode of user input;
Third receiving unit, be configured to the input interface receive and store it is user input, logical for verifying Cross the starting verification information that the starting interface starts the application to be encrypted;
Setting unit is configured to that the verification information for receiving user's input is arranged according to the starting verification information Verifying interface.
11. device according to claim 10, which is characterized in that the starting verification information includes following at least one :
Encrypted message, finger print information, problem information, gesture information, operation information.
12. a kind of apply starter, which is characterized in that described device includes:
Display unit is configured to be directed to the clicking operation that starting icon executes according to user, shows preset be used for Receive the verifying interface of verification information, wherein the starting icon and the starting interface of encryption application and non-encrypted application close Connection, wherein the clicking operation is the non-clicking operation for the first time that user is directed to that the starting icon executes;
Receiving unit is configured to receive the verification information that the user passes through verifying interface input;
First start unit is configured to judge whether the verification information and pre-stored starting verification information are identical, If identical, first for starting the encryption application is called to call script, starts the encryption application.
13. device according to claim 12, which is characterized in that described device further include:
Second start unit is configured to judging whether the verification information and pre-stored starting verification information are identical Later, if it is not the same, then calling second for starting the non-encrypted application to call script, start described non-encrypted answer With.
14. device according to claim 12, which is characterized in that the verification information includes at least one of the following:
Encrypted message, finger print information, answer information, gesture information, operation information.
CN201610060250.3A 2016-01-28 2016-01-28 Using encryption, starting method and apparatus Active CN105740670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610060250.3A CN105740670B (en) 2016-01-28 2016-01-28 Using encryption, starting method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610060250.3A CN105740670B (en) 2016-01-28 2016-01-28 Using encryption, starting method and apparatus

Publications (2)

Publication Number Publication Date
CN105740670A CN105740670A (en) 2016-07-06
CN105740670B true CN105740670B (en) 2019-01-22

Family

ID=56246955

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610060250.3A Active CN105740670B (en) 2016-01-28 2016-01-28 Using encryption, starting method and apparatus

Country Status (1)

Country Link
CN (1) CN105740670B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295274B (en) * 2016-07-27 2020-03-17 宇龙计算机通信科技(深圳)有限公司 Application program control method and device
CN106599648A (en) * 2016-10-31 2017-04-26 努比亚技术有限公司 Application startup method and terminal
CN107133500A (en) * 2017-06-07 2017-09-05 深圳天珑无线科技有限公司 The encryption method and mobile terminal of a kind of application program
CN108563932B (en) * 2018-04-10 2020-01-10 Oppo广东移动通信有限公司 Application control method and device, readable storage medium and terminal
CN110210206B (en) * 2019-05-28 2021-04-06 维沃移动通信有限公司 Authority management method and terminal
CN114741122A (en) * 2020-12-23 2022-07-12 成都鼎桥通信技术有限公司 Application starting method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN104239778A (en) * 2014-09-02 2014-12-24 中科创达软件股份有限公司 Encrypted boosting method of application based on Android system
CN104462961A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Mobile terminal and privacy permission optimizing method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499907A (en) * 2009-02-19 2009-08-05 西安电子科技大学 Shoulder surfing preventing identity authentication system and method based on dynamic image password
CN102880820A (en) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 Method for accessing application program of mobile terminal and mobile terminal
CN103279411A (en) * 2013-06-06 2013-09-04 刘洪磊 Method and system of entering application programs based on fingerprint identification
CN104239778A (en) * 2014-09-02 2014-12-24 中科创达软件股份有限公司 Encrypted boosting method of application based on Android system
CN104462961A (en) * 2014-12-24 2015-03-25 北京奇虎科技有限公司 Mobile terminal and privacy permission optimizing method thereof

Also Published As

Publication number Publication date
CN105740670A (en) 2016-07-06

Similar Documents

Publication Publication Date Title
CN105740670B (en) Using encryption, starting method and apparatus
CN103188221B (en) application program login method, device and mobile terminal
US9152812B2 (en) Sensitive data protection during user interface automation testing systems and methods
EP2992477B1 (en) User and system authentication in enterprise systems
CN101529366B (en) Identification and visualization of trusted user interface objects
CN107249004B (en) Identity authentication method, device and client
CN107924431B (en) Anonymous application program packaging
CN108200089A (en) Implementation method, device, system and the storage medium of information security
CN107342966B (en) Authority credentials distribution method and device
CN108681662A (en) A kind of method and device of installation procedure
KR102491360B1 (en) Systems and methods for providing user accounts that allow users to operate computing devices
CN109660353A (en) A kind of application program installation method and device
CN105812370B (en) Intelligent card in processing method, apparatus and system
CN110247758A (en) The method, apparatus and code management device of Password Management
US20080172750A1 (en) Self validation of user authentication requests
US20230283598A1 (en) Message Authenticated Communication Sessions
CN103036852A (en) Method and device for achieving network login
CN106709362A (en) File encryption method and device and file decryption method and device
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN108540591B (en) Address book management method, address book management device and electronic equipment
EP3651034B1 (en) Systems and methods for watermarking audio of saas applications
CN109298895A (en) APP management method and device in mobile device
CN109413006A (en) Processing method, device, equipment and the machine readable media of account
CN107147617A (en) A kind of single-point logging method and device
CN105825134A (en) Intelligent card processing method, intelligent card management server and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant