CN105740670B - Using encryption, starting method and apparatus - Google Patents
Using encryption, starting method and apparatus Download PDFInfo
- Publication number
- CN105740670B CN105740670B CN201610060250.3A CN201610060250A CN105740670B CN 105740670 B CN105740670 B CN 105740670B CN 201610060250 A CN201610060250 A CN 201610060250A CN 105740670 B CN105740670 B CN 105740670B
- Authority
- CN
- China
- Prior art keywords
- application
- starting
- encryption
- encrypted
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application discloses application encryptions, starting method and apparatus.One specific embodiment of the method includes: to be compared the encryption permission verification information that received user inputs with the Authority Verification information for the encryption permission for being used to verify user, judges to encrypt permission verification information and whether Authority Verification information is identical;If identical, the encrypted instruction information of user's input is received, encrypted instruction information includes application message to be encrypted and encryption application message, the encryption starting icon that application message includes that encryption is applied;The first calling script for starting application to be encrypted and second for starting encryption application, which is obtained, according to application message to be encrypted and encryption application message calls script;Starting icon, the first calling script and the second calling script are associated with application to be encrypted and encryption application, it is corresponding for starting the starting interface of application and encryption application to be encrypted to generate starting icon.This embodiment improves the safeties of application.
Description
Technical field
This application involves field of computer technology, and in particular to terminal device technical field, more particularly to application are encrypted, opened
Dynamic method and apparatus.
Background technique
With the rapid development of electronic technology, the use of terminal device is also more and more extensive.Currently, user can be in terminal
Various applications are installed, these applications bring great convenience to the daily life of user in equipment.
Since the application installed on terminal device may be related to the private information of user, (the example when occurring unexpected
As terminal device is stolen, loses) the huge security risk that will also be faced with of user.For example, the net installed and shown on mobile phone
Silver gives the payment band of user convenience, but when hand-set from stolen, the property safety of user will be on the hazard.
Summary of the invention
The purpose of the application is to propose that a kind of improved application encrypts, starts method and apparatus, to solve background above
The technical issues of technology segment is mentioned.
In a first aspect, applying encryption method this application provides a kind of, which comprises input received user
Encryption permission verification information is compared with the Authority Verification information of the pre-stored encryption permission for verifying the user,
Judge whether the encryption permission verification information and the Authority Verification information are identical;If identical, it is defeated to receive the user
The encrypted instruction information entered, wherein the encrypted instruction information includes application message to be encrypted and encryption application message, described
The encryption starting icon that application message includes that encryption is applied;According to the application message to be encrypted and the encryption with answering
It is used to start the first calling script of application to be encrypted with acquisition of information and is called for starting the encryption with second applied
Script;Starting icon, the first calling script and the second calling script are carried out with application to be encrypted and encryption with application
Association generates the starting and is connect with the corresponding starting for starting the application to be encrypted and the encryption application of icon
Mouthful.
In some embodiments, the method also includes: to other than the starting interface it is other for start it is described to
The interface of encryption application or the encryption application is hidden or delete processing.
In some embodiments, to generate the starting icon corresponding for starting the application to be encrypted and described
After starting interface of the encryption with application, the method also includes: detecting that the user holds for the starting with icon
After capable clicking operation for the first time, corresponding input circle is shown according to the information for choosing verification mode of user input
Face;By the input interface receive and store user input, for being verified described in the starting interface starts
The starting verification information of application to be encrypted;According to starting verification information setting for receiving testing for user's input
Demonstrate,prove the verifying interface of information.
In some embodiments, the starting with verification information include at least one of the following: encrypted message, finger print information,
Problem information, gesture information, operation information.
Second aspect, this application provides a kind of applications to start method, which comprises is used according to user for starting
The clicking operation that icon executes is shown preset for receiving the verifying interface of verification information, wherein starting figure
The starting interface conjunctionn of mark and encryption application and non-encrypted application;It receives the user and passes through the verifying of verifying interface input
Information;Judge whether the verification information and pre-stored starting verification information are identical, if identical, calls for opening
Move the encryption application first calls script, starts the encryption application.
In some embodiments, judge the verification information and pre-stored starting verification information it is whether identical it
Afterwards, the method also includes: if it is not the same, then call for start the non-encrypted application second call script, starting
The non-encrypted application.
In some embodiments, the verification information includes at least one of the following: encrypted message, finger print information, answer letter
Breath, gesture information, operation information.
The third aspect applies encryption device this application provides a kind of, and described device includes: the first receiving unit, configuration
Encryption permission verification information and the pre-stored encryption permission for being used to verify the user for inputting received user
Authority Verification information be compared, judge whether the encryption permission verification information and the Authority Verification information identical;The
Two receiving units receive the encrypted instruction information of user input, wherein the encryption refers to if being configured to identical
Enabling information includes application message to be encrypted and encryption application message, and the encryption application message includes opening for encryption application
Employ icon;Acquiring unit is configured to be used for according to the application message to be encrypted and encryption application message acquisition
Start the first calling script of application to be encrypted and second for starting encryption application calls script;Encryption unit,
Be configured to by the starting icon, first call script and second call script and it is to be encrypted application and encryption with application into
Row association generates the starting and is connect with the corresponding starting for starting the application to be encrypted and the encryption application of icon
Mouthful.
In some embodiments, described device further include: processing unit, be configured to it is described starting interface other than its
It is used to start the application to be encrypted or the interface for encrypting application is hidden or delete processing.
In some embodiments, described device further include: display unit is configured to detecting the user for institute
It is aobvious according to the information for choosing verification mode of user input after the clicking operation for the first time for stating the execution of starting icon
Show corresponding input interface;Third receiving unit is configured to the input interface and receives and stores user's input
, for being verified the starting interface start the starting verification information of the application to be encrypted;Setting unit, configuration are used
In the verifying interface of the verification information according to starting verification information setting for receiving user's input.
In some embodiments, the starting with verification information include at least one of the following: encrypted message, finger print information,
Problem information, gesture information, operation information.
Fourth aspect applies starter this application provides a kind of, and described device includes: display unit, is configured to
It is directed to the clicking operation that starting is executed with icon according to user, is shown preset for receiving verifying circle of verification information
Face, wherein the starting interface conjunctionn of the starting icon and encryption application and non-encrypted application;Receiving unit is configured to
It receives the user and passes through the verification information of verifying interface input;First start unit is configured to judge the verifying
Whether information is identical with verification information as pre-stored starting, if identical, calls for starting the encryption application
First calls script, starts the encryption application.
In some embodiments, described device further include: the second start unit is configured to judging the verification information
With pre-stored starting with verification information it is whether identical after, if it is not the same, then calling for starting described non-encrypted answer
Second calls script, starts the non-encrypted application.
In some embodiments, the verification information includes at least one of the following: encrypted message, finger print information, answer letter
Breath, gesture information, operation information.
Application provided by the present application encrypts, starts method and apparatus, judges that user has by encrypting permission verification information
Encrypt permission after, according to user input encrypted instruction acquisition of information be used for start application to be encrypted first call script and
Second for starting encryption application calls script, then calls script and second to call script starting icon, first
It is associated with application to be encrypted and encryption application, it is corresponding for starting application and encryption to be encrypted to generate starting icon
The safety of application is improved to realize hiding for the starting interface of application to be encrypted with the starting interface of application.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 is that this application can be applied to exemplary system architecture figures therein;
Fig. 2 is the flow chart according to one embodiment using encryption method of the application;
Fig. 3 is the flow chart according to one embodiment using starting method of the application;
Fig. 4 a-4c is the schematic diagram according to the application scenarios using starting method of the application
Fig. 5 is the structural schematic diagram according to one embodiment using encryption device of the application;
Fig. 6 is the structural schematic diagram according to one embodiment using starter of the application;
Fig. 7 is adapted for the structural representation of the computer system for the terminal device or server of realizing the embodiment of the present application
Figure.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is shown can be using the embodiment of the application encryption of the application, starting method or application encryption, starter
Exemplary system architecture 100.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105.
Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with
Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out
Send message etc..Various telecommunication customer end applications, such as the application of financing class, purchase can be installed on terminal device 101,102,103
Species application, searching class application, instant messaging tools, mailbox client, social platform software etc..
Terminal device 101,102,103 can be with display screen and support the various electronic equipments of user's input, packet
Include but be not limited to smart phone, tablet computer, E-book reader, MP3 player (Moving Picture Experts
Group Audio Layer III, dynamic image expert's compression standard audio level 3), MP4 (Moving Picture
Experts Group Audio Layer IV, dynamic image expert's compression standard audio level 4) it is player, on knee portable
Computer and desktop computer etc..
Server 105 can be to provide the server of various services, and for example, terminal device 101,102,103 sends information
Background server.Background server can be requested according to the transmission of terminal device 101,102,103 by pre-stored information
Feed back to terminal device 101,102,103.
In some cases, the information that server 105 is sent to terminal device 101,102,103 can be prestored to end
End equipment 101,102,103 is local, since these information are stored in advance in terminal device 101,102,103, does not need to lead to
Server transmission is crossed, system architecture used in this application at this time can not also be related to above-mentioned network 104 and server 105.
It should be noted that application encryption method provided by the embodiment of the present application and application starting method are generally by terminal
Equipment 101,102,103 execute, correspondingly, using encryption device and using starter be generally positioned at terminal device 101,
102, in 103.
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need
It wants, can have any number of terminal device, network and server.
With continued reference to Fig. 2, the process 200 of one embodiment using encryption method according to the application is shown.It is described
Application encryption method, comprising the following steps:
Step 201, the encryption permission verification information that received user inputs is used to verify user's with pre-stored
The Authority Verification information of encryption permission is compared, and judges to encrypt permission verification information and whether Authority Verification information is identical.
In the present embodiment, using encryption method operation thereon electronic equipment (example terminal device 101 as shown in figure 1,
102,103) the encryption permission verification information that can by various modes receive user's input, if for example, above-mentioned electronic equipment
User is detected to the clicking operation of special icon, then shows that the preset information for inputting information for receiving user receives
Interface can receive the encryption permission verification information of user's input by the above-mentioned electronic equipment of information reception interface, wherein on
Stating special icon can be the icon (such as application icon) of various patterns, can be by above-mentioned electronic equipment according to current
What system version, theme, existing icon and mounted application message etc. were chosen automatically from Local or Remote server,
At this moment for different system versions, the icon of theme there are many needing to be stored in advance in Local or Remote server, in addition, above-mentioned
What special icon can also be chosen by user according to oneself use habit, hobby etc..Above-mentioned electronic equipment can will connect
The above-mentioned encryption permission verification information that receives and it is pre-stored for verify the Authority Verification information of the encryption permission of user into
Row compares, to judge whether above-mentioned encryption permission verification information and above-mentioned Authority Verification information are identical, wherein above-mentioned permission is tested
Card information can be user and be prestored on above-mentioned electronic equipment, and above-mentioned Authority Verification information can be password, fingerprint, test
The various forms such as answer, operation, the gesture of card problem.
In general, terminal device can be shown for receiving user after user clicks the special icon shown on terminal device
Input information information reception interface, user can pass through the information reception interface input encryption permission verification information.
Step 202, if it is identical, receive the encrypted instruction information of user's input.
In the present embodiment, the judgement based on step 201, if above-mentioned encryption permission verification information and above-mentioned Authority Verification
Information is identical, and above-mentioned electronic equipment can further receive the encrypted instruction information of user's input, wherein above-mentioned encrypted instruction letter
Breath includes application message to be encrypted and encryption application message, and above-mentioned encryption application message includes that the starting of encryption application is used
Icon.Above-mentioned application message to be encrypted and encryption icon, the title, version that can include but is not limited to application in application message
This.Herein, application to be encrypted can be that the security level required that user chooses from mounted application is relatively high, user
It is desired with the application of encryption, such as Internetbank, Alipay, financing class application.Encryption can be user from mounted with applying
The security level required chosen in is relatively low, user does not dislike externally exposed application.
Step 203, for starting application to be encrypted is obtained according to application message to be encrypted and encryption application message
One calling script and the second calling script that application is used for starting encryption.
In the present embodiment, above-mentioned electronic equipment can according to the application message to be encrypted that is received in step 202 and plus
Close first obtained from locally or remotely server with application message for starting application to be encrypted calls script and is used for
The second of starting encryption application calls script.Herein, it can locally or remotely be previously stored in server for opening
Move the various calling scripts of various applications.
Step 204, it by starting icon, the first calling script and the second calling script and application to be encrypted and encrypts with answering
With being associated, it is corresponding for starting the starting interface of application and encryption application to be encrypted to generate starting icon.
In the present embodiment, above-mentioned electronic equipment can adjust the starting icon of above-mentioned encryption application, above-mentioned first
It is associated with script and the second calling script with application to be encrypted and encryption application, generates the corresponding use of starting icon
In the starting interface for starting application and encryption application to be encrypted.Above-mentioned starting interface can be for start it is to be encrypted application and
The encryption software interface of application, user can call the starting interface with icon by clicking the starting, to start to be added
Close application or encryption application.
In some optional implementations of the present embodiment, other than above-mentioned electronic equipment can also be to above-mentioned starting interface
It is other for start it is above-mentioned it is to be encrypted application or above-mentioned encryption application interface (such as starting with icon, menu item, fast
Mode) it is hidden or delete processing.
In some optional implementations of the present embodiment, above-mentioned electronic equipment is generating the corresponding use of starting icon
After starting the starting interface of the application to be encrypted and the encryption with application, the starting can also be directed in detection user
After clicking operation for the first time with icon execution, shown according to the information for choosing verification mode of user's input corresponding defeated
Enter interface, wherein above-mentioned verification mode can be various verification modes, such as password authentification mode, fingerprint authentication mode, problem
Verification mode, gesture verification mode, operation demonstration mode, and all corresponding at least one of every kind of verification mode and the verification mode phase
Corresponding input interface.For example, password authentification mode can correspond to Password Input frame, fingerprint authentication mode can correspond to fingerprint and mention
Interface is taken, problem verification mode can be to the interface for being applied to the selection of carry out problem or problem input and answer input, gesture
Verification mode can be to the preset interface for being applied to detection user gesture (such as kneading gesture), and operation demonstration mode can
(such as successively to execute and click specified object run, upward sliding to being applied to sequence of operations that detection user's sequence executes
Operation, clicking operation) specific interface.Then, above-mentioned electronic equipment can receive and store user by above-mentioned input interface
Starting verification information inputting, starting above-mentioned application to be encrypted for being verified above-mentioned starting interface.Optionally, above-mentioned
Starting includes at least one of the following: encrypted message, finger print information, problem information, gesture information, operation information with verification information.
Finally, testing for the verification information for receiving user's input can be arranged in above-mentioned electronic equipment according to above-mentioned starting verification information
Interface is demonstrate,proved, above-mentioned verifying interface is the non-interface clicking above-mentioned electronic equipment after above-mentioned starting icon for the first time and showing of user,
The interface and the pre-stored starting of above-mentioned electronic equipment are corresponding with verification information, such as when starting with verification information is password
When information, which can be the password box popped up for inputting password.When starting is finger print information with verification information,
The interface can be a fingerprint and obtain interface.When starting is problem information with verification information, which can be one and shows
It is shown with the interface of the problem of user pre-selects or inputs and input frame.When starting is gesture information with verification information, the boundary
Face can be the interface of a detection user gesture.When starting is operation information with verification information, which can be user
Input the input interface that the starting is with verification information.
The method provided by the above embodiment of the application, which passes through, calls script and second to call foot starting icon, first
This is associated with application to be encrypted and encryption application, and it is corresponding for starting application to be encrypted and adding to generate starting icon
The close starting interface with application improves the safety of application to realize hiding for the starting interface of application to be encrypted.
With further reference to Fig. 3, it illustrates the processes 300 according to one embodiment using starting method of the application.
This applies the process 300 of starting method, comprising the following steps:
Step 301, the clicking operation that starting is executed with icon is directed to according to user, display is preset to test for receiving
Demonstrate,prove the verifying interface of information.
In the present embodiment, electronic equipment (such as the terminal device shown in FIG. 1 using the operation of starting method thereon
101,102,103) clicking operation that starting icon execute can be directed to according to user, shows and preset is tested for receiving
Demonstrate,prove the verifying interface of information, wherein the starting interface conjunctionn of above-mentioned starting icon and encryption application and non-encrypted application.At this
In, above-mentioned clicking operation is the non-clicking operation for the first time that user is directed to that the starting icon executes.Above-mentioned encryption is applied to be added with non-
Close application can be after application and encryption to be encrypted are encrypted with application by the application encryption method of the application and obtain
's.
Step 302, it receives user and passes through the verification information of verifying interface input.
In the present embodiment, the verifying interface input that above-mentioned electronic equipment can receive that user is shown by step 301 is tested
Demonstrate,prove information.
In some optional implementations of the present embodiment, above-mentioned verification information includes at least one of the following: message in cipher
Breath, finger print information, answer information, gesture information, operation information.Herein, above-mentioned answer information can be user for above-mentioned
The answer that the problem of showing on verifying interface is answered.
Step 303, judge whether verification information and pre-stored starting verification information are identical, if identical, adjust
Script, starting encryption application are called with first for starting encryption application.
In the present embodiment, above-mentioned electronic equipment can be believed by received verifying in the means judgment steps 302 such as comparison
Whether breath is identical with verification information as pre-stored starting, if identical, above-mentioned electronic equipment is called answers for starting encryption
First calls script, to start encryption application.
In some optional implementations of the present embodiment, above-mentioned electronic equipment can also judge verification information and pre-
The starting first stored with verification information it is whether identical after, if it is not the same, then call for starting the non-encrypted application
Second calls script, starts non-encrypted application.
With continued reference to Fig. 4 a-4c, Fig. 4 a-4c is shown according to one of the application scenarios using starting method of the present embodiment
It is intended to.User first clicks on the icon 401 of starting as shown in fig. 4 a shown on terminal device, and terminal device is according to user's needle
To the starting clicking operation of icon 401, verifying circle for being used to receive verification information preset, as shown in Figure 4 b is shown
Face.User inputs encrypted message by the verifying interface that Fig. 4 b is shown, and by clicking confirmation 402 confirmation input of control.Terminal
Whether the encrypted message of device authentication user input is identical with verification information as pre-stored starting, if identical, calls
First for starting Internetbank calls script, starts Internetbank program, will be as illustrated in fig. 4 c.If encrypted message is with starting with testing
Card information is not identical, then calls second for starting calculator application to call script, start calculator.
The method provided by the above embodiment of the application starts encryption application by starting icon, and needs to test before starting
The verification information of user's input is demonstrate,proved, therefore ensure that the safety of encryption application.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides a kind of application encryptions to fill
The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, which specifically can be applied to respectively
In kind electronic equipment.
As shown in figure 5, applying encryption device 500 described in the present embodiment includes: that the first receiving unit 501, second receives
Unit 502, acquiring unit 503 and encryption unit 504.Wherein, the first receiving unit 501 is configured to received user is defeated
The encryption permission verification information and the pre-stored Authority Verification information for verifying the encryption permission of above-mentioned user entered carries out
Compare, judges whether above-mentioned encryption permission verification information and above-mentioned Authority Verification information are identical;Second receiving unit 502, configuration
If receiving the encrypted instruction information of above-mentioned user's input, wherein above-mentioned encrypted instruction information includes to be encrypted for identical
Application message and encryption application message, the above-mentioned encryption starting icon that application message includes that encryption is applied;It obtains single
Member 503 is configured to be obtained according to above-mentioned application message to be encrypted and above-mentioned encryption application message for starting to be encrypted answer
First calling script and the second calling script applied for starting above-mentioned encryption;Encryption unit 504, be configured to by
Above-mentioned starting icon, the first calling script and the second calling script are associated with application to be encrypted and encryption application, raw
It is corresponding for starting the starting interface of above-mentioned application to be encrypted and above-mentioned encryption application at above-mentioned starting icon.
In the present embodiment, the first receiving unit 501, the second receiving unit 502, acquiring unit 503 and encryption unit 504
Specific processing can refer to step 201, step 202, step 203, step 204 in Fig. 2 corresponding embodiment.
In some optional implementations of the present embodiment, above-mentioned application encryption device 500 further include: processing unit is (not
Show), it is configured to other for starting above-mentioned application to be encrypted or above-mentioned encryption application other than above-mentioned starting interface
Interface be hidden or delete processing.
In some optional implementations of the present embodiment, above-mentioned application encryption device 500 further include: display unit is (not
Show), it is configured to after detecting the clicking operation for the first time that above-mentioned user executes for above-mentioned starting icon, according to upper
The information for choosing verification mode for stating user's input shows corresponding input interface;Third receiving unit (not shown), matches
Set for by above-mentioned input interface receive and store above-mentioned user input, start for being verified above-mentioned starting interface
State the starting verification information of application to be encrypted;Setting unit (not shown) is configured to according to above-mentioned starting verification information
The verifying interface of verification information for receiving above-mentioned user's input is set.
In some optional implementations of the present embodiment, above-mentioned starting is included at least one of the following: close with verification information
Code information, finger print information, problem information, gesture information, operation information.
With further reference to Fig. 6, as the realization to method shown in above-mentioned each figure, this application provides a kind of application startings to fill
The one embodiment set, the Installation practice is corresponding with embodiment of the method shown in Fig. 3, which specifically can be applied to respectively
In kind electronic equipment.
As shown in fig. 6, application starter 600 described in the present embodiment includes: display unit 601,602 and of receiving unit
First start unit 603.Wherein, display unit 601 are configured to the click behaviour executed according to user for starting icon
Make, show preset for receiving the verifying interface of verification information, wherein above-mentioned starting icon and encryption using and it is non-
Encrypt the starting interface conjunctionn of application;Receiving unit 602 is configured to receive what above-mentioned user was inputted by above-mentioned verifying interface
Verification information;First start unit 603 is configured to judge that above-mentioned verification information is with verification information with pre-stored starting
It is no identical, if identical, call first for starting above-mentioned encryption application to call script, start above-mentioned encryption application.
In some optional implementations of the present embodiment, above-mentioned application starter 600 further include: the second start unit
(not shown) is configured to after judging whether above-mentioned verification information and pre-stored starting verification information are identical, such as
Fruit is not identical, then calls second for starting above-mentioned non-encrypted application to call script, start above-mentioned non-encrypted application.
In some optional implementations of the present embodiment, above-mentioned verification information include at least one of the following: encrypted message,
Finger print information, answer information, gesture information, operation information.
Below with reference to Fig. 7, it illustrates the calculating of the terminal device or server that are suitable for being used to realize the embodiment of the present application
The structural schematic diagram of machine system 700.
As shown in fig. 7, computer system 700 includes central processing unit (CPU) 701, it can be read-only according to being stored in
Program in memory (ROM) 702 or be loaded into the program in random access storage device (RAM) 703 from storage section 708 and
Execute various movements appropriate and processing.In RAM 703, also it is stored with system 700 and operates required various programs and data.
CPU 701, ROM 702 and RAM 703 are connected with each other by bus 704.Input/output (I/O) interface 705 is also connected to always
Line 704.
I/O interface 705 is connected to lower component: the importation 706 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 707 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 708 including hard disk etc.;
And the communications portion 709 of the network interface card including LAN card, modem etc..Communications portion 709 via such as because
The network of spy's net executes communication process.Driver 710 is also connected to I/O interface 705 as needed.Detachable media 711, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 710, in order to read from thereon
Computer program be mounted into storage section 708 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for method shown in execution flow chart.At this
In the embodiment of sample, which can be downloaded and installed from network by communications portion 709, and/or from removable
Medium 711 is unloaded to be mounted.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yiyong
The dedicated hardware based system of defined functions or operations is executed to realize, or can be referred to specialized hardware and computer
The combination of order is realized.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard
The mode of part is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor packet
Include the first receiving unit, the second receiving unit, acquiring unit and encryption unit.Wherein, the title of these units is in certain situation
Under do not constitute restriction to the unit itself, for example, the first receiving unit is also described as " inputting received user
Encryption permission verification information and the Authority Verification information of the pre-stored encryption permission for verifying the user compare
Compared with judging the encryption permission verification information and the whether identical unit of the Authority Verification information ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media, the non-volatile calculating
Machine storage medium can be nonvolatile computer storage media included in device described in above-described embodiment;It is also possible to
Individualism, without the nonvolatile computer storage media in supplying terminal.Above-mentioned nonvolatile computer storage media is deposited
One or more program is contained, when one or more of programs are executed by an equipment, so that the equipment: will connect
The encryption permission verification information and the permission of the pre-stored encryption permission for verifying the user of user's input of receipts are tested
Card information is compared, and judges whether the encryption permission verification information and the Authority Verification information are identical;If identical,
Receive the encrypted instruction information of user's input, wherein the encrypted instruction information includes application message to be encrypted and encryption
With application message, the encryption starting icon that application message includes that encryption is applied;Believed according to the application to be encrypted
Breath and encryption application message acquisition are for starting the first calling script of application to be encrypted and for starting the encryption
Script is called with the second of application;Script and second is called to call script and application to be encrypted the starting icon, first
It is associated with encryption application, it is corresponding for starting the application to be encrypted and the encryption to generate the starting icon
With the starting interface of application.Alternatively, above-mentioned nonvolatile computer storage media is stored with one or more program, when described
When one or more program is executed by an equipment, so that the equipment: being directed to the point that starting icon executes according to user
Operation is hit, is shown preset for receiving the verifying interface of verification information, wherein the starting icon and encryption are applied
With the starting interface conjunctionn of non-encrypted application;It receives the user and passes through the verification information of verifying interface input;Judge institute
It states verification information and whether pre-stored starting verification information is identical, if identical, call for starting the encryption
The first of application calls script, starts the encryption application.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from the inventive concept, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (14)
1. a kind of apply encryption method, which is characterized in that the described method includes:
By the encryption permission verification information and the pre-stored encryption permission for being used to verify the user that received user inputs
Authority Verification information be compared, judge whether the encryption permission verification information and the Authority Verification information identical;
If identical, the encrypted instruction information of user's input is received, wherein the encrypted instruction information includes to be encrypted
Application message and encryption application message, the encryption starting icon that application message includes that encryption is applied;
The first tune for starting application to be encrypted is obtained according to the application message to be encrypted and the encryption application message
Script is called with script and second for starting encryption application;
Starting icon, the first calling script and the second calling script are closed with application to be encrypted and encryption with application
It is corresponding for starting the starting interface of the application to be encrypted and the encryption application to generate the starting icon for connection.
2. the method according to claim 1, wherein the method also includes:
Other interfaces for starting the application to be encrypted or the encryption application other than the starting interface are carried out
Hiding or delete processing.
3. the method according to claim 1, wherein corresponding for starting institute generating the starting icon
After stating the starting interface of application to be encrypted and the encryption with application, the method also includes:
After detecting the clicking operation for the first time that the user executes for the starting icon, inputted according to the user
The information for choosing verification mode show corresponding input interface;
By the input interface receive and store user input, for being verified described in the starting interface starts
The starting verification information of application to be encrypted;
The verifying interface of verification information according to starting verification information setting for receiving user's input.
4. according to the method described in claim 3, it is characterized in that, the starting is included at least one of the following: with verification information
Encrypted message, finger print information, problem information, gesture information, operation information.
5. a kind of application starts method, which is characterized in that the described method includes:
It is directed to the clicking operation that starting is executed with icon according to user, is shown preset for receiving the verifying of verification information
Interface, wherein the starting interface conjunctionn of the starting icon and encryption application and non-encrypted application, wherein the click behaviour
Work is the non-clicking operation for the first time that user is directed to that the starting icon executes;
It receives the user and passes through the verification information of verifying interface input;
Judge whether the verification information and pre-stored starting verification information are identical, if identical, calls for opening
Move the encryption application first calls script, starts the encryption application.
6. according to the method described in claim 5, it is characterized in that, judging the verification information and pre-stored starting use
After whether verification information is identical, the method also includes:
If it is not the same, then calling second for starting the non-encrypted application to call script, start the non-encrypted application.
7. according to the method described in claim 5, it is characterized in that, the verification information includes at least one of the following:
Encrypted message, finger print information, answer information, gesture information, operation information.
8. a kind of apply encryption device, which is characterized in that described device includes:
First receiving unit is configured to be used to test with pre-stored by the encryption permission verification information that received user inputs
The Authority Verification information for demonstrate,proving the encryption permission of the user is compared, and judges the encryption permission verification information and the permission
Whether verification information is identical;
Second receiving unit receives the encrypted instruction information of user input, wherein described if being configured to identical
Encrypted instruction information includes application message to be encrypted and encryption application message, and the encryption application message includes encryption with answering
Starting icon;
Acquiring unit, be configured to be obtained according to the application message to be encrypted and the encryption application message for start to
The first of encryption application calls script and uses the second of application to call script for starting the encryption;
Encryption unit is configured to call script and second to call script and application to be encrypted the starting icon, first
It is associated with encryption application, it is corresponding for starting the application to be encrypted and the encryption to generate the starting icon
With the starting interface of application.
9. device according to claim 8, which is characterized in that described device further include:
Processing unit is configured to other for starting the application to be encrypted or the encryption other than the starting interface
It is hidden with the interface of application or delete processing.
10. device according to claim 8, which is characterized in that described device further include:
Display unit, be configured to detect the user for the starting icon execute clicking operation for the first time it
Afterwards, corresponding input interface is shown according to the information for choosing verification mode of user input;
Third receiving unit, be configured to the input interface receive and store it is user input, logical for verifying
Cross the starting verification information that the starting interface starts the application to be encrypted;
Setting unit is configured to that the verification information for receiving user's input is arranged according to the starting verification information
Verifying interface.
11. device according to claim 10, which is characterized in that the starting verification information includes following at least one
:
Encrypted message, finger print information, problem information, gesture information, operation information.
12. a kind of apply starter, which is characterized in that described device includes:
Display unit is configured to be directed to the clicking operation that starting icon executes according to user, shows preset be used for
Receive the verifying interface of verification information, wherein the starting icon and the starting interface of encryption application and non-encrypted application close
Connection, wherein the clicking operation is the non-clicking operation for the first time that user is directed to that the starting icon executes;
Receiving unit is configured to receive the verification information that the user passes through verifying interface input;
First start unit is configured to judge whether the verification information and pre-stored starting verification information are identical,
If identical, first for starting the encryption application is called to call script, starts the encryption application.
13. device according to claim 12, which is characterized in that described device further include:
Second start unit is configured to judging whether the verification information and pre-stored starting verification information are identical
Later, if it is not the same, then calling second for starting the non-encrypted application to call script, start described non-encrypted answer
With.
14. device according to claim 12, which is characterized in that the verification information includes at least one of the following:
Encrypted message, finger print information, answer information, gesture information, operation information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610060250.3A CN105740670B (en) | 2016-01-28 | 2016-01-28 | Using encryption, starting method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610060250.3A CN105740670B (en) | 2016-01-28 | 2016-01-28 | Using encryption, starting method and apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105740670A CN105740670A (en) | 2016-07-06 |
CN105740670B true CN105740670B (en) | 2019-01-22 |
Family
ID=56246955
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610060250.3A Active CN105740670B (en) | 2016-01-28 | 2016-01-28 | Using encryption, starting method and apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105740670B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106295274B (en) * | 2016-07-27 | 2020-03-17 | 宇龙计算机通信科技(深圳)有限公司 | Application program control method and device |
CN106599648A (en) * | 2016-10-31 | 2017-04-26 | 努比亚技术有限公司 | Application startup method and terminal |
CN107133500A (en) * | 2017-06-07 | 2017-09-05 | 深圳天珑无线科技有限公司 | The encryption method and mobile terminal of a kind of application program |
CN108563932B (en) * | 2018-04-10 | 2020-01-10 | Oppo广东移动通信有限公司 | Application control method and device, readable storage medium and terminal |
CN110210206B (en) * | 2019-05-28 | 2021-04-06 | 维沃移动通信有限公司 | Authority management method and terminal |
CN114741122A (en) * | 2020-12-23 | 2022-07-12 | 成都鼎桥通信技术有限公司 | Application starting method, device, equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499907A (en) * | 2009-02-19 | 2009-08-05 | 西安电子科技大学 | Shoulder surfing preventing identity authentication system and method based on dynamic image password |
CN102880820A (en) * | 2012-08-14 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Method for accessing application program of mobile terminal and mobile terminal |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
CN104239778A (en) * | 2014-09-02 | 2014-12-24 | 中科创达软件股份有限公司 | Encrypted boosting method of application based on Android system |
CN104462961A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Mobile terminal and privacy permission optimizing method thereof |
-
2016
- 2016-01-28 CN CN201610060250.3A patent/CN105740670B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499907A (en) * | 2009-02-19 | 2009-08-05 | 西安电子科技大学 | Shoulder surfing preventing identity authentication system and method based on dynamic image password |
CN102880820A (en) * | 2012-08-14 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Method for accessing application program of mobile terminal and mobile terminal |
CN103279411A (en) * | 2013-06-06 | 2013-09-04 | 刘洪磊 | Method and system of entering application programs based on fingerprint identification |
CN104239778A (en) * | 2014-09-02 | 2014-12-24 | 中科创达软件股份有限公司 | Encrypted boosting method of application based on Android system |
CN104462961A (en) * | 2014-12-24 | 2015-03-25 | 北京奇虎科技有限公司 | Mobile terminal and privacy permission optimizing method thereof |
Also Published As
Publication number | Publication date |
---|---|
CN105740670A (en) | 2016-07-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105740670B (en) | Using encryption, starting method and apparatus | |
CN103188221B (en) | application program login method, device and mobile terminal | |
US9152812B2 (en) | Sensitive data protection during user interface automation testing systems and methods | |
EP2992477B1 (en) | User and system authentication in enterprise systems | |
CN101529366B (en) | Identification and visualization of trusted user interface objects | |
CN107249004B (en) | Identity authentication method, device and client | |
CN107924431B (en) | Anonymous application program packaging | |
CN108200089A (en) | Implementation method, device, system and the storage medium of information security | |
CN107342966B (en) | Authority credentials distribution method and device | |
CN108681662A (en) | A kind of method and device of installation procedure | |
KR102491360B1 (en) | Systems and methods for providing user accounts that allow users to operate computing devices | |
CN109660353A (en) | A kind of application program installation method and device | |
CN105812370B (en) | Intelligent card in processing method, apparatus and system | |
CN110247758A (en) | The method, apparatus and code management device of Password Management | |
US20080172750A1 (en) | Self validation of user authentication requests | |
US20230283598A1 (en) | Message Authenticated Communication Sessions | |
CN103036852A (en) | Method and device for achieving network login | |
CN106709362A (en) | File encryption method and device and file decryption method and device | |
CN113055169B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN108540591B (en) | Address book management method, address book management device and electronic equipment | |
EP3651034B1 (en) | Systems and methods for watermarking audio of saas applications | |
CN109298895A (en) | APP management method and device in mobile device | |
CN109413006A (en) | Processing method, device, equipment and the machine readable media of account | |
CN107147617A (en) | A kind of single-point logging method and device | |
CN105825134A (en) | Intelligent card processing method, intelligent card management server and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |