CN107194236A - One kind application decryption method and device - Google Patents

One kind application decryption method and device Download PDF

Info

Publication number
CN107194236A
CN107194236A CN201710372020.5A CN201710372020A CN107194236A CN 107194236 A CN107194236 A CN 107194236A CN 201710372020 A CN201710372020 A CN 201710372020A CN 107194236 A CN107194236 A CN 107194236A
Authority
CN
China
Prior art keywords
encrypted
sliding trace
user
application
slide
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710372020.5A
Other languages
Chinese (zh)
Inventor
梁广祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tinno Wireless Technology Co Ltd
Original Assignee
Shenzhen Tinno Wireless Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tinno Wireless Technology Co Ltd filed Critical Shenzhen Tinno Wireless Technology Co Ltd
Priority to CN201710372020.5A priority Critical patent/CN107194236A/en
Publication of CN107194236A publication Critical patent/CN107194236A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiments of the invention provide one kind application decryption method and device.On the one hand, the embodiment of the present invention is directed to the corresponding sliding trace of slide encrypted using performing by obtaining user, according to the sliding trace, determines the figure that the sliding trace is formed, if the figure matches with preset pattern, application has been encrypted described in unlatching.Compared with prior art, when decryption has been encrypted and applied, the embodiment of the present invention is without user to input decryption account and clear crytpographic key in the terminal, user is only needed to draw in the terminal shape, due to shape of drawing in the terminal, simpler, fast than inputting decryption account and clear crytpographic key in the terminal, this improves the efficiency of application decryption method of the prior art.

Description

One kind application decryption method and device
【Technical field】
The present invention relates to field of information security technology, more particularly to a kind of application decryption method and device.
【Background technology】
In actual applications, in order to improve the security of application, settings can be encrypted to application, if user wants unlatching The application, just needs that the application is decrypted.
In the prior art, typically application is decrypted using following decryption methods:
User clicks on the icon of encrypted application, and this is applied will show decryption account on the desktop of the terminal at place Input frame and clear crytpographic key input frame, if the decryption account of user's input is correct with clear crytpographic key, the application will be activated; Otherwise, terminal just points out decryption account and/or clear crytpographic key mistake, and the application just can not be activated.
In process of the present invention is realized, inventor has found that at least there are the following problems in the prior art:
Because the process that user inputs decryption account and clear crytpographic key is relatively complicated, account and clear crytpographic key institute are decrypted in addition Including number of characters it is more, user can consume a longer time, this just causes existing skill in input decryption account and clear crytpographic key Application decryption method in art is less efficient.
【The content of the invention】
In view of this, the embodiments of the invention provide one kind application decryption method and device, to solve to a certain extent The problem of application decryption method certainly of the prior art is less efficient.
In a first aspect, the embodiments of the invention provide one kind application decryption method, terminal is implemented in, including:
Obtain user and be directed to the corresponding sliding trace of slide encrypted using performing;
According to the sliding trace, the figure that the sliding trace is formed is determined;
If the figure matches with preset pattern, application has been encrypted described in unlatching.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, obtain user's pin To having encrypted using the corresponding sliding trace of slide performed, including:
The sliding trajectory that the icon of application is dragged by user has been encrypted described in obtaining.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, obtain user's pin To having encrypted using the corresponding sliding trace of slide performed, including:
Receiving and deciphering is asked, according to the decoding request, is determined and described has been encrypted application;Or, in response to user's pin To the operational order of the icon for having encrypted application, determine and described encrypted application;
Obtain user and encrypt the corresponding slip rail of slide performed using the interface of the terminal at place for described Mark, to have been encrypted as user for described using the corresponding sliding trace of slide performed.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, obtain user's pin To having encrypted using the corresponding sliding trace of slide performed, including:
Receiving and deciphering is asked;
According to the decoding request, display performs the user interface of slide for user;
Obtain user and the corresponding sliding trace of slide is performed in the user interface, to be directed to as user It is described to have encrypted using the corresponding sliding trace of slide performed.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, according to the cunning Dynamic rail mark, is determined after the figure that the sliding trace is formed, methods described also includes:
If the figure is mismatched with preset pattern, display decryption account input frame and clear crytpographic key input frame, and The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
Second aspect, the embodiment of the present invention additionally provides another application decryption method, is implemented in terminal, including:
Obtain user and be directed to the corresponding sliding trace of slide encrypted and performed using the interface of the terminal at place;
According to the sliding trace, the figure of the sliding trace formation is determined;
If the figure matches with preset pattern, according to preset pattern and the corresponding relation for having encrypted application, institute is determined State that figure is corresponding to have encrypted application;
Application has been encrypted described in opening.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, according to the cunning After dynamic rail mark, the figure for determining the sliding trace formation, methods described also includes:
If the figure is mismatched with preset pattern, display decryption account input frame and clear crytpographic key input frame, and The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
The third aspect, the embodiments of the invention provide one kind application decryption device, is arranged in terminal, including:
Acquisition module, the corresponding sliding trace of slide encrypted using performing is directed to for obtaining user;
Determining module, for according to the sliding trace, determining the figure that the sliding trace is formed;
Opening module, for when the figure and preset pattern match, application have been encrypted described in unlatching.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, the acquisition mould Block, is used for:
The sliding trajectory that the icon of application is dragged by user has been encrypted described in obtaining.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, the acquisition mould Block, is used for:
Receiving and deciphering is asked, according to the decoding request, is determined and described has been encrypted application;Or be directed in response to user The operational order of the icon for having encrypted application, determines and described has encrypted application;
Obtain user and encrypt the corresponding slip rail of slide performed using the interface of the terminal at place for described Mark, to have been encrypted as user for described using the corresponding sliding trace of slide performed.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, the acquisition mould Block, specifically for:
Receiving and deciphering is asked;
According to the decoding request, display performs the user interface of slide for user;
Obtain user and the corresponding sliding trace of slide is performed in the user interface, to be directed to as user It is described to have encrypted using the corresponding sliding trace of slide performed.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Display module, for, according to the sliding trace, determining what the sliding trace was formed in the determining module After figure, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and root The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
Fourth aspect, the embodiment of the present invention additionally provides another application decryption device, is arranged in terminal, including:
Acquisition module, the slide correspondence for the interface execution for having encrypted the terminal for applying place is directed to for obtaining user Sliding trace;
Determining module, for according to the sliding trace, determining the figure of the sliding trace formation;
The determining module, is additionally operable to when the figure and preset pattern match, according to preset pattern with having encrypted The corresponding relation of application, determines that the figure is corresponding and has encrypted application;
Opening module, described application has been encrypted for opening.
Aspect as described above and any possible implementation, it is further provided a kind of implementation, described device is also Including:
Display module, for, according to the sliding trace, determining what the sliding trace was formed in the determining module After figure, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
A technical scheme in above-mentioned technical proposal has the advantages that:
The embodiment of the present invention is directed to the corresponding sliding trace of slide encrypted using performing, root by obtaining user According to the sliding trace, the figure that the sliding trace is formed is determined, if the figure matches with preset pattern, is just opened Application is encrypted described in opening, compared with prior art, when decryption has been encrypted and applied, the embodiment of the present invention is without user in terminal Middle input decryption account and clear crytpographic key, it is only necessary to which user draws shape in the terminal, due to shape of drawing in the terminal, than in terminal Middle input decryption account is simple, quick with clear crytpographic key, and this improves the efficiency of application decryption method of the prior art.
【Brief description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this area For those of ordinary skill, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the embodiment one for the method that the embodiment of the present invention is provided;
Fig. 2 is the schematic flow sheet of the embodiment two for the method that the embodiment of the present invention is provided;
Fig. 3 is the functional block diagram of the embodiment three for the device that the embodiment of the present invention is provided;
Fig. 4 is the functional block diagram of the example IV for the device that the embodiment of the present invention is provided.
【Embodiment】
In order to be better understood from technical scheme, the embodiment of the present invention is retouched in detail below in conjunction with the accompanying drawings State.
It will be appreciated that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.Base Embodiment in the present invention, those of ordinary skill in the art obtained under the premise of creative work is not made it is all its Its embodiment, belongs to the scope of protection of the invention.
The term used in embodiments of the present invention is the purpose only merely for description specific embodiment, and is not intended to be limiting The present invention." one kind ", " described " and "the" of singulative used in the embodiment of the present invention and appended claims It is also intended to including most forms, unless context clearly shows that other implications.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, represent There may be three kinds of relations, for example, A and/or B, can be represented:Individualism A, while there is A and B, individualism B these three Situation.In addition, character "/" herein, it is a kind of relation of "or" to typically represent forward-backward correlation object.
Depending on linguistic context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determining " or " in response to detection ".Similarly, depending on linguistic context, phrase " if it is determined that " or " if detection (condition or event of statement) " can be construed to " when it is determined that when " or " in response to determine " or " when the detection (condition of statement Or event) when " or " in response to detection (condition or event of statement) ".
Embodiment one
In order to solve that application decryption method of the prior art is present it is less efficient the problem of, the embodiment of the present invention one is carried For one kind application decryption method.
The schematic flow sheet for the application decryption method that the embodiment of the present invention one is provided, as shown in figure 1, this method is implemented in end End, this method comprises the following steps:
S101, obtains user and is directed to the corresponding sliding trace of slide encrypted using performing.
In embodiments of the present invention, user can be obtained according to following three kinds of methods and is directed to the slip encrypted using performing Operate corresponding sliding trace:
First method:The sliding trace that the icon of application is dragged by user has been encrypted in acquisition, to be directed to as user The corresponding sliding trace of slide that encryption application is performed.
Dragging condition can be in advance set, i.e., be arranged in advance in the case of what kind of, user can drag and encrypt application Icon.Wherein, above-mentioned dragging condition can be that the icon for having encrypted application is depressed by the user duration more than predetermined threshold value, and this is preset Threshold value can be configured according to the actual requirements, such as 1S, 2S or 20S etc.;Above-mentioned dragging condition can also be to have encrypted application Icon double-clicked by user.Explanation is needed exist for, user, can't be to having encrypted when the icon of application has been encrypted in dragging Any influence is produced using the other application in the terminal interface at place.
When meeting dragging condition, terminal can monitor the icon for having encrypted application in real time and slide rail by what user dragged Mark, to be directed to the corresponding sliding trace of slide encrypted using performing as user.
Second method:Determine and encrypted application, obtain user and held for having encrypted using the interface of the terminal at place The corresponding sliding trace of capable slide, to be directed to the corresponding slip rail of slide encrypted using performing as user Mark.
Wherein, in embodiments of the present invention, it can be determined to have encrypted application according to following two methods:
(1) receiving and deciphering is asked, and according to decoding request, is determined and has been encrypted application.
Wherein, above-mentioned decoding request can be the executive agent that other-end is sent to the embodiment of the present invention.It is above-mentioned its His terminal can be any terminal outside the executive agent of the embodiment of the present invention.
It can include having encrypted using corresponding unique identity information, the unique identity in above-mentioned decoding request Information can be to have encrypted the information such as the title or numbering of application.
Specifically, terminal is after decoding request is received, the application correspondence of encryption that can be included according to the decoding request Unique identity information, determine user want decryption which encrypted application.
(2) operational order for the icon for having encrypted application is directed in response to user, determines and has encrypted application.
Aforesaid operations instruction can be more than the pressing operation of predetermined threshold value for pressing duration, and the predetermined threshold value can be according to reality Border demand is configured, such as 3S, 5S or 10S etc.;Aforesaid operations instruction can also be double click operation.Which user has been directed to The icon of encryption application is performed after above-mentioned pressing operation or double click operation, and terminal, which has just encrypted this, to be wanted using being defined as user The application of decryption.
The method for having encrypted application according to any one above-mentioned determination, determines that user wants the encryption application of decryption Afterwards, terminal can monitor user in real time and be directed to the corresponding slip rail of slide encrypted and performed using the terminal interface at place Mark, to be directed to the corresponding sliding trace of slide encrypted using performing as user.Need exist for explanation, user , can't be to having encrypted the terminal interface using place when the terminal interface for having encrypted using place performs slide In other application produce any influence.
The third method:Receiving and deciphering is asked, and according to the decoding request, display performs the user of slide for user Operation interface, obtains user and the corresponding sliding trace of slide is performed in the user interface, to be used as user's pin Encrypted to described using the corresponding sliding trace of slide performed.
The decoding request referred in the third method, can be asked with the decryption referred in (1) of above second method Ask identical, no longer repeated herein.
Above-mentioned confession user performs the user interface of slide, can operate boundary for the user of any type or shape Face.Such as, the user interface for performing slide for user can be blank interface or nine grids unlock interface etc.;Should The shape that the user interface of slide is performed for user can be the shapes, the application such as circle, square or rectangular Embodiment is limited without any this.
S102, according to the sliding trace, determines the figure that the sliding trace is formed.
S103, if the figure matches with preset pattern, application has been encrypted described in unlatching.
Wherein, above-mentioned preset pattern can have any shape, such as circular, triangle or square etc..
In practical application, user performs the figure that the corresponding sliding trace of slide is formed, it is more difficult to and preset pattern Striking resemblances, may there is some difference with preset pattern, then terminal can first judge figure that sliding trace formed with it is pre- If whether figure matches, if the figure that sliding trace is formed matches with preset pattern, open and encrypted application;If sliding The figure that track is formed is mismatched with preset pattern, then terminal display decryption account input frame and clear crytpographic key input frame, And the decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
, can basis when whether the figure for judging that sliding trace is formed matches with preset pattern in the embodiment of the present invention Following methods judge:
Judge whether the similarity of figure that sliding trace formed and preset pattern is more than predetermined threshold value, if being more than, Judge that the figure that is formed of sliding trace matches with preset pattern, otherwise, then judge figure that sliding trace formed with advance If figure is mismatched.Wherein, the size of predetermined threshold value can be set according to the actual requirements, such as, the predetermined threshold value can be 80%. In the embodiment of the present invention, can according to default shape similarity analysis model, come judge figure that sliding trace formed with it is pre- If whether the similarity of figure is more than predetermined threshold value.
Using application decryption method provided in an embodiment of the present invention, the cunning encrypted using performing is directed to by obtaining user It is dynamic to operate corresponding sliding trace, according to the sliding trace, the figure that the sliding trace is formed is determined, if the figure Shape matches with preset pattern, has just encrypted application described in unlatching, compared with prior art, when decryption has been encrypted and applied, this Inventive embodiments input decryption account and clear crytpographic key without user in the terminal, it is only necessary to which user draws shape in the terminal, due to Draw in the terminal shape, simpler with clear crytpographic key, fast than inputting decryption account in the terminal, this improves existing skill The efficiency of application decryption method in art.
It should be noted that terminal involved in the embodiment of the present invention can include but is not limited to personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), wireless handheld Equipment, tablet personal computer (Tablet Computer), mobile phone, MP3 player, MP4 players etc..
It should be noted that S101~S103 executive agent can be located locally end for decryption device, the device The application at end, or can also be the plug-in unit being located locally in the application of terminal or SDK (Software Development Kit, SDK) etc. functional unit, the embodiment of the present invention is to this without being particularly limited to.
It is understood that the application can be mounted in the application program (nativeApp) in terminal, or may be used also To be a web page program (webApp) of browser in terminal, the embodiment of the present invention is to this without limiting.
Embodiment two
Based on the identical inventive concept of embodiment one, the embodiment of the present invention two also provides another application decryption method.
The schematic flow sheet for the another application decryption method that the embodiment of the present invention two is provided, as shown in Figure 2.This method is performed In terminal, this method comprises the following steps:
Step 201, obtain user and be directed to the corresponding cunning of slide encrypted and performed using the interface of the terminal at place Dynamic rail mark.
Wherein, above-mentioned interface can be desktop.It there may be on desktop due to having encrypted the terminal for applying place multiple Application icon, user may influence the operation of multiple applications when the enterprising line slip of desktop of the terminal is operated, in order to avoid The generation of this case, can be configured for the terminal in advance so that, should after user performs predetermined registration operation for the terminal Terminal just enters sliding-modes, i.e., perform slide on the table into for user and do not interfere with the operation of any application Pattern.Wherein, above-mentioned predetermined registration operation can be any operation, can be configured according to actual conditions, such as double-click the terminal The blank space of desktop etc..
Step 202, according to the sliding trace, the figure of the sliding trace formation is determined.
Step 203, if the figure matches with preset pattern, according to preset pattern and the corresponding pass for having encrypted application System, determines that the figure is corresponding and has encrypted application.
Wherein, can be according to the determination methods referred in step 103, to judge the figure of sliding trace formation whether with presetting Figure matches, and is no longer repeated herein.
Above-mentioned preset pattern and the corresponding relation for having encrypted application, can be preset pattern and the unique body for having encrypted application The corresponding relation of part identification information, so, just can determine what the image formed with sliding trace matched according to the relation Pre-set image is corresponding to have encrypted application, and having encrypted of determining is corresponding using the image for being defined as sliding trace formation Encryption application.
Step 204, application has been encrypted described in opening.
It should be noted that in embodiments of the present invention, if judging the figure and preset pattern of sliding trace formation not Matching, then show decryption account input frame and clear crytpographic key input frame, and the decryption account inputted according to user and decryption Password performs decryption oprerations.
Explanation is needed exist for, the application decryption method that embodiment one is provided wants solution, it is necessary to which user is determined in advance out It is close which encrypted application, then according to user for this encrypted using perform slide, determine slide Corresponding figure, and then judge whether the figure matches with preset pattern, then according to judged result, perform associated decryption behaviour Make.And the application decryption method that embodiment two is provided, the desired decryption of user need not be determined in advance, and which has encrypted application, but Need to be determined in advance out user for having encrypted the corresponding figure of slide performed by the interface for the terminal for applying place, so Determined afterwards according to the figure and encrypted application, it is final to carry out associated decryption operation.
The application decryption method provided using the embodiment of the present invention two, by obtaining user for having encrypted using place The corresponding sliding trace of slide that the interface of terminal is performed, according to the sliding trace, determines that the sliding trace is formed Figure, if the figure matches with preset pattern, according to preset pattern and the corresponding relation for having encrypted application, determine institute State that figure is corresponding to have encrypted application, open it is described encrypted application, compared with prior art, decrypt encrypted apply when, The embodiment of the present invention inputs decryption account and clear crytpographic key without user in the terminal, it is only necessary to which user draws shape in the terminal, by In shape of drawing in the terminal, simpler with clear crytpographic key, fast than inputting decryption account in the terminal, this improves existing The efficiency of application decryption method in technology.
It should be noted that terminal involved in the embodiment of the present invention can include but is not limited to personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), wireless handheld Equipment, tablet personal computer (Tablet Computer), mobile phone, MP3 player, MP4 players etc..
It should be noted that S201~S204 executive agent can be located locally end for decryption device, the device The application at end, or can also be the plug-in unit being located locally in the application of terminal or SDK (Software Development Kit, SDK) etc. functional unit, the embodiment of the present invention is to this without being particularly limited to.
It is understood that the application can be mounted in the application program (nativeApp) in terminal, or may be used also To be a web page program (webApp) of browser in terminal, the embodiment of the present invention is to this without limiting.
Embodiment three
The embodiment of the present invention further provides the device embodiment of each step and method in implementation method embodiment one.
Fig. 3 is refer to, the functional block diagram of device is decrypted in its application provided by the embodiment of the present invention.As illustrated, The device is arranged in terminal, and the device includes:
Acquisition module 31, the corresponding sliding trace of slide encrypted using performing is directed to for obtaining user.
Determining module 32, for according to the sliding trace, determining the figure that the sliding trace is formed.
Opening module 33, for when the figure and preset pattern match, application have been encrypted described in unlatching.
In one embodiment, the acquisition module 31, specifically for:
The sliding trajectory that the icon of application is dragged by user is encrypted described in obtaining, to have been encrypted as user for described Using the corresponding sliding trace of the slide of execution.
In one embodiment, the acquisition module 31, specifically for:
Receiving and deciphering is asked, according to the decoding request, determine it is described encrypted application, or in response to user for institute The operational order for the icon for having encrypted application is stated, determines and described has encrypted application;
Obtain user and encrypt the corresponding slip rail of slide performed using the interface of the terminal at place for described Mark, to have been encrypted as user for described using the corresponding sliding trace of slide performed.
In one embodiment, the acquisition module 31, specifically for:
Receiving and deciphering is asked;
According to the decoding request, display performs the user interface of slide for user;
Obtain user and the corresponding sliding trace of slide is performed in the user interface, to be directed to as user It is described to have encrypted using the corresponding sliding trace of slide performed.
In one embodiment, described device also includes:
Display module, for, according to the sliding trace, determining what the sliding trace was formed in the determining module After figure, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and root The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
Because each unit in the present embodiment is able to carry out the method shown in Fig. 1, the part that the present embodiment is not described in detail, Refer to the related description to Fig. 1.
The technical scheme of the embodiment of the present invention has the advantages that:
The embodiment of the present invention is directed to the corresponding sliding trace of slide encrypted using performing, root by obtaining user According to the sliding trace, the figure that the sliding trace is formed is determined, if the figure matches with preset pattern, is just opened Application is encrypted described in opening, compared with prior art, when decryption has been encrypted and applied, the embodiment of the present invention is without user in terminal Middle input decryption account and clear crytpographic key, it is only necessary to which user draws shape in the terminal, due to shape of drawing in the terminal, than in terminal Middle input decryption account is simple, quick with clear crytpographic key, and this improves the efficiency of application decryption method of the prior art.
Example IV
The embodiment of the present invention further provides the device embodiment of each step and method in implementation method embodiment two.
Fig. 4 is refer to, the functional block diagram of its device provided by the embodiment of the present invention.As illustrated, the device is set It is placed in terminal, the device includes:
Acquisition module 41, the slide pair for the interface execution for having encrypted the terminal for applying place is directed to for obtaining user The sliding trace answered.
Determining module 42, for according to the sliding trace, determining the figure of the sliding trace formation.
The determining module 42, is additionally operable to when the figure and preset pattern match, according to preset pattern with adding The corresponding relation of close application, determines that the figure is corresponding and has encrypted application.
Opening module 43, described application has been encrypted for opening.
In one embodiment, described device also includes:
Display module, for, according to the sliding trace, determining what the sliding trace was formed in the determining module After figure, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and root The decryption account and clear crytpographic key inputted according to user performs decryption oprerations.
Because each unit in the present embodiment is able to carry out the method shown in Fig. 2, the part that the present embodiment is not described in detail, Refer to the related description to Fig. 2.
The technical scheme of the embodiment of the present invention has the advantages that:
The corresponding slip rail of slide for the interface execution for having encrypted the terminal for applying place is directed to by obtaining user Mark, according to the sliding trace, determines the figure of the sliding trace formation, if the figure matches with preset pattern, According to preset pattern and the corresponding relation for having encrypted application, determine that the figure is corresponding and encrypted application, open and described add Close application, compared with prior art, when decryption has been encrypted and applied, the embodiment of the present invention inputs decryption without user in the terminal Account and clear crytpographic key, it is only necessary to which user draws shape in the terminal, due to shape of drawing in the terminal, than inputting decryption in the terminal Account is simple, quick with clear crytpographic key, and this improves the efficiency of application decryption method of the prior art.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided by the present invention, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Divide, only a kind of division of logic function there can be other dividing mode when actually realizing, for example, multiple units or group Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown Or the coupling each other discussed or direct-coupling or communication connection can be by some interfaces, device or unit it is indirect Coupling is communicated to connect, and can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ hardware adds the form of SFU software functional unit to realize.
The above-mentioned integrated unit realized in the form of SFU software functional unit, can be stored in an embodied on computer readable and deposit In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are to cause a computer Device (can be personal computer, server, or network equipment etc.) or processor (Processor) perform the present invention each The part steps of embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various Can be with the medium of store program codes.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God is with principle, and any modification, equivalent substitution and improvements done etc. should be included within the scope of protection of the invention.

Claims (14)

1. one kind application decryption method, it is characterised in that be implemented in terminal;Methods described includes:
Obtain user and be directed to the corresponding sliding trace of slide encrypted using performing;
According to the sliding trace, the figure that the sliding trace is formed is determined;
If the figure matches with preset pattern, application has been encrypted described in unlatching.
2. the method as described in claim 1, it is characterised in that obtain user and be directed to the slide pair encrypted using performing The sliding trace answered, including:
The sliding trajectory that the icon of application is dragged by user is encrypted described in obtaining, to have encrypted application for described as user The corresponding sliding trace of slide of execution.
3. the method as described in claim 1, it is characterised in that obtain user and be directed to the slide pair encrypted using performing The sliding trace answered, including:
Receiving and deciphering is asked, according to the decoding request, is determined and described has been encrypted application;Or, it is directed to institute in response to user The operational order for the icon for having encrypted application is stated, determines and described has encrypted application;
Obtain user and encrypt the corresponding sliding trace of slide performed using the interface of the terminal at place for described, with Encrypted as user for described using the corresponding sliding trace of slide performed.
4. the method as described in claim 1, it is characterised in that obtain user and be directed to the slide pair encrypted using performing The sliding trace answered, including:
Receiving and deciphering is asked;
According to the decoding request, display performs the user interface of slide for user;
Obtain user and the corresponding sliding trace of slide is performed in the user interface, it is described to be directed to as user Encrypt using the corresponding sliding trace of slide performed.
5. the method as described in claim 1, it is characterised in that according to the sliding trace, determines sliding trace institute shape Into figure after, methods described also includes:
If the figure is mismatched with preset pattern, display decryption account input frame and clear crytpographic key input frame, and according to The decryption account and clear crytpographic key of user's input perform decryption oprerations.
6. one kind application decryption method, it is characterised in that be implemented in terminal;Methods described includes:
Obtain user and be directed to the corresponding sliding trace of slide encrypted and performed using the interface of the terminal at place;
According to the sliding trace, the figure of the sliding trace formation is determined;
If the figure matches with preset pattern, according to preset pattern and the corresponding relation for having encrypted application, the figure is determined Shape is corresponding to have encrypted application;
Application has been encrypted described in opening.
7. method as claimed in claim 6, it is characterised in that according to the sliding trace, determines that the sliding trace is formed Figure after, methods described also includes:
If the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and according to The decryption account and clear crytpographic key of family input perform decryption oprerations.
8. one kind application decryption device, it is characterised in that be arranged in terminal;Described device includes:
Acquisition module, the corresponding sliding trace of slide encrypted using performing is directed to for obtaining user;
Determining module, for according to the sliding trace, determining the figure that the sliding trace is formed;
Opening module, for when the figure and preset pattern match, application have been encrypted described in unlatching.
9. device as claimed in claim 8, it is characterised in that the acquisition module, specifically for:
The sliding trajectory that the icon of application is dragged by user is encrypted described in obtaining, to have encrypted application for described as user The corresponding sliding trace of slide of execution.
10. device as claimed in claim 8, it is characterised in that the acquisition module, specifically for:
Receiving and deciphering is asked, according to the decoding request, is determined and described has been encrypted application;Or, or be directed in response to user The operational order of the icon for having encrypted application, determines and described has encrypted application;
Obtain user and encrypt the corresponding sliding trace of slide performed using the interface of the terminal at place for described, with Encrypted as user for described using the corresponding sliding trace of slide performed.
11. device as claimed in claim 8, it is characterised in that the acquisition module, specifically for:
Receiving and deciphering is asked;
According to the decoding request, display performs the user interface of slide for user;
Obtain user and the corresponding sliding trace of slide is performed in the user interface, it is described to be directed to as user Encrypt using the corresponding sliding trace of slide performed.
12. device as claimed in claim 8, it is characterised in that described device also includes:
Display module, for, according to the sliding trace, determining the figure that the sliding trace is formed in the determining module Afterwards, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and according to The decryption account and clear crytpographic key of family input perform decryption oprerations.
13. one kind application decryption device, it is characterised in that be arranged in terminal;Described device includes:
Acquisition module, the corresponding cunning of slide for the interface execution for having encrypted the terminal for applying place is directed to for obtaining user Dynamic rail mark;
Determining module, for according to the sliding trace, determining the figure of the sliding trace formation;
The determining module, is additionally operable to when the figure and preset pattern match, according to preset pattern with having encrypted application Corresponding relation, determine that the figure is corresponding and encrypted application;
Opening module, described application has been encrypted for opening.
14. device as claimed in claim 13, it is characterised in that described device also includes:
Display module, for, according to the sliding trace, determining the figure that the sliding trace is formed in the determining module Afterwards, when the figure and preset pattern are mismatched, display decryption account input frame and clear crytpographic key input frame, and according to The decryption account and clear crytpographic key of user's input perform decryption oprerations.
CN201710372020.5A 2017-05-24 2017-05-24 One kind application decryption method and device Pending CN107194236A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710372020.5A CN107194236A (en) 2017-05-24 2017-05-24 One kind application decryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710372020.5A CN107194236A (en) 2017-05-24 2017-05-24 One kind application decryption method and device

Publications (1)

Publication Number Publication Date
CN107194236A true CN107194236A (en) 2017-09-22

Family

ID=59874530

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710372020.5A Pending CN107194236A (en) 2017-05-24 2017-05-24 One kind application decryption method and device

Country Status (1)

Country Link
CN (1) CN107194236A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104123164A (en) * 2014-07-31 2014-10-29 广东欧珀移动通信有限公司 Application program starting method and device
CN105574366A (en) * 2015-05-28 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Application data protection method and apparatus and terminal
CN106203176A (en) * 2016-07-29 2016-12-07 乐视控股(北京)有限公司 A kind of application encryption method and device
CN106250757A (en) * 2016-07-29 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN104123164A (en) * 2014-07-31 2014-10-29 广东欧珀移动通信有限公司 Application program starting method and device
CN105574366A (en) * 2015-05-28 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Application data protection method and apparatus and terminal
CN106203176A (en) * 2016-07-29 2016-12-07 乐视控股(北京)有限公司 A kind of application encryption method and device
CN106250757A (en) * 2016-07-29 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal

Similar Documents

Publication Publication Date Title
US20210232974A1 (en) Federated-learning based method of acquiring model parameters, system and readable storage medium
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
CN104834449A (en) Mobile terminal icon managing method and device
CN105069335A (en) Password setting method, verification method and terminal
CN105898054A (en) Verification-based message display method and communication terminal
CN103152157A (en) Secure encrypted method and relevant device
TW201539247A (en) Password input and verification method and system thereof
CN105550627A (en) Fingerprint verification method and apparatus
CN107622208A (en) Note encryption and decryption method and related product
CN108400868A (en) Storage method, device and the mobile terminal of seed key
CN106873862A (en) A kind of data inputting method and device
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN107844728A (en) Identify method and device, computer installation and the computer-readable recording medium of Quick Response Code
CN104915588A (en) Privacy protection method and device for electronic equipment
CN104077065A (en) Method for displaying virtual keyboard by touch screen terminal and touch screen terminal
CN112231309A (en) Method, device, terminal equipment and medium for removing duplicate of longitudinal federal data statistics
CN106203176A (en) A kind of application encryption method and device
CN105069360B (en) A kind of file encryption, decryption method and terminal
CN106778344B (en) A kind of data permission control method and terminal
CN110990821B (en) Identity type verification method, device and storage medium
CN107194236A (en) One kind application decryption method and device
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
CN106156571B (en) Encrypting fingerprint tool, encrypting fingerprint tool encrypting and deciphering system and encipher-decipher method
CN105306209A (en) Password setting method, login method and devices
CN106161365B (en) Data processing method and device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170922