WO2014166193A1 - 应用程序加密处理方法、装置和终端 - Google Patents
应用程序加密处理方法、装置和终端 Download PDFInfo
- Publication number
- WO2014166193A1 WO2014166193A1 PCT/CN2013/082466 CN2013082466W WO2014166193A1 WO 2014166193 A1 WO2014166193 A1 WO 2014166193A1 CN 2013082466 W CN2013082466 W CN 2013082466W WO 2014166193 A1 WO2014166193 A1 WO 2014166193A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- user
- application
- key
- identification card
- Prior art date
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 14
- 238000000034 method Methods 0.000 claims abstract description 20
- 238000012795 verification Methods 0.000 claims description 51
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 3
- 230000002708 enhancing effect Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 102000005591 NIMA-Interacting Peptidylprolyl Isomerase Human genes 0.000 description 1
- 108010059419 NIMA-Interacting Peptidylprolyl Isomerase Proteins 0.000 description 1
- 102000007315 Telomeric Repeat Binding Protein 1 Human genes 0.000 description 1
- 108010033711 Telomeric Repeat Binding Protein 1 Proteins 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/123—Restricting unauthorised execution of programs by using dedicated hardware, e.g. dongles, smart cards, cryptographic processors, global positioning systems [GPS] devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
Definitions
- the present invention relates to the field of communications technologies, and in particular, to an application encryption processing method, apparatus, and terminal.
- an application encryption processing method, apparatus, and terminal BACKGROUND OF THE INVENTION
- smart terminals have developed rapidly.
- One of the most prominent features of smart terminals is that there is an open operating system platform, such as an Android operating system developed by Google Inc., based on which the user can access the software application store. Download and install the app.
- users do not have effective protection measures for accessing applications installed in the terminal. Once others have obtained your mobile phone, they can access the applications installed in the mobile phone and the personal data information stored in these applications, such as mobile phones. Bank information, account information, etc. That is to say, for the access and use of the application of the smart terminal, there are currently technical defects and there is a risk in use.
- an embodiment of the present invention provides an application encryption processing method for a terminal, where the method includes: acquiring a first application that the user of the terminal selects to encrypt; prompting the user to input the first information. Generating a first key according to the first information; Encrypting the first application with the first key and storing the first key in the first application.
- the method further includes: receiving an access request of the terminal user requesting access to the encrypted first application; prompting a user to input second information; and inputting second information input by the terminal user with the first Matching the first key stored in the application; when the second information is successfully matched with the first key, decrypting the first application, and providing the first application to the terminal user .
- the first information is a user identification card password of the terminal.
- the generating the first key according to the first information is: applying, according to the user identification card password input by the user, a user identification card password verification to the user identification card of the terminal, to obtain a first verification result;
- the first verification result indicates that the user identification card password verification is successful
- the terminal identification number, and the second subkey is a user identification card password of the terminal.
- the second information input by the terminal user is a user identification card password of the terminal; the matching the second information input by the terminal user with the first key stored in the first application program
- the method includes: obtaining a terminal identification number of the terminal, comparing with a first subkey in the first key, to obtain a first comparison result; and when the first comparison result indicates a terminal identification number of the terminal
- the second information input by the terminal user is compared with the second subkey of the first key to obtain a second comparison result; when the second comparison is performed
- the result indicates that when the second information input by the terminal user is consistent with the second subkey, the user identification card of the terminal is applied for the user identification card password verification to obtain a second verification result; Decrypting the first application when the second information is successfully matched with the first key, and providing the first application to the terminal user to indicate the terminal when the second verification result is After the user identification card password input by the user is successfully verified, the first application is decrypted, and the first application is provided to the terminal user.
- an embodiment of the present invention further provides an application encryption processing apparatus, which is used for a terminal, where the apparatus includes: an acquiring module, configured to acquire a first application that is encrypted by a user of the terminal; a prompting module, configured to prompt the user to input first information; a key generation module configured to generate a first key according to the first information; and an encryption module configured to encrypt the first key by using the first key An application, and storing the first key in the first application.
- the device further includes: a receiving module, configured to receive an access request of the terminal user requesting access to the encrypted first application; a second prompting module, configured to prompt the user to input second information; a matching module, And configured to match the second information input by the terminal user with the first key stored in the first application; the decrypting module is configured to: when the second information is successfully matched with the first key Decrypting the first application and providing the first application to the end user.
- the first information is a user identification card password of the terminal.
- the key generation module includes: a key authentication module, configured to apply for a user identification card password verification to the user identification card of the terminal according to the user identification card password input by the user, to obtain a first verification result; An extracting module, configured to: when the first verification result indicates that the user identification card password verification is successful, generating the first key including a first subkey and a second subkey, wherein the first subkey The terminal identification number of the terminal, and the second subkey is a user identification card password of the terminal.
- a key authentication module configured to apply for a user identification card password verification to the user identification card of the terminal according to the user identification card password input by the user, to obtain a first verification result
- An extracting module configured to: when the first verification result indicates that the user identification card password verification is successful, generating the first key including a first subkey and a second subkey, wherein the first subkey The terminal identification number of the terminal, and the second subkey is a user identification card password of the terminal.
- the second information input by the terminal user is a user identification card password of the terminal;
- the matching module includes: a first comparison module, configured to acquire a terminal identification number of the terminal and the first secret The first subkey in the key is compared to obtain a first comparison result;
- the second comparison module is configured to: when the first comparison result indicates that the terminal identification number of the terminal is consistent with the first subkey And comparing the second information input by the terminal user with the second subkey in the first key to obtain a second comparison result; accessing the authentication module, and setting, when the comparison result indicates the When the user identification card password input by the terminal is consistent with the first key, the user identification card of the terminal is applied for the user identification card password verification to obtain a second verification result; and the decryption module is set to be the second verification.
- an embodiment of the present invention further provides a terminal, including the application encryption processing apparatus according to any one of the above.
- the terminal user can selectively encrypt the application in the terminal, enhance the security of the terminal user accessing or using the application, improve the security of the private data of the terminal user, and improve the user experience.
- FIG. 2 is a schematic flowchart of an application for encrypting an application using a terminal identification number and a user identification card according to an embodiment of the present invention
- FIG. 4 is a schematic structural diagram of an application encryption processing apparatus according to an embodiment of the present invention
- FIG. 5 is a schematic structural diagram of interaction between a terminal and a user identification card according to an embodiment of the present invention
- FIG. 6 is a schematic structural diagram of a functional entity according to an embodiment of the present invention.
- An embodiment of the present invention provides an application encryption processing method, which is used in a terminal.
- the method is as shown in FIG. 1 , and the method includes: Step 11 : acquiring a first application that is selected by a user of the terminal to be encrypted; Step 12, prompting The user inputs the first information; Step 13, generates a first key according to the first information; Step 14, encrypts the first application by using the first key, and in the first application Storing the first key.
- the terminal prompts the user to input the first information, and generates a first key corresponding to the first application according to the first information, and encrypts the first application by using the first key.
- the program stores the information of the first key in the package of the first application, and through the above process, encrypts the application.
- the implementation of the application of the encryption entry is various.
- the user can use the interactive menu of the terminal to access the encrypted menu, and the selection operation of the menu starts the related background program for related processing.
- the application encryption processing method further includes: receiving an access request of the terminal user requesting access to the encrypted first application; prompting the user to input the second information; Matching the second information input by the terminal user with the first key stored in the first application; when the second information is successfully matched with the first key, decrypting the first application a program, and providing the first application to the end user.
- the end user since the end user selectively encrypts the application, when accessing an application specifically, it may first determine whether the application that the user needs to access is encrypted, if the application is encrypted, Prompting the user to input the second information, matching the second information with the first key stored in the encrypted first application to be accessed, and decrypting only when the second information matches the first key An application that provides the first application to the user; otherwise accesses the application directly.
- the terminal user when the terminal user needs to access the encrypted application, the terminal user can access or use the encrypted application only when the second information input by the user matches the key stored in the application successfully.
- the illegal user obtains the personal data information by accessing the application on the terminal, thereby enhancing the security of the terminal user accessing or using the application, and improving the security of the end user's private data. , improved user experience.
- the application is encrypted by using the terminal identification number of the terminal and the password of the user identification card as a key.
- the terminal identification number includes, but is not limited to, an International Mobile Equipment Identity (IMEI) number. Any identifier that can identify the unique identity of the terminal can be encrypted as a key.
- the subscriber identity card password includes, but is not limited to, an ADM code, a PIN1 code, a PIN2 code, and the like.
- the terminal identification number When the terminal identification number is used as a key, it is directly extracted by the terminal, and the terminal user only needs to input the user identification card password for verification. That is, the first information is a user identification card password of the terminal.
- the step 13 may be: applying a user identification card password verification to the user identification card of the terminal according to the user identification card password input by the user, to obtain a first verification result; and when the first verification result indicates the user identification card
- the first key including the first subkey and the second subkey is generated, where the first subkey is a terminal identification number of the terminal, and the second subkey is a The user identification card password of the terminal.
- the subscriber identity cards herein include, but are not limited to, SIM cards, USIM cards, UIM cards, and the like.
- the application is encrypted to prevent the terminal from being used by other illegal users to lock certain applications.
- the application is encrypted by using the terminal identification number of the terminal and the password of the user identification card as a key
- the second information input by the terminal user is The user identification card password of the terminal
- the matching the second information input by the terminal user with the first key stored in the first application comprises: acquiring a terminal identification number of the terminal and a first child in the first key The key is compared to obtain a first comparison result; when the first comparison result indicates that the terminal identification number of the terminal is consistent with the first subkey, the second information input by the terminal user is The second subkey in the first key is compared to obtain a second comparison result; when the second comparison result indicates that the second information input by the terminal user is consistent with the second subkey, Applying a user identification card password verification to the user identification card of the terminal to obtain a second verification result; and when the second information is successfully matched with
- the terminal When the terminal user accesses the encrypted first application, the terminal first extracts the stored first key from the application, and acquires the terminal identification number of the terminal and the first subkey in the first key, that is, the first key. The terminal identification numbers in the key are compared. If the user identification card is matched, the user identification card is rejected. Otherwise, the user is denied access or use the application. Further, the terminal prompts the user to input the second information, that is, prompting the user to input the user identification card.
- the terminal applies for the user identification card password verification to the user identification card, where the user identification card includes but is not limited to a SIM card, a USIM card, a UIM card, etc., and the user identification card decrypts the user identification card password successfully input by the user.
- the application and the application is provided to the end user. The following describes in detail the process of encrypting and accessing an application using the terminal identification number and the user identification card password.
- the application encryption process is as shown in FIG.
- Step 1 The terminal user selects an application that needs to be encrypted, for example, a mobile banking, and can enter through the application encryption menu of the terminal;
- Step 2 the terminal prompts the user to input a valid user identification card password.
- a valid user identification card password can be the PIN code of the SIM card;
- Step 3 The terminal identifies the card to the user, where the SIM card is used for the PIN code verification. If the verification succeeds, the process proceeds to step 4, otherwise the encryption process is ended.
- Step 4 the currently entered user identification card password and the terminal identification number of the terminal are used as the key. Encrypt the mobile banking application and save the key.
- the method includes: Step 1: receiving an access request of the terminal user requesting access to the application; Step 2, determining whether the application is encrypted, if it is encrypted Go to step 3, otherwise, directly provide the application to the end user; Step 3, extract the stored key from the encrypted application package, the key includes a first subkey and a second subkey, One subkey is the terminal identification number of the terminal, and the second subkey is the user identification card password; Step 4, the terminal identification number of the reading terminal is compared with the first subkey in the key, if the step is consistently entered 5, otherwise, the decryption process is ended; Step 5, the terminal prompts the user to input a valid user identification card password, here is the SIM card PIN code, and compares with the second subkey in the key, if the process proceeds to step 6, otherwise End the decryption process; Step 6, apply for the user identification card password verification to the user identification card, where the user identification card is a SIM card; Step 7, determine whether the verification is successful Successful proceeds to step 8, otherwise, the decryption process; Step 8, the decrypt
- the terminal user can selectively encrypt the application in the terminal, preferably, using the terminal identification number of the terminal and the password of the user identification card as a key encryption application, and accessing the encrypted application.
- the user identification card password entered by the user is matched with the key, the security of the terminal user accessing or using the application is enhanced, and the security of the end user's private data is improved, and the user experience is improved.
- an embodiment of the present invention further provides an application encryption processing apparatus, which is used in a terminal. The device, as shown in FIG.
- an acquiring module configured to acquire a user selected by the terminal to encrypt An application
- a first prompting module configured to prompt the user to input the first information
- a key generation module configured to generate a first key according to the first information
- an encryption module configured to encrypt the first application with the first key, and store the first application in the first application Said first key.
- the above-mentioned application encryption processing device wherein the device further includes: a receiving module, configured to receive an access request of the terminal user requesting access to the encrypted first application; and a second prompting module, configured to prompt the user to input a second information; a matching module, configured to match the second information input by the terminal user with a first key stored in the first application; and a decryption module configured to: when the second information is When the first key is successfully matched, the first application is decrypted, and the first application is provided to the terminal user.
- the first information is a user identification card password of the terminal.
- the key generation module includes: a key authentication module, configured to apply for a user identification card password verification to the user identification card of the terminal according to the user identification card password input by the user, to obtain a first verification result; An extracting module, configured to: when the first verification result indicates that the user identification card password verification is successful, generating the first key including a first subkey and a second subkey, wherein the first subkey The terminal identification number of the terminal, and the second subkey is a user identification card password of the terminal.
- a key authentication module configured to apply for a user identification card password verification to the user identification card of the terminal according to the user identification card password input by the user, to obtain a first verification result
- An extracting module configured to: when the first verification result indicates that the user identification card password verification is successful, generating the first key including a first subkey and a second subkey, wherein the first subkey The terminal identification number of the terminal, and the second subkey is a user identification card password of the terminal.
- the second information input by the terminal user is a user identification card password of the terminal;
- the matching module includes: a first comparison module, configured to acquire a terminal identification number of the terminal and the first secret The first subkey in the key is compared to obtain a first comparison result;
- the second comparison module is configured to: when the first comparison result indicates that the terminal identification number of the terminal is consistent with the first subkey And comparing the second information input by the terminal user with the second subkey in the first key to obtain a second comparison result;
- the access authentication module is configured to: when the comparison result indicates that the user identification card password input by the terminal is consistent with the first key, apply for user identification card password verification to the user identification card of the terminal, and obtain a second verification result.
- the decryption module is configured to decrypt the first application and provide the first application to the terminal user after the second verification result indicates that the user identification card password input by the user of the terminal is successfully verified. program.
- the application is encrypted by using the terminal identification number and the user identification card password, the interaction between the terminal and the user identification card is as shown in FIG. 5.
- the embodiment of the present invention further provides a functional entity, as shown in FIG.
- the key authentication module is configured to: when the user inputs the user identification card key, apply for key authentication to the user identification card, receive the user identification card authentication success or failure, and the result, if successful, send the key to the encryption module;
- the encryption module is configured to receive a key sent by the key authentication module, and encrypt the data to be encrypted by using the key and the terminal identification number;
- the query module is configured to query the application when the user accesses the application
- the encryption status information is used to determine whether the data accessed by the user is encrypted by the encryption module. When it is determined that the data accessed by the user is encrypted, the access authentication module is notified to require the user to input a key; and the access authentication module is set to receive the query module request.
- an embodiment of the present invention further provides a terminal, including the application encryption processing device according to any one of the preceding claims, where the terminal may be a mobile terminal or a fixed terminal.
- an application encryption processing method, apparatus, and terminal provided by an embodiment of the present invention have the following beneficial effects:
- the terminal user can selectively encrypt an application in the terminal, and utilize the terminal.
- the terminal identification number and the password of the user identification card are used as the key encryption application.
- the user identification card password and the key input by the user need to be matched, thereby enhancing the security of the terminal user accessing or using the application. Sex, while improving the security of end users' private data and improving the user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computing Systems (AREA)
- Radar, Positioning & Navigation (AREA)
- Remote Sensing (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP13881740.8A EP2985712B1 (en) | 2013-04-07 | 2013-08-28 | Application encryption processing method, apparatus, and terminal |
US14/781,252 US9977907B2 (en) | 2013-04-07 | 2013-08-28 | Encryption processing method and device for application, and terminal |
JP2016505678A JP2016515778A (ja) | 2013-04-07 | 2013-08-28 | アプリケーション暗号化処理方法、装置及び端末 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310117667.5 | 2013-04-07 | ||
CN201310117667.5A CN104102858B (zh) | 2013-04-07 | 2013-04-07 | 应用程序加密处理方法、装置和终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014166193A1 true WO2014166193A1 (zh) | 2014-10-16 |
Family
ID=51671002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/082466 WO2014166193A1 (zh) | 2013-04-07 | 2013-08-28 | 应用程序加密处理方法、装置和终端 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9977907B2 (zh) |
EP (1) | EP2985712B1 (zh) |
JP (1) | JP2016515778A (zh) |
CN (1) | CN104102858B (zh) |
WO (1) | WO2014166193A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845264A (zh) * | 2015-12-03 | 2017-06-13 | 中兴通讯股份有限公司 | 应用加密方法、装置和应用访问方法、装置 |
CN107426723A (zh) * | 2016-05-24 | 2017-12-01 | 中兴通讯股份有限公司 | 终端文件加密方法、终端文件解密方法和终端 |
CN106709322A (zh) * | 2017-01-04 | 2017-05-24 | 北京奇虎科技有限公司 | 一种应用程序的加密方法、装置和移动终端 |
CN107920069A (zh) * | 2017-11-15 | 2018-04-17 | 中国联合网络通信集团有限公司 | 加密终端内应用程序安全处理方法及装置 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102098657A (zh) * | 2009-12-11 | 2011-06-15 | 中兴通讯股份有限公司 | 一种实现终端锁网功能的方法及装置 |
CN102938032A (zh) * | 2012-10-17 | 2013-02-20 | 中兴通讯股份有限公司 | 一种对通讯终端上应用程序加、解密的方法、***和终端 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7478248B2 (en) * | 2002-11-27 | 2009-01-13 | M-Systems Flash Disk Pioneers, Ltd. | Apparatus and method for securing data on a portable storage device |
FR2919974B1 (fr) * | 2007-08-08 | 2010-02-26 | Fidalis | Systeme d'information et procede d'identification par un serveur d'application d'un utilisateur |
US8915447B2 (en) * | 2007-09-12 | 2014-12-23 | Devicefidelity, Inc. | Amplifying radio frequency signals |
CN101662765B (zh) * | 2008-08-29 | 2013-08-07 | 深圳富泰宏精密工业有限公司 | 手机短信保密***及方法 |
EP2234028A1 (en) * | 2009-02-26 | 2010-09-29 | Research In Motion Limited | System and method of handling encrypted backup data |
JP2011248792A (ja) * | 2010-05-31 | 2011-12-08 | Hitachi Ltd | 端末データ管理システム |
US8935691B2 (en) * | 2011-09-19 | 2015-01-13 | Mourad Ben Ayed | Program store for updating electronic devices |
CN102647712B (zh) * | 2012-04-06 | 2017-06-16 | 惠州Tcl移动通信有限公司 | 一种手机数据加密方法以及解密方法 |
CN104102882B (zh) * | 2013-04-12 | 2017-05-03 | 腾讯科技(深圳)有限公司 | 一种应用程序隐私数据的保护方法及装置 |
CN104144411B (zh) * | 2013-05-08 | 2019-09-24 | 南京中兴新软件有限责任公司 | 加密、解密终端及应用于终端的加密和解密方法 |
-
2013
- 2013-04-07 CN CN201310117667.5A patent/CN104102858B/zh active Active
- 2013-08-28 WO PCT/CN2013/082466 patent/WO2014166193A1/zh active Application Filing
- 2013-08-28 US US14/781,252 patent/US9977907B2/en active Active
- 2013-08-28 JP JP2016505678A patent/JP2016515778A/ja active Pending
- 2013-08-28 EP EP13881740.8A patent/EP2985712B1/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102098657A (zh) * | 2009-12-11 | 2011-06-15 | 中兴通讯股份有限公司 | 一种实现终端锁网功能的方法及装置 |
CN102938032A (zh) * | 2012-10-17 | 2013-02-20 | 中兴通讯股份有限公司 | 一种对通讯终端上应用程序加、解密的方法、***和终端 |
Non-Patent Citations (1)
Title |
---|
See also references of EP2985712A4 * |
Also Published As
Publication number | Publication date |
---|---|
CN104102858B (zh) | 2018-02-13 |
EP2985712A4 (en) | 2016-03-30 |
EP2985712B1 (en) | 2019-10-09 |
JP2016515778A (ja) | 2016-05-30 |
CN104102858A (zh) | 2014-10-15 |
US9977907B2 (en) | 2018-05-22 |
US20160055339A1 (en) | 2016-02-25 |
EP2985712A1 (en) | 2016-02-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150835B (zh) | 云端数据存取的方法、装置、设备及计算机可读存储介质 | |
US20180082050A1 (en) | Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device | |
US9525549B2 (en) | Method and apparatus for securing a mobile application | |
US11501294B2 (en) | Method and device for providing and obtaining graphic code information, and terminal | |
JP6129325B2 (ja) | 通信端末でのアプリケーションプログラムを暗号化と復号化する方法、システム及び端末 | |
TW201741922A (zh) | 一種基於生物特徵的安全認證方法及裝置 | |
WO2014183526A1 (zh) | 一种身份识别的方法、装置和*** | |
CN111431719A (zh) | 一种移动终端密码保护模块、移动终端及密码保护方法 | |
CN109145628B (zh) | 一种基于可信执行环境的数据采集方法及*** | |
JP5613596B2 (ja) | 認証システム、端末装置、認証サーバ、およびプログラム | |
KR101724401B1 (ko) | 생체 정보 인식과 키 분할 방식을 이용한 공인인증 시스템 및 그 방법, 그 방법을 수행하는 프로그램이 기록된 기록매체 | |
CN113221128B (zh) | 账号和密码的存储方法及注册管理*** | |
CN109714769B (zh) | 信息绑定方法、装置、设备及存储介质 | |
KR101690989B1 (ko) | Fido 인증모듈을 이용한 전자서명 방법 | |
CN111401901B (zh) | 生物支付设备的认证方法、装置、计算机设备和存储介质 | |
CN108768941B (zh) | 一种远程解锁安全设备的方法及装置 | |
US10333707B1 (en) | Systems and methods for user authentication | |
WO2013182103A2 (zh) | 加密、解密终端及应用于终端的加密和解密方法 | |
WO2014166193A1 (zh) | 应用程序加密处理方法、装置和终端 | |
CN108667800B (zh) | 一种访问权限的认证方法及装置 | |
CN108881153B (zh) | 用于登入的认证方法 | |
CN112039857B (zh) | 一种公用基础模块的调用方法和装置 | |
KR101482321B1 (ko) | 생체 인식을 이용한 인증서 비밀번호 대체 방법 | |
KR20110005615A (ko) | 사용자 매체를 이용한 무선 오티피 운영 방법 및 시스템과 이를 위한 무선단말 및 기록매체 | |
CN115529591A (zh) | 基于令牌的认证方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13881740 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14781252 Country of ref document: US |
|
ENP | Entry into the national phase |
Ref document number: 2016505678 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2013881740 Country of ref document: EP |