CN107612901A - One kind applies encryption method and terminal - Google Patents
One kind applies encryption method and terminal Download PDFInfo
- Publication number
- CN107612901A CN107612901A CN201710813836.7A CN201710813836A CN107612901A CN 107612901 A CN107612901 A CN 107612901A CN 201710813836 A CN201710813836 A CN 201710813836A CN 107612901 A CN107612901 A CN 107612901A
- Authority
- CN
- China
- Prior art keywords
- white list
- operating system
- application
- authentication information
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses one kind to apply encryption method and terminal, and wherein method includes:In the case where detecting the operation for intended application, operating system obtains and applies white list;In the case where intended application is included in and applied in white list, whether the first authentication information that operating system checking receives matches with the second authentication information to prestore;In the case where verifying matching, operating system performs the operation for intended application.The embodiment of the present invention applies white list by preserving, and can improve the security of user profile.
Description
Technical field
The present invention relates to communication technique field, and in particular to one kind applies encryption method and terminal.
Background technology
With the rapid development of mobile communication technology, the terminal such as mobile phone in the live and work of people in occupation of increasingly
Important effect, people are entertained, are linked up, handled official business and done shopping using types of applications in terminal, terminal purposes increasingly
In the case of abundant, the protection of privacy of user, is increasingly taken seriously in.
At present, the privacy information of user, user can be set to certain in terminal in third-party application in being applied for protection
A little applications are encrypted, however, after the third-party application is unloaded, or after terminal carries out brush machine, the encryption letter of application
Breath is lost, and terminal still can not realize that user's private information is protected, so as to reduce the security of user profile.
The content of the invention
The embodiment of the present invention provides one kind and applies encryption method and terminal, can improve the security of user profile.
In a first aspect, the embodiments of the invention provide one kind to apply encryption method, this method includes:
In the case where detecting the operation for intended application, operating system obtains and applies white list;
In the case where the intended application is included in the application white list, what the operating system checking received
Whether the first authentication information matches with the second authentication information to prestore;
In the case where verifying matching, the operating system performs the operation for being directed to intended application.
Second aspect, the embodiments of the invention provide one kind to apply encryption method, including:
In the case of the application white list and its unique corresponding identity that the operating system for receiving terminal is sent,
Server preserve it is described using white list, it is described it is unique corresponding to identity and the mapping relations using white list, institute
Identity is stated as at least one of the equipment identities mark of terminal and described log-on message.
The third aspect, the embodiments of the invention provide a kind of terminal, the terminal includes:
Acquiring unit, in the case where detecting the operation for intended application, white list to be applied in acquisition;
Authentication unit, in the case of being included in the intended application in the application white list, checking receives
The first authentication information whether matched with the second authentication information to prestore;
Execution unit, in the case where verifying matching, performing the operation for being directed to intended application.
Fourth aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and
Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch
The application code that terminal performs the method described by first aspect is held, the processor is arranged to perform above-mentioned first
The method of aspect.
5th aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium
Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor
The method for stating the above-mentioned first aspect of computing device.
6th aspect, the embodiments of the invention provide another computer-readable recording medium, the computer storage is situated between
Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction makes when being executed by a processor
The method of the above-mentioned second aspect of computing device.
The embodiment of the present invention is preserved on the server by the application white list for setting operating system, is directed to detecting
During the operation of intended application, the application white list of the preservation on the server is obtained, whether white name is being applied according to intended application
Decide whether to carry out intended application the checking of identity information in list, without by third-party application, but in an operating system
Information in application can be encrypted, avoid by third-party application carry out using encryption when, third-party application is unloaded
Afterwards, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve the security of user profile.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram using encryption method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram using encryption method that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic flow diagram using encryption method that further embodiment of this invention provides;
Fig. 4 is a kind of interface schematic diagram of log-on message for verifying terminal provided in an embodiment of the present invention;
Fig. 5 is that the interface schematic diagram using white list is received in a kind of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface
The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just
Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface
Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch
Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Fig. 1 is referred to, Fig. 1 is that the embodiment of the present invention provides a kind of schematic flow diagram using encryption method, and Fig. 1 is from end
The angle description at end, as shown in figure 1, this may include using encryption method:
In the case where detecting the operation for intended application, operating system obtains and applies white list for S101, terminal.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target
One kind in the data of application.User can set these operations to intended application to carry out authority restriction.The white list can be with
It is to be pre-stored in local white list or operating system removes the white list that server obtains in real time.
S102, in the case where intended application is included in and applied in white list, the checking of the operating system of terminal receives
Whether the first authentication information matches with the second authentication information to prestore.
Specifically, white list can be applied in locally preservation, the application white list locally preserved can be that server is advance
Be handed down to operating system or operating system when white list is sent into server, be stored in it is local, as local guarantor
When the application white list deposited does not update, operating system applies white list without go server to be downloaded according to identity again.When with
After family is to being updated using white list, or when end side carries out brush machine, operating system can preserve the white name of application of renewal
It is single, or, operating system sends the application white list comprising identity to server and asked, and identity is downloaded from server
It is corresponding to apply white list.
When operating system detects the operation of intended application, go server to obtain and apply white list, including:The operation
Whether system detectio is locally preserved using white list;When locally preserving the application white list, the operating system obtains institute
State the application white list locally preserved;When not preserving the application white list locally, the operating system is according to the application
Uniquely corresponding identity applies white list to white list from server acquisition is described.The white list can be operating system
Obtained in real time from server.
S103, in the case where verifying and matching, the operating system of terminal performs the operation for intended application.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target
One kind in the data of application.User can set these operations to intended application to carry out authority restriction.
Fig. 2 is referred to, Fig. 2 is that the embodiment of the present invention provides a kind of schematic flow diagram using encryption method, and Fig. 2 is from end
What the angle of end and server was described.As shown in Fig. 2 this may include using encryption method:
S201, the operating system of terminal are sent using white list and its unique corresponding identity to server.
Specifically, to ensure the security using white list of terminal setting, operating system can will apply white list standby
Part arrives server end.The identity is at least one of the equipment identities mark of terminal and described log-on message.Wherein,
The equipment identities mark of terminal can be mobile device international identity code (the international mobile of terminal
Equipment identity, IMEI) or mac address of nic, CPU identifier, Electronic Serial Number, deposit
The hardware information of the unique mark terminal device such as reservoir identity and communication module identity.Log-on message can be user
The log-on message registering, for be set using using white list for identifying user identity, log-on message is terminal authentication
It is crossing, regard as legal information.
In the present embodiment, sent by the identity corresponding relation of application white list and terminal and be stored in server
On, the application white list that terminal can not be carried out by third-party application is set, and is carried out directly in the operating system of terminal white
List is set, also, even if carrying out terminal brush machine, can equally be utilized the identity of terminal to obtain and be backed up on the server
Using white list, when can avoid being stored in local using white list, the unloading of third-party application or brush machine so that loss is set
The situation using white list put, so as to improve the security of user profile, application is reset without after brush machine
White list, the convenience set using white list can be improved.
S202, server are preserved using white list, unique corresponding identity and the mapping relations of application white list.
Specifically, server is preserved using white list, unique corresponding identity and the mapping relations of application white list
Afterwards, unique corresponding identity can be sent to server by the operating system of terminal, and server is according to unique correspondence
Identity get terminal operating system setting apply white list, so that what terminal local preserved loses using white list
After mistake, given for change again using white list from server, so as to improve the security and convenience of white list setting.
S203, the operating system of terminal detect the operation of intended application.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target
One kind in the data of application.User can set these operations to intended application to carry out authority restriction.
S204, operating system send to server and asked using white list.
Specifically, when operating system detects the operation of intended application, white list is applied in acquisition, including:The operation
Whether system detectio is locally preserved using white list;When locally preserving the application white list, the operating system obtains institute
State the application white list locally preserved;When not preserving the application white list locally, the operating system is according to the application
Uniquely corresponding identity applies white list to white list from server acquisition is described.
Wherein, it can be that server is handed down to operating system or behaviour in advance using white list locally to preserve
When making system white list being sent into server, be stored in it is local, when locally preserve do not updated using white list when, operation
System applies white list without going server to be downloaded according to identity again.After user using white list to being updated, or
When person end side carries out brush machine, operating system can preserve the white list of applying of renewal, or, operating system is sent to server
Application white list comprising identity is asked, and is downloaded from server and is applied white list corresponding to identity.
S205, server will be sent to the operating system of terminal using white list.
Specifically, when server receives the application white list request of terminal transmission, terminal will be sent to using white list
Operating system.This can be stored in local by operating system using white list, when user using white list to not being updated
When, can be from local acquisition, without going server to download again, when user is to applying white name when white list is applied in follow-up use
Singly it is updated, or after terminal carries out brush machine, step S204 can be re-executed.
S206, operating system verify whether the first authentication information matches with the second authentication information.
In the present embodiment, in the situation that the first authentication information of operating system checking matches with the second authentication information
Under, show authentication by performing step S206;The first authentication information and the second authentication are verified in operating system
In the case of information is unmatched, show authentication not by the way that then operating system refusal performs the operation for intended application, knot
Beam.
Specifically, the first authentication information and the second authentication information are character password, touch track, fingerprint spy
At least one of sign, face characteristic and iris feature.In an operating system, user can know beforehand through touch-screen, fingerprint
Other module and the first-class input unit of shooting gather above-mentioned second authentication information, and preserve in an operating system.When needs are tested
When whether card identity information matches, the first authentication information can be gathered again through above-mentioned input unit.
Wherein, when the first authentication information includes character password, character password that the second authentication information includes
When identical with the character password that the first authentication information includes, show the two matching;When the first authentication information bag
During containing at least one of touch track, fingerprint characteristic, face characteristic and iris feature, the first authentication information and the second body
Part checking information matching can be understood as the characteristic information matching degree of the two and be more than or equal to predetermined threshold value, when the characteristic information of the two
When matching degree is less than predetermined threshold value, the first authentication information mismatches with the second authentication information.Other can also be passed through
Mode defines the two matching, and the present embodiment does not limit.
Specifically, be pre-stored in the second local authentication information can also be with using white list, identity together
It is sent to and server is sent to by operating system, and it is and uniquely corresponding with identity together using white list.As local guarantor
When the second identity information deposited is lost, server can be gone to re-download the second identity information by identity.The operation
The first authentication information for receiving of system checking whether matched with the second authentication information to prestore including:The operation
Whether system detectio locally preserves the second authentication information;In the case where locally preserving second authentication information,
The operating system detects first authentication information and whether second authentication information that locally preserves is identical;
In the case where locally not preserving second authentication information, the operating system according to it is described it is unique corresponding to identity mark
Know the second authentication information for obtaining and being prestored on the server, detect first authentication information and the server
On the second authentication information for prestoring it is whether identical.
S207, operating system perform the operation for intended application.
Specifically, in step S203 the operation of intended application be open the intended application, the unloading intended application,
One kind in the data of the intended application is removed, it is corresponding, perform the operation of the intended application with being detected in step S203.
In encryption method is applied described by Fig. 2, server is stored in using white list by set operating system
On, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to intended application
Whether decide whether to carry out intended application the checking of identity information in application white list, without by third-party application, and
It is that information in application can be encrypted in an operating system, avoids when being carried out by third-party application using encryption, the
After tripartite's application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user profile
Security.
Fig. 3 is referred to, Fig. 3 is a kind of schematic flow diagram using encryption method that another embodiment of the present invention provides, such as
Shown in Fig. 3, this may include using encryption method:
S301, operating system verify stepping on for terminal when receiving for entering the instruction using white list setting interface
Record information.
Specifically, show that log-on message is legal in the case of in the log-on message for verifying terminal, perform step
S302, in the log-on message for verifying terminal not in the case of, show that log-on message is illegal, it is desirable to verify or tie again
Beam.
Wherein, can be clicked in end side for setting application white using the instruction at white list setting interface for entering
The function button of list, the log-on message can be the legal account and password approved by the terminal registered in the terminal,
For example, when terminal is mobile phone, the log-on message can be the mobile phone account and corresponding password registered during mobile phone initialization.It is right
The form for the password answered can be at least one in character password, touch track, fingerprint characteristic, face characteristic and iris feature
Kind.
For example, referring to Fig. 4, the interface that Fig. 4 is a kind of log-on message for verifying terminal provided in an embodiment of the present invention shows
It is intended to, as shown in figure 4, when clicking on " application encryption " button in mobile phone side, can be by user in account and password box
Input and the log-on message of terminal is verified.
S302, operating system enter sets interface using white list, and it is white to receive application on application white list setting interface
List.
Specifically, in the case of the log-on message of the terminal is verified, operating system, which enters, applies white list
Interface is set, sets to receive on interface in application white list and applies white list.
For example, referring to Fig. 5, Fig. 5 is that the interface using white list is received in a kind of terminal provided in an embodiment of the present invention
Schematic diagram, as shown in figure 5, after entering using white list setting interface, user can set interface choose in application white list
The application being encrypted is needed, " preservation " button can be clicked on after user is provided with, then the application chosen preserves accordingly
In application white list.Before not preserving, if user wants to cancel this setting, revocation button can be clicked on, does not preserve this application
The setting of white list.
S303, operating system are sent using white list and its unique corresponding identity to server.
Specifically, the identity is at least one of the equipment identities mark of terminal and described log-on message.Behaviour
Make system only can send using white list and its unique corresponding identity to server, be pre-stored in the second local identity
Checking information can also be and send jointly to be sent to server by operating system using white list, identity, and and
It is uniquely corresponding with identity together using white list.When the second identity information locally preserved is lost, identity can be passed through
Mark goes server to re-download the second identity information.
S304, server are preserved using white list, unique corresponding identity and the mapping relations of application white list.
S305, the operating system of terminal detect the operation of intended application.
S306, operating system send to server and asked using white list.
S307, server will be sent to the operating system of terminal using white list.
S308, operating system verify whether the first authentication information matches with the second authentication information.
S309, operating system perform the operation for intended application.
Specifically, step S303-S309 specific descriptions refer to the step S201- in the embodiment described by Fig. 2
S207, repeat no more here.
In encryption method is applied described by Fig. 3, server is stored in using white list by set operating system
On, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to intended application
Whether decide whether to carry out intended application the checking of identity information in application white list, without by third-party application, and
It is that information in application can be encrypted in an operating system, avoids when being carried out by third-party application using encryption, the
After tripartite's application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user profile
Security.
Fig. 6 is referred to, Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.As shown in fig. 6, the terminal
It can include:
Acquiring unit 601, in the case where detecting the operation for intended application, white list to be applied in acquisition;
Authentication unit 602, in the case of being included in the intended application in the application white list, checking receives
To the first authentication information whether match with the second authentication information to prestore;
Execution unit 603, in the case where verifying matching, performing the operation for being directed to intended application.
As a kind of possible embodiment, the operation of the intended application is to open the intended application, described in unloading
One kind in intended application, the data of the removing intended application.
As a kind of possible embodiment, the acquiring unit 601 is obtained before applying white list, institute's authentication unit
602, it is additionally operable to, in the case where receiving for entering the instruction using white list setting interface, verify the login letter of terminal
Breath;
The terminal also includes:
Setting unit 604 is white into the application for working as in the case where the log-on message of the terminal is verified
List sets interface, sets to receive on interface in the application white list and applies white list;
Transmitting element 605, for applying white list and its unique corresponding identity by described, it is sent to the service
Device so that the server preserve it is described using white list, it is described it is unique corresponding to identity with described using white list
Mapping relations, the identity are at least one of the equipment identities mark of terminal and described log-on message.
As a kind of possible embodiment, the transmitting element 605, for by the application white list and its unique right
The identity answered, the server is sent to, including:By it is described application white list and second authentication information and its
Identity corresponding to unique, is sent to the server;
The authentication unit 602 verifies whether the first authentication information received is believed with the second authentication to prestore
Breath matching includes:Whether detection is local preserves the second authentication information;Locally preserving second authentication information
In the case of, detect first authentication information and whether second authentication information that locally preserves is identical;At this
In the case that ground does not preserve second authentication information, the operating system according to it is described it is unique corresponding to identity obtain
The second authentication information to be prestored on the server is taken, is detected pre- on first authentication information and the server
Whether the second authentication information deposited is identical.
As a kind of possible embodiment, the acquiring unit 601 obtains to be included using white list:The operating system
Whether detection is local preserves using white list;When locally preserving the application white list, the operating system obtains described
What ground preserved applies white list;When not preserving the application white list locally, the operating system is according to the white name of application
Single unique corresponding identity applies white list from server acquisition is described.
As a kind of possible embodiment, first authentication information and the second authentication information are that character is close
At least one of code, touch track, fingerprint characteristic, face characteristic and iris feature.
In the schematic block diagram of terminal described by Fig. 6, service is stored in using white list by set operating system
On device, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, should according to target
With whether in application white list deciding whether to carry out intended application the checking of identity information, without by third-party application,
But information in application can be encrypted in an operating system, avoid by third-party application carry out using encryption when,
After third-party application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user's letter
The security of breath.
Fig. 7 is referred to, Fig. 7 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.As shown in fig. 7, this reality
Applying the terminal in example can include:One or more processors 701;One or more input equipments 702, one or more communication
Interface 703, memory 704 and bus 705.Above-mentioned processor 701, input equipment 702, communication interface 703 and memory 704 are logical
Bus 705 is crossed to connect.Memory 704 is used for store instruction, and processor 701 is used for the instruction for performing the storage of memory 704.Its
In, input equipment 702 can be touch-screen, and for detecting the operation of intended application, communication interface 703 is used to carry out with server
Communication, processor 701 are used for:
In the case where detecting the operation for intended application, white list is applied in acquisition;
In the case where intended application is included in and applied in white list, verify whether is the first authentication information for receiving
Matched with the second authentication information to prestore;
In the case where verifying matching, the operation for intended application is performed.
As a kind of possible embodiment, the operation of intended application is to open intended application, unloading intended application, remove
One kind in the data of intended application.
As a kind of possible embodiment, processor 701 is obtained before applying white list, and processor 701 is additionally operable to adjust
Following operate is performed with the instruction in memory 704:
In the case where receiving for entering the instruction using white list setting interface, the log-on message of terminal is verified;
In the case where the log-on message of terminal is verified, interface is set into application white list, interface is set in application white list
White list is applied in upper reception;
Processor 701 is additionally operable to control communication interface 703 to perform following operation:Will be using white list and its uniquely corresponding
Identity, server is sent to, so that server preserves using white list, unique corresponding identity and applies white list
Mapping relations, identity for terminal equipment identities mark and at least one of log-on message.
As a kind of possible embodiment, processor 701 will apply white list and its unique corresponding identity, hair
Server is given, including:Processor 701 controls communication interface 703 to apply white list and the second authentication information and its only
Identity corresponding to one, is sent to server;
Processor 701 verifies whether the first authentication information received matches with the second authentication information to prestore
Including:
Whether detection is local preserves the second authentication information;When the situation in locally the second authentication information of preservation
Under, whether the second authentication information for detecting the first authentication information and locally preserving is identical;When not preserving the locally
In the case of two authentication informations, prestored in the reception server of communication interface 703 it is unique corresponding to corresponding to identity
Second authentication information is sent to processor 701 by the second authentication information, communication interface 703, and processor 701 receives the
Two authentication informations, whether identical detect the second authentication information to be prestored on the first authentication information and server.
As a kind of possible embodiment, processor 701 control communication interface 703 obtain prestore on the server should
Included with white list:Processor 701 detects local whether preserve using white list;When locally white list is applied in preservation, obtain
What is locally preserved applies white list;When not preserving using white list locally, the reception server of communication interface 703 is sent unique
White list is applied corresponding to corresponding identity, communication interface 703 will be sent to processor 701, processor using white list
White list is applied in 701 receptions.
As a kind of possible embodiment, input equipment 702 can also be included in fingerprint collecting sensor, camera
At least one, for obtaining the first identity information, the first authentication information and the second authentication information are character passwords, touched
Touch at least one of track, fingerprint characteristic, face characteristic and iris feature.
In the schematic block diagram of the terminal described by Fig. 7, clothes are stored in using white list by set operating system
It is engaged on device, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to target
Using whether application white list in decide whether to intended application carry out identity information checking, without by third party should
With, but information in application can be encrypted in an operating system, avoid and carried out by third-party application using encryption
When, after third-party application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve use
The security of family information.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone etc..
Memory 704 can include read-only storage and random access memory, and provide and refer to processor 701 and 801
Order and data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory can be with
The information of storage device type.
In the specific implementation, the executable present invention of processor, input equipment, output equipment described in the embodiment of the present invention
Implementation described in the embodiment of the method for the application encryption that embodiment provides, it also can perform the embodiment of the present invention and retouched
The implementation for the terminal stated, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention
Matter is stored with computer program, and the method as shown in above-mentioned Fig. 1, Fig. 2 and Fig. 3 is realized when the computer program is executed by processor
The flow of embodiment.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example
Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as
The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure
Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both
Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing
Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily
When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware
With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This
A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially
Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal, server and method, can
To realize by another way.For example, device embodiment described above is only schematical, for example, the unit
Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or group when actually realizing
Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.In addition, it is shown or
The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit
Close or communication connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated
Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention
Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
It is required that protection domain be defined.
Claims (10)
1. one kind applies encryption method, it is characterised in that including:
In the case where detecting the operation for intended application, operating system obtains and applies white list;
In the case where the intended application is included in the application white list, the operating system verifies first received
Whether authentication information matches with the second authentication information to prestore;
In the case where verifying matching, the operating system performs the operation for being directed to intended application.
2. according to the method for claim 1, it is characterised in that the operation of the intended application is to open the target to answer
With, the unloading intended application, remove one kind in the data of the intended application.
3. according to the method for claim 1, it is characterised in that the operating system is obtained before applying white list, described
Method also includes:
In the case where receiving for entering the instruction using white list setting interface, the login letter of operating system checking terminal
Breath;
In the case where the log-on message of the terminal is verified, the operating system enters the application white list and sets boundary
Face, set to receive on interface in the application white list and apply white list;
Operating system identity corresponding to by the application white list and its uniquely, is sent to the server, so that
The server preserve it is described using white list, it is described it is unique corresponding to identity closed with the mapping using white list
System, the identity are at least one of the equipment identities mark of terminal and described log-on message.
4. according to the method described in any one of claims 1 to 3, it is characterised in that the operating system applies white name by described
Identity corresponding to single and its unique, is sent to the server, including:
Operating system identity corresponding to by the application white list and second authentication information and its uniquely,
It is sent to the server;
Whether the first authentication information that the operating system checking receives matches with the second authentication information to prestore
Including:
Whether the operating system detection is local preserves the second authentication information;
In the case where locally preserving second authentication information, the operating system detects the first authentication letter
Whether breath and second authentication information locally preserved are identical;
In the case where locally not preserving second authentication information, the operating system according to it is described it is unique corresponding to body
Part mark obtains the second authentication information to be prestored on the server, detects first authentication information and the clothes
Whether the second authentication information to be prestored on business device is identical.
5. according to the method described in any one of claims 1 to 3, it is characterised in that the operating system obtains and applies white list
Including:
Whether the operating system detection is local preserves using white list;
In the case where locally preserving the application white list, the operating system obtains the white name of application locally preserved
It is single;
In the case where not preserving the application white list locally, the operating system uniquely corresponds to according to the application white list
Identity obtained from the server and described apply white list.
6. according to the method described in any one of claims 1 to 3, it is characterised in that first authentication information and described
Second authentication information is at least one of character password, touch track, fingerprint characteristic, face characteristic and iris feature.
7. one kind applies encryption method, it is characterised in that including:
In the case of the application white list and its unique corresponding identity that the operating system for receiving terminal is sent, service
Device preserve it is described using white list, it is described it is unique corresponding to identity and the mapping relations using white list, the body
Part is identified as at least one of the equipment identities mark of terminal and described log-on message.
8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-6 any claims
Member.
9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory
Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store application code, the processing
Device is arranged to call described program code, performs the method as described in claim any one of 1-6.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program,
The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor
It is required that the method described in any one of 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710813836.7A CN107612901A (en) | 2017-09-11 | 2017-09-11 | One kind applies encryption method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710813836.7A CN107612901A (en) | 2017-09-11 | 2017-09-11 | One kind applies encryption method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107612901A true CN107612901A (en) | 2018-01-19 |
Family
ID=61063113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710813836.7A Withdrawn CN107612901A (en) | 2017-09-11 | 2017-09-11 | One kind applies encryption method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107612901A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414201A (en) * | 2018-04-26 | 2019-11-05 | 仁宝电脑工业股份有限公司 | Electronic device and its operating method with fingerprint authentication function |
WO2019223687A1 (en) * | 2018-05-22 | 2019-11-28 | 中兴通讯股份有限公司 | Conference access control method and system, server, terminal, and storage medium |
EP3618474A1 (en) * | 2018-08-27 | 2020-03-04 | Shenzhen IVPS Technology Co., Ltd. | Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette |
CN111935159A (en) * | 2020-08-13 | 2020-11-13 | 工银科技有限公司 | Method, device and system for authenticating mutual trust between multiple systems |
CN112925534A (en) * | 2021-02-25 | 2021-06-08 | 广东电网有限责任公司电力调度控制中心 | Embedded application unloading method and device for cryptographic chip |
CN113827983A (en) * | 2021-09-24 | 2021-12-24 | 深圳市白日梦网络科技有限公司 | Method and device for interaction between operating system and game application |
CN113923703A (en) * | 2020-07-08 | 2022-01-11 | 中国移动通信有限公司研究院 | State detection method, device and storage medium |
CN114091014A (en) * | 2021-10-29 | 2022-02-25 | 珠海大横琴科技发展有限公司 | Data processing method and device |
CN114676412A (en) * | 2020-12-24 | 2022-06-28 | 成都鼎桥通信技术有限公司 | USB KEY equipment verification method and device and storage medium |
-
2017
- 2017-09-11 CN CN201710813836.7A patent/CN107612901A/en not_active Withdrawn
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110414201A (en) * | 2018-04-26 | 2019-11-05 | 仁宝电脑工业股份有限公司 | Electronic device and its operating method with fingerprint authentication function |
WO2019223687A1 (en) * | 2018-05-22 | 2019-11-28 | 中兴通讯股份有限公司 | Conference access control method and system, server, terminal, and storage medium |
EP3618474A1 (en) * | 2018-08-27 | 2020-03-04 | Shenzhen IVPS Technology Co., Ltd. | Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette |
US11483304B2 (en) | 2018-08-27 | 2022-10-25 | Shenzhen Ivps Technology Co., Ltd | Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette |
CN113923703A (en) * | 2020-07-08 | 2022-01-11 | 中国移动通信有限公司研究院 | State detection method, device and storage medium |
CN111935159A (en) * | 2020-08-13 | 2020-11-13 | 工银科技有限公司 | Method, device and system for authenticating mutual trust between multiple systems |
CN114676412A (en) * | 2020-12-24 | 2022-06-28 | 成都鼎桥通信技术有限公司 | USB KEY equipment verification method and device and storage medium |
CN112925534A (en) * | 2021-02-25 | 2021-06-08 | 广东电网有限责任公司电力调度控制中心 | Embedded application unloading method and device for cryptographic chip |
CN113827983A (en) * | 2021-09-24 | 2021-12-24 | 深圳市白日梦网络科技有限公司 | Method and device for interaction between operating system and game application |
CN114091014A (en) * | 2021-10-29 | 2022-02-25 | 珠海大横琴科技发展有限公司 | Data processing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107612901A (en) | One kind applies encryption method and terminal | |
CN107704765A (en) | A kind of interface access method, server and computer-readable recording medium | |
CN106341381B (en) | Manage the method and system of the safe golden key of frame server system | |
US8370899B2 (en) | Disposable browser for commercial banking | |
CN105052108B (en) | Automatic duplicity digital certificate detection | |
US9292694B1 (en) | Privacy protection for mobile devices | |
US10078599B2 (en) | Application access control method and electronic apparatus implementing the same | |
CN106357672B (en) | A kind of login method and terminal | |
CN109472166A (en) | A kind of electronic signature method, device, equipment and medium | |
CN107851167A (en) | Protection calculates the technology of data in a computing environment | |
CN107465730A (en) | A kind of service request method and terminal | |
CN107038369A (en) | The method and terminal of a kind of resources accessing control | |
CN107466031A (en) | A kind of method and terminal for protecting data | |
CN108475304B (en) | Method and device for associating application program and biological characteristics and mobile terminal | |
CN107169343A (en) | A kind of method and terminal of control application program | |
CN109644196A (en) | Message protection | |
CN107358114A (en) | A kind of method and terminal for preventing user data loss | |
CN107491732A (en) | A kind of identity authentication method and terminal | |
CN107733639A (en) | Key management method, device and readable storage medium storing program for executing | |
CN108335105A (en) | Data processing method and relevant device | |
CN105306202B (en) | Auth method, device and server | |
CN107967422A (en) | One kind verification implementation method and electric terminal | |
US10826901B2 (en) | Systems and method for cross-channel device binding | |
CN106685945A (en) | Service request processing method, verifying method of service handling number, and terminal thereof | |
CN107105103A (en) | A kind of information solicitation method and information solicitation device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180119 |
|
WW01 | Invention patent application withdrawn after publication |