[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN107612901A - One kind applies encryption method and terminal - Google Patents

One kind applies encryption method and terminal Download PDF

Info

Publication number
CN107612901A
CN107612901A CN201710813836.7A CN201710813836A CN107612901A CN 107612901 A CN107612901 A CN 107612901A CN 201710813836 A CN201710813836 A CN 201710813836A CN 107612901 A CN107612901 A CN 107612901A
Authority
CN
China
Prior art keywords
white list
operating system
application
authentication information
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710813836.7A
Other languages
Chinese (zh)
Inventor
李畅华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710813836.7A priority Critical patent/CN107612901A/en
Publication of CN107612901A publication Critical patent/CN107612901A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses one kind to apply encryption method and terminal, and wherein method includes:In the case where detecting the operation for intended application, operating system obtains and applies white list;In the case where intended application is included in and applied in white list, whether the first authentication information that operating system checking receives matches with the second authentication information to prestore;In the case where verifying matching, operating system performs the operation for intended application.The embodiment of the present invention applies white list by preserving, and can improve the security of user profile.

Description

One kind applies encryption method and terminal
Technical field
The present invention relates to communication technique field, and in particular to one kind applies encryption method and terminal.
Background technology
With the rapid development of mobile communication technology, the terminal such as mobile phone in the live and work of people in occupation of increasingly Important effect, people are entertained, are linked up, handled official business and done shopping using types of applications in terminal, terminal purposes increasingly In the case of abundant, the protection of privacy of user, is increasingly taken seriously in.
At present, the privacy information of user, user can be set to certain in terminal in third-party application in being applied for protection A little applications are encrypted, however, after the third-party application is unloaded, or after terminal carries out brush machine, the encryption letter of application Breath is lost, and terminal still can not realize that user's private information is protected, so as to reduce the security of user profile.
The content of the invention
The embodiment of the present invention provides one kind and applies encryption method and terminal, can improve the security of user profile.
In a first aspect, the embodiments of the invention provide one kind to apply encryption method, this method includes:
In the case where detecting the operation for intended application, operating system obtains and applies white list;
In the case where the intended application is included in the application white list, what the operating system checking received Whether the first authentication information matches with the second authentication information to prestore;
In the case where verifying matching, the operating system performs the operation for being directed to intended application.
Second aspect, the embodiments of the invention provide one kind to apply encryption method, including:
In the case of the application white list and its unique corresponding identity that the operating system for receiving terminal is sent, Server preserve it is described using white list, it is described it is unique corresponding to identity and the mapping relations using white list, institute Identity is stated as at least one of the equipment identities mark of terminal and described log-on message.
The third aspect, the embodiments of the invention provide a kind of terminal, the terminal includes:
Acquiring unit, in the case where detecting the operation for intended application, white list to be applied in acquisition;
Authentication unit, in the case of being included in the intended application in the application white list, checking receives The first authentication information whether matched with the second authentication information to prestore;
Execution unit, in the case where verifying matching, performing the operation for being directed to intended application.
Fourth aspect, the embodiments of the invention provide another terminal, including processor, input equipment, output equipment and Memory, the processor, input equipment, output equipment and memory are connected with each other, wherein, the memory is used to store branch The application code that terminal performs the method described by first aspect is held, the processor is arranged to perform above-mentioned first The method of aspect.
5th aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage medium Computer program is stored with, the computer program includes programmed instruction, and described program instruction makes institute when being executed by a processor The method for stating the above-mentioned first aspect of computing device.
6th aspect, the embodiments of the invention provide another computer-readable recording medium, the computer storage is situated between Matter is stored with computer program, and the computer program includes programmed instruction, and described program instruction makes when being executed by a processor The method of the above-mentioned second aspect of computing device.
The embodiment of the present invention is preserved on the server by the application white list for setting operating system, is directed to detecting During the operation of intended application, the application white list of the preservation on the server is obtained, whether white name is being applied according to intended application Decide whether to carry out intended application the checking of identity information in list, without by third-party application, but in an operating system Information in application can be encrypted, avoid by third-party application carry out using encryption when, third-party application is unloaded Afterwards, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve the security of user profile.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram using encryption method provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram using encryption method that another embodiment of the present invention provides;
Fig. 3 is a kind of schematic flow diagram using encryption method that further embodiment of this invention provides;
Fig. 4 is a kind of interface schematic diagram of log-on message for verifying terminal provided in an embodiment of the present invention;
Fig. 5 is that the interface schematic diagram using white list is received in a kind of terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 7 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Fig. 1 is referred to, Fig. 1 is that the embodiment of the present invention provides a kind of schematic flow diagram using encryption method, and Fig. 1 is from end The angle description at end, as shown in figure 1, this may include using encryption method:
In the case where detecting the operation for intended application, operating system obtains and applies white list for S101, terminal.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target One kind in the data of application.User can set these operations to intended application to carry out authority restriction.The white list can be with It is to be pre-stored in local white list or operating system removes the white list that server obtains in real time.
S102, in the case where intended application is included in and applied in white list, the checking of the operating system of terminal receives Whether the first authentication information matches with the second authentication information to prestore.
Specifically, white list can be applied in locally preservation, the application white list locally preserved can be that server is advance Be handed down to operating system or operating system when white list is sent into server, be stored in it is local, as local guarantor When the application white list deposited does not update, operating system applies white list without go server to be downloaded according to identity again.When with After family is to being updated using white list, or when end side carries out brush machine, operating system can preserve the white name of application of renewal It is single, or, operating system sends the application white list comprising identity to server and asked, and identity is downloaded from server It is corresponding to apply white list.
When operating system detects the operation of intended application, go server to obtain and apply white list, including:The operation Whether system detectio is locally preserved using white list;When locally preserving the application white list, the operating system obtains institute State the application white list locally preserved;When not preserving the application white list locally, the operating system is according to the application Uniquely corresponding identity applies white list to white list from server acquisition is described.The white list can be operating system Obtained in real time from server.
S103, in the case where verifying and matching, the operating system of terminal performs the operation for intended application.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target One kind in the data of application.User can set these operations to intended application to carry out authority restriction.
Fig. 2 is referred to, Fig. 2 is that the embodiment of the present invention provides a kind of schematic flow diagram using encryption method, and Fig. 2 is from end What the angle of end and server was described.As shown in Fig. 2 this may include using encryption method:
S201, the operating system of terminal are sent using white list and its unique corresponding identity to server.
Specifically, to ensure the security using white list of terminal setting, operating system can will apply white list standby Part arrives server end.The identity is at least one of the equipment identities mark of terminal and described log-on message.Wherein, The equipment identities mark of terminal can be mobile device international identity code (the international mobile of terminal Equipment identity, IMEI) or mac address of nic, CPU identifier, Electronic Serial Number, deposit The hardware information of the unique mark terminal device such as reservoir identity and communication module identity.Log-on message can be user The log-on message registering, for be set using using white list for identifying user identity, log-on message is terminal authentication It is crossing, regard as legal information.
In the present embodiment, sent by the identity corresponding relation of application white list and terminal and be stored in server On, the application white list that terminal can not be carried out by third-party application is set, and is carried out directly in the operating system of terminal white List is set, also, even if carrying out terminal brush machine, can equally be utilized the identity of terminal to obtain and be backed up on the server Using white list, when can avoid being stored in local using white list, the unloading of third-party application or brush machine so that loss is set The situation using white list put, so as to improve the security of user profile, application is reset without after brush machine White list, the convenience set using white list can be improved.
S202, server are preserved using white list, unique corresponding identity and the mapping relations of application white list.
Specifically, server is preserved using white list, unique corresponding identity and the mapping relations of application white list Afterwards, unique corresponding identity can be sent to server by the operating system of terminal, and server is according to unique correspondence Identity get terminal operating system setting apply white list, so that what terminal local preserved loses using white list After mistake, given for change again using white list from server, so as to improve the security and convenience of white list setting.
S203, the operating system of terminal detect the operation of intended application.
Specifically, the operation of intended application is to open the intended application, the unloading intended application, remove the target One kind in the data of application.User can set these operations to intended application to carry out authority restriction.
S204, operating system send to server and asked using white list.
Specifically, when operating system detects the operation of intended application, white list is applied in acquisition, including:The operation Whether system detectio is locally preserved using white list;When locally preserving the application white list, the operating system obtains institute State the application white list locally preserved;When not preserving the application white list locally, the operating system is according to the application Uniquely corresponding identity applies white list to white list from server acquisition is described.
Wherein, it can be that server is handed down to operating system or behaviour in advance using white list locally to preserve When making system white list being sent into server, be stored in it is local, when locally preserve do not updated using white list when, operation System applies white list without going server to be downloaded according to identity again.After user using white list to being updated, or When person end side carries out brush machine, operating system can preserve the white list of applying of renewal, or, operating system is sent to server Application white list comprising identity is asked, and is downloaded from server and is applied white list corresponding to identity.
S205, server will be sent to the operating system of terminal using white list.
Specifically, when server receives the application white list request of terminal transmission, terminal will be sent to using white list Operating system.This can be stored in local by operating system using white list, when user using white list to not being updated When, can be from local acquisition, without going server to download again, when user is to applying white name when white list is applied in follow-up use Singly it is updated, or after terminal carries out brush machine, step S204 can be re-executed.
S206, operating system verify whether the first authentication information matches with the second authentication information.
In the present embodiment, in the situation that the first authentication information of operating system checking matches with the second authentication information Under, show authentication by performing step S206;The first authentication information and the second authentication are verified in operating system In the case of information is unmatched, show authentication not by the way that then operating system refusal performs the operation for intended application, knot Beam.
Specifically, the first authentication information and the second authentication information are character password, touch track, fingerprint spy At least one of sign, face characteristic and iris feature.In an operating system, user can know beforehand through touch-screen, fingerprint Other module and the first-class input unit of shooting gather above-mentioned second authentication information, and preserve in an operating system.When needs are tested When whether card identity information matches, the first authentication information can be gathered again through above-mentioned input unit.
Wherein, when the first authentication information includes character password, character password that the second authentication information includes When identical with the character password that the first authentication information includes, show the two matching;When the first authentication information bag During containing at least one of touch track, fingerprint characteristic, face characteristic and iris feature, the first authentication information and the second body Part checking information matching can be understood as the characteristic information matching degree of the two and be more than or equal to predetermined threshold value, when the characteristic information of the two When matching degree is less than predetermined threshold value, the first authentication information mismatches with the second authentication information.Other can also be passed through Mode defines the two matching, and the present embodiment does not limit.
Specifically, be pre-stored in the second local authentication information can also be with using white list, identity together It is sent to and server is sent to by operating system, and it is and uniquely corresponding with identity together using white list.As local guarantor When the second identity information deposited is lost, server can be gone to re-download the second identity information by identity.The operation The first authentication information for receiving of system checking whether matched with the second authentication information to prestore including:The operation Whether system detectio locally preserves the second authentication information;In the case where locally preserving second authentication information, The operating system detects first authentication information and whether second authentication information that locally preserves is identical; In the case where locally not preserving second authentication information, the operating system according to it is described it is unique corresponding to identity mark Know the second authentication information for obtaining and being prestored on the server, detect first authentication information and the server On the second authentication information for prestoring it is whether identical.
S207, operating system perform the operation for intended application.
Specifically, in step S203 the operation of intended application be open the intended application, the unloading intended application, One kind in the data of the intended application is removed, it is corresponding, perform the operation of the intended application with being detected in step S203.
In encryption method is applied described by Fig. 2, server is stored in using white list by set operating system On, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to intended application Whether decide whether to carry out intended application the checking of identity information in application white list, without by third-party application, and It is that information in application can be encrypted in an operating system, avoids when being carried out by third-party application using encryption, the After tripartite's application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user profile Security.
Fig. 3 is referred to, Fig. 3 is a kind of schematic flow diagram using encryption method that another embodiment of the present invention provides, such as Shown in Fig. 3, this may include using encryption method:
S301, operating system verify stepping on for terminal when receiving for entering the instruction using white list setting interface Record information.
Specifically, show that log-on message is legal in the case of in the log-on message for verifying terminal, perform step S302, in the log-on message for verifying terminal not in the case of, show that log-on message is illegal, it is desirable to verify or tie again Beam.
Wherein, can be clicked in end side for setting application white using the instruction at white list setting interface for entering The function button of list, the log-on message can be the legal account and password approved by the terminal registered in the terminal, For example, when terminal is mobile phone, the log-on message can be the mobile phone account and corresponding password registered during mobile phone initialization.It is right The form for the password answered can be at least one in character password, touch track, fingerprint characteristic, face characteristic and iris feature Kind.
For example, referring to Fig. 4, the interface that Fig. 4 is a kind of log-on message for verifying terminal provided in an embodiment of the present invention shows It is intended to, as shown in figure 4, when clicking on " application encryption " button in mobile phone side, can be by user in account and password box Input and the log-on message of terminal is verified.
S302, operating system enter sets interface using white list, and it is white to receive application on application white list setting interface List.
Specifically, in the case of the log-on message of the terminal is verified, operating system, which enters, applies white list Interface is set, sets to receive on interface in application white list and applies white list.
For example, referring to Fig. 5, Fig. 5 is that the interface using white list is received in a kind of terminal provided in an embodiment of the present invention Schematic diagram, as shown in figure 5, after entering using white list setting interface, user can set interface choose in application white list The application being encrypted is needed, " preservation " button can be clicked on after user is provided with, then the application chosen preserves accordingly In application white list.Before not preserving, if user wants to cancel this setting, revocation button can be clicked on, does not preserve this application The setting of white list.
S303, operating system are sent using white list and its unique corresponding identity to server.
Specifically, the identity is at least one of the equipment identities mark of terminal and described log-on message.Behaviour Make system only can send using white list and its unique corresponding identity to server, be pre-stored in the second local identity Checking information can also be and send jointly to be sent to server by operating system using white list, identity, and and It is uniquely corresponding with identity together using white list.When the second identity information locally preserved is lost, identity can be passed through Mark goes server to re-download the second identity information.
S304, server are preserved using white list, unique corresponding identity and the mapping relations of application white list.
S305, the operating system of terminal detect the operation of intended application.
S306, operating system send to server and asked using white list.
S307, server will be sent to the operating system of terminal using white list.
S308, operating system verify whether the first authentication information matches with the second authentication information.
S309, operating system perform the operation for intended application.
Specifically, step S303-S309 specific descriptions refer to the step S201- in the embodiment described by Fig. 2 S207, repeat no more here.
In encryption method is applied described by Fig. 3, server is stored in using white list by set operating system On, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to intended application Whether decide whether to carry out intended application the checking of identity information in application white list, without by third-party application, and It is that information in application can be encrypted in an operating system, avoids when being carried out by third-party application using encryption, the After tripartite's application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user profile Security.
Fig. 6 is referred to, Fig. 6 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.As shown in fig. 6, the terminal It can include:
Acquiring unit 601, in the case where detecting the operation for intended application, white list to be applied in acquisition;
Authentication unit 602, in the case of being included in the intended application in the application white list, checking receives To the first authentication information whether match with the second authentication information to prestore;
Execution unit 603, in the case where verifying matching, performing the operation for being directed to intended application.
As a kind of possible embodiment, the operation of the intended application is to open the intended application, described in unloading One kind in intended application, the data of the removing intended application.
As a kind of possible embodiment, the acquiring unit 601 is obtained before applying white list, institute's authentication unit 602, it is additionally operable to, in the case where receiving for entering the instruction using white list setting interface, verify the login letter of terminal Breath;
The terminal also includes:
Setting unit 604 is white into the application for working as in the case where the log-on message of the terminal is verified List sets interface, sets to receive on interface in the application white list and applies white list;
Transmitting element 605, for applying white list and its unique corresponding identity by described, it is sent to the service Device so that the server preserve it is described using white list, it is described it is unique corresponding to identity with described using white list Mapping relations, the identity are at least one of the equipment identities mark of terminal and described log-on message.
As a kind of possible embodiment, the transmitting element 605, for by the application white list and its unique right The identity answered, the server is sent to, including:By it is described application white list and second authentication information and its Identity corresponding to unique, is sent to the server;
The authentication unit 602 verifies whether the first authentication information received is believed with the second authentication to prestore Breath matching includes:Whether detection is local preserves the second authentication information;Locally preserving second authentication information In the case of, detect first authentication information and whether second authentication information that locally preserves is identical;At this In the case that ground does not preserve second authentication information, the operating system according to it is described it is unique corresponding to identity obtain The second authentication information to be prestored on the server is taken, is detected pre- on first authentication information and the server Whether the second authentication information deposited is identical.
As a kind of possible embodiment, the acquiring unit 601 obtains to be included using white list:The operating system Whether detection is local preserves using white list;When locally preserving the application white list, the operating system obtains described What ground preserved applies white list;When not preserving the application white list locally, the operating system is according to the white name of application Single unique corresponding identity applies white list from server acquisition is described.
As a kind of possible embodiment, first authentication information and the second authentication information are that character is close At least one of code, touch track, fingerprint characteristic, face characteristic and iris feature.
In the schematic block diagram of terminal described by Fig. 6, service is stored in using white list by set operating system On device, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, should according to target With whether in application white list deciding whether to carry out intended application the checking of identity information, without by third-party application, But information in application can be encrypted in an operating system, avoid by third-party application carry out using encryption when, After third-party application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve user's letter The security of breath.
Fig. 7 is referred to, Fig. 7 is a kind of terminal schematic block diagram that another embodiment of the present invention provides.As shown in fig. 7, this reality Applying the terminal in example can include:One or more processors 701;One or more input equipments 702, one or more communication Interface 703, memory 704 and bus 705.Above-mentioned processor 701, input equipment 702, communication interface 703 and memory 704 are logical Bus 705 is crossed to connect.Memory 704 is used for store instruction, and processor 701 is used for the instruction for performing the storage of memory 704.Its In, input equipment 702 can be touch-screen, and for detecting the operation of intended application, communication interface 703 is used to carry out with server Communication, processor 701 are used for:
In the case where detecting the operation for intended application, white list is applied in acquisition;
In the case where intended application is included in and applied in white list, verify whether is the first authentication information for receiving Matched with the second authentication information to prestore;
In the case where verifying matching, the operation for intended application is performed.
As a kind of possible embodiment, the operation of intended application is to open intended application, unloading intended application, remove One kind in the data of intended application.
As a kind of possible embodiment, processor 701 is obtained before applying white list, and processor 701 is additionally operable to adjust Following operate is performed with the instruction in memory 704:
In the case where receiving for entering the instruction using white list setting interface, the log-on message of terminal is verified; In the case where the log-on message of terminal is verified, interface is set into application white list, interface is set in application white list White list is applied in upper reception;
Processor 701 is additionally operable to control communication interface 703 to perform following operation:Will be using white list and its uniquely corresponding Identity, server is sent to, so that server preserves using white list, unique corresponding identity and applies white list Mapping relations, identity for terminal equipment identities mark and at least one of log-on message.
As a kind of possible embodiment, processor 701 will apply white list and its unique corresponding identity, hair Server is given, including:Processor 701 controls communication interface 703 to apply white list and the second authentication information and its only Identity corresponding to one, is sent to server;
Processor 701 verifies whether the first authentication information received matches with the second authentication information to prestore Including:
Whether detection is local preserves the second authentication information;When the situation in locally the second authentication information of preservation Under, whether the second authentication information for detecting the first authentication information and locally preserving is identical;When not preserving the locally In the case of two authentication informations, prestored in the reception server of communication interface 703 it is unique corresponding to corresponding to identity Second authentication information is sent to processor 701 by the second authentication information, communication interface 703, and processor 701 receives the Two authentication informations, whether identical detect the second authentication information to be prestored on the first authentication information and server.
As a kind of possible embodiment, processor 701 control communication interface 703 obtain prestore on the server should Included with white list:Processor 701 detects local whether preserve using white list;When locally white list is applied in preservation, obtain What is locally preserved applies white list;When not preserving using white list locally, the reception server of communication interface 703 is sent unique White list is applied corresponding to corresponding identity, communication interface 703 will be sent to processor 701, processor using white list White list is applied in 701 receptions.
As a kind of possible embodiment, input equipment 702 can also be included in fingerprint collecting sensor, camera At least one, for obtaining the first identity information, the first authentication information and the second authentication information are character passwords, touched Touch at least one of track, fingerprint characteristic, face characteristic and iris feature.
In the schematic block diagram of the terminal described by Fig. 7, clothes are stored in using white list by set operating system It is engaged on device, when detecting the operation for intended application, the application white list of the preservation on the server is obtained, according to target Using whether application white list in decide whether to intended application carry out identity information checking, without by third party should With, but information in application can be encrypted in an operating system, avoid and carried out by third-party application using encryption When, after third-party application is unloaded, or after terminal carries out brush machine, the encryption information of application is lost, so as to improve use The security of family information.
It should be appreciated that in embodiments of the present invention, alleged processor 701 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 702 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc..
Memory 704 can include read-only storage and random access memory, and provide and refer to processor 701 and 801 Order and data.The a part of of memory 704 can also include nonvolatile RAM.For example, memory can be with The information of storage device type.
In the specific implementation, the executable present invention of processor, input equipment, output equipment described in the embodiment of the present invention Implementation described in the embodiment of the method for the application encryption that embodiment provides, it also can perform the embodiment of the present invention and retouched The implementation for the terminal stated, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the method as shown in above-mentioned Fig. 1, Fig. 2 and Fig. 3 is realized when the computer program is executed by processor The flow of embodiment.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal, server and method, can To realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or group when actually realizing Part can combine or be desirably integrated into another system, or some features can be ignored, or not perform.In addition, it is shown or The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communication connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

1. one kind applies encryption method, it is characterised in that including:
In the case where detecting the operation for intended application, operating system obtains and applies white list;
In the case where the intended application is included in the application white list, the operating system verifies first received Whether authentication information matches with the second authentication information to prestore;
In the case where verifying matching, the operating system performs the operation for being directed to intended application.
2. according to the method for claim 1, it is characterised in that the operation of the intended application is to open the target to answer With, the unloading intended application, remove one kind in the data of the intended application.
3. according to the method for claim 1, it is characterised in that the operating system is obtained before applying white list, described Method also includes:
In the case where receiving for entering the instruction using white list setting interface, the login letter of operating system checking terminal Breath;
In the case where the log-on message of the terminal is verified, the operating system enters the application white list and sets boundary Face, set to receive on interface in the application white list and apply white list;
Operating system identity corresponding to by the application white list and its uniquely, is sent to the server, so that The server preserve it is described using white list, it is described it is unique corresponding to identity closed with the mapping using white list System, the identity are at least one of the equipment identities mark of terminal and described log-on message.
4. according to the method described in any one of claims 1 to 3, it is characterised in that the operating system applies white name by described Identity corresponding to single and its unique, is sent to the server, including:
Operating system identity corresponding to by the application white list and second authentication information and its uniquely, It is sent to the server;
Whether the first authentication information that the operating system checking receives matches with the second authentication information to prestore Including:
Whether the operating system detection is local preserves the second authentication information;
In the case where locally preserving second authentication information, the operating system detects the first authentication letter Whether breath and second authentication information locally preserved are identical;
In the case where locally not preserving second authentication information, the operating system according to it is described it is unique corresponding to body Part mark obtains the second authentication information to be prestored on the server, detects first authentication information and the clothes Whether the second authentication information to be prestored on business device is identical.
5. according to the method described in any one of claims 1 to 3, it is characterised in that the operating system obtains and applies white list Including:
Whether the operating system detection is local preserves using white list;
In the case where locally preserving the application white list, the operating system obtains the white name of application locally preserved It is single;
In the case where not preserving the application white list locally, the operating system uniquely corresponds to according to the application white list Identity obtained from the server and described apply white list.
6. according to the method described in any one of claims 1 to 3, it is characterised in that first authentication information and described Second authentication information is at least one of character password, touch track, fingerprint characteristic, face characteristic and iris feature.
7. one kind applies encryption method, it is characterised in that including:
In the case of the application white list and its unique corresponding identity that the operating system for receiving terminal is sent, service Device preserve it is described using white list, it is described it is unique corresponding to identity and the mapping relations using white list, the body Part is identified as at least one of the equipment identities mark of terminal and described log-on message.
8. a kind of terminal, it is characterised in that including the list for performing the method as described in claim 1-6 any claims Member.
9. a kind of terminal, it is characterised in that the processor, defeated including processor, input equipment, output equipment and memory Enter equipment, output equipment and memory to be connected with each other, wherein, the memory is used to store application code, the processing Device is arranged to call described program code, performs the method as described in claim any one of 1-6.
A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable storage medium is stored with computer program, The computer program includes programmed instruction, and described program instruction makes the computing device such as right when being executed by a processor It is required that the method described in any one of 1-6.
CN201710813836.7A 2017-09-11 2017-09-11 One kind applies encryption method and terminal Withdrawn CN107612901A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710813836.7A CN107612901A (en) 2017-09-11 2017-09-11 One kind applies encryption method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710813836.7A CN107612901A (en) 2017-09-11 2017-09-11 One kind applies encryption method and terminal

Publications (1)

Publication Number Publication Date
CN107612901A true CN107612901A (en) 2018-01-19

Family

ID=61063113

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710813836.7A Withdrawn CN107612901A (en) 2017-09-11 2017-09-11 One kind applies encryption method and terminal

Country Status (1)

Country Link
CN (1) CN107612901A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414201A (en) * 2018-04-26 2019-11-05 仁宝电脑工业股份有限公司 Electronic device and its operating method with fingerprint authentication function
WO2019223687A1 (en) * 2018-05-22 2019-11-28 中兴通讯股份有限公司 Conference access control method and system, server, terminal, and storage medium
EP3618474A1 (en) * 2018-08-27 2020-03-04 Shenzhen IVPS Technology Co., Ltd. Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette
CN111935159A (en) * 2020-08-13 2020-11-13 工银科技有限公司 Method, device and system for authenticating mutual trust between multiple systems
CN112925534A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Embedded application unloading method and device for cryptographic chip
CN113827983A (en) * 2021-09-24 2021-12-24 深圳市白日梦网络科技有限公司 Method and device for interaction between operating system and game application
CN113923703A (en) * 2020-07-08 2022-01-11 中国移动通信有限公司研究院 State detection method, device and storage medium
CN114091014A (en) * 2021-10-29 2022-02-25 珠海大横琴科技发展有限公司 Data processing method and device
CN114676412A (en) * 2020-12-24 2022-06-28 成都鼎桥通信技术有限公司 USB KEY equipment verification method and device and storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110414201A (en) * 2018-04-26 2019-11-05 仁宝电脑工业股份有限公司 Electronic device and its operating method with fingerprint authentication function
WO2019223687A1 (en) * 2018-05-22 2019-11-28 中兴通讯股份有限公司 Conference access control method and system, server, terminal, and storage medium
EP3618474A1 (en) * 2018-08-27 2020-03-04 Shenzhen IVPS Technology Co., Ltd. Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette
US11483304B2 (en) 2018-08-27 2022-10-25 Shenzhen Ivps Technology Co., Ltd Method for setting password for electronic cigarette, system, storage medium, and electronic cigarette
CN113923703A (en) * 2020-07-08 2022-01-11 中国移动通信有限公司研究院 State detection method, device and storage medium
CN111935159A (en) * 2020-08-13 2020-11-13 工银科技有限公司 Method, device and system for authenticating mutual trust between multiple systems
CN114676412A (en) * 2020-12-24 2022-06-28 成都鼎桥通信技术有限公司 USB KEY equipment verification method and device and storage medium
CN112925534A (en) * 2021-02-25 2021-06-08 广东电网有限责任公司电力调度控制中心 Embedded application unloading method and device for cryptographic chip
CN113827983A (en) * 2021-09-24 2021-12-24 深圳市白日梦网络科技有限公司 Method and device for interaction between operating system and game application
CN114091014A (en) * 2021-10-29 2022-02-25 珠海大横琴科技发展有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
CN107612901A (en) One kind applies encryption method and terminal
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN106341381B (en) Manage the method and system of the safe golden key of frame server system
US8370899B2 (en) Disposable browser for commercial banking
CN105052108B (en) Automatic duplicity digital certificate detection
US9292694B1 (en) Privacy protection for mobile devices
US10078599B2 (en) Application access control method and electronic apparatus implementing the same
CN106357672B (en) A kind of login method and terminal
CN109472166A (en) A kind of electronic signature method, device, equipment and medium
CN107851167A (en) Protection calculates the technology of data in a computing environment
CN107465730A (en) A kind of service request method and terminal
CN107038369A (en) The method and terminal of a kind of resources accessing control
CN107466031A (en) A kind of method and terminal for protecting data
CN108475304B (en) Method and device for associating application program and biological characteristics and mobile terminal
CN107169343A (en) A kind of method and terminal of control application program
CN109644196A (en) Message protection
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107491732A (en) A kind of identity authentication method and terminal
CN107733639A (en) Key management method, device and readable storage medium storing program for executing
CN108335105A (en) Data processing method and relevant device
CN105306202B (en) Auth method, device and server
CN107967422A (en) One kind verification implementation method and electric terminal
US10826901B2 (en) Systems and method for cross-channel device binding
CN106685945A (en) Service request processing method, verifying method of service handling number, and terminal thereof
CN107105103A (en) A kind of information solicitation method and information solicitation device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20180119

WW01 Invention patent application withdrawn after publication