Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
The decryption method of the application program that the embodiment of the present invention provides is implemented in terminal, described terminal includes the electronic equipments such as smart mobile phone, panel computer, digital audio & video players, electronic reader, handheld game machine or vehicle electronic device, and described terminal can run APP.
Fig. 1 is the control method of a kind of application program in the embodiment of the present invention.The flow process of the decryption method of the application program in the present embodiment may include that as shown in the figure
S101, the interface that display is preset, described default interface includes at least one and hides or the icon of the first application program of camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes at least one and hides or the icon of an APP of camouflage.
Wherein, a described hiding APP refers to, does not show the APP of its icon, it is possible to preset by user in security domain interface.Such as: assume to be provided with Web bank APP in a secure domain, if this Web bank APP is set to hidden state by user in advance, then security domain interface will not show the icon of this Web bank APP.It addition, an APP of described camouflage refers to, it is possible to as the APP of the camouflage of other APP, the icon of an APP and the corresponding relation of other APP need to be pre-build by user.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of display camera APP, contact person's APP puppet is loaded on the icon of camera APP.
Concrete, the mode at terminal demonstration security domain interface may is that when terminal is in locking screen interface and gets the security domain entry instruction of user's input, is switched to security domain interface from locking screen interface;Or, when terminal is in conventional domain interface and gets the security domain switching command of user's input, from conventional domain changing interface to security domain interface.
S102, when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and terminal is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set.Such as: user is beforehand through the fingerprint identification module typing finger print information of oneself of terminal, and terminal is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and terminal is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and terminal is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, can select to trigger by user the opportunity of the authentication information of terminal acquisition user input, for instance: after terminal is switched to security domain interface, user selects to carry out authentication, and now terminal obtains the authentication information that user inputs.Optional again, the opportunity of the authentication information that terminal obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
It is to be noted, an APP for camouflage, terminal judge the authentication information of input whether with default checking information matches before, or after judging that the authentication information of input is not mated with the checking information preset, when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
S103, if so, then releases hiding described first application program, or releases the camouflage to described first application program.
Concrete, terminal if it is determined that the authentication information inputted and the checking information matches preset, then releases hiding an APP, or releases the camouflage to an APP.Implement in process:
Terminal releases the operation hidden to an APP: show the icon of an APP in security domain interface.Such as: assume that the APP hidden is calendar APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 6 (A) before the success of checking finger print information, after checking finger print information success, security domain interface shows calendar APP, as shown in Fig. 6 (B).
Terminal releases the operation to the camouflage of an APP: when getting the click commands that user's icon for an APP inputs, the corresponding relation according to the icon of the APP pre-build and the 2nd APP, starts the 2nd APP.Such as: assume that an APP of camouflage is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, terminal, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).Further alternative, terminal if it is determined that input authentication information with preset checking information matches, then the icon of an APP of display in security domain interface is replaced by the icon of the 2nd APP, such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes at least one and hides or the icon of the first application program of camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release hiding or camouflage the first application program, it is possible to achieve hiding or camouflage application program could be deciphered after authentication success, thus avoiding personal information compromised.
Fig. 2 is the control method of another kind of application program in the embodiment of the present invention.The flow process of the decryption method of the application program in the present embodiment may include that as shown in the figure
S201, sets up the icon of the first application program and the corresponding relation of the second application program.
After it is pointed out that terminal sets up the icon of an APP and the corresponding relation of the 2nd APP, the 2nd APP pseudo-can be loaded on the icon of an APP.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of a display camera APP.
S202, the interface that display is preset, described default interface includes the icon of the first application program of at least one camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes the icon of an APP of at least one camouflage.
S203, when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and terminal is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set, if so, then perform step S205, if it is not, then perform step S204.Such as: user is beforehand through the fingerprint identification module typing finger print information of oneself of terminal, and terminal is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and terminal is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and terminal is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, can select to trigger by user the opportunity of the authentication information of terminal acquisition user input, for instance: after terminal is switched to security domain interface, user selects to carry out authentication, and now terminal obtains the authentication information that user inputs.Optional again, the opportunity of the authentication information that terminal obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
S204, when getting user for the click commands of the icon input of described first application program of camouflage, starts described first application program.
Concrete, terminal judges authentication information whether with default checking information matches before, and after judging that authentication information is not mated with the checking information preset, when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
S205, when getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, start described second application program.
Concrete, terminal if it is determined that the authentication information inputted and the checking information matches preset, then releases the camouflage to an APP.Implement in process, terminal when getting the click commands that user's icon for an APP inputs, the corresponding relation according to the icon of the APP pre-build and the 2nd APP, start the 2nd APP.Such as: assume that an APP of camouflage is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, terminal, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).Further alternative, terminal if it is determined that input authentication information with preset checking information matches, then the icon of an APP of display in security domain interface is replaced by the icon of the 2nd APP, such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes the icon of the first application program of at least one camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release the camouflage to the first application program, it is possible to achieve the application program of camouflage could be deciphered after authentication success, thus avoiding personal information compromised.
Fig. 3 is the structural representation of a kind of terminal in the embodiment of the present invention.Terminal in the embodiment of the present invention at least can include interface display unit 310, identity authenticating unit 320 and application decryption unit 330 as shown in the figure, wherein:
Interface display unit 310, for showing that default interface, described default interface include at least one and hide or the icon of the first application program of camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes at least one and hides or the icon of an APP of camouflage.
Wherein, a described hiding APP refers to, does not show the APP of its icon, it is possible to preset by user in security domain interface.Such as: assume to be provided with Web bank APP in a secure domain, if this Web bank APP is set to hidden state by user in advance, then security domain interface will not show the icon of this Web bank APP.It addition, an APP of described camouflage refers to, it is possible to as the APP of the camouflage of other APP, the icon of an APP and the corresponding relation of the 2nd APP need to be pre-build by user.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of display camera APP, contact person's APP puppet is loaded on the icon of camera APP.
Concrete, interface display unit 310 shows that the mode at security domain interface may is that when terminal is in locking screen interface and gets the security domain entry instruction of user's input, is switched to security domain interface from locking screen interface;Or, when terminal is in conventional domain interface and gets the security domain switching command of user's input, from conventional domain changing interface to security domain interface.
Identity authenticating unit 320, for when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and identity authenticating unit 320 is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set.Such as: user is beforehand through oneself the finger print information of fingerprint identification module typing of terminal, identity authenticating unit 320 is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input is consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and identity authenticating unit 320 is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and identity authenticating unit 320 is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, identity authenticating unit 320 obtains and can select to trigger by user the opportunity of the authentication information of user's input, such as: after terminal is switched to security domain interface, user selects to carry out authentication, and now identity authenticating unit 320 obtains the authentication information of user's input.Optional again, the opportunity of the authentication information that identity authenticating unit 320 obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, identity authenticating unit 320 is once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
Application decryption unit 330, for if so, then releasing hiding described first application program, or releases the camouflage to described first application program.In implementing, described application decryption unit 330 can farther include the first decryption unit 331 and the second decryption unit 332 as shown in Figure 4, wherein:
First decryption unit 331, for showing the icon of hiding described first application program in described default interface.
Such as: assume that the APP hidden is calendar APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 6 (A) before the success of checking finger print information, after checking finger print information success, security domain interface shows calendar APP, as shown in Fig. 6 (B).
Second decryption unit 332, is used for when getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, starts described second application program.
Such as: assume that the APP hidden is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, second decryption unit 332, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).
Optionally, described application decryption unit 330 can farther include icon as shown in Figure 4 and change unit 333, for if so, then the icon of described first application program of display in described default interface being replaced by the icon of described second application program.
Such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
Referring to Fig. 3, the terminal in the embodiment of the present invention can also include application start unit 340 as shown in the figure, for when getting user for the click commands of the icon input of described first application program of camouflage, starting described first application program.
Concrete, identity authenticating unit 320 judge authentication information whether with default checking information matches before, and after judging that authentication information is not mated with the checking information preset, application start unit 340 is when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
Fig. 5 is the structural representation of the another kind of terminal in the embodiment of the present invention, as it is shown in figure 5, this terminal may include that at least one processor 501, for instance CPU, and at least one communication bus 502, at least one user interface 503, memorizer 504.Wherein, communication bus 502 is for realizing the connection communication between these assemblies;User interface 503 can include touching display screen, button and fingerprint identification module or photographic head, for interacting with user, and obtains the authentication information of user;Memorizer 504 can be high-speed RAM memorizer, it is also possible to be non-volatile memorizer (non-volatilememory), for instance at least one disk memory.Optionally, memorizer 504 can also is that at least one is located remotely from the storage device of aforementioned processor 501.Storing batch processing code in memorizer 504, processor 501, for calling the program code of storage in memorizer 504, performs following operation:
The interface that display is preset, described default interface includes at least one and hides or the icon of the first application program of camouflage;
When getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches;
If so, then release hiding described first application program, or release the camouflage to described first application program.
Optionally, processor 501 release to described first application program hide concrete operations be:
Described default interface shows the icon of hiding described first application program.
Optional again, processor 501 releases the concrete operations of the camouflage to described first application program and is:
When getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, start described second application program.
Further, processor 501 judge described authentication information whether with default checking information matches after, also perform:
If so, then the icon of described first application program of display in described default interface is replaced by the icon of described second application program.
Optionally, processor 501 judge described authentication information whether with default checking information matches before, and after judging that described authentication information is not mated with the checking information preset, also perform:
When getting user for the click commands of the icon input of described first application program of camouflage, start described first application program.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes at least one and hides or the icon of the first application program of camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release hiding or camouflage the first application program, it is possible to achieve hiding or camouflage application program could be deciphered after authentication success, thus avoiding personal information compromised.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, can be by the hardware that computer program carrys out instruction relevant to complete, described program can be stored in a computer read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc..
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device, it is possible to merge according to actual needs, divide and delete.
Unit described in the embodiment of the present invention, universal integrated circuit can be passed through, for instance CPU (CentralProcessingUnit, central processing unit), or realized by ASIC (ApplicationSpecificIntegratedCircuit, special IC).
Additionally, term " first ", " second " are only for descriptive purposes, and it is not intended that indicate or imply relative importance or the implicit quantity indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or implicitly include at least one this feature.In describing the invention, " multiple " are meant that at least two, for instance two, three etc., unless otherwise expressly limited specifically.
Above disclosed it is only present pre-ferred embodiments, certainly can not limit the interest field of the present invention, the equivalent variations therefore made according to the claims in the present invention with this, still belong to the scope that the present invention contains.