[go: up one dir, main page]

CN107169343A - A kind of method and terminal of control application program - Google Patents

A kind of method and terminal of control application program Download PDF

Info

Publication number
CN107169343A
CN107169343A CN201710281466.7A CN201710281466A CN107169343A CN 107169343 A CN107169343 A CN 107169343A CN 201710281466 A CN201710281466 A CN 201710281466A CN 107169343 A CN107169343 A CN 107169343A
Authority
CN
China
Prior art keywords
identity
default application
default
proof
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710281466.7A
Other languages
Chinese (zh)
Inventor
刘岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710281466.7A priority Critical patent/CN107169343A/en
Publication of CN107169343A publication Critical patent/CN107169343A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of method and terminal of control application program, wherein, methods described includes:If detecting the predetermined registration operation that triggering starts the first default application, the mark of the described first default application is obtained;The information security grade of the described first default application is determined according to the mark of the described first default application;Proof of identity is carried out to the described first default application by the corresponding target operating environment of described information safe class;Wherein, the target operating environment is one of them at least two mutually isolated running environment, and the running environment is corresponded with safe root of trust;If proof of identity passes through, the described first default application is run by the target operating environment.The embodiment of the present invention can improve the safety and reliability of data in terminal.

Description

A kind of method and terminal of control application program
Technical field
The present invention relates to electronic technology field, more particularly to a kind of method and terminal of control application program.
Background technology
With various web application (Application, APP) popularization, user can be in the application city of terminal The application program of oneself needs is carried and installed off field, so that the function of terminal extension.
As the application program installed in terminal is more and more, user is when using various application programs, and each application can be produced Raw a large amount of interaction datas, the first application program may call the interaction data of the second application program.Wherein, interaction data may be wrapped Include user and be not intended to the privacy information that others sees, for example, personal information, important information or sensitive information etc..
If the interaction data protection to each application program is improper, it is easy to cause the leakage of private information of user.
The content of the invention
The embodiment of the present invention provides a kind of method and terminal of control application program, it is possible to increase the safety of data in terminal Property and reliability.
In a first aspect, the embodiments of the invention provide a kind of method for controlling application program, this method includes:
If detecting the predetermined registration operation that triggering starts the first default application, the mark of the described first default application is obtained;
The information security grade of the described first default application is determined according to the mark of the described first default application;
Proof of identity is carried out to the described first default application by the corresponding target operating environment of described information safe class; Wherein, the target operating environment be at least two mutually isolated running environment in one of them, the running environment with Safe root of trust is corresponded;
If proof of identity passes through, the described first default application is run by the target operating environment.
On the other hand, the embodiments of the invention provide a kind of terminal, the terminal includes:
Acquiring unit, if starting the predetermined registration operation of the first default application for detecting triggering, obtains described first pre- If the mark of application;
Determining unit, the information security for determining the described first default application according to the mark of the described first default application Grade;
Proof of identity unit, for default to described first by the corresponding target operating environment of described information safe class Using progress proof of identity;Wherein, the target operating environment is wherein one at least two mutually isolated running environment Individual, the running environment is corresponded with safe root of trust;
Control unit, if passing through for proof of identity, is answered by the way that target operating environment operation described first is default With.
If the embodiment of the present invention starts the predetermined registration operation of the first default application by detecting triggering, described first is obtained The mark of default application;The information security grade of the described first default application is determined according to the mark of the described first default application; Proof of identity is carried out to the described first default application by the corresponding target operating environment of described information safe class;Wherein, institute It is one of them at least two mutually isolated running environment to state target operating environment;If proof of identity passes through, pass through The default application of the target operating environment operation described first.Due to detecting the default behaviour of the default application of triggering startup first When making, when the default application of verification first allows the default application of operation for its corresponding target operating environment, transported by target The default application of row environment operation first;When recognizing the first default application message and being maliciously tampered, it is pre- that terminal does not run first If using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Eventually End is by setting at least two mutually isolated running environment, and the default application of different information security grades operates at least two Mutually isolated running environment, to prevent from carrying out data interaction between the different two or more application programs of information security grade Period calls the privacy information of user, and causes the situation of information leakage, it is possible to increase the security of data and reliable in terminal Property.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 is a kind of schematic flow diagram of the method for control application program provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the method for control application program that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of terminal schematic block diagram that another embodiment of the present invention is provided;
Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" be indicated Described feature, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, it is whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use such as touch sensitive surface at least one is public Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
Fig. 1 is referred to, Fig. 1 is a kind of schematic flow diagram of the method for control application program provided in an embodiment of the present invention. The executive agent that the method for application program is controlled in the present embodiment is to have at least two mutually isolated operations in terminal, terminal Environment, the different safe root of trust of each independent running environment correspondence.Terminal can be mobile eventually for mobile phone, tablet personal computer etc. End.The method of control application program as shown in Figure 1 may include following steps:
S101:If detecting the predetermined registration operation that triggering starts the first default application, the described first default application is obtained Mark.
Terminal is in normal work, when detecting the predetermined registration operation of the application of triggering startup first, according to the first application Information judges whether the first application is default application, if the first application is default application, terminal recognition is touched to be currently detected Hair starts the predetermined registration operation of the first default application, obtains the mark of the first default application.
Detecting the predetermined registration operation of the application of triggering startup first can be:Detect the application drawing that user clicks on the first application Mark or click on the first peer link or interface applied in the interactive interface of other application.
Default application is the application that its information security is protected the need for being prestored in terminal, and the application can be to be related to use The application of the privacy informations such as family personal information, important information or sensitive information.
The number of default application can be one, or at least two, not be limited herein.First default application Mark can be the first default title applied.
S102:The information security grade of the described first default application is determined according to the mark of the described first default application.
Preset in terminal and store default application and the default corresponding relation of information security grade, terminal is default according to first The default corresponding relation for identifying, presetting application and information security grade of application, determines that first presets the corresponding information peace of application Congruent level.
Wherein, information security grade can be divided into common grade and severity level, can also set three or more Information security grade, can specifically be configured according to actual needs.
S103:Identity is carried out to the described first default application by the corresponding target operating environment of described information safe class Verification;Wherein, the target operating environment is one of them at least two mutually isolated running environment.
There are at least two mutually isolated running environment, the letter for the default application that each running environment is run in terminal Cease safe class different.The different safe key root of each running environment correspondence, safe key root refers to depositing for storage root key Storage area domain, safety chip is presently the most the place of safe storage key, so safety chip can be used as safe root of trust. I.e. each running environment needs to rely on each self-corresponding safety chip as safe root of trust.
Wherein, the database (in the corresponding safety chip of running environment) of running environment, which preserves the running environment, allows fortune The corresponding key root of capable all default applications, root key is used to allow the running environment the default application of operation to carry out identity Verification.
Terminal determines that first presets the corresponding target operating environment of application according to the information security grade of the first default application, It is determined that first it is default apply corresponding target operating environment when, obtain the first default application from the target operating environment corresponding Root key, and proof of identity is carried out using the default application of the root secret key pair first got in target operating environment, to examine Whether the first default application, which belongs to target operating environment, allows the default application of operation.
Wherein, running environment is corresponding with information security grade.When terminal only has two running environment, two different Running environment allows the information security grade of the default application of operation different, and same running environment allows the default application run Information security grade all same.When being provided with the running environment of 3 or more than 3 in terminal, each running environment allows fortune The information security grade of capable default application is different, and same running environment allows information security of default application of operation etc. Level can be with identical, can also different (now, same running environment allows the information security grade of the default application run to belong to Same pre-set interval or preset range).
When the default application of terminal check first is that target operating environment allows the default application of operation, S104 is performed; When the default application of terminal check first is not the default application that target operating environment is allowed, the first default application letter is identified as Breath is maliciously tampered, and terminates this control flow, returns to S101.
S104:If proof of identity passes through, the described first default application is run by the target operating environment.
When the default application of terminal check first is that target operating environment allows the default application of operation, transported by target The default application of row environment operation first.
It is understood that the interaction data that the default application of operation first is produced, which is stored in first, presets the corresponding mesh of application Mark running environment.
Such scheme, if terminal detects the predetermined registration operation that triggering starts the first default application, obtains described first pre- If the mark of application;The information security grade of the described first default application is determined according to the mark of the described first default application;It is logical Cross described information safe class corresponding target operating environment and proof of identity is carried out to the described first default application;Wherein, it is described Target operating environment is one of them at least two mutually isolated running environment;If proof of identity passes through, pass through institute State the default application of target operating environment operation described first.Due to detecting the predetermined registration operation of the default application of triggering startup first When, when the default application of verification first allows the default application of operation for its corresponding target operating environment, pass through object run The default application of environment operation first;When recognizing the first default application message and being maliciously tampered, terminal is not run first and preset Using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Terminal By setting at least two mutually isolated running environment, the default application of different information security grades operates at least two phases The running environment mutually isolated, to prevent from carrying out the data interaction phase between the different two or more application programs of information security grade Between call the privacy information of user, and cause the situation of information leakage, it is possible to increase the safety and reliability of data in terminal.
Fig. 2 is referred to, Fig. 2 is a kind of exemplary flow of the method for control application program that another embodiment of the present invention is provided Figure.The executive agent that the method for application program is controlled in the present embodiment is mutually isolated with least two in terminal, terminal Running environment, the different safe root of trust of each independent running environment correspondence.Terminal can be mobile for mobile phone, tablet personal computer etc. Terminal.The method of control application program as shown in Figure 2 may include following steps:
S201:If detecting the predetermined registration operation that triggering starts the first default application, the described first default application is obtained Mark.
S201 is identical with the S101 of a upper embodiment in the present embodiment, specifically refers to the specific of S101 in an embodiment Description, is not repeated herein.
S202:The information security grade of the described first default application is determined according to the mark of the described first default application.
Preset in terminal and store default application and the default corresponding relation of information security grade, terminal is default according to first The default corresponding relation for identifying, presetting application and information security grade of application, determines that first presets the corresponding information peace of application Congruent level.
Wherein, information security grade can be divided into common grade and severity level, can also set three or more Information security grade, can specifically be configured according to actual needs.
S203:Identity is carried out to the described first default application by the corresponding target operating environment of described information safe class Verification;Wherein, the target operating environment is one of them at least two mutually isolated running environment.
There are at least two mutually isolated running environment, the letter for the default application that each running environment is run in terminal Cease safe class different.The different safe key root of each running environment correspondence, safe key root refers to depositing for storage root key Storage area domain, safety chip is presently the most the place of safe storage key, so safety chip can be used as safe root of trust. I.e. each running environment needs to rely on each self-corresponding safety chip as safe root of trust.
Wherein, the database (in the corresponding safety chip of running environment) of running environment, which preserves the running environment, allows fortune The corresponding key root of capable all default applications, root key is used to allow the running environment the default application of operation to carry out identity Verification.
Terminal determines that first presets the corresponding target operating environment of application according to the information security grade of the first default application, It is determined that first it is default apply corresponding target operating environment when, obtain the first default application from the target operating environment corresponding Root key, and proof of identity is carried out using the default application of the root secret key pair first got in target operating environment, to examine Whether the first default application, which belongs to target operating environment, allows the default application of operation.
Wherein, running environment is corresponding with information security grade.When terminal only has two running environment, two different Running environment allows the information security grade of the default application of operation different, and same running environment allows the default application run Information security grade all same.When being provided with the running environment of 3 or more than 3 in terminal, each running environment allows fortune The information security grade of capable default application is different, and same running environment allows information security of default application of operation etc. Level can be with identical, can also different (now, same running environment allows the information security grade of the default application run to belong to Same pre-set interval or preset range).
Below to include two safety chips in terminal, two safety chips correspond to two mutually isolated operation rings respectively Illustrated exemplified by border.
For example, when the security information grade of the first default application is common grade, the corresponding object run ring of common grade When border is the first running environment, terminal obtains the first corresponding key of default application from the first running environment, and first Proof of identity is carried out using the default application of the root secret key pair first got in running environment;When the safety letter of the first default application Breath grade is severity level, when the corresponding target operating environment of severity level is the second running environment, and terminal runs ring from second The first corresponding key of default application is obtained in border, and it is pre- using the root secret key pair first got in the second running environment If application carries out proof of identity.
Further, when being provided with the first running environment and the second running environment in terminal, S203 can include:
If the described first default application correspondence first information safe class, pre- to described first by the first running environment If application carries out proof of identity;If described first the second information security grade of default application correspondence, passes through the second running environment Proof of identity is carried out to the described first default application;Wherein, the first safe root of trust of first running environment correspondence, described the Two running environment the second safe root of trust of correspondence.
Below to include two safety chips in terminal, two safety chips correspond to two mutually isolated operation rings respectively Illustrated exemplified by border.(the first running environment relies on the first safe core to the first safe root of trust of first running environment correspondence Piece), the second running environment the second safe root of trust (the second running environment relies on the second safety chip) of correspondence, the first operation ring Border allow information security grade and the second running environment of the default application of operation allow operation default application information security Grade is different.
For example, when the security information grade of the first default application is common grade, the corresponding object run ring of common grade When border is the first running environment, terminal obtains the first corresponding key of default application from the first running environment, and first Proof of identity is carried out using the default application of the root secret key pair first got in running environment, whether to examine the first default application Belonging to the first running environment allows the default application of operation.It is that the first running environment is allowed to preset application when terminal check first During the default application of operation, S204 is performed;When the default application of terminal check first be not the first running environment allowed it is default Using when, be identified as the first default application message and be maliciously tampered, terminate this control flow, return to S201.
When the security information grade of the first default application is severity level, the corresponding target operating environment of severity level is the During two running environment, terminal obtains the first corresponding key of default application from the second running environment, and runs ring second Proof of identity is carried out using the default application of the root secret key pair first that gets in border, to examine whether the first default application belongs to the Two running environment allow the default application of operation.When the default application of terminal check first is that the second running environment allows operation It is default when applying, perform S204;When the default application of terminal check first is not the default application that the second running environment is allowed, It is identified as the first default application message to be maliciously tampered, terminates this control flow, return to S201.
Further, S203 can include S2031~S2033:
S2031:The unique identity of the described first default application is obtained from the described first default application.
Further, the unique identity includes the bag name of the first default application or calculated by Message Digest 5 Obtained digital signature.
Terminal can preset associated documents (installation file or the operation applied according to the mark of the first default application from first The associated documents that data are produced) the middle bag name for obtaining the first default application.
Terminal can also obtain Message Digest 5 (Message Digest Algorithm) from the first default application Calculate obtained digital signature.Digital signature can be MD5 values.MD5 is Message Digest Algorithm 5.
Specifically, the developer of the first default application is before the default application of issue first, using Message Digest 5 the 5th Version (Message Digest Algorithm, MD5) produces informative abstract for a segment information of the first default application, with to the One default application is digitally signed, to prevent from being tampered.Terminal be mounted with first it is default apply when, can be default from first MD5 values are obtained in the associated documents of application.
S2032:The described first default application is obtained from the database of the target operating environment corresponding default unique Identity.
Default unique identity can be bag name or obtained numeral label are calculated by Message Digest 5 Name.
S2033:Compare the unique identity and the default unique identity of the carrying, so as to described first Default application carries out proof of identity;Wherein, if the unique identity of the carrying is identical with the default unique identity, Then the check results pass through for proof of identity;If the unique identity of the carrying and the default unique identity are not Identical, then the check results fail for proof of identity.
Further, when the described first default application correspondence first key pair, first secret key pair includes the first public key And first private key, the second secret key pair of the target operating environment correspondence, second secret key pair includes the second public key and the During two private keys, S203 can include S2034~S2036:
S2034:First message is sent to close pipe server by the described first default application.
S2035:Receive the second message that the close pipe server is sent according to first message;Wherein, described second Message presets corresponding first private key of application using described first by the close pipe server and first message is signed, And the second public key of the use target operating environment is encrypted to first message after signature and obtained.
Wherein, first key pair and the terminal institute of all default applications have been prestored in the database of close pipe server The key of the running environment of support is to (public key that can also only preserve the running environment that terminal is supported).
Close pipe server is when receiving the first message that terminal is sent by the first default application, and acquisition first is default should First key pair, and the corresponding key pair of target operating environment is obtained, and using the first of the first default application Private key is signed to the first message, and the first message after signature is carried out using target operating environment corresponding second public key Encryption obtains the second message, and the second message is sent to terminal.
Close pipe server carries out signature to the first message using the first private key of the first default application and referred to, private using first Key encrypts the wherein one piece of data of the first message.
S2036:Control the target operating environment using corresponding second private key of the target operating environment to described the Two messages are decrypted, and corresponding first public key of the default application of use described first enters to second message after decryption Row sign test.
Wherein, if second message carries out sign test success, it is identified as proof of identity and passes through;If second message enters Row sign test fails, then is identified as proof of identity failure.
Terminal is obtained when receiving the second message that close pipe server is sent according to the first message from target operating environment The first key pair of the first default application is taken, and obtains the second key pair of target operating environment, and control targe operation ring The second message is decrypted using corresponding second private key of target operating environment for border.Terminal in the second message of successful decryption, The message (the first message after signature) after close pipe server is signed using the first private key of the first default application is obtained, this When, terminal presets corresponding first public key of application using first and carries out sign test to the second message after decryption.
Terminal presets application corresponding first public key using first and the second message progress sign test after decryption is specifically referred to: Terminal presets corresponding first public key of application to the second message after decryption using first, decrypts and is serviced in the second message by close pipe Device uses the data that the first private key is encrypted, to reduce the first message.
Terminal is when reducing the first message, by the first message of reduction and the first message by the first default application transmission It is compared, if the first message of reduction is identical with the first message sent by the first default application, sign test success, terminal The proof of identity for being identified as the first default application passes through.
Terminal is preset corresponding first public key of application using first and can not decrypted in the second message by the use of close pipe server During the data that the first private key is encrypted, sign test failure is identified as the first default application message and is maliciously tampered, first it is default should Proof of identity fails.
It is understood that because the unique identity of the first default application may also be tampered, terminal is being performed When S2031~S2033 passes through to the first default application identity verification, S2034~S2036 is can also carry out, further to first Default application carries out proof of identity, to improve the degree of accuracy of proof of identity.
It is understood that in the present embodiment, when being provided with the first running environment and the second running environment in terminal, First running environment and the second running environment can carry out identity using identical identity verification method to the first default application Verification, it would however also be possible to employ different identity verification methods is verified to the first default application.When the first running environment and Two running environment are verified using different identity verification methods to the first default application, and the first running environment allows operation When the information security grade of default application allows the information security grade of default application of operation higher than the second running environment, first Running environment can perform S2031~S2033 and carry out proof of identity to the first default application, and the second running environment can be performed S2034~S2036 applications default to first carry out proof of identity, or the second running environment can perform S2031~S2033 with And S2034~S2036 carries out proof of identity to the first default application, can be specifically configured, not done according to actual conditions herein Limitation.
S204:If proof of identity passes through, the described first default application is run by the target operating environment.
When the default application of terminal check first is that target operating environment allows the default application of operation, transported by target The default application of row environment operation first.
It is understood that the interaction data that the default application of operation first is produced, which is stored in first, presets the corresponding mesh of application Mark running environment.
Further, when being provided with the first running environment and the second running environment in terminal, S204 can include:If institute State the first running environment and proof of identity is carried out to the described first default application, and proof of identity passes through, then is transported by described first The default application of row environment operation described first;If second running environment carries out proof of identity to the described first default application, And proof of identity passes through, then the described first default application is run by second running environment.
For example, when the default application of terminal check first is that the first running environment allows the default application of operation, passing through The default application of first running environment operation first.The default application of terminal check first is that the second running environment allows the pre- of operation If using when, pass through the default application of the second running environment operation first.
Such scheme, if terminal detects the predetermined registration operation that triggering starts the first default application, obtains described first pre- If the mark of application;The information security grade of the described first default application is determined according to the mark of the described first default application;It is logical Cross described information safe class corresponding target operating environment and proof of identity is carried out to the described first default application;Wherein, it is described Target operating environment is one of them at least two mutually isolated running environment;If proof of identity passes through, pass through institute State the default application of target operating environment operation described first.Due to detecting the predetermined registration operation of the default application of triggering startup first When, when the default application of verification first allows the default application of operation for its corresponding target operating environment, pass through object run The default application of environment operation first;When recognizing the first default application message and being maliciously tampered, terminal is not run first and preset Using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Terminal By setting at least two mutually isolated running environment, the default application of different information security grades operates at least two phases The running environment mutually isolated, to prevent from carrying out the data interaction phase between the different two or more application programs of information security grade Between call the privacy information of user, and cause the situation of information leakage, it is possible to increase the safety and reliability of data in terminal.
Terminal can carry out proof of identity using different identity verification methods to the first default application, to improve identity school The degree of accuracy tested.
Referring to Fig. 3, Fig. 3 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal can be mobile phone, put down The mobile terminals such as plate computer, but this is not limited to, it can also be other-end, not be limited herein.The terminal bag of the present embodiment The each unit included is used to perform each step in the corresponding embodiments of Fig. 1, specifically refers to the corresponding embodiments of Fig. 1 and Fig. 1 In associated description, do not repeat herein.The terminal 300 of the present embodiment includes:Acquiring unit 310, determining unit 320, identity school Verification certificate member 330 and control unit 340.
If acquiring unit 310 is used to detect the predetermined registration operation that triggering starts the first default application, described first is obtained The mark of default application.
Determining unit 320 is used to determine that the information of the described first default application is pacified according to the mark of the described first default application Congruent level.
Proof of identity unit 330 is used for pre- to described first by the corresponding target operating environment of described information safe class If application carries out proof of identity;Wherein, the target operating environment be at least two mutually isolated running environment in wherein One, the running environment is corresponded with safe root of trust.
If control unit 340 passes through for proof of identity, run described first by the target operating environment and preset Using.
Such scheme, if terminal detects the predetermined registration operation that triggering starts the first default application, obtains described first pre- If the mark of application;The information security grade of the described first default application is determined according to the mark of the described first default application;It is logical Cross described information safe class corresponding target operating environment and proof of identity is carried out to the described first default application;Wherein, it is described Target operating environment is one of them at least two mutually isolated running environment;If proof of identity passes through, pass through institute State the default application of target operating environment operation described first.Due to detecting the predetermined registration operation of the default application of triggering startup first When, when the default application of verification first allows the default application of operation for its corresponding target operating environment, pass through object run The default application of environment operation first;When recognizing the first default application message and being maliciously tampered, terminal is not run first and preset Using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Terminal By setting at least two mutually isolated running environment, the default application of different information security grades operates at least two phases The running environment mutually isolated, to prevent from carrying out the data interaction phase between the different two or more application programs of information security grade Between call the privacy information of user, and cause the situation of information leakage, it is possible to increase the safety and reliability of data in terminal.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram for terminal that another embodiment of the present invention is provided.Terminal can be hand The mobile terminals such as machine, tablet personal computer, but this is not limited to, it can also be other-end, not be limited herein.The end of the present embodiment Hold each unit included to be used to perform each step in the corresponding embodiments of Fig. 2, specifically refer to the corresponding realities of Fig. 2 and Fig. 2 The associated description in example is applied, is not repeated herein.The terminal 400 of the present embodiment includes:Acquiring unit 410, determining unit 420, body Part verification unit 430 and control unit 440.Proof of identity unit 430 can include:It is identity acquiring unit 431, default Identity acquiring unit 432 and comparing unit 433.Proof of identity unit 430 can also include:Packet sending unit 434, Message receiving unit 435 and sign test unit 436.
If acquiring unit 410 is used to detect the predetermined registration operation that triggering starts the first default application, described first is obtained The mark of default application.
Determining unit 420 is used to determine that the information of the described first default application is pacified according to the mark of the described first default application Congruent level.
Proof of identity unit 430 is used for pre- to described first by the corresponding target operating environment of described information safe class If application carries out proof of identity;Wherein, the target operating environment be at least two mutually isolated running environment in wherein One, the running environment is corresponded with safe root of trust.
Further, when the running environment number be two when, proof of identity unit 430 specifically for:If described First default application correspondence first information safe class, then carry out identity by the first running environment to the described first default application Verification;If described first the second information security grade of default application correspondence, default to described first by the second running environment Using progress proof of identity;Wherein, the first safe root of trust of the first running environment correspondence, the second running environment correspondence Second safe root of trust.
Further, proof of identity unit 430 can include:Identity acquiring unit 431, default identity are obtained Unit 432 and comparing unit 433;
Identity acquiring unit 431, for obtaining the described first default application only from the described first default application One identity;
Alternatively, the unique identity includes the bag name of the first default application or calculated by Message Digest 5 The digital signature arrived;
Default identity acquiring unit 432:For obtaining described first from the database of the target operating environment It is default to apply corresponding default unique identity;
Comparing unit 433, unique identity and the default unique identity for comparing the carrying, so that Proof of identity is carried out to the described first default application;
Wherein, if the unique identity of the carrying is identical with the default unique identity, it is identified as identity Verification passes through;If the unique identity of the carrying is differed with the default unique identity, identity school is identified as Test failure.
Further, the described first default application correspondence first key pair, first secret key pair include the first public key with And first private key, the second secret key pair of the target operating environment correspondence, second secret key pair includes the second public key and second Private key;Proof of identity unit 430 can also include:Packet sending unit 434, message receiving unit 435 and sign test unit 436;
Packet sending unit 434, for sending the first message to close pipe server by the described first default application;
Message receiving unit 435, for receiving the second message that the close pipe server is sent according to first message; Wherein, second message presets corresponding first private key of application to described first by the close pipe server using described first Message is signed, and first message after signature is encrypted using the second public key of the target operating environment Arrive;
Sign test unit 436, for controlling the target operating environment using corresponding second private of the target operating environment Second message is decrypted key, and using corresponding first public key of the described first default application to described in after decryption Second message carries out sign test;
Wherein, if sign test success, is identified as proof of identity and passes through;If sign test fails, proof of identity failure is identified as.
If control unit 440 passes through for proof of identity, run described first by the target operating environment and preset Using.
Further, when the running environment number be two when, control unit 440 specifically for:If described first Running environment carries out proof of identity to the described first default application, and proof of identity passes through, then passes through first running environment Run the described first default application;If second running environment carries out proof of identity, and identity to the described first default application Verification passes through, then runs the described first default application by second running environment.
Such scheme, if terminal detects the predetermined registration operation that triggering starts the first default application, obtains described first pre- If the mark of application;The information security grade of the described first default application is determined according to the mark of the described first default application;It is logical Cross described information safe class corresponding target operating environment and proof of identity is carried out to the described first default application;Wherein, it is described Target operating environment is one of them at least two mutually isolated running environment;If proof of identity passes through, pass through institute State the default application of target operating environment operation described first.Due to detecting the predetermined registration operation of the default application of triggering startup first When, when the default application of verification first allows the default application of operation for its corresponding target operating environment, pass through object run The default application of environment operation first;When recognizing the first default application message and being maliciously tampered, terminal is not run first and preset Using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Terminal By setting at least two mutually isolated running environment, the default application of different information security grades operates at least two phases The running environment mutually isolated, to prevent from carrying out the data interaction phase between the different two or more application programs of information security grade Between call the privacy information of user, and cause the situation of information leakage, it is possible to increase the safety and reliability of data in terminal.
Terminal can carry out proof of identity using different identity verification methods to the first default application, to improve identity school The degree of accuracy tested.
Referring to Fig. 5, Fig. 5 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.This reality as depicted The terminal 500 applied in example can include:One or more processors 510;One or more input equipments 520, it is one or more Output equipment 530 and memory 540.Above-mentioned processor 510, input equipment 520, output equipment 530 and memory 540 are by total Line 550 is connected.
Memory 540 is instructed for storage program.
The programmed instruction that processor 510 is used to be stored according to memory 540 performs following operate:
If processor 510 is used to detect the predetermined registration operation that triggering starts the first default application, described first is obtained pre- If the mark of application.
Processor 510 is additionally operable to determine the information peace of the described first default application according to the mark of the described first default application Congruent level.
Processor 510 is additionally operable to answer by the way that the corresponding target operating environment of described information safe class is default to described first With carrying out proof of identity;Wherein, the target operating environment is one of them at least two mutually isolated running environment, The running environment is corresponded with safe root of trust.
Pass through if processor 510 is additionally operable to proof of identity, run described first by the target operating environment and preset Using.
Alternatively, the number of the running environment be two, processor 510 specifically for:If the described first default application Correspondence first information safe class, then carry out proof of identity, if identity by the first running environment to the described first default application Verification passes through, then runs the described first default application by first running environment;If the described first default application correspondence the Two information security grades, then carry out proof of identity, if proof of identity is logical by the second running environment to the described first default application Cross, then the described first default application is run by second running environment;Wherein, the first running environment correspondence first is pacified Full root of trust, the second safe root of trust of the second running environment correspondence.
Alternatively, processor 510 specifically for:The described first default application is obtained from the described first default application only One identity;Described first is obtained from the database of the target operating environment and presets the corresponding default unique identities of application Mark;Compare the unique identity and the default unique identity of the carrying, so as to the described first default application Carry out proof of identity;Wherein, if the unique identity of the carrying is identical with the default unique identity, it is identified as Proof of identity passes through;If the unique identity of the carrying is differed with the default unique identity, body is identified as Part verification failure.
Alternatively, the described first default application correspondence first key pair, first secret key pair include the first public key and First private key, the second secret key pair of the target operating environment correspondence, second secret key pair includes the second public key and the second private Key;
Processor 510 is additionally operable to:First message is sent to close pipe server by the described first default application;Receive described The second message that close pipe server is sent according to first message;Wherein, second message is adopted by the close pipe server Corresponding first private key of application is preset with described first to sign to first message, and uses the target operating environment The second public key first message after signature be encrypted obtained;The target operating environment is controlled to use the target Second message is decrypted corresponding second private key of running environment, and using the described first default application corresponding the One public key carries out sign test to second message after decryption;Wherein, if sign test success, is identified as proof of identity and passes through;If Sign test fails, then is identified as proof of identity failure.
Alternatively, the unique identity includes the bag name of the first default application or calculated by Message Digest 5 The digital signature arrived.
Such scheme, if terminal detects the predetermined registration operation that triggering starts the first default application, obtains described first pre- If the mark of application;The information security grade of the described first default application is determined according to the mark of the described first default application;It is logical Cross described information safe class corresponding target operating environment and proof of identity is carried out to the described first default application;Wherein, it is described Target operating environment is one of them at least two mutually isolated running environment;If proof of identity passes through, pass through institute State the default application of target operating environment operation described first.Due to detecting the predetermined registration operation of the default application of triggering startup first When, when the default application of verification first allows the default application of operation for its corresponding target operating environment, pass through object run The default application of environment operation first;When recognizing the first default application message and being maliciously tampered, terminal is not run first and preset Using, with prevent because operation be maliciously tampered information default application cause privacy information for revealing the default application.Terminal By setting at least two mutually isolated running environment, the default application of different information security grades operates at least two phases The running environment mutually isolated, to prevent from carrying out the data interaction phase between the different two or more application programs of information security grade Between call the privacy information of user, and cause the situation of information leakage, it is possible to increase the safety and reliability of data in terminal.
Terminal can carry out proof of identity using different identity verification methods to the first default application, to improve identity school The degree of accuracy tested.
It should be appreciated that in embodiments of the present invention, alleged processor 510 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 520 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 530 can include display (LCD etc.), loudspeaker etc..
The memory 540 can include read-only storage and random access memory, and to processor 510 provide instruction and Data.The a part of of memory 540 can also include nonvolatile RAM.For example, memory 540 can also be deposited Store up the information of device type.
In the specific implementation, processor 510, input equipment 520, the output equipment 530 described in the embodiment of the present invention can Perform the reality described in the first embodiment and second embodiment of the method for control application program provided in an embodiment of the present invention Existing mode, also can perform the implementation of the terminal described by the embodiment of the present invention, will not be repeated here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specially Industry technical staff can realize described function to each specific application using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
, can be by it in several embodiments provided herein, it should be understood that disclosed terminal and method Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, mechanical or other forms are connected.
Step in present invention method can be sequentially adjusted, merged and deleted according to actual needs.
Unit in terminal of the embodiment of the present invention can be combined, divided and deleted according to actual needs.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, it can be stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially The part contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are to cause a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

1. a kind of method for controlling application program, it is characterised in that methods described includes:
If detecting the predetermined registration operation that triggering starts the first default application, the mark of the described first default application is obtained;
The information security grade of the described first default application is determined according to the mark of the described first default application;
Proof of identity is carried out to the described first default application by the corresponding target operating environment of described information safe class;Its In, the target operating environment is one of them at least two mutually isolated running environment, the running environment and peace Full root of trust is corresponded;
If proof of identity passes through, the described first default application is run by the target operating environment.
2. according to the method described in claim 1, it is characterised in that the number of the running environment is two, described to pass through institute State information security grade corresponding target operating environment and proof of identity is carried out to the described first default application, including:
If the described first default application correspondence first information safe class, answered by the way that the first running environment is default to described first With carrying out proof of identity;
If described first the second information security grade of default application correspondence, answered by the way that the second running environment is default to described first With carrying out proof of identity;Wherein, the first safe root of trust of first running environment correspondence, the second running environment correspondence the Two safe root of trusts;
If the proof of identity passes through, the described first default application is run by the target operating environment, including:
If first running environment carries out proof of identity to the described first default application, and proof of identity passes through, then passes through institute State the default application of the first running environment operation described first;
If second running environment carries out proof of identity to the described first default application, and proof of identity passes through, then passes through institute State the default application of the second running environment operation described first.
3. method according to claim 1 or 2, it is characterised in that described to pass through the corresponding mesh of described information safe class Mark running environment carries out proof of identity to the described first default application to be included:
The unique identity of the described first default application is obtained from the described first default application;
Described first is obtained from the database of the target operating environment and presets the corresponding default unique identity of application;
Compare the unique identity of the carrying and the default unique identity, thus it is default to described first apply into Row proof of identity;
Wherein, if the unique identity of the carrying is identical with the default unique identity, it is identified as proof of identity Pass through;If the unique identity of the carrying is differed with the default unique identity, proof of identity mistake is identified as Lose.
4. method according to claim 3, it is characterised in that the described first default application correspondence first key pair, described First secret key pair includes the first public key and the first private key, and the target operating environment corresponds to the second secret key pair, and described second is secret Key is to including the second public key and the second private key;
It is described that proof of identity is carried out to the described first default application by the corresponding target operating environment of described information safe class Including:
First message is sent to close pipe server by the described first default application;
Receive the second message that the close pipe server is sent according to first message;Wherein, second message is by described Close pipe server presets corresponding first private key of application using described first and first message is signed, and using described Second public key of target operating environment is encrypted to first message after signature and obtained;
The target operating environment is controlled to be carried out using corresponding second private key of the target operating environment to second message Decryption, and corresponding first public key of application is preset to second message progress sign test after decryption using described first;
Wherein, if sign test success, is identified as proof of identity and passes through;If sign test fails, proof of identity failure is identified as.
5. method according to claim 3, it is characterised in that the unique identity includes the bag of the first default application Name calculates obtained digital signature by Message Digest 5.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, if starting the predetermined registration operation of the first default application for detecting triggering, obtain described first it is default should Mark;
Determining unit, information security for determining the described first default application according to the mark of the described first default application etc. Level;
Proof of identity unit, for being applied by the way that the corresponding target operating environment of described information safe class is default to described first Carry out proof of identity;Wherein, the target operating environment is one of them at least two mutually isolated running environment, institute Running environment is stated to correspond with safe root of trust;
Control unit, if passing through for proof of identity, the described first default application is run by the target operating environment.
7. terminal according to claim 6, it is characterised in that the number of the running environment is two,
The proof of identity unit specifically for:If the described first default application correspondence first information safe class, by the One running environment carries out proof of identity to the described first default application;If described first second information security of default application correspondence etc. Level, then carry out proof of identity by the second running environment to the described first default application;Wherein, the first running environment correspondence First safe root of trust, the second safe root of trust of the second running environment correspondence;
Described control unit specifically for:If first running environment carries out proof of identity to the described first default application, and Proof of identity passes through, then runs the described first default application by first running environment;If second running environment pair Described first default application carries out proof of identity, and proof of identity passes through, then runs described the by second running environment One default application.
8. the terminal according to claim 6 or 7, it is characterised in that the proof of identity unit includes:
Identity acquiring unit, the unique identities mark for obtaining the described first default application from the described first default application Know;
Default identity acquiring unit:For obtaining the described first default application from the database of the target operating environment Corresponding default unique identity;
Comparing unit, unique identity and the default unique identity for comparing the carrying, so as to described First default application carries out proof of identity;
Wherein, if the unique identity of the carrying is identical with the default unique identity, it is identified as proof of identity Pass through;If the unique identity of the carrying is differed with the default unique identity, proof of identity mistake is identified as Lose.
9. terminal according to claim 8, it is characterised in that the described first default application correspondence first key pair, described First secret key pair includes the first public key and the first private key, and the target operating environment corresponds to the second secret key pair, and described second is secret Key is to including the second public key and the second private key;
The proof of identity unit also includes:
Packet sending unit, for sending the first message to close pipe server by the described first default application;
Message receiving unit, for receiving the second message that the close pipe server is sent according to first message;Wherein, institute The second message is stated to enter first message using corresponding first private key of the described first default application by the close pipe server Go and sign, and use the second public key of the target operating environment that first message after signature is encrypted and obtain;
Sign test unit, for controlling the target operating environment using corresponding second private key of the target operating environment to described Second message is decrypted, and presets corresponding first public key of application to second message after decryption using described first Carry out sign test;
Wherein, if sign test success, is identified as proof of identity and passes through;If sign test fails, proof of identity failure is identified as.
10. terminal according to claim 8, it is characterised in that the unique identity includes the first default application Bag name calculates obtained digital signature by Message Digest 5.
CN201710281466.7A 2017-04-25 2017-04-25 A kind of method and terminal of control application program Withdrawn CN107169343A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710281466.7A CN107169343A (en) 2017-04-25 2017-04-25 A kind of method and terminal of control application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710281466.7A CN107169343A (en) 2017-04-25 2017-04-25 A kind of method and terminal of control application program

Publications (1)

Publication Number Publication Date
CN107169343A true CN107169343A (en) 2017-09-15

Family

ID=59812305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710281466.7A Withdrawn CN107169343A (en) 2017-04-25 2017-04-25 A kind of method and terminal of control application program

Country Status (1)

Country Link
CN (1) CN107169343A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107919960A (en) * 2017-12-04 2018-04-17 北京深思数盾科技股份有限公司 The authentication method and system of a kind of application program
CN108595942A (en) * 2018-04-12 2018-09-28 Oppo广东移动通信有限公司 Application program safety control method and device, mobile terminal and storage medium
CN108846310A (en) * 2018-04-28 2018-11-20 Oppo广东移动通信有限公司 Image processing method, device, electronic equipment and computer readable storage medium
CN108985255A (en) * 2018-08-01 2018-12-11 Oppo广东移动通信有限公司 Data processing method, device, computer readable storage medium and electronic equipment
CN108985062A (en) * 2018-07-06 2018-12-11 Oppo(重庆)智能科技有限公司 File transfer control method, device and equipment
WO2019205888A1 (en) * 2018-04-28 2019-10-31 Oppo广东移动通信有限公司 Image processing method and apparatus, electronic device, and storage medium
CN112905258A (en) * 2021-02-05 2021-06-04 杭州天宽科技有限公司 Mobile terminal application safety starting method
US11157605B2 (en) 2018-04-12 2021-10-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Security control method and device of application, and electronic device
US11373445B2 (en) 2018-08-01 2022-06-28 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and apparatus for processing data, and computer readable storage medium
CN119004422A (en) * 2024-08-08 2024-11-22 北京建恒信安科技有限公司 Hierarchical identity verification method and device and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104537537A (en) * 2014-12-24 2015-04-22 深圳市小兵智能科技有限公司 Safety payment method based on Android system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104537537A (en) * 2014-12-24 2015-04-22 深圳市小兵智能科技有限公司 Safety payment method based on Android system

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107919960A (en) * 2017-12-04 2018-04-17 北京深思数盾科技股份有限公司 The authentication method and system of a kind of application program
CN108595942B (en) * 2018-04-12 2019-12-10 Oppo广东移动通信有限公司 Application security control method, device, mobile terminal, and storage medium
CN108595942A (en) * 2018-04-12 2018-09-28 Oppo广东移动通信有限公司 Application program safety control method and device, mobile terminal and storage medium
US11157605B2 (en) 2018-04-12 2021-10-26 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Security control method and device of application, and electronic device
CN112668547A (en) * 2018-04-28 2021-04-16 Oppo广东移动通信有限公司 Image processing method, image processing device, electronic equipment and computer readable storage medium
WO2019205888A1 (en) * 2018-04-28 2019-10-31 Oppo广东移动通信有限公司 Image processing method and apparatus, electronic device, and storage medium
CN108846310B (en) * 2018-04-28 2021-02-02 Oppo广东移动通信有限公司 Image processing method, image processing device, electronic equipment and computer readable storage medium
CN108846310A (en) * 2018-04-28 2018-11-20 Oppo广东移动通信有限公司 Image processing method, device, electronic equipment and computer readable storage medium
CN108985062A (en) * 2018-07-06 2018-12-11 Oppo(重庆)智能科技有限公司 File transfer control method, device and equipment
CN108985062B (en) * 2018-07-06 2020-12-15 Oppo(重庆)智能科技有限公司 File transmission control method, device and equipment
CN108985255A (en) * 2018-08-01 2018-12-11 Oppo广东移动通信有限公司 Data processing method, device, computer readable storage medium and electronic equipment
CN108985255B (en) * 2018-08-01 2021-05-18 Oppo广东移动通信有限公司 Data processing method and device, computer readable storage medium and electronic equipment
US11373445B2 (en) 2018-08-01 2022-06-28 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Method and apparatus for processing data, and computer readable storage medium
CN112905258A (en) * 2021-02-05 2021-06-04 杭州天宽科技有限公司 Mobile terminal application safety starting method
CN119004422A (en) * 2024-08-08 2024-11-22 北京建恒信安科技有限公司 Hierarchical identity verification method and device and electronic equipment

Similar Documents

Publication Publication Date Title
CN107169343A (en) A kind of method and terminal of control application program
CN107704765A (en) A kind of interface access method, server and computer-readable recording medium
CN107480519A (en) A kind of method and server for identifying risk application
CN107786328A (en) A kind of method, service node device and computer-readable medium for generating key
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
CN106778130B (en) Message display method, display device and mobile terminal
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107038369A (en) The method and terminal of a kind of resources accessing control
CN101398875A (en) Software publisher trust extension application
CN106357672A (en) Login method and terminal
CN107466031A (en) A kind of method and terminal for protecting data
CN107612901A (en) One kind applies encryption method and terminal
CN107086984A (en) A kind of method, terminal and server for obtaining and generating identifying code
CN106355059A (en) Password input method and terminal
CN107592636A (en) A kind of method of processing information, terminal and server
CN106815518B (en) Application installation method and electronic equipment
CN107608724A (en) A kind of method, terminal and computer-readable recording medium for managing application program
CN106603510A (en) Data processing method and terminal
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN106686585A (en) Binding method and system
CN106209853A (en) The login method of a kind of application program and terminal
CN107864039A (en) A kind of application signature method, terminal and computer-readable recording medium
CN106446683A (en) Detection method for malignant program and terminal
CN108229210A (en) A kind of method, terminal and computer readable storage medium for protecting data
CN106657574A (en) SOS method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20170915