CN106228085A - The method for secret protection of application program and mobile terminal - Google Patents
The method for secret protection of application program and mobile terminal Download PDFInfo
- Publication number
- CN106228085A CN106228085A CN201610599434.7A CN201610599434A CN106228085A CN 106228085 A CN106228085 A CN 106228085A CN 201610599434 A CN201610599434 A CN 201610599434A CN 106228085 A CN106228085 A CN 106228085A
- Authority
- CN
- China
- Prior art keywords
- application icon
- secret protection
- application program
- application
- icon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides method for secret protection and the mobile terminal of a kind of application program, and described method includes: the first touch control operation on application icon shown by monitoring current display interface;If the first touch control operation on shown application icon and the operation of the first preset touch match, then the application program that described application icon is corresponding is carried out secret protection setting.This method to set up directly can carry out input operation on application icon and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve prior art and application program carries out the loaded down with trivial details problem of process that secrecy is arranged.
Description
Technical field
The present invention relates to the Display Technique field of application icon, refer in particular to a kind of application program method for secret protection and
Mobile terminal.
Background technology
During the use of mobile device, the demand of the most protected privacy of a lot of users, such as download a chat
Software, but be not intended to other people and know that he is using this application program or is being not intended to other people and can arbitrarily check the tool of this application program
Internal appearance, is now accomplished by that this application program carries out secrecy and arranges.Some mobile device existing possesses similar safe cabinet or answers
With lock function, during i.e. user's safe cabinet to be entered or application lock are arranged, it would be desirable to carrying out secrecy arrange application program letter
Breath adds in safe cabinet or application lock, makes user can not arbitrarily check the application program added in safe cabinet or application lock.
Although safe cabinet or application lock can reach user, and application program carries out the purpose that secrecy is arranged, but actually used
Step of getting up is cumbersome, it has not been convenient to.
Summary of the invention
The purpose of technical solution of the present invention is to provide method for secret protection and the mobile terminal of a kind of application program, solves existing
Have in technology and application program is carried out the cumbersome problem of process that secrecy is arranged.
The present invention provides the method for secret protection of a kind of application program, and wherein, described method includes:
The first touch control operation on application icon shown by monitoring current display interface;
If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application
The application program that icon is corresponding carries out secret protection.
Another aspect of the present invention also provides for a kind of mobile terminal, wherein, and including:
First monitoring modular, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module, if the first touch control operation on shown application icon and the first preset touch operation phase
Coupling, then carry out secret protection setting to the application program that described application icon is corresponding.
The method for secret protection of application program described in the specific embodiment of the invention and mobile terminal have following Advantageous
Effect:
Operate, when monitoring for the first preset touch that application program is carried out secret protection setting by presetting
Touch control operation and the first preset touch on application icon operate when matching, it is determined that application program is carried out hidden by user's input
The instruction of private protection setting, the corresponding program performing application icon chosen to user carries out the step of secret protection setting.Should
Method directly can carry out input operation on application icon and perform, simple to operation, it is not necessary to carries out safe cabinet or answers
Arrange with lock, thus solve prior art and application program is carried out the loaded down with trivial details problem of process that secrecy is arranged.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention
The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only some enforcements of the present invention
Example, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to these accompanying drawings
Obtain other accompanying drawing.
Fig. 1 represents the schematic flow sheet of the method for secret protection of application program described in first embodiment of the invention;
Fig. 2 represents the schematic flow sheet of the method for secret protection of application program described in second embodiment of the invention;
Fig. 3 represents the schematic flow sheet of the method for secret protection of application program described in third embodiment of the invention;
Fig. 4 represents the schematic flow sheet of the method for secret protection of application program described in fourth embodiment of the invention;
Fig. 5 represents the schematic flow sheet of the method for secret protection of application program described in fifth embodiment of the invention;
Fig. 6 represents one of structural representation of mobile terminal described in sixth embodiment of the invention;
Fig. 7 represents the two of the structural representation of mobile terminal described in sixth embodiment of the invention;
Fig. 8 represents the structured flowchart of mobile terminal described in seventh embodiment of the invention;
Fig. 9 represents the structured flowchart of mobile terminal described in eighth embodiment of the invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the present invention below with reference to accompanying drawings.Although accompanying drawing shows the present invention
Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention and should be by embodiments set forth here
Limited.On the contrary, it is provided that these embodiments are able to be best understood from the present invention, and can be by the scope of the present invention
Complete conveys to those skilled in the art.
First embodiment
The method for secret protection of application program described in first embodiment, as it is shown in figure 1, described method includes:
Step 101, monitors the first touch control operation on application icon shown by current display interface;
Specifically, current display interface is the standby desktop of mobile terminal, shows the application icon of multiple application program.
When clicking a wherein application icon at standby desktop, mobile terminal starts the application program that execution is corresponding with application icon.
Such as, the standby desktop of current display interface shows the application icon of the application programs such as corresponding wechat, QQ and Taobao, works as a little
When selecting the application icon of wechat, enter wechat startup interface.
The method to set up of application icon of the present invention, by step 101, shown application in monitoring current display interface
Whether touch control operation is there is on icon.
Step 102 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right
The application program that described application icon is corresponding carries out secret protection setting.
Use the method for the invention, be provided for starting the preset touch operation of application program and for application program
Application icon to carry out preset touch operation (first preset touch operation) that secrecy arranges be difference, when by step 101, prison
Surveying and there is the first touch control operation on shown application icon in current display interface, this first touch control operation enters with to application icon
When the first preset touch operation that row secrecy is arranged matches, it is determined that user's input is the application to selected application icon
Program carries out the instruction of secret protection setting, and the application program of selected application icon is carried out secrecy setting.
Such as, the first preset touch operation can be the double click operation being less than Preset Time interval time, when monitoring the
When one touch control operation is the double click operation on application icon, determine that needing that application icon carries out secrecy is arranged;Or be
Pressing operation on application icon, in order to match with the pressing operation action starting application program, when the first preset touch is grasped
During as pressing operation, it can be the pressing reaching to preset pressing parameter;So when monitoring the first touch control operation in application
Pressing operation on icon, and when pressing parameter reaches to preset pressing parameter, determine and need the application journey corresponding to application icon
Sequence carries out secret protection setting.
It is preferred that the first preset touch operation carrying out secrecy setting corresponding to the application program of different application icon is permissible
For difference, specifically can preset.
The method for secret protection of application program described in first embodiment of the invention, by presetting for application icon
Application program carry out the first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and first pre-
If touch control operation matches, it is determined that user's input carries out the finger of secret protection setting to the application program that application icon is corresponding
Order, the application program performing application icon chosen to user carries out the step that secrecy is arranged.This method to set up can directly exist
Carry out input operation on application icon and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve
Certainly prior art carries out the loaded down with trivial details problem of process of secret protection setting to the application program of application icon.
Second embodiment
As in figure 2 it is shown, the method for secret protection of application program specifically includes described in the second embodiment:
Step 201, monitors the first touch control operation on application icon shown by current display interface.
Step 202 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right
Described application icon is hidden.
The method for secret protection of application program described in second embodiment of the invention, by presetting for application icon
Carry out the first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and the first preset touch operate
When matching, it is determined that user's input carries out the instruction of secret protection setting to application icon, and this carries out secret protection setting
Mode is by hiding the application icon that the first touch control operation is chosen in current display interface.
Use this kind of mode, by application icon input and the first preset touch being operated phase in current display interface
The touch control operation joined, i.e. can be hidden application icon in current display interface, and mode of operation is simple and convenient.
It addition, it is preferred that in order to ensure that the action that application icon is hidden arrange will not produce maloperation, in step
In 202, before hiden application icon, it is also possible to include step:
Output prompting user will the prompting message of hiden application icon;
After receiving the confirmation instruction that user inputs on prompting message, application icon is hidden.
Additionally, identical with first embodiment, the first application icon is carried out described the first of secret protection setting and presets tactile
Control operation can be the double click operation on described application icon, or is the pressing operation on described application icon.Certainly,
Also can be not limited thereto.
3rd embodiment
As it is shown on figure 3, the method for secret protection of application program specifically includes described in the 3rd embodiment:
Step 301, monitors the first touch control operation on application icon shown by current display interface.
Step 3021, if the first touch control operation on shown application icon and the operation of the first preset touch match, then
Output prompting user's input is encrypted the display interface that password is arranged to the application program that described application icon is corresponding;
Step 3022, obtains the Crypted password of user's input, by right with described first application icon institute for described Crypted password
That answers application program is actuated for association.
The method to set up of application icon described in third embodiment of the invention, by presetting for carrying out application icon
The first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and the first preset touch operate phase
Timing, it is determined that user's input carries out the instruction that secrecy is arranged to application icon, this mode carrying out secrecy setting is:
Prompting user's input is encrypted the display interface that password is arranged to the application program that selected application icon is corresponding,
Make user according to suggested display interface, input Crypted password;After obtaining this Crypted password, by Crypted password with selected
Application program corresponding to application icon be actuated for association so that user taps this application icon after being encrypted, enter
During the corresponding application program of this application icon, user need to input can start after set Crypted password is verified into
Enter.
Use this kind of mode, by the input of selected application icon being grasped with the first preset touch in current display interface
Making the touch control operation matched, i.e. can enter the Crypted password setting steps of selected application icon, mode of operation is the most square
Just.
Additionally, identical with first embodiment, in the 3rd embodiment, the corresponding application program of application icon is carried out privacy guarantor
The described first preset touch operation protecting setting can be the double click operation on described application icon, or is in described application
Pressing operation on icon.Certainly, it is possible to be not limited thereto.
4th embodiment
In the method for secret protection of application program described in 4th embodiment, the application program that application icon is corresponding is protected
The described first preset touch operation of close setting for pressing operation, can include when utilizing pressing operation input pressing duration and by
The pressing parameter that pressure pressure value two kinds is different, by judging pressing parameter area when pressing operation inputs, can use difference
Set-up mode the application program that application icon is corresponding is carried out secret protection setting.
Specifically, as shown in Figure 4, the method for secret protection of application program described in the 4th embodiment specifically includes:
Step 401, monitors the first touch control operation on application icon shown by current display interface;
Step 4021, when the first touch control operation is the pressing operation on application icon, obtains the pressing of pressing operation
Parameter;
Step 4022, compares described pressing parameter with predefined parameter;
Wherein, described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
Step 4023, if the pressing parameter of the first touch control operation is more than predefined parameter, then corresponding to application icon application
Program carries out the first secrecy and arranges;
Step 4024, if the pressing parameter of the first touch control operation is less than predefined parameter, then corresponding to application icon application
Program carries out the second secrecy and arranges.
Specifically, the described first preset touch behaviour of secret protection setting is carried out when the application program corresponding to application icon
As pressing operation and for need the pressing operation meeting scheduled duration numerical value time, monitoring the first touch control operation be pressing operation
Time, need whether the pressing duration determining whether pressing operation is more than scheduled duration numerical value, if less than scheduled duration numerical value, then
The application program that application icon is corresponding carries out the first secrecy arrange, as being hidden by application icon;If more than pre-timing
Long numerical value, then carry out the second secrecy and arrange the application program that application icon is corresponding, arranges as prompting is encrypted password.
It is pressing behaviour when the application program corresponding to application icon carries out the described first preset touch operation of secrecy setting
When making and be to need the pressing operation meeting scheduled pressure value, when monitoring the first touch control operation and being pressing operation, need into one
Step judges whether the press pressure value of pressing operation is more than scheduled pressure value, if less than scheduled pressure value, then to application icon pair
The application program answered carries out the first secrecy and arranges, as being hidden by application icon;If more than scheduled pressure value, then to application
The application program that icon is corresponding carries out the second secrecy and arranges, and arranges as prompting is encrypted password.
Use the method for secret protection of application program described in fourth embodiment of the invention, by controlling inputted pressing operation
Pressing parameter different, secrecy can be carried out in different ways and arrange, thus increase user and carry out the selection that secrecy is arranged.
In the method for secret protection of application program described in above first to fourth embodiment, monitoring on application icon
Before first touch control operation, application icon is and did not carried out secret protection setting, namely first to fourth embodiment is only used for
Illustrate the application icon not carrying out secret protection setting is carried out the concrete mode of secret protection setting.
The present invention also provides for the method for secret protection of application program described in the 5th embodiment, illustrates carrying out secrecy setting
Application icon, also include releasing further the step that secrecy is arranged.
5th embodiment
As it is shown in figure 5, the method for secret protection of application program specifically includes described in the 5th embodiment:
Step 501, monitors the first touch control operation on application icon shown by current display interface.
Step 502 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right
The application program that described first application icon is corresponding carries out secret protection setting.
By above-mentioned step 502 and step 501, with the step 102 of first embodiment and the execution process of step 101 with
Act on identical, carry out, for the application program corresponding to application icon, the first preset touch behaviour that secrecy is arranged by presetting
Make, when the touch control operation (the first touch control operation) monitored on application icon matches with the first preset touch operation, the most really
Determine user's input and the application program that application icon is corresponding is carried out the instruction of secret protection setting, perform application chosen to user
Icon carries out the step of secret protection setting.This method to set up directly can carry out input operation on application icon and perform,
Simple to operation.
Further, the method for secret protection of application program described in the 5th embodiment the most also includes:
Step 503, the second touch control operation in monitoring current display interface;
Step 504, if described second touch control operation and the operation of the second preset touch match, then releases described application icon
Secret protection arrange.
In above-mentioned step 504, the second preset touch operation is set in advance for releasing the dynamic of secret protection setting
Make, such as when application icon carries out the mode of secret protection setting for making the first application icon hide, when application icon is in
When secret protection arranges state, current display interface does not show that this application icon, now the second preset touch operation can be
The double click operation on a white space in current display interface, or be the pressing behaviour reaching scheduled duration or predetermined pressure
Make.When the second touch control operation that user is inputted and the second preset touch operate and match, then release the hidden of this application icon
Private protection setting, makes this application icon again show in current display interface.
The most such as, when the mode that application icon carries out secret protection setting is arranged for being encrypted cryptoguard, when
This application icon is in secret protection when arranging state, and current display interface exists and shows this application icon, now second presets
Touch control operation can be the operation on this application icon, such as double click operation, or for reaching scheduled duration or predetermined pressure
Pressing operation is preferably identical with the first preset touch operation that application icon carries out secret protection setting.When user institute is defeated
When the second touch control operation entered and the operation of the second preset touch match, after prompting user's input validation password, releasing should to this
Arrange with the secret protection of application program corresponding to icon.
Sixth embodiment
Sixth embodiment of the invention provides a kind of mobile terminal, refering to Fig. 6 and combine shown in Fig. 7, and described mobile terminal 600
Including:
First monitoring modular 601, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module 602, if the first touch control operation on shown application icon and the first preset touch behaviour
Work matches, then the program program that described application icon is corresponding is carried out secret protection setting.
Described mobile terminal is by presetting carry out that secrecy is arranged for the application program corresponding to application icon the
One preset touch operation, when the touch control operation monitored on application icon and the first preset touch operate and match, it is determined that
User's input carries out the instruction of secret protection setting to the application program of application icon, performs application icon pair chosen to user
The application program answered carries out the step of secret protection setting.This method to set up directly can carry out input operation on application icon
And perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve prior art and application program is entered
The loaded down with trivial details problem of process that row secrecy is arranged.
Alternatively, described mobile terminal 600 also includes:
Second monitoring modular 603, for monitoring the second touch control operation in current display interface;
Second arranges module 604, if matching for described second touch control operation and the operation of the second preset touch, then releases
The secret protection of the application program that described application icon is corresponding is arranged.
Arranging module 604 by arranging the second monitoring modular 603 and second, user can answer carrying out secrecy setting
Release secret protection with icon to arrange.
Alternatively, first module 602 be set include:
Icon hiding unit 6021, for described application icon being hidden or including:
Output unit 6022, is encrypted, for exporting prompting user's input, the display that password is arranged to described application icon
Interface;
Password acceptance unit 6023, for obtaining the Crypted password of user's input, by described Crypted password and described application
Application program corresponding to icon be actuated for association.
Arranging module 602 by first, the mode can being hidden application icon carries out secret protection setting, or
The mode of input Crypted password is used to carry out secret protection setting the starting of application program of application icon.
Wherein, the most described first preset touch operation is double click operation on described application icon, or be
Pressing operation on described application icon.
If described first preset touch operation is the pressing operation on described application icon, alternatively, described first sets
Put module 602 to include:
First arranges unit 6024, if the pressing parameter for described first touch control operation is more than predefined parameter, to described
The application program that application icon is corresponding carries out the first secrecy and arranges;
Second arranges unit 6025, if the pressing parameter for described first touch control operation is less than described predefined parameter, then
The application program that described application icon is corresponding carries out the second secrecy arrange;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
Using above-mentioned first to arrange unit 6024 and second and arrange unit 6025, user can be inputted by control and be pressed
The pressing parameter of press operation is different, can carry out secret protection setting in different ways, thus increase user and carry out privacy
The selection of protection setting.
Using mobile terminal described in the embodiment of the present invention, user is without entering special safe cabinet or application lock to application drawing
Mark carries out secrecy and arranges, swift and convenient to operate.
7th embodiment
As shown in Figure 8, for the structured flowchart of mobile terminal of the embodiment of the present invention.This is illustrated below in conjunction with this figure
The application entity of the method to set up of bright application icon.
Mobile terminal as shown in Figure 8 includes: at least one processor 801, memorizer 802, take pictures assembly 803 and user
Interface 804.Wherein, assembly 803 of taking pictures includes different the first photographic head of photosensitive sensitivity and second camera.Mobile terminal
Each assembly in 800 is coupled by bus system 805.It is understood that bus system 805 be used for realizing these assemblies it
Between connection communication.Bus system 805, in addition to including data/address bus, also includes power bus, controls bus and status signal
Bus.But for the sake of understanding explanation, in fig. 8 various buses are all designated as bus system 805.
Wherein, user interface 804 can include display or pointing device (such as touch-sensitive plate or touch screen etc..
The memorizer 802 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memorizer 802 of system and method described herein be intended to include but not limited to these and arbitrarily its
It is suitable for the memorizer of type.
In some embodiments, memorizer 802 stores following element, executable module or data structure, or
Their subset of person, or their superset: operating system 8021 and application program 8022.
Wherein, operating system 8021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for
Realize various basic business and process hardware based task.Application program 8022, comprises various application program, such as media
Player (Media Player), browser (Browser) etc., be used for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 8022.
In an embodiment of the present invention, by calling program or the instruction of memorizer 802 storage, specifically, can be should
With the program stored in program 8022 or instruction.Wherein, processor 801 is used for monitoring application icon shown by current display interface
On the first touch control operation;If the first touch control operation on shown application icon and the operation of the first preset touch match, then
The application program that described application icon is corresponding is carried out secret protection setting.
The method that the invention described above embodiment discloses can apply in processor 801, or is realized by processor 801.
Processor 801 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 801 or software form.Above-mentioned process
Device 801 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) or other PLD, discrete gate or transistor logic,
Discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General
The processor etc. that processor can be microprocessor or this processor can also be any routine.In conjunction with embodiment of the present invention institute
The step of disclosed method can be embodied directly in hardware decoding processor and perform, or with the hardware in decoding processor
And software module combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme read-only
In the storage medium that this areas such as memorizer or electrically erasable programmable memorizer, depositor are ripe.This storage medium is positioned at
Memorizer 802, processor 801 reads the information in memorizer 802, completes the step of said method in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its
Combination realizes.Realizing for hardware, processing unit can be implemented in one or more special IC (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
Controller, microcontroller, microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can be realized herein by the module (such as process, function etc.) performing function described herein
Described technology.Software code is storable in performing in memorizer and by processor.Memorizer can within a processor or
Processor is outside to be realized.
Specifically, processor 801 is additionally operable to: after described application icon carrying out secrecy and arranges, monitor currently displaying
The second touch control operation on interface;If described second touch control operation and the operation of the second preset touch match, then release described answering
Arrange with the secret protection of application program corresponding to icon.
Specifically, processor 801 is additionally operable to: described application icon carries out secrecy when arranging, is entered by described application icon
Row is hidden.
Specifically, processor 801 is additionally operable to: output prompting user's input is encrypted password and arranges described application icon
Display interface;Obtain the Crypted password of user's input, by application program corresponding to described Crypted password and described application icon
Be actuated for association.
Specifically, processor 801 is additionally operable to: if described first preset touch operation is the pressing on described application icon
Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described
The step carrying out secret protection with icon includes: if the pressing parameter of described first touch control operation is more than predefined parameter, to described
The application program that application icon is corresponding carries out the first secrecy and arranges.
Specifically, processor 801 is additionally operable to: if described first preset touch operation is the pressing on described application icon
Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described
The step carrying out secret protection with icon includes: if the pressing parameter of described first touch control operation is less than predefined parameter, then to institute
State application program corresponding to the first application icon and carry out the second secrecy setting;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
The mobile terminal 800 of the embodiment of the present invention, by presetting for carrying out hidden to the application program of application icon
First preset touch operation of private protection setting, when the touch control operation monitored on application icon and the first preset touch operate phase
During coupling, it is determined that user's input carries out the instruction of secret protection setting to the application program that application icon is corresponding, perform to
The application program of the chosen application icon in family carries out the step of secret protection setting.This method to set up can be directly at application icon
On carry out input operation and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve existing skill
Art carries out the loaded down with trivial details problem of process that secrecy is arranged to application program.
8th embodiment
Fig. 9 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 9
900 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric
Brain etc..
Mobile terminal 900 in Fig. 9 includes power supply 910, memorizer 920, input block 930, display unit 940, takes pictures
Assembly 950, processor 960, WIFI (Wireless Fidelity) module 970, voicefrequency circuit 980 and RF circuit 990, wherein,
Assembly 950 of taking pictures includes different the first photographic head of photosensitive sensitivity and second camera, and specifically, the first photographic head is colored
Photographic head, second camera is black and white photographic head.
Wherein, input block 930 can be used for receiving the information of user's input, and produces the user with mobile terminal 900
Arrange and function controls relevant signal input.Specifically, in the embodiment of the present invention, this input block 930 can include touching
Control panel 931.Contact panel 931, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user
Use any applicable object such as finger, stylus or adnexa operation on contact panel 931), and according to journey set in advance
Formula drives corresponding attachment means.Optionally, contact panel 931 can include touch detecting apparatus and two portions of touch controller
Point.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings, transmit a signal to
Touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives
This processor 960, and order that processor 960 sends can be received and performed.Furthermore, it is possible to use resistance-type, condenser type,
The polytype such as infrared ray and surface acoustic wave realizes contact panel 931.
Wherein, display unit 940 can be used for showing the information inputted by user or the information being supplied to user and movement
The various menu interfaces of terminal.Display unit 940 can include display floater 941, optionally, can use LCD or organic light emission
The forms such as diode (Organic Light-Emitting Diode, OLED) configure display floater 941.
It should be noted that contact panel 931 can cover display floater 941, formed and touch display screen, when this touch display screen is examined
Measure thereon or after neighbouring touch operation, send processor 960 to determine the type of touch event, with preprocessor
960 provide corresponding visual output according to the type of touch event on touch display screen.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area
And the arrangement mode of this conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can be distinguished two and show
Show the arrangement mode in district.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible
The interface elements such as the icon and/or the widget desktop control that comprise at least one application program.This Application Program Interface viewing area
It can also be the empty interface not comprising any content.This conventional control viewing area is for showing the control that utilization rate is higher, such as,
The application icons etc. such as settings button, interface numbering, scroll bar, phone directory icon.
Wherein processor 960 is the control centre of mobile terminal, utilizes each of various interface and the whole mobile phone of connection
Individual part, is stored in the software program in first memory 921 and/or module by running or performing, and calls and be stored in
Data in second memory 922, perform the various functions of mobile terminal and process data, thus mobile terminal is carried out entirety
Monitoring.Optionally, processor 960 can include one or more processing unit.
In embodiments of the present invention, by call the software program and/or module stored in this first memory 921 and/
To the data in second memory 922, processor 960 touches for monitoring on application icon shown by current display interface first
Control operation;If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application
The application program that icon is corresponding carries out secret protection setting.
Specifically, processor 960 is additionally operable to: after described application icon carrying out secrecy and arranges, monitor currently displaying
The second touch control operation on interface;If described second touch control operation and the operation of the second preset touch match, then release described answering
Arrange with the secret protection of application program corresponding to icon.
Specifically, processor 960 is additionally operable to: the application program that described application icon is corresponding is carried out secret protection setting
Time, described application icon is hidden.
Specifically, processor 960 is additionally operable to: the application program that described application icon is corresponding is carried out secret protection setting
Time, output prompting user's input is encrypted the display interface that password is arranged to described application icon;Obtain adding of user's input
Password, by application program corresponding to described Crypted password and described application icon be actuated for associate.
Specifically, processor 960 is additionally operable to: if described first preset touch operation is the pressing on described application icon
Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described
The step carrying out secret protection setting with the application program that icon is corresponding includes: if the pressing parameter of described first touch control operation is big
In predefined parameter, the application program that described application icon is corresponding is carried out the first secrecy and arranges.
Specifically, processor 960 is additionally operable to: if described first preset touch operation is the pressing on described application icon
Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described
The step carrying out secret protection setting with the application program that icon is corresponding includes: if the pressing parameter of described first touch control operation is little
In described predefined parameter, then the application program that described application icon is corresponding is carried out the second secrecy and arranges;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
The mobile terminal 900 of the embodiment of the present invention, by presetting for protecting the application program of application icon
First preset touch operation of close setting, matches when the touch control operation monitored on application icon and the first preset touch operate
Time, it is determined that user's input carries out the instruction of privacy settings setting to the application program that application icon is corresponding, performs user institute
The application program that application icon is corresponding is chosen to carry out the step of secret protection setting.This method to set up can be directly at application icon
On carry out input operation and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve existing skill
Art carries out the loaded down with trivial details problem of process that secrecy is arranged to application program.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes
Unit and algorithm steps, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These functions are actually
Perform with hardware or software mode, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel
Each specifically should being used for can be used different methods to realize described function, but this realization is it is not considered that exceed
The scope of the present invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description,
The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be passed through other
Mode realizes.Such as, device embodiment described above is only schematically, such as, the division of described unit, it is only
A kind of logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or
Person is desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed is mutual
Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication link
Connect, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, permissible
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words
The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter
Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual
People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.
And aforesaid storage medium includes: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can store program code
Medium.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, on the premise of without departing from principle of the present invention, it is also possible to make some improvements and modifications, these improvements and modifications are also
Should be regarded as protection scope of the present invention.
Claims (16)
1. the method for secret protection of an application program, it is characterised in that described method includes:
The first touch control operation on application icon shown by monitoring current display interface;
If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application icon
Corresponding application program carries out secret protection.
Method for secret protection the most according to claim 1, it is characterised in that in the application journey corresponding to described application icon
After sequence carries out secret protection setting, described method also includes:
The second touch control operation in monitoring current display interface;
If described second touch control operation and the operation of the second preset touch match, then release the application journey that described application icon is corresponding
The secret protection of sequence is arranged.
Method for secret protection the most according to claim 1, it is characterised in that the application program corresponding to described application icon
The step carrying out secrecy setting includes:
Described application icon is hidden.
Method for secret protection the most according to claim 1, it is characterised in that the application program corresponding to described application icon
The step carrying out secret protection setting includes:
Output prompting user's input is encrypted the display interface that password is arranged to described application icon;
Obtain the Crypted password of user's input, the startup of application program corresponding to described Crypted password and described application icon is entered
Row association.
Method for secret protection the most according to claim 1, it is characterised in that described first preset touch operation is for described
Double click operation on application icon or pressing operation.
Method for secret protection the most according to claim 5, it is characterised in that if described first preset touch operates as in institute
State the pressing operation on application icon, if the first touch control operation on shown application icon described in then and the first preset touch behaviour
Work matches, and the step that the application program that described application icon is corresponding carries out secret protection setting includes:
If the pressing parameter of described first touch control operation is more than predefined parameter, the application program that described application icon is corresponding is carried out
The first setting that maintains secrecy.
Method for secret protection the most according to claim 5, it is characterised in that if described first preset touch operates as in institute
State the pressing operation on application icon, if the first touch control operation on shown application icon described in then and the first preset touch behaviour
Work matches, and the step that described application icon carries out secret protection setting includes:
If the pressing parameter of described first touch control operation is less than predefined parameter, then the application program that described application icon is corresponding is entered
Row the second secrecy is arranged.
8. according to the method for secret protection described in claim 6 or 7, it is characterised in that
Described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or described pressing parameter is pressing
Force value, described predefined parameter is scheduled pressure value.
9. a mobile terminal, it is characterised in that including:
First monitoring modular, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module, if the first touch control operation on shown application icon and the first preset touch operation phase
Join, then the application program that described application icon is corresponding is carried out secret protection setting.
Mobile terminal the most according to claim 9, it is characterised in that described mobile terminal also includes:
Second monitoring modular, for monitoring the second touch control operation in current display interface;
Second arranges module, if matching for described second touch control operation and the operation of the second preset touch, then releases described answering
Arrange with the secret protection of application program corresponding to icon.
11. mobile terminals according to claim 9, it is characterised in that described first arranges module includes:
Icon hiding unit, for being hidden described application icon.
12. mobile terminals according to claim 9, it is characterised in that described first arranges module includes:
Output unit, is encrypted, for exporting prompting user's input, the display interface that password is arranged to described application icon;
Password acceptance unit, for obtaining the Crypted password of user's input, by right with described application icon institute for described Crypted password
That answers application program is actuated for association.
13. mobile terminals according to claim 9, it is characterised in that described first preset touch operation is for answering described
With the double click operation on icon or pressing operation.
14. mobile terminals according to claim 13, it is characterised in that if described first preset touch operation is for described
Pressing operation on application icon, the most described first arranges module includes:
First arranges unit, if the pressing parameter for described first touch control operation is more than predefined parameter, to described application icon
Corresponding application program carries out the first secrecy and arranges.
15. mobile terminals according to claim 13, it is characterised in that if described first preset touch operation is for described
Pressing operation on application icon, the most described first arranges module includes:
Second arranges unit, if the pressing parameter for described first touch control operation is less than predefined parameter, then and should to described first
Carry out the second secrecy with the application program that icon is corresponding to arrange;
16. according to the mobile terminal described in claims 14 or 15, it is characterised in that
Described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610599434.7A CN106228085B (en) | 2016-07-27 | 2016-07-27 | The method for secret protection and mobile terminal of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610599434.7A CN106228085B (en) | 2016-07-27 | 2016-07-27 | The method for secret protection and mobile terminal of application program |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106228085A true CN106228085A (en) | 2016-12-14 |
CN106228085B CN106228085B (en) | 2019-01-11 |
Family
ID=57534697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610599434.7A Active CN106228085B (en) | 2016-07-27 | 2016-07-27 | The method for secret protection and mobile terminal of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106228085B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682467A (en) * | 2016-12-20 | 2017-05-17 | 宇龙计算机通信科技(深圳)有限公司 | Hiding method for software, device and intelligent terminal |
CN108681664A (en) * | 2018-05-28 | 2018-10-19 | 维沃移动通信有限公司 | A kind of encryption method and device |
CN111045588A (en) * | 2019-11-29 | 2020-04-21 | 维沃移动通信有限公司 | Information viewing method and electronic equipment |
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
CN111279339A (en) * | 2017-08-29 | 2020-06-12 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN112380588A (en) * | 2020-11-17 | 2021-02-19 | 惠州Tcl移动通信有限公司 | Private information display method and device, storage medium and mobile terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130249843A1 (en) * | 2012-03-26 | 2013-09-26 | Kyocera Corporation | Device, method, and storage medium storing program |
CN105320898A (en) * | 2015-09-30 | 2016-02-10 | 联想(北京)有限公司 | Information processing method and system |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission controlling method and device for application programs |
CN105447399A (en) * | 2014-08-18 | 2016-03-30 | 北京壹人壹本信息科技有限公司 | Icon hiding method and apparatus |
-
2016
- 2016-07-27 CN CN201610599434.7A patent/CN106228085B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130249843A1 (en) * | 2012-03-26 | 2013-09-26 | Kyocera Corporation | Device, method, and storage medium storing program |
CN105447399A (en) * | 2014-08-18 | 2016-03-30 | 北京壹人壹本信息科技有限公司 | Icon hiding method and apparatus |
CN105320898A (en) * | 2015-09-30 | 2016-02-10 | 联想(北京)有限公司 | Information processing method and system |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission controlling method and device for application programs |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106682467A (en) * | 2016-12-20 | 2017-05-17 | 宇龙计算机通信科技(深圳)有限公司 | Hiding method for software, device and intelligent terminal |
CN111279339A (en) * | 2017-08-29 | 2020-06-12 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN111279339B (en) * | 2017-08-29 | 2023-07-21 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN108681664A (en) * | 2018-05-28 | 2018-10-19 | 维沃移动通信有限公司 | A kind of encryption method and device |
CN111045588A (en) * | 2019-11-29 | 2020-04-21 | 维沃移动通信有限公司 | Information viewing method and electronic equipment |
CN111045588B (en) * | 2019-11-29 | 2021-08-17 | 维沃移动通信有限公司 | Information viewing method and electronic equipment |
CN111125770A (en) * | 2019-12-27 | 2020-05-08 | 维沃移动通信有限公司 | Privacy protection method and electronic equipment |
CN112380588A (en) * | 2020-11-17 | 2021-02-19 | 惠州Tcl移动通信有限公司 | Private information display method and device, storage medium and mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN106228085B (en) | 2019-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106228085A (en) | The method for secret protection of application program and mobile terminal | |
CN106126077A (en) | A kind of application program image target display control method and mobile terminal | |
CN106020613A (en) | Operation method and mobile terminal for unread messages | |
CN106055195A (en) | Operating method for folder and mobile terminal | |
CN106445392A (en) | Operating method of status bar icon and mobile terminal | |
CN106127076A (en) | The inspection method of a kind of photograph album photo and mobile terminal | |
CN106951335A (en) | A kind of process guard method and mobile terminal | |
CN106055198A (en) | Method for displaying notifications based on content and mobile terminal | |
CN103076959A (en) | Electronic equipment and screen unlocking method thereof | |
CN106778389B (en) | A kind of loss detection method and mobile terminal of mobile terminal | |
CN106453925A (en) | Information transmission method and mobile terminals | |
CN106484301A (en) | A kind of method of hiden application and terminal | |
CN106357866A (en) | Contact list management method and mobile intelligent terminal | |
CN106325753A (en) | Payment interface display method and mobile terminal | |
CN106372470A (en) | Method for reminding of inputting password and mobile terminal | |
CN106503507A (en) | Method and mobile terminal that a kind of password shows | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN106503501A (en) | A kind of startup method of user model and mobile terminal | |
CN106227453A (en) | The control method of a kind of mobile terminal and mobile terminal | |
CN106991319A (en) | The right management method and mobile terminal of a kind of application program | |
CN106210231A (en) | A kind of method of information processing and mobile terminal | |
CN106371745A (en) | Interface switching method and mobile terminal | |
CN107329586A (en) | A kind of data inputting method, mobile terminal and computer-readable recording medium | |
CN106991306B (en) | A kind of method and mobile terminal inputting password | |
CN106156600A (en) | The unlocking method of a kind of application program and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |