CN106228085A - The method for secret protection of application program and mobile terminal - Google Patents

The method for secret protection of application program and mobile terminal Download PDF

Info

Publication number
CN106228085A
CN106228085A CN201610599434.7A CN201610599434A CN106228085A CN 106228085 A CN106228085 A CN 106228085A CN 201610599434 A CN201610599434 A CN 201610599434A CN 106228085 A CN106228085 A CN 106228085A
Authority
CN
China
Prior art keywords
application icon
secret protection
application program
application
icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610599434.7A
Other languages
Chinese (zh)
Other versions
CN106228085B (en
Inventor
璐句腹
贾丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610599434.7A priority Critical patent/CN106228085B/en
Publication of CN106228085A publication Critical patent/CN106228085A/en
Application granted granted Critical
Publication of CN106228085B publication Critical patent/CN106228085B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides method for secret protection and the mobile terminal of a kind of application program, and described method includes: the first touch control operation on application icon shown by monitoring current display interface;If the first touch control operation on shown application icon and the operation of the first preset touch match, then the application program that described application icon is corresponding is carried out secret protection setting.This method to set up directly can carry out input operation on application icon and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve prior art and application program carries out the loaded down with trivial details problem of process that secrecy is arranged.

Description

The method for secret protection of application program and mobile terminal
Technical field
The present invention relates to the Display Technique field of application icon, refer in particular to a kind of application program method for secret protection and Mobile terminal.
Background technology
During the use of mobile device, the demand of the most protected privacy of a lot of users, such as download a chat Software, but be not intended to other people and know that he is using this application program or is being not intended to other people and can arbitrarily check the tool of this application program Internal appearance, is now accomplished by that this application program carries out secrecy and arranges.Some mobile device existing possesses similar safe cabinet or answers With lock function, during i.e. user's safe cabinet to be entered or application lock are arranged, it would be desirable to carrying out secrecy arrange application program letter Breath adds in safe cabinet or application lock, makes user can not arbitrarily check the application program added in safe cabinet or application lock.
Although safe cabinet or application lock can reach user, and application program carries out the purpose that secrecy is arranged, but actually used Step of getting up is cumbersome, it has not been convenient to.
Summary of the invention
The purpose of technical solution of the present invention is to provide method for secret protection and the mobile terminal of a kind of application program, solves existing Have in technology and application program is carried out the cumbersome problem of process that secrecy is arranged.
The present invention provides the method for secret protection of a kind of application program, and wherein, described method includes:
The first touch control operation on application icon shown by monitoring current display interface;
If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application The application program that icon is corresponding carries out secret protection.
Another aspect of the present invention also provides for a kind of mobile terminal, wherein, and including:
First monitoring modular, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module, if the first touch control operation on shown application icon and the first preset touch operation phase Coupling, then carry out secret protection setting to the application program that described application icon is corresponding.
The method for secret protection of application program described in the specific embodiment of the invention and mobile terminal have following Advantageous Effect:
Operate, when monitoring for the first preset touch that application program is carried out secret protection setting by presetting Touch control operation and the first preset touch on application icon operate when matching, it is determined that application program is carried out hidden by user's input The instruction of private protection setting, the corresponding program performing application icon chosen to user carries out the step of secret protection setting.Should Method directly can carry out input operation on application icon and perform, simple to operation, it is not necessary to carries out safe cabinet or answers Arrange with lock, thus solve prior art and application program is carried out the loaded down with trivial details problem of process that secrecy is arranged.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below by institute in the description to the embodiment of the present invention The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is only some enforcements of the present invention Example, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to these accompanying drawings Obtain other accompanying drawing.
Fig. 1 represents the schematic flow sheet of the method for secret protection of application program described in first embodiment of the invention;
Fig. 2 represents the schematic flow sheet of the method for secret protection of application program described in second embodiment of the invention;
Fig. 3 represents the schematic flow sheet of the method for secret protection of application program described in third embodiment of the invention;
Fig. 4 represents the schematic flow sheet of the method for secret protection of application program described in fourth embodiment of the invention;
Fig. 5 represents the schematic flow sheet of the method for secret protection of application program described in fifth embodiment of the invention;
Fig. 6 represents one of structural representation of mobile terminal described in sixth embodiment of the invention;
Fig. 7 represents the two of the structural representation of mobile terminal described in sixth embodiment of the invention;
Fig. 8 represents the structured flowchart of mobile terminal described in seventh embodiment of the invention;
Fig. 9 represents the structured flowchart of mobile terminal described in eighth embodiment of the invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the present invention below with reference to accompanying drawings.Although accompanying drawing shows the present invention Exemplary embodiment, it being understood, however, that may be realized in various forms the present invention and should be by embodiments set forth here Limited.On the contrary, it is provided that these embodiments are able to be best understood from the present invention, and can be by the scope of the present invention Complete conveys to those skilled in the art.
First embodiment
The method for secret protection of application program described in first embodiment, as it is shown in figure 1, described method includes:
Step 101, monitors the first touch control operation on application icon shown by current display interface;
Specifically, current display interface is the standby desktop of mobile terminal, shows the application icon of multiple application program. When clicking a wherein application icon at standby desktop, mobile terminal starts the application program that execution is corresponding with application icon. Such as, the standby desktop of current display interface shows the application icon of the application programs such as corresponding wechat, QQ and Taobao, works as a little When selecting the application icon of wechat, enter wechat startup interface.
The method to set up of application icon of the present invention, by step 101, shown application in monitoring current display interface Whether touch control operation is there is on icon.
Step 102 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right The application program that described application icon is corresponding carries out secret protection setting.
Use the method for the invention, be provided for starting the preset touch operation of application program and for application program Application icon to carry out preset touch operation (first preset touch operation) that secrecy arranges be difference, when by step 101, prison Surveying and there is the first touch control operation on shown application icon in current display interface, this first touch control operation enters with to application icon When the first preset touch operation that row secrecy is arranged matches, it is determined that user's input is the application to selected application icon Program carries out the instruction of secret protection setting, and the application program of selected application icon is carried out secrecy setting.
Such as, the first preset touch operation can be the double click operation being less than Preset Time interval time, when monitoring the When one touch control operation is the double click operation on application icon, determine that needing that application icon carries out secrecy is arranged;Or be Pressing operation on application icon, in order to match with the pressing operation action starting application program, when the first preset touch is grasped During as pressing operation, it can be the pressing reaching to preset pressing parameter;So when monitoring the first touch control operation in application Pressing operation on icon, and when pressing parameter reaches to preset pressing parameter, determine and need the application journey corresponding to application icon Sequence carries out secret protection setting.
It is preferred that the first preset touch operation carrying out secrecy setting corresponding to the application program of different application icon is permissible For difference, specifically can preset.
The method for secret protection of application program described in first embodiment of the invention, by presetting for application icon Application program carry out the first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and first pre- If touch control operation matches, it is determined that user's input carries out the finger of secret protection setting to the application program that application icon is corresponding Order, the application program performing application icon chosen to user carries out the step that secrecy is arranged.This method to set up can directly exist Carry out input operation on application icon and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve Certainly prior art carries out the loaded down with trivial details problem of process of secret protection setting to the application program of application icon.
Second embodiment
As in figure 2 it is shown, the method for secret protection of application program specifically includes described in the second embodiment:
Step 201, monitors the first touch control operation on application icon shown by current display interface.
Step 202 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right Described application icon is hidden.
The method for secret protection of application program described in second embodiment of the invention, by presetting for application icon Carry out the first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and the first preset touch operate When matching, it is determined that user's input carries out the instruction of secret protection setting to application icon, and this carries out secret protection setting Mode is by hiding the application icon that the first touch control operation is chosen in current display interface.
Use this kind of mode, by application icon input and the first preset touch being operated phase in current display interface The touch control operation joined, i.e. can be hidden application icon in current display interface, and mode of operation is simple and convenient.
It addition, it is preferred that in order to ensure that the action that application icon is hidden arrange will not produce maloperation, in step In 202, before hiden application icon, it is also possible to include step:
Output prompting user will the prompting message of hiden application icon;
After receiving the confirmation instruction that user inputs on prompting message, application icon is hidden.
Additionally, identical with first embodiment, the first application icon is carried out described the first of secret protection setting and presets tactile Control operation can be the double click operation on described application icon, or is the pressing operation on described application icon.Certainly, Also can be not limited thereto.
3rd embodiment
As it is shown on figure 3, the method for secret protection of application program specifically includes described in the 3rd embodiment:
Step 301, monitors the first touch control operation on application icon shown by current display interface.
Step 3021, if the first touch control operation on shown application icon and the operation of the first preset touch match, then Output prompting user's input is encrypted the display interface that password is arranged to the application program that described application icon is corresponding;
Step 3022, obtains the Crypted password of user's input, by right with described first application icon institute for described Crypted password That answers application program is actuated for association.
The method to set up of application icon described in third embodiment of the invention, by presetting for carrying out application icon The first preset touch operation that secrecy is arranged, when the touch control operation monitored on application icon and the first preset touch operate phase Timing, it is determined that user's input carries out the instruction that secrecy is arranged to application icon, this mode carrying out secrecy setting is:
Prompting user's input is encrypted the display interface that password is arranged to the application program that selected application icon is corresponding, Make user according to suggested display interface, input Crypted password;After obtaining this Crypted password, by Crypted password with selected Application program corresponding to application icon be actuated for association so that user taps this application icon after being encrypted, enter During the corresponding application program of this application icon, user need to input can start after set Crypted password is verified into Enter.
Use this kind of mode, by the input of selected application icon being grasped with the first preset touch in current display interface Making the touch control operation matched, i.e. can enter the Crypted password setting steps of selected application icon, mode of operation is the most square Just.
Additionally, identical with first embodiment, in the 3rd embodiment, the corresponding application program of application icon is carried out privacy guarantor The described first preset touch operation protecting setting can be the double click operation on described application icon, or is in described application Pressing operation on icon.Certainly, it is possible to be not limited thereto.
4th embodiment
In the method for secret protection of application program described in 4th embodiment, the application program that application icon is corresponding is protected The described first preset touch operation of close setting for pressing operation, can include when utilizing pressing operation input pressing duration and by The pressing parameter that pressure pressure value two kinds is different, by judging pressing parameter area when pressing operation inputs, can use difference Set-up mode the application program that application icon is corresponding is carried out secret protection setting.
Specifically, as shown in Figure 4, the method for secret protection of application program described in the 4th embodiment specifically includes:
Step 401, monitors the first touch control operation on application icon shown by current display interface;
Step 4021, when the first touch control operation is the pressing operation on application icon, obtains the pressing of pressing operation Parameter;
Step 4022, compares described pressing parameter with predefined parameter;
Wherein, described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
Step 4023, if the pressing parameter of the first touch control operation is more than predefined parameter, then corresponding to application icon application Program carries out the first secrecy and arranges;
Step 4024, if the pressing parameter of the first touch control operation is less than predefined parameter, then corresponding to application icon application Program carries out the second secrecy and arranges.
Specifically, the described first preset touch behaviour of secret protection setting is carried out when the application program corresponding to application icon As pressing operation and for need the pressing operation meeting scheduled duration numerical value time, monitoring the first touch control operation be pressing operation Time, need whether the pressing duration determining whether pressing operation is more than scheduled duration numerical value, if less than scheduled duration numerical value, then The application program that application icon is corresponding carries out the first secrecy arrange, as being hidden by application icon;If more than pre-timing Long numerical value, then carry out the second secrecy and arrange the application program that application icon is corresponding, arranges as prompting is encrypted password.
It is pressing behaviour when the application program corresponding to application icon carries out the described first preset touch operation of secrecy setting When making and be to need the pressing operation meeting scheduled pressure value, when monitoring the first touch control operation and being pressing operation, need into one Step judges whether the press pressure value of pressing operation is more than scheduled pressure value, if less than scheduled pressure value, then to application icon pair The application program answered carries out the first secrecy and arranges, as being hidden by application icon;If more than scheduled pressure value, then to application The application program that icon is corresponding carries out the second secrecy and arranges, and arranges as prompting is encrypted password.
Use the method for secret protection of application program described in fourth embodiment of the invention, by controlling inputted pressing operation Pressing parameter different, secrecy can be carried out in different ways and arrange, thus increase user and carry out the selection that secrecy is arranged.
In the method for secret protection of application program described in above first to fourth embodiment, monitoring on application icon Before first touch control operation, application icon is and did not carried out secret protection setting, namely first to fourth embodiment is only used for Illustrate the application icon not carrying out secret protection setting is carried out the concrete mode of secret protection setting.
The present invention also provides for the method for secret protection of application program described in the 5th embodiment, illustrates carrying out secrecy setting Application icon, also include releasing further the step that secrecy is arranged.
5th embodiment
As it is shown in figure 5, the method for secret protection of application program specifically includes described in the 5th embodiment:
Step 501, monitors the first touch control operation on application icon shown by current display interface.
Step 502 is if the first touch control operation on shown application icon and the operation of the first preset touch match, the most right The application program that described first application icon is corresponding carries out secret protection setting.
By above-mentioned step 502 and step 501, with the step 102 of first embodiment and the execution process of step 101 with Act on identical, carry out, for the application program corresponding to application icon, the first preset touch behaviour that secrecy is arranged by presetting Make, when the touch control operation (the first touch control operation) monitored on application icon matches with the first preset touch operation, the most really Determine user's input and the application program that application icon is corresponding is carried out the instruction of secret protection setting, perform application chosen to user Icon carries out the step of secret protection setting.This method to set up directly can carry out input operation on application icon and perform, Simple to operation.
Further, the method for secret protection of application program described in the 5th embodiment the most also includes:
Step 503, the second touch control operation in monitoring current display interface;
Step 504, if described second touch control operation and the operation of the second preset touch match, then releases described application icon Secret protection arrange.
In above-mentioned step 504, the second preset touch operation is set in advance for releasing the dynamic of secret protection setting Make, such as when application icon carries out the mode of secret protection setting for making the first application icon hide, when application icon is in When secret protection arranges state, current display interface does not show that this application icon, now the second preset touch operation can be The double click operation on a white space in current display interface, or be the pressing behaviour reaching scheduled duration or predetermined pressure Make.When the second touch control operation that user is inputted and the second preset touch operate and match, then release the hidden of this application icon Private protection setting, makes this application icon again show in current display interface.
The most such as, when the mode that application icon carries out secret protection setting is arranged for being encrypted cryptoguard, when This application icon is in secret protection when arranging state, and current display interface exists and shows this application icon, now second presets Touch control operation can be the operation on this application icon, such as double click operation, or for reaching scheduled duration or predetermined pressure Pressing operation is preferably identical with the first preset touch operation that application icon carries out secret protection setting.When user institute is defeated When the second touch control operation entered and the operation of the second preset touch match, after prompting user's input validation password, releasing should to this Arrange with the secret protection of application program corresponding to icon.
Sixth embodiment
Sixth embodiment of the invention provides a kind of mobile terminal, refering to Fig. 6 and combine shown in Fig. 7, and described mobile terminal 600 Including:
First monitoring modular 601, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module 602, if the first touch control operation on shown application icon and the first preset touch behaviour Work matches, then the program program that described application icon is corresponding is carried out secret protection setting.
Described mobile terminal is by presetting carry out that secrecy is arranged for the application program corresponding to application icon the One preset touch operation, when the touch control operation monitored on application icon and the first preset touch operate and match, it is determined that User's input carries out the instruction of secret protection setting to the application program of application icon, performs application icon pair chosen to user The application program answered carries out the step of secret protection setting.This method to set up directly can carry out input operation on application icon And perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve prior art and application program is entered The loaded down with trivial details problem of process that row secrecy is arranged.
Alternatively, described mobile terminal 600 also includes:
Second monitoring modular 603, for monitoring the second touch control operation in current display interface;
Second arranges module 604, if matching for described second touch control operation and the operation of the second preset touch, then releases The secret protection of the application program that described application icon is corresponding is arranged.
Arranging module 604 by arranging the second monitoring modular 603 and second, user can answer carrying out secrecy setting Release secret protection with icon to arrange.
Alternatively, first module 602 be set include:
Icon hiding unit 6021, for described application icon being hidden or including:
Output unit 6022, is encrypted, for exporting prompting user's input, the display that password is arranged to described application icon Interface;
Password acceptance unit 6023, for obtaining the Crypted password of user's input, by described Crypted password and described application Application program corresponding to icon be actuated for association.
Arranging module 602 by first, the mode can being hidden application icon carries out secret protection setting, or The mode of input Crypted password is used to carry out secret protection setting the starting of application program of application icon.
Wherein, the most described first preset touch operation is double click operation on described application icon, or be Pressing operation on described application icon.
If described first preset touch operation is the pressing operation on described application icon, alternatively, described first sets Put module 602 to include:
First arranges unit 6024, if the pressing parameter for described first touch control operation is more than predefined parameter, to described The application program that application icon is corresponding carries out the first secrecy and arranges;
Second arranges unit 6025, if the pressing parameter for described first touch control operation is less than described predefined parameter, then The application program that described application icon is corresponding carries out the second secrecy arrange;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
Using above-mentioned first to arrange unit 6024 and second and arrange unit 6025, user can be inputted by control and be pressed The pressing parameter of press operation is different, can carry out secret protection setting in different ways, thus increase user and carry out privacy The selection of protection setting.
Using mobile terminal described in the embodiment of the present invention, user is without entering special safe cabinet or application lock to application drawing Mark carries out secrecy and arranges, swift and convenient to operate.
7th embodiment
As shown in Figure 8, for the structured flowchart of mobile terminal of the embodiment of the present invention.This is illustrated below in conjunction with this figure The application entity of the method to set up of bright application icon.
Mobile terminal as shown in Figure 8 includes: at least one processor 801, memorizer 802, take pictures assembly 803 and user Interface 804.Wherein, assembly 803 of taking pictures includes different the first photographic head of photosensitive sensitivity and second camera.Mobile terminal Each assembly in 800 is coupled by bus system 805.It is understood that bus system 805 be used for realizing these assemblies it Between connection communication.Bus system 805, in addition to including data/address bus, also includes power bus, controls bus and status signal Bus.But for the sake of understanding explanation, in fig. 8 various buses are all designated as bus system 805.
Wherein, user interface 804 can include display or pointing device (such as touch-sensitive plate or touch screen etc..
The memorizer 802 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory, Maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memorizer 802 of system and method described herein be intended to include but not limited to these and arbitrarily its It is suitable for the memorizer of type.
In some embodiments, memorizer 802 stores following element, executable module or data structure, or Their subset of person, or their superset: operating system 8021 and application program 8022.
Wherein, operating system 8021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for Realize various basic business and process hardware based task.Application program 8022, comprises various application program, such as media Player (Media Player), browser (Browser) etc., be used for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 8022.
In an embodiment of the present invention, by calling program or the instruction of memorizer 802 storage, specifically, can be should With the program stored in program 8022 or instruction.Wherein, processor 801 is used for monitoring application icon shown by current display interface On the first touch control operation;If the first touch control operation on shown application icon and the operation of the first preset touch match, then The application program that described application icon is corresponding is carried out secret protection setting.
The method that the invention described above embodiment discloses can apply in processor 801, or is realized by processor 801. Processor 801 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method each Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 801 or software form.Above-mentioned process Device 801 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLD, discrete gate or transistor logic, Discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.General The processor etc. that processor can be microprocessor or this processor can also be any routine.In conjunction with embodiment of the present invention institute The step of disclosed method can be embodied directly in hardware decoding processor and perform, or with the hardware in decoding processor And software module combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme read-only In the storage medium that this areas such as memorizer or electrically erasable programmable memorizer, depositor are ripe.This storage medium is positioned at Memorizer 802, processor 801 reads the information in memorizer 802, completes the step of said method in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its Combination realizes.Realizing for hardware, processing unit can be implemented in one or more special IC (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, Controller, microcontroller, microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can be realized herein by the module (such as process, function etc.) performing function described herein Described technology.Software code is storable in performing in memorizer and by processor.Memorizer can within a processor or Processor is outside to be realized.
Specifically, processor 801 is additionally operable to: after described application icon carrying out secrecy and arranges, monitor currently displaying The second touch control operation on interface;If described second touch control operation and the operation of the second preset touch match, then release described answering Arrange with the secret protection of application program corresponding to icon.
Specifically, processor 801 is additionally operable to: described application icon carries out secrecy when arranging, is entered by described application icon Row is hidden.
Specifically, processor 801 is additionally operable to: output prompting user's input is encrypted password and arranges described application icon Display interface;Obtain the Crypted password of user's input, by application program corresponding to described Crypted password and described application icon Be actuated for association.
Specifically, processor 801 is additionally operable to: if described first preset touch operation is the pressing on described application icon Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described The step carrying out secret protection with icon includes: if the pressing parameter of described first touch control operation is more than predefined parameter, to described The application program that application icon is corresponding carries out the first secrecy and arranges.
Specifically, processor 801 is additionally operable to: if described first preset touch operation is the pressing on described application icon Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described The step carrying out secret protection with icon includes: if the pressing parameter of described first touch control operation is less than predefined parameter, then to institute State application program corresponding to the first application icon and carry out the second secrecy setting;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
The mobile terminal 800 of the embodiment of the present invention, by presetting for carrying out hidden to the application program of application icon First preset touch operation of private protection setting, when the touch control operation monitored on application icon and the first preset touch operate phase During coupling, it is determined that user's input carries out the instruction of secret protection setting to the application program that application icon is corresponding, perform to The application program of the chosen application icon in family carries out the step of secret protection setting.This method to set up can be directly at application icon On carry out input operation and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve existing skill Art carries out the loaded down with trivial details problem of process that secrecy is arranged to application program.
8th embodiment
Fig. 9 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 9 900 can be mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 900 in Fig. 9 includes power supply 910, memorizer 920, input block 930, display unit 940, takes pictures Assembly 950, processor 960, WIFI (Wireless Fidelity) module 970, voicefrequency circuit 980 and RF circuit 990, wherein, Assembly 950 of taking pictures includes different the first photographic head of photosensitive sensitivity and second camera, and specifically, the first photographic head is colored Photographic head, second camera is black and white photographic head.
Wherein, input block 930 can be used for receiving the information of user's input, and produces the user with mobile terminal 900 Arrange and function controls relevant signal input.Specifically, in the embodiment of the present invention, this input block 930 can include touching Control panel 931.Contact panel 931, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user Use any applicable object such as finger, stylus or adnexa operation on contact panel 931), and according to journey set in advance Formula drives corresponding attachment means.Optionally, contact panel 931 can include touch detecting apparatus and two portions of touch controller Point.Wherein, the touch orientation of touch detecting apparatus detection user, and detect the signal that touch operation brings, transmit a signal to Touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives This processor 960, and order that processor 960 sends can be received and performed.Furthermore, it is possible to use resistance-type, condenser type, The polytype such as infrared ray and surface acoustic wave realizes contact panel 931.
Wherein, display unit 940 can be used for showing the information inputted by user or the information being supplied to user and movement The various menu interfaces of terminal.Display unit 940 can include display floater 941, optionally, can use LCD or organic light emission The forms such as diode (Organic Light-Emitting Diode, OLED) configure display floater 941.
It should be noted that contact panel 931 can cover display floater 941, formed and touch display screen, when this touch display screen is examined Measure thereon or after neighbouring touch operation, send processor 960 to determine the type of touch event, with preprocessor 960 provide corresponding visual output according to the type of touch event on touch display screen.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area And the arrangement mode of this conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can be distinguished two and show Show the arrangement mode in district.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible The interface elements such as the icon and/or the widget desktop control that comprise at least one application program.This Application Program Interface viewing area It can also be the empty interface not comprising any content.This conventional control viewing area is for showing the control that utilization rate is higher, such as, The application icons etc. such as settings button, interface numbering, scroll bar, phone directory icon.
Wherein processor 960 is the control centre of mobile terminal, utilizes each of various interface and the whole mobile phone of connection Individual part, is stored in the software program in first memory 921 and/or module by running or performing, and calls and be stored in Data in second memory 922, perform the various functions of mobile terminal and process data, thus mobile terminal is carried out entirety Monitoring.Optionally, processor 960 can include one or more processing unit.
In embodiments of the present invention, by call the software program and/or module stored in this first memory 921 and/ To the data in second memory 922, processor 960 touches for monitoring on application icon shown by current display interface first Control operation;If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application The application program that icon is corresponding carries out secret protection setting.
Specifically, processor 960 is additionally operable to: after described application icon carrying out secrecy and arranges, monitor currently displaying The second touch control operation on interface;If described second touch control operation and the operation of the second preset touch match, then release described answering Arrange with the secret protection of application program corresponding to icon.
Specifically, processor 960 is additionally operable to: the application program that described application icon is corresponding is carried out secret protection setting Time, described application icon is hidden.
Specifically, processor 960 is additionally operable to: the application program that described application icon is corresponding is carried out secret protection setting Time, output prompting user's input is encrypted the display interface that password is arranged to described application icon;Obtain adding of user's input Password, by application program corresponding to described Crypted password and described application icon be actuated for associate.
Specifically, processor 960 is additionally operable to: if described first preset touch operation is the pressing on described application icon Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described The step carrying out secret protection setting with the application program that icon is corresponding includes: if the pressing parameter of described first touch control operation is big In predefined parameter, the application program that described application icon is corresponding is carried out the first secrecy and arranges.
Specifically, processor 960 is additionally operable to: if described first preset touch operation is the pressing on described application icon Operation, if the first touch control operation on shown application icon described in then and the operation of the first preset touch match, answers described The step carrying out secret protection setting with the application program that icon is corresponding includes: if the pressing parameter of described first touch control operation is little In described predefined parameter, then the application program that described application icon is corresponding is carried out the second secrecy and arranges;
Wherein said pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
The mobile terminal 900 of the embodiment of the present invention, by presetting for protecting the application program of application icon First preset touch operation of close setting, matches when the touch control operation monitored on application icon and the first preset touch operate Time, it is determined that user's input carries out the instruction of privacy settings setting to the application program that application icon is corresponding, performs user institute The application program that application icon is corresponding is chosen to carry out the step of secret protection setting.This method to set up can be directly at application icon On carry out input operation and perform, simple to operation, it is not necessary to carry out safe cabinet or application lock is arranged, thus solve existing skill Art carries out the loaded down with trivial details problem of process that secrecy is arranged to application program.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example that the embodiments described herein describes Unit and algorithm steps, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These functions are actually Perform with hardware or software mode, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel Each specifically should being used for can be used different methods to realize described function, but this realization is it is not considered that exceed The scope of the present invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the system of foregoing description, The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can be passed through other Mode realizes.Such as, device embodiment described above is only schematically, such as, the division of described unit, it is only A kind of logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed is mutual Between coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication link Connect, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is the most in other words The part contributing prior art or the part of this technical scheme can embody with the form of software product, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention. And aforesaid storage medium includes: USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can store program code Medium.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, on the premise of without departing from principle of the present invention, it is also possible to make some improvements and modifications, these improvements and modifications are also Should be regarded as protection scope of the present invention.

Claims (16)

1. the method for secret protection of an application program, it is characterised in that described method includes:
The first touch control operation on application icon shown by monitoring current display interface;
If the first touch control operation on shown application icon and the operation of the first preset touch match, then to described application icon Corresponding application program carries out secret protection.
Method for secret protection the most according to claim 1, it is characterised in that in the application journey corresponding to described application icon After sequence carries out secret protection setting, described method also includes:
The second touch control operation in monitoring current display interface;
If described second touch control operation and the operation of the second preset touch match, then release the application journey that described application icon is corresponding The secret protection of sequence is arranged.
Method for secret protection the most according to claim 1, it is characterised in that the application program corresponding to described application icon The step carrying out secrecy setting includes:
Described application icon is hidden.
Method for secret protection the most according to claim 1, it is characterised in that the application program corresponding to described application icon The step carrying out secret protection setting includes:
Output prompting user's input is encrypted the display interface that password is arranged to described application icon;
Obtain the Crypted password of user's input, the startup of application program corresponding to described Crypted password and described application icon is entered Row association.
Method for secret protection the most according to claim 1, it is characterised in that described first preset touch operation is for described Double click operation on application icon or pressing operation.
Method for secret protection the most according to claim 5, it is characterised in that if described first preset touch operates as in institute State the pressing operation on application icon, if the first touch control operation on shown application icon described in then and the first preset touch behaviour Work matches, and the step that the application program that described application icon is corresponding carries out secret protection setting includes:
If the pressing parameter of described first touch control operation is more than predefined parameter, the application program that described application icon is corresponding is carried out The first setting that maintains secrecy.
Method for secret protection the most according to claim 5, it is characterised in that if described first preset touch operates as in institute State the pressing operation on application icon, if the first touch control operation on shown application icon described in then and the first preset touch behaviour Work matches, and the step that described application icon carries out secret protection setting includes:
If the pressing parameter of described first touch control operation is less than predefined parameter, then the application program that described application icon is corresponding is entered Row the second secrecy is arranged.
8. according to the method for secret protection described in claim 6 or 7, it is characterised in that
Described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or described pressing parameter is pressing Force value, described predefined parameter is scheduled pressure value.
9. a mobile terminal, it is characterised in that including:
First monitoring modular, for monitoring the first touch control operation on application icon shown by current display interface;
First arranges module, if the first touch control operation on shown application icon and the first preset touch operation phase Join, then the application program that described application icon is corresponding is carried out secret protection setting.
Mobile terminal the most according to claim 9, it is characterised in that described mobile terminal also includes:
Second monitoring modular, for monitoring the second touch control operation in current display interface;
Second arranges module, if matching for described second touch control operation and the operation of the second preset touch, then releases described answering Arrange with the secret protection of application program corresponding to icon.
11. mobile terminals according to claim 9, it is characterised in that described first arranges module includes:
Icon hiding unit, for being hidden described application icon.
12. mobile terminals according to claim 9, it is characterised in that described first arranges module includes:
Output unit, is encrypted, for exporting prompting user's input, the display interface that password is arranged to described application icon;
Password acceptance unit, for obtaining the Crypted password of user's input, by right with described application icon institute for described Crypted password That answers application program is actuated for association.
13. mobile terminals according to claim 9, it is characterised in that described first preset touch operation is for answering described With the double click operation on icon or pressing operation.
14. mobile terminals according to claim 13, it is characterised in that if described first preset touch operation is for described Pressing operation on application icon, the most described first arranges module includes:
First arranges unit, if the pressing parameter for described first touch control operation is more than predefined parameter, to described application icon Corresponding application program carries out the first secrecy and arranges.
15. mobile terminals according to claim 13, it is characterised in that if described first preset touch operation is for described Pressing operation on application icon, the most described first arranges module includes:
Second arranges unit, if the pressing parameter for described first touch control operation is less than predefined parameter, then and should to described first Carry out the second secrecy with the application program that icon is corresponding to arrange;
16. according to the mobile terminal described in claims 14 or 15, it is characterised in that
Described pressing parameter is pressing duration, and described predefined parameter is scheduled duration numerical value;Or
Described pressing parameter is press pressure value, and described predefined parameter is scheduled pressure value.
CN201610599434.7A 2016-07-27 2016-07-27 The method for secret protection and mobile terminal of application program Active CN106228085B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610599434.7A CN106228085B (en) 2016-07-27 2016-07-27 The method for secret protection and mobile terminal of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610599434.7A CN106228085B (en) 2016-07-27 2016-07-27 The method for secret protection and mobile terminal of application program

Publications (2)

Publication Number Publication Date
CN106228085A true CN106228085A (en) 2016-12-14
CN106228085B CN106228085B (en) 2019-01-11

Family

ID=57534697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610599434.7A Active CN106228085B (en) 2016-07-27 2016-07-27 The method for secret protection and mobile terminal of application program

Country Status (1)

Country Link
CN (1) CN106228085B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682467A (en) * 2016-12-20 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Hiding method for software, device and intelligent terminal
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN111045588A (en) * 2019-11-29 2020-04-21 维沃移动通信有限公司 Information viewing method and electronic equipment
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN111279339A (en) * 2017-08-29 2020-06-12 深圳传音通讯有限公司 Application locking method, terminal equipment and computer readable medium
CN112380588A (en) * 2020-11-17 2021-02-19 惠州Tcl移动通信有限公司 Private information display method and device, storage medium and mobile terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130249843A1 (en) * 2012-03-26 2013-09-26 Kyocera Corporation Device, method, and storage medium storing program
CN105320898A (en) * 2015-09-30 2016-02-10 联想(北京)有限公司 Information processing method and system
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs
CN105447399A (en) * 2014-08-18 2016-03-30 北京壹人壹本信息科技有限公司 Icon hiding method and apparatus

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130249843A1 (en) * 2012-03-26 2013-09-26 Kyocera Corporation Device, method, and storage medium storing program
CN105447399A (en) * 2014-08-18 2016-03-30 北京壹人壹本信息科技有限公司 Icon hiding method and apparatus
CN105320898A (en) * 2015-09-30 2016-02-10 联想(北京)有限公司 Information processing method and system
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106682467A (en) * 2016-12-20 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Hiding method for software, device and intelligent terminal
CN111279339A (en) * 2017-08-29 2020-06-12 深圳传音通讯有限公司 Application locking method, terminal equipment and computer readable medium
CN111279339B (en) * 2017-08-29 2023-07-21 深圳传音通讯有限公司 Application locking method, terminal equipment and computer readable medium
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN111045588A (en) * 2019-11-29 2020-04-21 维沃移动通信有限公司 Information viewing method and electronic equipment
CN111045588B (en) * 2019-11-29 2021-08-17 维沃移动通信有限公司 Information viewing method and electronic equipment
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN112380588A (en) * 2020-11-17 2021-02-19 惠州Tcl移动通信有限公司 Private information display method and device, storage medium and mobile terminal

Also Published As

Publication number Publication date
CN106228085B (en) 2019-01-11

Similar Documents

Publication Publication Date Title
CN106228085A (en) The method for secret protection of application program and mobile terminal
CN106126077A (en) A kind of application program image target display control method and mobile terminal
CN106020613A (en) Operation method and mobile terminal for unread messages
CN106055195A (en) Operating method for folder and mobile terminal
CN106445392A (en) Operating method of status bar icon and mobile terminal
CN106127076A (en) The inspection method of a kind of photograph album photo and mobile terminal
CN106951335A (en) A kind of process guard method and mobile terminal
CN106055198A (en) Method for displaying notifications based on content and mobile terminal
CN103076959A (en) Electronic equipment and screen unlocking method thereof
CN106778389B (en) A kind of loss detection method and mobile terminal of mobile terminal
CN106453925A (en) Information transmission method and mobile terminals
CN106484301A (en) A kind of method of hiden application and terminal
CN106357866A (en) Contact list management method and mobile intelligent terminal
CN106325753A (en) Payment interface display method and mobile terminal
CN106372470A (en) Method for reminding of inputting password and mobile terminal
CN106503507A (en) Method and mobile terminal that a kind of password shows
CN107632870A (en) The startup method and terminal of a kind of application
CN106503501A (en) A kind of startup method of user model and mobile terminal
CN106227453A (en) The control method of a kind of mobile terminal and mobile terminal
CN106991319A (en) The right management method and mobile terminal of a kind of application program
CN106210231A (en) A kind of method of information processing and mobile terminal
CN106371745A (en) Interface switching method and mobile terminal
CN107329586A (en) A kind of data inputting method, mobile terminal and computer-readable recording medium
CN106991306B (en) A kind of method and mobile terminal inputting password
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant