CN111279339A - Application locking method, terminal equipment and computer readable medium - Google Patents

Application locking method, terminal equipment and computer readable medium Download PDF

Info

Publication number
CN111279339A
CN111279339A CN201780096367.XA CN201780096367A CN111279339A CN 111279339 A CN111279339 A CN 111279339A CN 201780096367 A CN201780096367 A CN 201780096367A CN 111279339 A CN111279339 A CN 111279339A
Authority
CN
China
Prior art keywords
application
touch screen
authentication
screen action
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780096367.XA
Other languages
Chinese (zh)
Other versions
CN111279339B (en
Inventor
李晓亮
黄成钟
郑雪瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Publication of CN111279339A publication Critical patent/CN111279339A/en
Application granted granted Critical
Publication of CN111279339B publication Critical patent/CN111279339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An application locking method, a terminal device and a computer readable medium are provided, wherein the method comprises the following steps: the method comprises the steps that a terminal device receives a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon (101); locking an application (102) corresponding to the application icon according to the first touch screen action; if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application, wherein the second touch screen action is used for clicking the application icon for a second preset number of times (103); and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is used for clicking the application icon for a third preset number of times (104). By locking the application, information security can be improved.

Description

Application locking method, terminal equipment and computer readable medium Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method for locking an application, a terminal device, and a computer-readable medium.
Background
As the mobile terminal device has stronger data processing capability, more and more applications are available on the mobile terminal device. Some applications are used for payment or deposit important information of the user, and if the user loses the mobile terminal device or is used by others, the important information can be leaked, so that some irreparable loss is caused. The mobile terminal device can then strengthen the information security by locking the application.
The currently used application locking technique is to lock an application by a swipe gesture and enter a password to unlock the application.
However, the existing technology has the defects that when a certain application icon is subjected to sliding operation, misoperation is often caused to other application icons, so that the operation is inconvenient, and when other people open the locked application and are rejected by the mobile terminal device, the application program is reminded of storing important information, and the safety performance is reduced on the contrary.
Disclosure of Invention
The embodiment of the invention provides an application locking method which can improve the information security.
In a first aspect, an embodiment of the present invention provides a method for locking an application, where the method includes:
the method comprises the steps that a terminal device receives a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon; locking an application corresponding to the application icon according to the first touch screen action;
if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application, wherein the second touch screen action is used for clicking the application icon for a second preset number of times;
and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is used for clicking the application icon for a third preset number of times.
By implementing the method described in the first aspect, the terminal device receives the first touch screen action, the second touch screen action or the third touch screen action, and performs different operations according to the received touch screen action, and compared with the existing technology for locking an application, the method has the advantages that the operation mode of clicking is more accurate, and the requirement on the terminal device is low. The embodiment of the invention has simple operation in actual life and cost saving, and can effectively ensure the safety of the information in the application by locking the application.
With reference to the first aspect, in a first implementation manner of the first aspect, the locking, according to the first touch screen action, the application corresponding to the application icon includes:
if the terminal equipment receives the first touch screen action for the first time, displaying a set prompt message, and locking an application corresponding to the application icon after receiving the set authentication message;
and if the terminal device does not receive the first touch screen action for the first time, the terminal device locks the application according to the first touch screen action.
By executing the steps, the terminal device can perform locking or authentication information setting operation by judging whether the application receives the first touch screen action for the first time. The application locking method has universality, and by setting in a system of the terminal equipment, numerous applications on the terminal equipment can be locked, so that the practicability of application locking is improved.
With reference to the first aspect, in a second implementation manner of the first aspect, after the displaying the first authentication interface, the method further includes:
receiving first authentication information, and if the first authentication information is not authenticated, displaying a second authentication interface;
receiving second authentication information through the second authentication interface, wherein the type of the second authentication information is different from that of the first authentication information;
and after the second authentication information passes the authentication, opening the application corresponding to the application icon.
By executing the steps, the second authentication can be performed after the first authentication fails, the authentication modes of the first authentication and the second authentication are different, and the authentication modes can comprise fingerprint screen locking, pattern screen locking or character password screen locking, so that the second authentication information can be input when the user forgets the first authentication information, the probability that the user passes the verification by himself is improved, and the purposes of guaranteeing the application safety and bringing convenience to the user are achieved.
With reference to the second implementation of the first aspect, in a third implementation of the first aspect, the method further includes:
and if the second authentication information is not authenticated, sending warning prompt information to a target terminal bound with the terminal equipment, and hiding or locking the application preset duration corresponding to the application icon.
By executing the steps, the application can be locked or hidden under the condition that the second authentication is still not passed, and warning prompt information is sent to the target terminal bound with the terminal equipment. Since the target terminal bound with the terminal device can be regarded as the terminal device trusted by the user, the function of warning the user can be achieved under the condition that the application is authenticated for many times and fails, and the safety is further improved.
With reference to the second implementation manner of the first aspect or the third implementation manner of the first aspect, in a fourth implementation manner of the first aspect, after the displaying the first authentication interface, the method further includes:
the first authentication interface comprises a hidden application icon, and if the hidden application icon is selected, the first authentication information is received;
and if the first authentication information passes the authentication, hiding the second preset duration of the application.
By executing the steps, the terminal device can hide the application under the selection of the user, if the hidden application icon is selected in the first authentication interface, then the authentication information received by the terminal device is authenticated, and if the authentication is passed, the application is hidden for a second preset time, wherein the second preset time can be any set time. Through the method, the embodiment of the invention can further improve the safety by hiding the application.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a unit configured to execute the method of the first aspect, and includes:
the receiving unit is used for receiving a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon; receiving a second touch screen action, wherein the second touch screen action is used for clicking the application icon for a second preset number of times; receiving a third touch screen action, wherein the third touch screen action is used for clicking a third preset number of times of the application icon;
the locking control unit is used for locking the application corresponding to the application icon according to the first touch screen action;
the prompting unit is used for displaying locking prompting information if the receiving unit receives the second touch screen action;
the application control unit is used for blocking the instruction of opening the application if the receiving unit receives the second touch screen action;
and the authentication unit is used for displaying a first authentication interface if the receiving unit receives the third touch screen action.
By implementing the method described in the first aspect, the receiving unit receives the first touch screen action, the second touch screen action, or the third touch screen action, and performs different operations on the locking control unit, the prompting unit, the application control unit, or the authentication unit according to the received touch screen action. The embodiment of the invention is simple to operate in actual life, and the safety of the information in the application can be effectively guaranteed by locking the application.
With reference to the second aspect, in a first implementation of the second aspect:
the locking control unit is used for displaying and setting prompt information by the prompt unit if the receiving unit receives the first touch screen action for the first time, and locking the application corresponding to the application icon after the authentication unit receives the set first authentication information;
and if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
By executing the steps, the receiving unit can determine whether the application receives the first touch screen action for the first time, so that the application control unit locks or the prompting unit prompts to set the authentication information. The application locking method has universality, and by setting in a system of the terminal equipment, numerous applications on the terminal equipment can be locked, so that the practicability of application locking is improved.
With reference to the second aspect, in a second implementation of the second aspect:
the authentication unit is used for receiving the first authentication information, and if the first authentication information is not authenticated, a second authentication interface is displayed; receiving second authentication information, wherein the type of the second authentication information is different from that of the first authentication information;
and the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication.
By executing the steps, the second authentication can be performed after the first authentication fails, the authentication modes of the first authentication and the second authentication are different, and the authentication modes can comprise fingerprint screen locking, pattern screen locking or character password screen locking, so that the second authentication information can be input when the user forgets the first authentication information, the probability that the user passes the verification by himself is improved, and the purposes of guaranteeing the application safety and bringing convenience to the user are achieved.
With reference to the second aspect, in a third implementation of the second aspect, the terminal device further includes:
and the sending unit is used for sending warning prompt information to a target terminal bound with the terminal equipment if the second authentication information is not authenticated, and the application control unit hides the application corresponding to the application icon or the locking control unit locks the application preset time length corresponding to the application icon.
By executing the steps, the application control unit can lock or hide the application under the condition that the second authentication is still not passed, and the sending unit sends the warning prompt message to the target terminal bound with the terminal equipment. Since the target terminal bound with the terminal device can be regarded as the terminal device trusted by the user, the function of warning the user can be achieved under the condition that the application is authenticated for many times and fails, and the safety is further improved.
With reference to the second implementation manner of the second aspect or the third implementation manner of the second aspect, in a fourth implementation manner of the second aspect, the application control unit is further configured to, after the authentication unit displays the first authentication interface, if the receiving unit receives the information that the hidden application icon is selected, and the received first authentication information passes authentication, hide the application for a second preset time, where the first authentication interface includes the hidden application icon.
By executing the steps, the application control unit can hide the application, if the hidden application icon is selected in the first authentication interface, the authentication unit then authenticates the received authentication information, and if the authentication is passed, the application control unit hides the second preset time length, wherein the second preset time length can be any set time. Through the method, the embodiment of the invention can further improve the safety by hiding the application.
In a third aspect, an embodiment of the present invention provides another terminal device, including a processor, an input device, an output device, a memory, and a communication interface, where the processor, the input device, the output device, the memory, and the communication interface are connected to each other through a bus, where the memory is used to store a computer program that supports the terminal device to execute the method, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, in which a computer program is stored, the computer program comprising program instructions, which, when executed by a processor, cause the processor to perform the method of the first aspect.
The embodiment of the invention can improve the safety of the information in the application by locking or hiding the application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of a method for application locking according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of a method for application locking according to another embodiment of the present invention;
fig. 3 is an effect diagram of a hidden icon included in a first authentication interface in the method for locking an application according to the embodiment of the present invention;
fig. 4 is a schematic block diagram of a terminal device according to an embodiment of the present invention;
fig. 5 is a schematic block diagram of a terminal device according to another embodiment of the present invention;
fig. 6 is a structural block diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
In particular implementations, the terminal devices described in embodiments of the invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a terminal device that includes a display and a touch-sensitive surface is described. However, it should be understood that the terminal device may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal device supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the terminal device may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal device may be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal device may support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, which is a schematic flow chart of a method for applying locking according to an embodiment of the present invention, as shown in fig. 1, the method may include:
101: the terminal device receives a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon.
In an embodiment of the present invention, the first touch screen action is a preset number of times for clicking an application icon, where the preset number of times is two or more than two times. The application icon is a software identifier, and different application icons correspond to different application programs. The application icon of the terminal device desktop can be selected to perform different operations.
For example, a user clicks an application icon on a desktop of a terminal device, a sensor of the terminal device receives the clicked action and delays for a certain time to ensure that a complete action is received, and an object of the action is analyzed, that is, the application icon is found.
In the embodiment of the present invention, if the terminal device receives the first touch screen action for the first time, setting prompt information is displayed, and the application corresponding to the application icon is locked after receiving the set authentication information, where the setting prompt information is used to prompt a user to set a password for locking a screen when the application is locked, and the screen locking may be a fingerprint screen locking, a pattern screen locking, a character password screen locking, or the like; and if the terminal device does not receive the first touch screen action for the first time, the terminal device locks the application corresponding to the application icon according to the first touch screen action, wherein the application locking means that the application cannot be operated by a user, and the operation comprises opening, moving, deleting or updating.
For example, if the terminal device receives the first touch screen action for the first time, a setting prompt message is displayed, where the setting prompt message may be "the application is not set with a password and cannot be locked, please set a password", after the terminal device displays the setting prompt message, a screen-locking password setting interface is displayed, after receiving the set authentication information, the application corresponding to the application icon is locked,
102: and locking the application corresponding to the application icon according to the first touch screen action.
In the embodiment of the present invention, the locking of the application corresponding to the application icon means that the application icon is selected, that is, the application corresponding to the application icon is selected, the terminal device locks the application, and the application cannot be operated by the user, including opening, moving, deleting, or updating.
103: and if a second touch screen action is received, displaying locking prompt information and blocking an application opening instruction, wherein the second touch screen action is used for clicking the application icon for a second preset number of times.
In an embodiment of the present invention, the second touch screen action is a second preset number of times of clicking an application icon, where the second preset number is one time, and the lock prompt message is used to prompt that an application is locked and cannot be opened, moved, deleted, or updated, for example, "the application is locked and cannot be operated, and the application is unlocked by continuously clicking three times of inputting a password".
For example, the terminal device detects that an application icon is clicked once, and usually, to open an application corresponding to the application icon, in the embodiment of the present invention, if the terminal device receives a second touch screen action, that is, the application icon is clicked once, the terminal device first queries whether the application corresponding to the application icon is locked, and if the application corresponding to the application icon is locked, an instruction to open the application icon is blocked, or the instruction is received but no response is made; and if the application icon is not locked, opening the application corresponding to the application icon.
104: and if a third touch screen action is received, displaying the first authentication interface, wherein the third touch screen action is used for clicking the application icon for a third preset number of times.
In an embodiment of the present invention, the third touch screen action is a third preset number of times of clicking the application icon, where the third preset number is two or more times, and the third preset number is different from the second preset number of times, and the first authentication interface is a screen locking interface, configured to receive an authentication password input by a user, and may be a fingerprint screen locking, a pattern screen locking, or a character password screen locking.
In an embodiment of the present invention, the first authentication interface includes a hidden application icon, for example, as shown in fig. 3. And if the hidden application icon is selected by the user, hiding the application for a second preset time after the first authentication information passes the authentication. Wherein the second preset duration is a fixed duration set in the system.
In the embodiment of the invention, a user can simply operate the application corresponding to the application icon by clicking the application icon on the terminal equipment to lock the application, and in the embodiment of the invention, the user can perform the second authentication under the condition that the first authentication fails, and the first authentication mode is different from the second authentication mode, so that the authentication modes are diversified, the user can pass the authentication as much as possible, and meanwhile, the application is prevented from being opened by people except the user, and the safety of information in the application is improved.
Referring to fig. 2, which is a schematic flow chart of another method for applying locking according to an embodiment of the present invention, as shown in fig. 2, the method may include:
201: the terminal device receives a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon.
In an embodiment of the present invention, the first touch screen action is a preset number of times for clicking an application icon, where the preset number of times is two or more than two times. The application icon is a software identifier, and different application icons correspond to different application programs. The application icon of the terminal device desktop can be triggered, so that the application corresponding to the application icon is operated.
For example, a user clicks an application icon on a desktop of a terminal device, a sensor of the terminal device receives the clicked action and delays for a certain time to ensure that a complete action is received, and an object of the action is analyzed, that is, the application icon is found.
202: whether the terminal device receives the first touch screen action for the first time.
If yes, go to step 203; if not, go to step 205.
In the embodiment of the present invention, after receiving the first touch screen action, the terminal device queries whether the application corresponding to the selected application icon has authentication information in an authentication list in the system, where the authentication list is used to store the authentication information, and the authentication information is password information for locking the application corresponding to the application icon, where the password includes a fingerprint, a pattern, or a character. If the terminal device inquires that the application has the authentication information, the application does not receive the first touch screen action for the first time; if the terminal device does not inquire the authentication information of the application, it is indicated that the application receives the first touch screen action for the first time.
203: and displaying the setting prompt information.
In the embodiment of the invention, if the terminal device receives the first touch screen action for the first time, the terminal device displays the setting prompt information, the setting prompt information is used for prompting a user to set a password for locking a screen when an application is locked, and the screen locking can be a fingerprint screen locking, a pattern screen locking, a character password screen locking or the like.
For example, it is determined that the terminal device displays a setting prompt message after receiving the first touch screen action for the first time, where the setting prompt message may be "the application is not set with a password and cannot be locked, and please set a password", and after displaying the setting prompt message, the terminal device displays a screen-locking password setting interface, and after receiving the set authentication information, locks the application corresponding to the application icon.
204: and locking the application corresponding to the application icon after receiving the set authentication information.
In the embodiment of the present invention, since the user sets the authentication information in the previous step 203, the terminal device receives the authentication information, stores the authentication information in the authentication list in the system, and then locks the application corresponding to the application icon. The authentication list comprises authentication information and application identifications, and the authentication information corresponds to the application identifications one to one.
205: and locking the application corresponding to the application icon according to the first touch screen action.
In the embodiment of the present invention, since the terminal device does not receive the first touch screen action for the first time, the terminal device locks the application corresponding to the application icon according to the first touch screen action, where locking the application means that the application cannot be operated by a user, including opening, moving, deleting, or updating.
206: and if a second touch screen action is received, displaying locking prompt information and blocking an application opening instruction, wherein the second touch screen action is used for clicking the application icon for a second preset number of times.
In an embodiment of the present invention, the second touch screen action is a second preset number of times of clicking an application icon, where the second preset number is one time, and the lock prompt message is used to prompt that an application is locked and cannot be opened, moved, deleted, or updated, for example, "the application is locked and cannot be operated, and the application is unlocked by continuously clicking three times of inputting a password".
For example, the terminal device detects that an application icon is clicked once, and usually, to open an application corresponding to the application icon, in the embodiment of the present invention, if the terminal device receives a second touch screen action, that is, the application icon is clicked once, the terminal device first queries whether the application corresponding to the application icon is locked, and if the application corresponding to the application icon is locked, an instruction to open the application icon is blocked, or the instruction is received but no response is made; and if the application icon is not locked, opening the application corresponding to the application icon.
207: and if a third touch screen action is received, displaying the first authentication interface, wherein the third touch screen action is used for clicking the application icon for a third preset number of times.
In an embodiment of the present invention, the third touch screen action is a third preset number of times of clicking the application icon, where the third preset number is two or more times, and the third preset number is different from the second preset number of times, and the first authentication interface is a screen locking interface, configured to receive an authentication password input by a user, and may be a fingerprint screen locking, a pattern screen locking, or a character password screen locking.
In an embodiment of the present invention, the first authentication interface includes a hidden application icon, for example, as shown in fig. 3. And if the hidden application icon is selected by the user, hiding the application for a second preset time after the first authentication information passes the authentication. Wherein the second preset duration is a fixed duration set in the system.
208: whether the first authentication information passes the authentication.
If yes, go to step 209; if not, go to step 210.
In the embodiment of the present invention, after receiving the first authentication information, the terminal device matches the first authentication information with authentication information in an authentication list in a terminal device system, and if matching is successful, step 209 is executed; if the matching fails, step 210 is performed.
209: and opening the application corresponding to the application icon.
In the embodiment of the present invention, since the first authentication information passes the authentication in step 208, the terminal device responds to the instruction for opening the application corresponding to the application icon, and opens the application corresponding to the application icon.
210: and displaying a second authentication interface, and receiving second authentication information through the second authentication interface.
In this embodiment of the present invention, since the first authentication information is not authenticated in step 208, the terminal device displays a second authentication interface, where the second authentication interface is a screen locking interface, and is used to receive an authentication password input by the user, and may be a fingerprint screen locking, a pattern screen locking, or a character password screen locking, and the second authentication interface includes an input portion that can receive second authentication information input by the user.
211: whether the second authentication information passes the authentication.
If yes, go to step 209; if not, go to step 212.
In the embodiment of the present invention, after receiving the second authentication information, the terminal device matches the second authentication information with the authentication information in the authentication list in the terminal device system, and if the matching is successful, step 209 is executed; if the match fails, step 212 is performed.
212: and sending warning prompt information to a target terminal bound with the terminal equipment, and hiding or locking the application preset duration corresponding to the application icon.
In this embodiment of the present invention, since the second authentication information fails to authenticate in step 211, the terminal device sends a warning prompt message to other target terminals bound to the terminal device, where the warning prompt message is used to prompt the user that the locked application in the terminal device fails to authenticate for multiple times, for example, "warn, that your application fails to unlock for multiple times, please pay attention to protect own information and property security".
The embodiment of the invention also provides a terminal device, which is used for executing the unit of the method in any one of the preceding claims. Specifically, referring to fig. 4, a schematic block diagram of a terminal device according to an embodiment of the present invention is shown. The terminal device of the embodiment includes: a receiving unit 401, a lock control unit 402, a presentation unit 403, an application control unit 404, and an authentication unit 405.
The receiving unit 401 is configured to receive a first touch screen action, where the first touch screen action is to click an application icon for a first preset number of times; receiving a second touch screen action, wherein the second touch screen action is used as a second preset number of times of clicking the application icon; and receiving a third touch screen action, wherein the third touch screen action is used for clicking a third preset number of times of the application icon.
A locking control unit 402, configured to lock an application corresponding to the application icon according to the first touch screen action.
A prompting unit 403, configured to display a locking prompting message if the receiving unit receives the second touch screen action.
The application control unit 404 is configured to block an instruction to open an application if the receiving unit receives the second touch screen action.
The authentication unit 405 is configured to display a first authentication interface if the receiving unit receives the third touch screen action.
By implementing the user equipment described in fig. 4, the terminal device can make different responses according to different touch screen actions for the application icon when receiving the different touch screen actions, and can simply and quickly lock the application corresponding to the application icon, and the safety of information in the application can be effectively guaranteed by the user equipment.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another terminal device according to an embodiment of the present invention. The terminal device shown in fig. 5 is optimized by the terminal device shown in fig. 4. In comparison with the terminal device shown in fig. 4, in the terminal device shown in fig. 5:
the locking control unit is further configured to display a set prompt message if the receiving unit receives the first touch screen action for the first time, and lock the application corresponding to the application icon after the authentication unit receives the set first authentication message;
and if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
In the embodiment of the present invention, the authentication unit is further configured to receive the first authentication information, and if the first authentication information is not authenticated, display a second authentication interface; receiving second authentication information, wherein the type of the second authentication information is different from that of the first authentication information;
and the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication.
In this embodiment of the present invention, the service device shown in fig. 5 may further include:
and the sending unit is used for sending warning prompt information to a target terminal bound with the terminal equipment if the second authentication information is not authenticated, and the application control unit hides the application corresponding to the application icon or the locking control unit locks the application preset time length corresponding to the application icon.
In this embodiment of the present invention, the application control unit is further configured to, after the authentication unit displays the first authentication interface, hide the application for a second preset time if the receiving unit receives the information that the hidden application icon is selected and the received first authentication information passes the authentication, where the first authentication interface includes the hidden application icon.
By implementing the user equipment described in fig. 5, the terminal device can make different responses according to different touch screen actions for the application icon when receiving the different touch screen actions, and can simply and quickly lock the application corresponding to the application icon, and the safety of information in the application can be effectively guaranteed by the user equipment. Furthermore, when the first authentication information fails, the user can perform second authentication information authentication, the authentication interface can be a fingerprint screen lock, a pattern screen lock, a character password screen lock or the like, and the two authentication modes are different, so that the user can obtain the opportunity of second authentication under the condition that the first authentication fails, the verification passing probability of the user who sets the locking password is improved, and meanwhile, the safety of the information in the locking application is ensured.
Referring to fig. 6, a schematic block diagram of a terminal device according to another embodiment of the present invention is shown. As shown, the terminal device in this embodiment may include: one or more processors 601; one or more input devices 602, one or more output devices 603, memory 604, and a communication interface 605. The processor 601, the input device 602, the output device 603, the memory 604, and the communication interface 605 are connected by a bus 606. The memory 604 is used for storing computer programs comprising program instructions, the processor 601 is used for executing the program instructions stored by the memory 604, and the communication interface is used for communicating with network elements, wherein the network elements comprise, for example, a virtual machine management center, a shared memory, etc.
The input device 602 is configured to execute a function of the receiving unit, and is configured to receive a first touch screen action, where the first touch screen action is a first preset number of times of clicking an application icon; receiving a second touch screen action, wherein the second touch screen action is used as a second preset number of times of clicking the application icon; and receiving a third touch screen action, wherein the third touch screen action is used for clicking a third preset number of times of the application icon.
The output device 603 is configured to execute a function of the authentication unit, and is configured to display a first authentication interface if the input device 602 receives the third touch screen action; and is further configured to execute a function of a prompting unit, and is configured to display a lock prompting message if the input device 602 receives the second touch screen action.
In this embodiment of the present invention, after the output device 603 displays the first authentication interface, if the first authentication information is not authenticated, the output device 603 displays the second authentication interface.
Wherein the input device 602 is further configured to receive second authentication information, the second authentication information being of a different type than the first authentication information.
The processor 601 is configured to execute a function of a locking control unit, and is configured to lock an application corresponding to an application icon according to a first touch screen action if the input device 602 receives the first touch screen action; and is further configured to execute the function of the application control unit, and is configured to block an instruction to open an application if the input device 602 receives the second touch screen action.
After the input device 602 receives the first touch screen action, if the input device 602 receives the first touch screen action for the first time, the output device 603 displays a setting prompt message, and locks an application corresponding to the application icon after the input device 602 receives the set authentication information; if the input device 602 does not receive the first touch screen action for the first time, the processor 601 locks the application according to the first touch screen action.
Further, if the second authentication information passes the authentication, the processor 601 opens the application corresponding to the application icon.
After the output device 603 displays the first authentication interface, if the input device receives information that the hidden application icon is selected and the received first authentication information passes the authentication, the processor 601 hides the application for a second preset time, and the first authentication interface includes the hidden application icon.
The communication interface 605 is configured to execute a function of the sending unit, and is configured to send a warning prompt message to a target terminal bound to the terminal device if the second authentication information is not authenticated, and the processor 601 hides or locks the application preset time duration corresponding to the application icon locked by the control unit.
It should be understood that in the embodiment of the present invention, the Processor 601 may be a Central Processing Unit (CPU), and the Processor may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 602 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, etc., and the output device 630 may include a display (LCD, etc.), a speaker, etc.
The memory 604 may include both read-only memory and random access memory, and provides instructions and data to the processor 601. A portion of the memory 604 may also include non-volatile random access memory. For example, the memory 604 may also store device type information.
In a specific implementation, the processor 601, the input device 602, and the output device 603 described in this embodiment of the present invention may execute the implementation manners described in the first embodiment and the second embodiment of the method for locking an application provided in this embodiment of the present invention, and may also execute the implementation manner of the terminal device described in this embodiment of the present invention, which is not described herein again.
In another embodiment of the present invention, a computer-readable storage medium is provided that stores a computer program comprising program instructions for execution by a processor.
The computer readable storage medium may be an internal storage unit of the terminal device of any of the foregoing embodiments, for example, a hard disk or a memory of the terminal device. The computer readable storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk provided on the terminal device, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like. Further, the computer-readable storage medium may also include both an internal storage unit of the terminal device and an external storage device. The computer-readable storage medium is used for storing computer programs and other programs and data required by the terminal device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the terminal device and the unit described above may refer to corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed terminal device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Claims (10)

  1. A method of application locking, comprising:
    the method comprises the steps that a terminal device receives a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon; locking an application corresponding to the application icon according to the first touch screen action;
    if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application, wherein the second touch screen action is used for clicking the application icon for a second preset number of times;
    and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is used for clicking the application icon for a third preset number of times.
  2. The method of claim 1, wherein the locking the application corresponding to the application icon according to the first touch screen action comprises:
    if the terminal equipment receives the first touch screen action for the first time, displaying a set prompt message, and locking an application corresponding to the application icon after receiving the set authentication message;
    and if the terminal device does not receive the first touch screen action for the first time, the terminal device locks the application according to the first touch screen action.
  3. The method of claim 1, after said displaying the first authentication interface, further comprising:
    receiving first authentication information, and if the first authentication information is not authenticated, displaying a second authentication interface;
    receiving second authentication information through the second authentication interface, wherein the type of the second authentication information is different from that of the first authentication information;
    and after the second authentication information passes the authentication, opening the application corresponding to the application icon.
  4. The method of claim 3, further comprising:
    and if the second authentication information is not authenticated, sending warning prompt information to a target terminal bound with the terminal equipment, and hiding or locking the application preset duration corresponding to the application icon.
  5. The method of claim 3 or 4, wherein after said displaying the first authentication interface, the method further comprises:
    the first authentication interface comprises a hidden application icon, and if the hidden application icon is selected, the first authentication information is received;
    and if the first authentication information passes the authentication, hiding the second preset duration of the application.
  6. A terminal device, comprising:
    the receiving unit is used for receiving a first touch screen action, wherein the first touch screen action is a first preset number of times of clicking an application icon; receiving a second touch screen action, wherein the second touch screen action is used for clicking the application icon for a second preset number of times; receiving a third touch screen action, wherein the third touch screen action is used for clicking a third preset number of times of the application icon;
    the locking control unit is used for locking the application corresponding to the application icon according to the first touch screen action;
    the prompting unit is used for displaying locking prompting information if the receiving unit receives the second touch screen action;
    the application control unit is used for blocking the instruction of opening the application if the receiving unit receives the second touch screen action;
    and the authentication unit is used for displaying a first authentication interface if the receiving unit receives the third touch screen action.
  7. The terminal device of claim 6,
    the locking control unit is used for displaying and setting prompt information by the prompt unit if the receiving unit receives the first touch screen action for the first time, and locking the application corresponding to the application icon after the authentication unit receives the set first authentication information;
    and if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
  8. The terminal device of claim 6,
    the authentication unit is used for receiving the first authentication information, and if the first authentication information is not authenticated, a second authentication interface is displayed; receiving second authentication information, wherein the type of the second authentication information is different from that of the first authentication information;
    and the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication.
  9. A terminal device comprising a processor, an input device, an output device and a memory, the processor, the input device, the output device and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method according to any one of claims 1 to 5.
  10. A computer-readable storage medium, characterized in that the computer storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to perform the method according to any of claims 1-5.
CN201780096367.XA 2017-08-29 2017-08-29 Application locking method, terminal equipment and computer readable medium Active CN111279339B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/099507 WO2019041136A1 (en) 2017-08-29 2017-08-29 Application locking method, terminal device, and computer readable medium

Publications (2)

Publication Number Publication Date
CN111279339A true CN111279339A (en) 2020-06-12
CN111279339B CN111279339B (en) 2023-07-21

Family

ID=65524783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780096367.XA Active CN111279339B (en) 2017-08-29 2017-08-29 Application locking method, terminal equipment and computer readable medium

Country Status (2)

Country Link
CN (1) CN111279339B (en)
WO (1) WO2019041136A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110007821B (en) 2019-03-28 2021-03-02 维沃移动通信有限公司 Operation method and terminal equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105718768A (en) * 2016-01-12 2016-06-29 广东欧珀移动通信有限公司 Icon misoperation prevention method and device
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120074490A (en) * 2010-12-28 2012-07-06 삼성전자주식회사 Apparatus and method for displaying menu of portable terminal
CN105005436A (en) * 2015-06-26 2015-10-28 宇龙计算机通信科技(深圳)有限公司 Program processing method and mobile terminal
CN106446631A (en) * 2016-09-20 2017-02-22 深圳市金立通信设备有限公司 Method and terminal for checking screen lock notification information

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105718768A (en) * 2016-01-12 2016-06-29 广东欧珀移动通信有限公司 Icon misoperation prevention method and device
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device

Also Published As

Publication number Publication date
WO2019041136A1 (en) 2019-03-07
CN111279339B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
US9754095B2 (en) Unlocking electronic devices using touchscreen input gestures
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN105519038B (en) User input data protection method and system
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
US20130347102A1 (en) Method, Apparatus and System for Access Mode Control of a Device
US20140201831A1 (en) Method and apparatus for authenticating password of user terminal
US9357391B1 (en) Unlocking electronic devices with touchscreen input gestures
CN104866752B (en) A kind of application guard method and user terminal
WO2014029356A1 (en) Method and mobile terminal for enhancing the security of a mobile terminal
WO2014201830A1 (en) Method and device for detecting software-tampering
CN105956431B (en) A kind of application protection processing method and mobile terminal
CN106022077B (en) A kind of unlocking screen method and terminal
CN106355059A (en) Password input method and terminal
WO2019047148A1 (en) Password verification method, terminal, and computer readable storage medium
US8392992B1 (en) Method and apparatus for preventing sensitive data leakage due to input focus misappropriation
CN107422860A (en) Control method, device, storage medium and mobile terminal based on blank screen gesture
CN105005436A (en) Program processing method and mobile terminal
US8726184B2 (en) Systems, apparatus and methods for a messaging system
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
US20140059669A1 (en) Method and mobile terminal for enhancing the security of a mobile terminal
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
WO2020128693A1 (en) Device and method to control access to protected functionality of applications
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN109800548B (en) Method and device for preventing personal information from being leaked

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant