CN106203176A - A kind of application encryption method and device - Google Patents

A kind of application encryption method and device Download PDF

Info

Publication number
CN106203176A
CN106203176A CN201610616217.4A CN201610616217A CN106203176A CN 106203176 A CN106203176 A CN 106203176A CN 201610616217 A CN201610616217 A CN 201610616217A CN 106203176 A CN106203176 A CN 106203176A
Authority
CN
China
Prior art keywords
encryption
screen
intended application
icon
shortcut menu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610616217.4A
Other languages
Chinese (zh)
Inventor
钟新露
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Original Assignee
LeTV Holding Beijing Co Ltd
LeTV Mobile Intelligent Information Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Holding Beijing Co Ltd, LeTV Mobile Intelligent Information Technology Beijing Co Ltd filed Critical LeTV Holding Beijing Co Ltd
Priority to CN201610616217.4A priority Critical patent/CN106203176A/en
Publication of CN106203176A publication Critical patent/CN106203176A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text

Abstract

The embodiment of the invention discloses a kind of application encryption method and device, relate to terminal encryption technical field, wherein, the method includes: when the cryptographic operation being applied on intended application icon being detected, shows encryption shortcut menu on the screen of terminal;When the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption window is to be encrypted described intended application.Embodiment of the present invention cryptographic operation is simple, saves user time.

Description

A kind of application encryption method and device
Technical field
The present invention relates to terminal encryption technical field, particularly relate to a kind of application encryption method and device.
Background technology
Along with the development of science and technology, the application of terminal comes into intellectuality, commercialization.In the terminal, more and more Application software used by people, the APP such as such as social networks, medical treatment are registered, bank service, the account of these application softwaries storage Number all comprise important personal information, when lost terminal or stolen time, it is hidden to there is the biggest safety in the personal information of user Suffer from.
During inventor realizes the present invention, it is found that prior art exists following defect: in prior art, for Improve the safety of the personal information that application software comprises in terminal unit, need to install third party and encrypt application software and realize Encryption to intended application software.During to intended application software cryptography, it is necessary to the third party's encryption opening installation should With software, then add intended application software to be encrypted to third party and encrypt in application software, then be encrypted, operation ratio More complicated, and the time of waste user.
Summary of the invention
In view of this, the embodiment of the present invention provides one application encryption method and device, and cryptographic operation is simple, saves user Time.
First aspect, embodiments provides a kind of application encryption method, including:
When the cryptographic operation being applied on intended application icon being detected, the screen of terminal shows the quick dish of encryption Single;
When the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption window is with right Described intended application is encrypted.
Further, described when the cryptographic operation being applied on intended application icon being detected, on the screen of terminal Display encryption shortcut menu, including:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows encryption shortcut menu.
Further, described default slip gesture is to drag icon slip gesture downwards, upwards, to the left or to the right.
Further, described when the cryptographic operation being applied on intended application icon being detected, on the screen of terminal Display encryption shortcut menu includes:
On icon display interface, when detecting the operation of described intended application icon drag to screen predeterminated position Time, the screen of terminal shows described encryption shortcut menu.
Further, described screen predeterminated position is screen top, bottom, left hand edge or right hand edge.
Further, when detecting that the operation to described encryption shortcut menu triggers, the screen of terminal shows and adds Close window, after being encrypted described intended application, also includes:
When receiving the instruction that intended application has been encrypted, generate encryption identification, and described encryption identification is shown In described intended application icon on icon interface.
Second aspect, embodiments provides a kind of application encryption device, including:
Shortcut menu display module, for when detecting the cryptographic operation being applied on intended application icon, in terminal Screen on show encryption shortcut menu;
Encryption window display module, for when detecting the trigger action to described encryption shortcut menu, in terminal Show on screen that encryption window is to be encrypted described intended application.
Further, described shortcut menu display module, specifically for:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows encryption shortcut menu.
Further, described default slip gesture is to drag icon slip gesture downwards, upwards, to the left or to the right.
Further, described shortcut menu display module, specifically for:
On icon display interface, when detecting the operation of described intended application icon drag to screen predeterminated position Time, the screen of terminal shows described encryption shortcut menu.
Further, described screen predeterminated position is screen top, bottom, left hand edge or right hand edge.
Further, described device also includes: encryption identification generation module, for dish quick to described encryption being detected During single trigger action, the screen of terminal show and encrypts window after described intended application to be encrypted, work as reception During to the instruction that described intended application has been encrypted, generate encryption identification, and described encryption identification is shown at icon interface On described intended application icon in.
A kind of application encryption method that the embodiment of the present invention provides and device, by direct to intended application icon of user Effect realizes the encryption to intended application, and cryptographic operation is simple, saves user time.
Accompanying drawing explanation
By the detailed description that non-limiting example is made made with reference to the following drawings of reading, other of the present invention Feature, purpose and advantage will become more apparent upon:
Fig. 1 is a kind of application encryption method flow chart that the embodiment of the present invention one provides;
Fig. 2 is a kind of application encryption method flow chart that the embodiment of the present invention two provides;
Fig. 3 is a kind of application encryption method flow chart that the embodiment of the present invention three provides;
Fig. 4 is a kind of application encryption device structured flowchart that the embodiment of the present invention four provides.
Detailed description of the invention
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that, in order to just Part related to the present invention is illustrate only rather than full content in description, accompanying drawing.
Embodiment one
Fig. 1 is a kind of application encryption method flow chart that the embodiment of the present invention one provides, and the method can be added by one application Close device performs, and this device is performed by software and/or hardware, and this device is generally disposed at smart mobile phone, panel computer etc. In terminal.As it is shown in figure 1, the application encryption method that the present embodiment provides comprises the steps:
S110: when the cryptographic operation being applied on intended application icon being detected, shows encryption on the screen of terminal Shortcut menu.
In the present embodiment, terminal can be smart mobile phone, panel computer etc..At present, terminal is provided with multiple application, General binding in the wherein personal information of user as the application memory such as wechat, Alipay, and the application such as wechat, Alipay The bank card information of user, the once terminal loss of user, there is the biggest potential safety hazard, therefore user in the personal information of user The application of terminal can be encrypted.
In the present embodiment, when the intended application installed during user is to terminal is encrypted, can directly target be answered It is encrypted operation with icon.Be applied to the cryptographic operation on intended application icon can be long by, gesture of sliding, drag to pre- If trigger actions such as positions, wherein, the cryptographic operation being applied on intended application icon can also is that other form, not office It is limited to above-mentioned trigger action.When terminal detects the cryptographic operation being applied on intended application icon, screen shows Shortcut menu, shortcut menu can be lock core pattern, or can also be other pattern, is used for pointing out user to intended application It is encrypted.When user needs to be encrypted intended application, shortcut menu can be clicked on, when user abandons intended application When being encrypted, user clicks on other positions on screen, and shortcut menu no longer shows, or through after a while (e.g., 10s) After, shortcut menu no longer shows.
S120: when the trigger action to described encryption shortcut menu being detected, shows encryption window on the screen of terminal Mouth is to be encrypted described intended application.
In the present embodiment, trigger action can be click on, long by etc. operation.If be detected that user is to encrypting quick dish Single trigger action, shows encryption window on a terminal screen, otherwise, does not show encryption window.Wherein, encryption window shows Content can be to prompt the user whether again to be encrypted, be that then terminal detects certainly encryption if user clicks on Instructing, show the region of input password in encryption window, user can be at the region input password of input password to answer target With being encrypted.If user clicks on no, i.e. user abandons the encryption to intended application, then terminal detects the finger of encryption negative Order, no longer shows encryption window.In encryption window, the input cryptographic zone of display can input the password of various ways, permissible It is digital and/or alphabetical combination, it is also possible to be figure, word etc..
In the present embodiment, when user needs to open the most encrypted intended application, the target after encryption can be clicked on Application icon, terminal can detect that user triggers the operation of the intended application icon after encryption, show Password Input on screen Window, user can input password in Password Input window.If be detected that input when the password of user's input and encryption Password is identical, then open the intended application of encryption.
Concrete, the present embodiment, during encrypting intended application, can realize above-mentioned application encryption side by being used for The code of method is integrated in operating system, when user needs to be encrypted intended application (such as, wechat), work i.e. detected Use the cryptographic operation on intended application icon, then next for realizing the code of above-mentioned application encryption method in call operation system Perform encryption to intended application, such that it is able to make intended application icon before encryption with encryption after position keep constant, energy Enough make user easily find intended application icon according to the custom of oneself, facilitate user to open intended application, and cryptographic operation Simply, save the time of user, be conducive to improving the experience of user.
The application encryption method that the present embodiment provides, is realized intended application the effect of intended application icon by user Encryption, cryptographic operation is simple, saves user time.
Embodiment two
Fig. 2 is a kind of application encryption method flow chart that the embodiment of the present invention two provides, on the basis of above-described embodiment one On, optionally, described when the cryptographic operation being applied on intended application icon being detected, the screen of terminal shows encryption Shortcut menu includes:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows encryption shortcut menu.
Thus, the slip gesture being applied on intended application icon by detection judges whether that quick dish is encrypted in display Single, simple to operate, facilitate user that intended application is encrypted.
Optionally, when the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption Window is after being encrypted described intended application, and the method also includes:
When receiving the instruction that described intended application has been encrypted, generate encryption identification, and by described encryption identification In the display described intended application icon on icon interface.
Thus, shown in the intended application icon on icon interface by encryption identification, facilitate user's understanding figure to demarcate The encryption situation of the application icon on face.
As in figure 2 it is shown, the application encryption method that the present embodiment provides comprises the steps:
S210: on icon display interface, obtains the slip gesture being applied on described intended application icon.
In the present embodiment, the slip gesture of described acquisition is to drag icon slip hands downwards, upwards, to the left or to the right Gesture.Wherein, slip gesture can also is that the slip gesture dragging the icon direction to other, such as, drags icon and carries out upper right Slide, sliding in upper left, slides in bottom right, slides in lower-left or dragging icon carries out picture shape etc., and wherein, dragging icon can draw Circle, L-shaped or heart etc..
S220: when the slip gesture obtained is consistent with default slip gesture, shows that on the screen of terminal encryption is quick Menu.
In the present embodiment, triggering terminal screen shows that the slip gesture needs of encryption shortcut menu pre-set, in advance The slip gesture first arranged could be arranged to drag icon slip gesture downwards, upwards, to the left or to the right.Or can also is that The slip gesture of other forms.Such as, the slip gesture preset is the slip gesture dragging icon slide downward, when user is to micro- When letter is encrypted, if user drags the icon slide downward of wechat, terminal detects that user is applied on wechat icon Slip gesture is consistent with the slip gesture preset, and can show encryption shortcut menu on screen.
S230: when the trigger action to described encryption shortcut menu being detected, shows encryption window on the screen of terminal Mouth is to be encrypted described intended application.
S240: when receiving the instruction having encrypted described intended application, generates encryption identification, and by described encryption In the mark display described intended application icon on icon interface.
In the present embodiment, encryption identification is preferably lock shape mark, and wherein, the color of lock shape mark is preferably yellow, adds Secret mark knows the mark that can also is that other, and shape and color for encryption identification are not construed as limiting.When intended application has been encrypted Cheng Shi, encryption identification shows the predeterminated position of the intended application icon on icon interface.Concrete, encryption identification can show In the upper left corner of intended application icon, the upper right corner, the lower left corner, the lower right corner or centre position, wherein, encryption identification can also show Show other positions at intended application icon.By generating encryption identification, and encryption identification is shown the mesh on icon interface In mark application icon, it is possible to facilitate user to understand and icon interface is applied the information whether encrypted.
Present embodiments providing a kind of application encryption method, the slip gesture judgement being applied to intended application by user is No display encryption shortcut menu, simple to operate, show in the intended application icon on icon interface by encryption identification, it is possible to Whether prompting ownership goal application icon has been carried out encryption, facilitates user to understand the encryption of the application icon on icon interface Situation.
Embodiment three
Fig. 3 is a kind of application encryption method flow chart that the embodiment of the present invention three provides, optionally, described when work being detected When using the cryptographic operation on intended application icon, the screen of terminal shows encryption shortcut menu includes:
On icon display interface, when detecting the operation of described intended application icon drag to screen predeterminated position Time, the screen of terminal shows encryption shortcut menu.
Thus, fast by detecting whether to judge whether intended application icon drag to screen predeterminated position to generate encryption Prompt menu, simple to operate, intended application is encrypted by beneficially user.
As it is shown on figure 3, the application encryption method that the present embodiment provides comprises the steps:
S310: on icon display interface, when detecting described intended application icon drag to screen predeterminated position During operation, the screen of terminal shows encryption shortcut menu.
In the present embodiment, screen predeterminated position is screen top, bottom, left hand edge or right hand edge.Wherein, should by target Being a trigger action with the predeterminated position of icon drag to screen, intended application icon still returns to original position, works as terminal When this trigger action being detected, screen will show encryption shortcut menu.
Such as, if the predeterminated position of screen is set to the top of screen, when user needs " Alipay " in terminal When application is encrypted, in icon display interface, press the icon of Alipay with the head of a household, and by this Alipay icon drag to screen The top of curtain, terminal can detect user's operation by Alipay icon drag to screen top, shows encryption on screen Shortcut menu.Wherein, when Alipay icon is no longer acted on by user, this icon returns to original position, it is possible to convenient User understands the position of each icon in icon display interface according to the custom of oneself, and facilitates user to enter the application after encryption Row unlocks.
S320: when the trigger action to described encryption shortcut menu being detected, shows encryption window on the screen of terminal Mouth is to be encrypted described intended application.
S330: when receiving the instruction having encrypted described intended application, generates encryption identification, and by described encryption In the mark display described intended application icon on icon interface.
Present embodiments provide a kind of application encryption method, pre-to screen by detecting whether intended application icon drag If position judges whether to generate encryption shortcut menu, simple to operate, intended application is encrypted by beneficially user.
Embodiment four
Fig. 4 is a kind of application encryption device structured flowchart that the embodiment of the present invention four provides, and this device is used for performing application Encryption method, as shown in Figure 4, described device includes shortcut menu display module 410 and encryption window display module 420.
Wherein, shortcut menu display module 410, for when the cryptographic operation being applied on intended application icon being detected Time, the screen of terminal shows encryption shortcut menu;
Encryption window display module 420, for when detecting the trigger action to described encryption shortcut menu, in terminal Screen on show encryption window so that described intended application is encrypted.
Optionally, shortcut menu display module 410, specifically for:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows encryption shortcut menu.
Optionally, described default slip gesture is to drag icon slip gesture downwards, upwards, to the left or to the right.
Optionally, shortcut menu display module 410, specifically for:
On icon display interface, when detecting the operation of described intended application icon drag to screen predeterminated position Time, the screen of terminal shows encryption shortcut menu.
Optionally, described screen predeterminated position is screen top, bottom, left hand edge or right hand edge.
Optionally, described encryption shortcut menu is lock shape pattern.
Optionally, encryption identification generation module 430, for detecting the triggering to described encryption shortcut menu in described working as During operation, the screen of terminal shows encryption window after described intended application is encrypted, when receiving described During the instruction that intended application has been encrypted, generate encryption identification, and described encryption identification is shown described on icon interface In intended application icon.Wherein, described encryption identification is lock shape mark.
Above-mentioned device can perform the method that any embodiment of the present invention is provided, and possesses execution method corresponding function mould Block and beneficial effect.
A kind of application encryption device that the embodiment of the present invention provides, it is right to be realized the effect of intended application icon by user The encryption of intended application, cryptographic operation is simple, is conducive to improving Consumer's Experience.
The embodiment of the present invention also provides for a kind of storage medium comprising computer executable instructions, and described computer can perform Instruction is used for when being performed by computer processor performing a kind of application encryption method, and the method includes:
When the cryptographic operation being applied on intended application icon being detected, the screen of terminal shows the quick dish of encryption Single;
When the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption window is with right Described intended application is encrypted.
Optionally, this computer executable instructions can be also used for when being performed by computer processor perform the present invention appoint A kind of technical scheme applying encryption method that meaning embodiment is provided.
By the description above with respect to embodiment, those skilled in the art it can be understood that arrive, the present invention Can realize by software and required common hardware, naturally it is also possible to realized by hardware, but a lot of in the case of the former is more Good embodiment.Based on such understanding, prior art is contributed by technical scheme the most in other words Part can embody with the form of software product, and this computer software product can be stored in computer-readable recording medium In, such as the floppy disk of computer, read only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions with so that a computer sets Standby (can be personal computer, server, or the network equipment etc.) performs the method described in each embodiment of the present invention.
Note, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious change, Readjust and substitute without departing from protection scope of the present invention.Therefore, although by above example, the present invention is carried out It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other Equivalent embodiments more can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (12)

1. an application encryption method, it is characterised in that including:
When the cryptographic operation being applied on intended application icon being detected, the screen of terminal shows encryption shortcut menu;
When the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption window is with to described Intended application is encrypted.
Method the most according to claim 1, it is characterised in that described ought detecting is applied to adding on intended application icon During close operation, the screen of terminal shows encryption shortcut menu, including:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows described encryption shortcut menu.
Method the most according to claim 2, it is characterised in that described default slip gesture for drag icon downwards, upwards, Slip gesture to the left or to the right.
Method the most according to claim 1, it is characterised in that described ought detecting is applied to adding on intended application icon During close operation, the screen of terminal shows encryption shortcut menu includes:
On icon display interface, when the operation by described intended application icon drag to screen predeterminated position being detected, Described encryption shortcut menu is shown on the screen of terminal.
Method the most according to claim 4, it is characterised in that described screen predeterminated position is screen top, bottom, the left side Edge or right hand edge.
Method the most according to claim 1, it is characterised in that the trigger action to described encryption shortcut menu detected Time, the screen of terminal shows encryption window after described intended application is encrypted, described method also includes:
When receiving the instruction that described intended application has been encrypted, generate encryption identification, and described encryption identification is shown In described intended application icon on icon interface.
7. the device applying encryption, it is characterised in that including:
Shortcut menu display module, for when detecting the cryptographic operation being applied on intended application icon, at the screen of terminal Encryption shortcut menu is shown on curtain;
Encryption window display module, for when detecting the trigger action to described encryption shortcut menu, at the screen of terminal Upper display encryption window is to be encrypted described intended application.
Device the most according to claim 7, it is characterised in that described shortcut menu display module, specifically for:
On icon display interface, obtain the slip gesture being applied on described intended application icon;
When the slip gesture obtained is consistent with default slip gesture, the screen of terminal shows encryption shortcut menu.
Device the most according to claim 8, it is characterised in that described default slip gesture for drag icon downwards, upwards, Slip gesture to the left or to the right.
Device the most according to claim 7, it is characterised in that described shortcut menu display module, specifically for:
On icon display interface, when the operation by described intended application icon drag to screen predeterminated position being detected, Described encryption shortcut menu is shown on the screen of terminal.
11. devices according to claim 10, it is characterised in that described screen predeterminated position is screen top, bottom, a left side Edge or right hand edge.
12. devices according to claim 7, it is characterised in that described device also includes: encryption identification generation module, use In when the trigger action to described encryption shortcut menu being detected, the screen of terminal shows encryption window is with to described mesh After mark application is encrypted, when receiving the instruction that described intended application has been encrypted, generate encryption identification, and by institute State in the described intended application icon that encryption identification shows on icon interface.
CN201610616217.4A 2016-07-29 2016-07-29 A kind of application encryption method and device Pending CN106203176A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610616217.4A CN106203176A (en) 2016-07-29 2016-07-29 A kind of application encryption method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610616217.4A CN106203176A (en) 2016-07-29 2016-07-29 A kind of application encryption method and device

Publications (1)

Publication Number Publication Date
CN106203176A true CN106203176A (en) 2016-12-07

Family

ID=57497920

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610616217.4A Pending CN106203176A (en) 2016-07-29 2016-07-29 A kind of application encryption method and device

Country Status (1)

Country Link
CN (1) CN106203176A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133531A (en) * 2017-05-24 2017-09-05 北京小米移动软件有限公司 The use based reminding method and device of application lock
CN107194236A (en) * 2017-05-24 2017-09-22 深圳天珑无线科技有限公司 One kind application decryption method and device
CN107273721A (en) * 2017-06-14 2017-10-20 深圳天珑无线科技有限公司 To the processing method and processing device of application
US10862686B2 (en) 2017-09-07 2020-12-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Application decryption method, terminal and non-transitory computer-readable storage medium
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN105205374A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Application program encrypting method and user terminal
CN105320868A (en) * 2014-12-22 2016-02-10 维沃移动通信有限公司 Application encryption method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102334306A (en) * 2011-07-18 2012-01-25 华为终端有限公司 Information instant enciphering and deciphering method and device
CN103488918A (en) * 2013-09-18 2014-01-01 广东欧珀移动通信有限公司 Application encrypting method and device for intelligent terminal
CN105320868A (en) * 2014-12-22 2016-02-10 维沃移动通信有限公司 Application encryption method and mobile terminal
CN104850801A (en) * 2015-06-09 2015-08-19 广东欧珀移动通信有限公司 File encryption method and file encryption device
CN105205374A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Application program encrypting method and user terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107133531A (en) * 2017-05-24 2017-09-05 北京小米移动软件有限公司 The use based reminding method and device of application lock
CN107194236A (en) * 2017-05-24 2017-09-22 深圳天珑无线科技有限公司 One kind application decryption method and device
CN107133531B (en) * 2017-05-24 2020-09-11 北京小米移动软件有限公司 Application lock use reminding method and device
CN107273721A (en) * 2017-06-14 2017-10-20 深圳天珑无线科技有限公司 To the processing method and processing device of application
US10862686B2 (en) 2017-09-07 2020-12-08 Guangdong Oppo Mobile Telecommunications Corp., Ltd. Application decryption method, terminal and non-transitory computer-readable storage medium
CN112948843A (en) * 2021-01-27 2021-06-11 维沃移动通信有限公司 Encryption method, encryption device, electronic equipment and medium

Similar Documents

Publication Publication Date Title
US10318717B2 (en) Message display method and apparatus
CN106203176A (en) A kind of application encryption method and device
CN104573552B (en) A kind of method and device of hiden application icon
WO2016045469A1 (en) Information encryption method and mobile terminal
WO2017020427A1 (en) Application program access method and terminal
CN104123164B (en) A kind of startup method and apparatus of application program
US10846412B2 (en) Electronic device including display and method of encrypting and decrypting information
CN104834449A (en) Mobile terminal icon managing method and device
CN101794365B (en) The method of safely inputting information and mobile terminal on mobile terminals
CN108021830B (en) Information processing method and electronic equipment
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
US20150020018A1 (en) Method, Apparatus, Terminal And Storage Medium For Inputting Information
US10019590B2 (en) Secure mobile phone document storage application
CN102880305A (en) Keyboard input encryption method and mobile terminal thereof
WO2016101813A1 (en) Method and device for unlocking user interface
US20190384924A1 (en) Electronic device and method of providing information for display
EP3203407A1 (en) Information processing method and information processing device
CN105022965B (en) A kind of data ciphering method and device
CN106709362A (en) File encryption method and device and file decryption method and device
CN105204755A (en) Soft keyboard operation method and terminal
CN106528007A (en) Printing control system and printing method thereof
CN103902205B (en) A kind of information processing method and electronic equipment
CN104392158A (en) Mobile terminal unlocking method and mobile terminal
CN104636041B (en) A kind of multifile fast selecting method and system based on touch screen
CN105930068A (en) Personal hotspot quick control method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20161207

WD01 Invention patent application deemed withdrawn after publication