CN106295294A - Method for controlling mobile terminal and device - Google Patents
Method for controlling mobile terminal and device Download PDFInfo
- Publication number
- CN106295294A CN106295294A CN201610619357.7A CN201610619357A CN106295294A CN 106295294 A CN106295294 A CN 106295294A CN 201610619357 A CN201610619357 A CN 201610619357A CN 106295294 A CN106295294 A CN 106295294A
- Authority
- CN
- China
- Prior art keywords
- identification information
- specific
- application
- fingerprint
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000001755 vocal effect Effects 0.000 claims description 26
- 238000005516 engineering process Methods 0.000 abstract description 17
- 210000003811 finger Anatomy 0.000 description 32
- 210000003813 thumb Anatomy 0.000 description 18
- 238000004891 communication Methods 0.000 description 11
- 210000005224 forefinger Anatomy 0.000 description 9
- 238000010586 diagram Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 210000004932 little finger Anatomy 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 230000005236 sound signal Effects 0.000 description 4
- 230000000712 assembly Effects 0.000 description 3
- 238000000429 assembly Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 208000031481 Pathologic Constriction Diseases 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 2
- PCHJSUWPFVWCPO-UHFFFAOYSA-N gold Chemical compound [Au] PCHJSUWPFVWCPO-UHFFFAOYSA-N 0.000 description 2
- 229910052737 gold Inorganic materials 0.000 description 2
- 239000010931 gold Substances 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 210000001215 vagina Anatomy 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000004807 localization Effects 0.000 description 1
- 239000012092 media component Substances 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 229910052709 silver Inorganic materials 0.000 description 1
- 239000004332 silver Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The disclosure is directed to method for controlling mobile terminal and device, described method includes: application-specific be associated one to one with identification information specific;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to identification information specific;When the identification information judging that user inputs belongs to identification information specific, start the application-specific that the identification information with described user input is associated one to one.The technology of the disclosure makes the identification information specific only inputted by user could start the application-specific of correspondence, rather than anyone can start application-specific.Therefore; the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects individual subscriber privacy application program; such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
Description
Technical field
It relates to communication technical field, particularly relate to method for controlling mobile terminal and device.
Background technology
Along with being on the increase of smart mobile phone function, large-size screen monitors smart mobile phone and portable computer increasingly become individual can not or
The Communication social tool lacked, people also put into the packing of increasing individual privacy among mobile phone.Individual privacy safety
Problem starts to perplex everyone, and the intelligent terminal APP such as Net silver, the credit card, track record, living habit, family's privacy etc. is complete
Portion is included in mobile phone.So, except the use habit formed at ordinary times, protect outside oneself mobile phone do not loses, also want
Note the protection work of mobile phone private.Therefore, the personal secrets protection of smart machine terminal APP increasingly becomes a lot of user's
Hard requirement.
Now, there is cell phone system can accomplish to open application " attending to anything else " functions such as two wechat, as flat simultaneously
Row space APP, is so easy to user and uses the APP of two said functions on a mobile phone simultaneously, but the use simultaneously exposed
Family privacy concern, such as user are not intended to them and know oneself there are two micro-signals when adding wechat good friend, the mobile phone quilt of oneself
Oneself is with two micro-signals, the person and one of them micro-signal good friend does not leaf through to be not intended to allow people see when leafing through.
Summary of the invention
For overcoming problem present in correlation technique, disclosure embodiment provides method for controlling mobile terminal and device.
First aspect according to disclosure embodiment, it is provided that a kind of method for controlling mobile terminal, including:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start defeated with described user
The application-specific that the identification information entered is associated one to one.
Alternatively, described identification information specific includes fingerprint identification information, cipher code recognition information and verbal instructions identification letter
At least one in breath.
Alternatively, described application-specific is associated one to one with identification information specific, including:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one
The fingerprint identification information of fingerprint is associated one to one.
Alternatively, described method also includes:
Hide in described application-specific all or part of;
Judge whether identification information that described user inputs belongs to be associated one to one with the application-specific hidden
Identification information specific;
It is associated one to one with the application-specific hidden when judging that identification information that described user inputs belongs to
During identification information specific, show the application-specific that the identification information with described user input is associated one to one.
Alternatively, described when judge that the identification information that described user input belongs to and hiding application-specific a pair
During the identification information specific that is associated, show the application-specific journey that the identification information with described user input is associated one to one
Sequence, including:
It is associated one to one with the application-specific hidden when judging that identification information that described user inputs belongs to
During identification information specific, start the application-specific that the identification information with described user input is associated one to one.
Second aspect according to disclosure embodiment, it is provided that a kind of mobile terminal controls device, including:
Relating module, is configured to be associated application-specific one to one with identification information specific;
Receiver module, is configured to receive the identification information of user's input;
First judge module, is configured to judge whether the identification information that described user inputs belongs to described specific identification letter
Breath;
Start module, be configured as the identification information that described first judge module judges that described user inputs and belong to institute
When stating identification information specific, start the application-specific that the identification information with described user input is associated one to one.
Alternatively, described identification information specific includes fingerprint identification information, cipher code recognition information and verbal instructions identification letter
At least one in breath.
Alternatively, described relating module is configured to:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one
The fingerprint identification information of fingerprint is associated one to one.
Alternatively, described device also includes:
Hide module, be configured to all or part of in hiding described application-specific;
Second judge module, is configured to judge whether the identification information that described user inputs belongs to and described hiding module
The identification information specific that the application-specific hidden is associated one to one;
Display module, be configured as the identification information that described second judge module judges that described user inputs belong to
During the identification information specific that the application-specific that described hiding module is hidden is associated one to one, display inputs with described user
The application-specific that is associated one to one of identification information.
Alternatively, described display module also includes:
Promoter module, is configured as the identification information that described second judge module judges that described user inputs and belongs to
During the identification information specific that the application-specific hidden with described hiding module is associated one to one, start defeated with described user
The application-specific that the identification information entered is associated one to one.
The third aspect according to disclosure embodiment, it is provided that a kind of mobile terminal controls device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start defeated with described user
The application-specific that the identification information entered is associated one to one.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Disclosure embodiment provides method for controlling mobile terminal and device, by by application-specific and specific identification
Information is associated one to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to specific knowledge
Other information;When the identification information judging that user inputs belongs to identification information specific, start and the identification of described user input
The application-specific that information is associated one to one so that the identification information specific only inputted by user could start correspondence
Application-specific, rather than anyone can start application-specific.Therefore, the mobile terminal of the disclosure controls technology profit
Individual subscriber privacy application program, such as mobile terminal APP is protected by the identification information specific of user's input, seamless and significantly
Improve and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of method for controlling mobile terminal shown in the disclosure one exemplary embodiment;
Fig. 2 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment;
Fig. 3 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment;
Fig. 4 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment;
Fig. 5 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment;
Fig. 6 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment;
Fig. 7 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of mobile terminal control technology, by application-specific being believed with specific identification
Breath is associated one to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to specific identification
Information;When the identification information judging that user inputs belongs to identification information specific, start and the identification information one of user's input
The application-specific being associated to one so that the identification information specific only inputted by user could start the specific of correspondence
Application program, rather than anyone can start application-specific.Therefore, the mobile terminal control technology of the disclosure utilizes user
The identification information specific of input protects individual subscriber privacy application program, such as mobile terminal APP, seamless and substantially increase
Protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
Fig. 1 is the flow chart according to a kind of method for controlling mobile terminal shown in the disclosure one exemplary embodiment, the party
Method comprises the following steps S110, S120, S130, S140:
In step s 110, application-specific is associated one to one with identification information specific.
In one embodiment, application-specific refers in multiple application programs, and user is not intended to others and starts
Application program.Such as, in multiple APP of mobile terminal, user may want to such as social media APP, bank finance
The APP such as APP, Email APP can not arbitrarily be started by others and check, i.e. can be by these social media APP, bank's gold
Melt APP, Email APP as application-specific.
In the step s 120, the identification information of user's input is received.
In one embodiment, identification information specific includes that fingerprint identification information, cipher code recognition information and verbal instructions are known
At least one in other information.In the terminal, can be the most corresponding with application-specific by identification information specific
Ground association, and this incidence relation is stored.
In one embodiment, finger print information, cipher code recognition information and verbal instructions identification are included when identification information specific
During information, i.e. some application-specific can be associated one to one with fingerprint identification information, and other application-specific
Can be associated one to one with cipher code recognition information, also have some can be associated one to one with verbal instructions identification information.Refer to
Stricture of vagina identification information can be received and recognized by fingerprint identification module.Cipher code recognition information can be by physical keyboard or by
Instruction, the dummy keyboard shown by touch screen or the instruction of key-press input of key input.Verbal instructions can be by mobile whole
The voice messaging of the mike input of end, voice messaging can be word, letter, numeral, music or insignificant sound.
In step s 130, it is judged that whether the identification information of user's input belongs to identification information specific.
In one embodiment, when identification information specific is fingerprint identification information, it is judged that the fingerprint recognition of user's input
Whether information belongs to the fingerprint identification information being associated one to one with application-specific.In one embodiment, when specific knowledge
When other information is cipher code recognition information, it is judged that whether the cipher code recognition information of user's input belongs to application-specific one to one
The cipher code recognition information being associated.In one embodiment, when identification information specific is verbal instructions identification information, it is judged that use
Whether the verbal instructions identification information of family input belongs to the verbal instructions identification information being associated one to one with application-specific.
In step S140, when the identification information judging that user inputs belongs to identification information specific, start and user
The application-specific that the identification information of input is associated one to one.
In one embodiment, when identification information specific is fingerprint identification information, when the fingerprint judging that user inputs
Identification information belongs to the fingerprint identification information being associated one to one with application-specific, then start the identification letter with user's input
The application-specific that breath is associated one to one.Such as, when the fingerprint recognition of application-specific A Yu the right hand thumb of user
When information is associated one to one, when judging that the fingerprint identification information that user inputs belongs to and application-specific A phase one to one
The fingerprint identification information of the right hand thumb of the user of association, then start application-specific A.
In one embodiment, when identification information specific is verbal instructions identification information, when judging what user inputted
Verbal instructions identification information belongs to the verbal instructions identification information being associated one to one with application-specific, then start and user
The application-specific that the identification information of input is associated one to one.Such as, know with special sound password when application-specific C
When other information is associated one to one, when judging that the verbal instructions identification information that user inputs belongs to and application-specific C mono-
The special sound password identification information being associated to one, then start application-specific C.
According to the method for controlling mobile terminal of disclosure embodiment, by by application-specific and identification information specific one
It is associated to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to identification information specific;
When the identification information judging that user inputs belongs to identification information specific, start and the identification information phase one to one of user's input
The application-specific of association so that the identification information specific only inputted by user could start the application-specific journey of correspondence
Sequence, rather than anyone can start application-specific.Therefore, the mobile terminal control technology of the disclosure utilizes user to input
Identification information specific protects individual subscriber privacy application program, such as mobile terminal APP, seamless and substantially increase and protect
Mobile terminal APP privacy safeguard protection, improves the experience of user operation.
In one embodiment, step S110 may include that when identification information specific is fingerprint identification information, by specific
Application program is associated one to one with the fingerprint identification information comprising at least one fingerprint of user.
In one embodiment, when there being 10 application-specific, can be by 10 application-specific A to J and use
The fingerprint identification information of at least one fingerprint comprised in 10 fingers at family is associated one to one and is associated one to one.Hereinafter say
The situation that a bright application-specific is associated one to one with the fingerprint of a finger of user.Such as, by application-specific journey
Sequence A is corresponding with the fingerprint of right hand thumb, application-specific B is corresponding with the fingerprint of right hand forefinger, by application-specific
Program C is corresponding with the fingerprint of right hand middle finger, and application-specific D is corresponding with the fingerprint of right ring finger, answers specific
Corresponding with the fingerprint of right hand little finger by program E, application-specific F is corresponding with the fingerprint of left hand thumb, by spy
Determine application program G corresponding with the fingerprint of left index finger, application-specific H is corresponding with the fingerprint of left hand middle finger, by spy
Determine fingerprint nameless with left hand for application program I corresponding, application-specific J is corresponding with the fingerprint of left hand little finger.
The situation that one application-specific of following description is associated one to one with the fingerprint of at least finger of user.
In one embodiment, when there being 10 application-specific, can comprising 10 application-specific A to J and user
The fingerprint identification information of at least one fingerprint in 10 fingers is associated one to one and is associated one to one.Such as, answer specific
Corresponding with the fingerprint of right hand thumb by program A, application-specific B is corresponding with the fingerprint of right hand forefinger, by specific
Application program C is corresponding with the fingerprint of right hand middle finger, application-specific D is corresponding with the fingerprint of right ring finger, by spy
Determine application program E corresponding with the fingerprint of right hand little finger, by application-specific F and the fingerprint and the right side that comprise right hand thumb
The fingerprint identification information of the fingerprint of hands forefinger is corresponding, by application-specific G with comprise the fingerprint of right hand thumb, the right hand food
Refer to fingerprint corresponding with the fingerprint identification information of right hand middle finger, by application-specific H with comprise right hand forefinger fingerprint and
The fingerprint identification information of right hand middle finger is corresponding, by application-specific I and the fingerprint and the right ring finger that comprise right hand middle finger
Fingerprint identification information corresponding, application-specific J is known with the fingerprint comprising the fingerprint of right hand thumb and right hand middle finger
Other information is corresponding.In the case, it is only necessary to the fingerprint of a right hand can be just 10 even more application-specific journeys
Sequence arranges identification information specific.
According to the method for controlling mobile terminal of disclosure embodiment, by being fingerprint identification information when identification information specific
Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user so that only
The particular fingerprint identification information inputted by user could start the application-specific of correspondence, rather than anyone can start spy
Determine application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user
Individual privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy and protect safely
Protect, improve the experience of user operation.
Fig. 2 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment, should
Method comprises the following steps S210, S220, S230:
In step S210, hide in described application-specific all or part of.
In one embodiment, application-specific can be hidden, unless user have input and the application-specific hidden
The identification information specific that program is corresponding one to one, just can show hidden application-specific, even performs the spy hidden
Determine application program.
In step S220, it is judged that whether the identification information of user's input belongs to the application-specific hidden one to one
The identification information specific being associated.
In step S230, when judging that the identification information that user inputs belongs to the application-specific hidden one to one
During the identification information specific being associated, show the application-specific that the identification information with user's input is associated one to one.
Fig. 3 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment, should
Step S210 in method is identical with step S210 shown in S220 with Fig. 2 and S220, and step S230 in Fig. 3 also includes
Step S330.
In step S330, when judging that the identification information that user inputs belongs to the application-specific hidden one to one
During the identification information specific being associated, start the application-specific that the identification information with user's input is associated one to one.That is,
When judging that the identification information that user inputs belongs to the identification information specific being associated one to one with the application-specific hidden
Time, not only show, and start the application-specific that the identification information with user's input is associated one to one.
According to the method for controlling mobile terminal of disclosure embodiment, by hide whole in described application-specific or
A part;Judge whether the identification information that user inputs belongs to the specific knowledge being associated one to one with the application-specific hidden
Other information;When judging that the identification information that user inputs belongs to the specific knowledge being associated one to one with the application-specific hidden
During other information, show the application-specific that the identification information with user's input is associated one to one so that only pass through user
The identification information specific of input could show the application-specific of correspondence, rather than anyone can see application-specific.
Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects the application of individual subscriber privacy
Program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection, improve user
The experience of operation.
Method for controlling mobile terminal referring to the concrete application scenarios explanation disclosure.
In one scenario, it would be desirable to the mobile terminal APP of secret protection, the such as social software the most main wechat of main wechat
Number, it is defined as A, and auxiliary wechat be that is to say, and wechat " small size " is defined as B, and other owners are thought the APP of secret protection, such as
Mobile banking, is defined as C.Operating system for mobile terminal arranges fingerprint recognition secret protection APP function, is simultaneously entered corresponding
Finger print information, and its corresponding secret protection APP is mated in advance.In this case, it is possible to by main wechat A, auxiliary micro-
Letter B and Mobile banking C respectively from different fingerprint identification information, such as, right hand thumb fingerprint, right hand index fingerprint and the right hand
Middle finger fingerprint is associated one to one.If user is when using double wechat function of mobile terminal, if want to open main wechat A, can
To use right hand thumb finger print information set in advance, if want to open auxiliary wechat B, it is possible to use the right hand set in advance is eaten
Refer to finger print information.In one embodiment, user can show main wechat A the most on mobile terminals, hides auxiliary wechat B.At this
In the case of, if use index fingerprint information set in advance, auxiliary wechat B can be shown on mobile terminals, the most permissible
Perform auxiliary wechat B.That is, mobile desktop only shows the APP mark of main wechat A, and the mark of auxiliary wechat B is only using forefinger to make
It is not hidden during for fingerprint identification module.Equally, Mobile banking C can also be carried out by user by using middle finger finger print information
Secret protection.In one embodiment, the fingerprint information set and typing is different can be passed through, and with list set in advance
One or the fingerprint identification information of various combination carry out the secret protection of different application programs.
Fig. 4 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment.This device
Including relating module 410, receiver module the 420, first judge module 430, start module 440.
Relating module 410 is configured to be associated application-specific one to one with identification information specific.
In one embodiment, application-specific refers in multiple application programs, and user is not intended to others and starts
Application program.Such as, in multiple APP of mobile terminal, user may want to such as social media APP, bank finance
The APP such as APP, Email APP can not arbitrarily be started by others and check, i.e. can be by these social media APP, bank's gold
Melt APP, Email APP as application-specific.
Receiver module 420 is configured to receive the identification information of user's input.
In one embodiment, identification information specific includes that fingerprint identification information, cipher code recognition information and verbal instructions are known
At least one in other information.In the terminal, can be the most corresponding with application-specific by identification information specific
Ground association, and this incidence relation is stored.
In one embodiment, finger print information, cipher code recognition information and verbal instructions identification are included when identification information specific
During information, i.e. some application-specific can be associated one to one with fingerprint identification information, and other application-specific
Can be associated one to one with cipher code recognition information, also have some can be associated one to one with verbal instructions identification information.Refer to
Stricture of vagina identification information can be received and recognized by fingerprint identification module.Cipher code recognition information can be by physical keyboard or by
Instruction, the dummy keyboard shown by touch screen or the instruction of key-press input of key input.Verbal instructions can be by mobile whole
The voice messaging of the mike input of end, voice messaging can be word, letter, numeral, music or insignificant sound.
First judge module 430 is configured to judge whether the identification information that user inputs belongs to identification information specific.
In one embodiment, when identification information specific is fingerprint identification information, it is judged that the fingerprint recognition of user's input
Whether information belongs to the fingerprint identification information being associated one to one with application-specific.In one embodiment, when specific knowledge
When other information is cipher code recognition information, it is judged that whether the cipher code recognition information of user's input belongs to application-specific one to one
The cipher code recognition information being associated.In one embodiment, when identification information specific is verbal instructions identification information, it is judged that use
Whether the verbal instructions identification information of family input belongs to the verbal instructions identification information being associated one to one with application-specific.
Start module 440 to be configured as the identification information that the first judge module 430 judges that user inputs and belong to specific
During identification information, start the application-specific that the identification information with user's input is associated one to one.
In one embodiment, when identification information specific is fingerprint identification information, when the fingerprint judging that user inputs
Identification information belongs to the fingerprint identification information being associated one to one with application-specific, then start the identification letter with user's input
The application-specific that breath is associated one to one.Such as, when the fingerprint recognition of application-specific A Yu the right hand thumb of user
When information is associated one to one, when judging that the fingerprint identification information that user inputs belongs to and application-specific A phase one to one
The fingerprint identification information of the right hand thumb of the user of association, then start application-specific A.
In one embodiment, when identification information specific is verbal instructions identification information, when judging what user inputted
Verbal instructions identification information belongs to the verbal instructions identification information being associated one to one with application-specific, then start and user
The application-specific that the identification information of input is associated one to one.Such as, know with special sound password when application-specific C
When other information is associated one to one, when judging that the verbal instructions identification information that user inputs belongs to and application-specific C mono-
The special sound password identification information being associated to one, then start application-specific C.
Mobile terminal according to disclosure embodiment controls device, by relating module, is configured to application-specific journey
Sequence is associated one to one with identification information specific;Receiver module, is configured to receive the identification information of user's input;First judges
Module, is configured to judge whether the identification information that user inputs belongs to identification information specific;Start module, be configured as the
One judge module is judged when the identification information that user inputs belongs to described identification information specific, starts and the identification of user's input
The application-specific that information is associated one to one so that the identification information specific only inputted by user could start correspondence
Application-specific, rather than anyone can start application-specific.Therefore, the mobile terminal of the disclosure controls technology profit
Individual subscriber privacy application program, such as mobile terminal APP is protected by the identification information specific of user's input, seamless and significantly
Improve and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
In one embodiment, relating module 410 can be configured to: when identification information specific is fingerprint identification information
Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user.
In one embodiment, when there being 10 application-specific, can be by 10 application-specific A to J and use
The fingerprint identification information of at least one fingerprint comprised in 10 fingers at family is associated one to one and is associated one to one.Hereinafter say
The situation that a bright application-specific is associated one to one with the fingerprint of a finger of user.Such as, by application-specific journey
Sequence A is corresponding with the fingerprint of right hand thumb, application-specific B is corresponding with the fingerprint of right hand forefinger, by application-specific
Program C is corresponding with the fingerprint of right hand middle finger, and application-specific D is corresponding with the fingerprint of right ring finger, answers specific
Corresponding with the fingerprint of right hand little finger by program E, application-specific F is corresponding with the fingerprint of left hand thumb, by spy
Determine application program G corresponding with the fingerprint of left index finger, application-specific H is corresponding with the fingerprint of left hand middle finger, by spy
Determine fingerprint nameless with left hand for application program I corresponding, application-specific J is corresponding with the fingerprint of left hand little finger.
The situation that one application-specific of following description is associated one to one with the fingerprint of at least finger of user.
In one embodiment, when there being 10 application-specific, can comprising 10 application-specific A to J and user
The fingerprint identification information of at least one fingerprint in 10 fingers is associated one to one and is associated one to one.Such as, answer specific
Corresponding with the fingerprint of right hand thumb by program A, application-specific B is corresponding with the fingerprint of right hand forefinger, by specific
Application program C is corresponding with the fingerprint of right hand middle finger, application-specific D is corresponding with the fingerprint of right ring finger, by spy
Determine application program E corresponding with the fingerprint of right hand little finger, by application-specific F and the fingerprint and the right side that comprise right hand thumb
The fingerprint identification information of the fingerprint of hands forefinger is corresponding, by application-specific G with comprise the fingerprint of right hand thumb, the right hand food
Refer to fingerprint corresponding with the fingerprint identification information of right hand middle finger, by application-specific H with comprise right hand forefinger fingerprint and
The fingerprint identification information of right hand middle finger is corresponding, by application-specific I and the fingerprint and the right ring finger that comprise right hand middle finger
Fingerprint identification information corresponding, application-specific J is known with the fingerprint comprising the fingerprint of right hand thumb and right hand middle finger
Other information is corresponding.In the case, it is only necessary to the fingerprint of a right hand can be just 10 even more application-specific journeys
Sequence arranges identification information specific.
Mobile terminal according to disclosure embodiment controls device, by being fingerprint identification information when identification information specific
Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user so that only
The particular fingerprint identification information inputted by user could start the application-specific of correspondence, rather than anyone can start spy
Determine application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user
Individual privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy and protect safely
Protect, improve the experience of user operation.
Fig. 5 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment, this dress
Put and include hiding module the 510, second judge module 520, display module 530:
Hiding module 510 is configured to all or part of in hiding application-specific.
In one embodiment, application-specific can be hidden, unless user have input and the application-specific hidden
The identification information specific that program is corresponding one to one, just can show hidden application-specific, even performs the spy hidden
Determine application program.
Second judge module 520 is configured to judge the application-specific whether the identification information that user inputs belongs to and hide
The identification information specific that program is associated one to one.
Display module 530 is configured as the identification information that the second judge module 520 judges that user inputs and belongs to hidden
During the identification information specific that the application-specific hidden is associated one to one, show and the identification information phase one to one of user's input
The application-specific of association.
Fig. 6 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment, this dress
The hiding module 510 put and the second judge module 520 and the hiding module 510 shown in Fig. 5 and the second judge module 520 phase
With, and the display module 530 in Fig. 6 also includes promoter module 630.
Promoter module 630 be configured as the identification information that the second judge module 520 judges that user inputs belong to
During the identification information specific that the application-specific hidden is associated one to one, start the identification information with user's input one to one
The application-specific being associated.That is, when the application-specific one judging that the identification information that user inputs belongs to and hides
During the identification information specific being associated to, not only show, and the identification information with user's input that starts is associated one to one
Application-specific.
Mobile terminal according to disclosure embodiment controls device, by hiding module, is configured to hide application-specific
All or part of in program;Second judge module, is configured to judge whether the identification information that user inputs belongs to hidden
Hide the identification information specific that the hiding application-specific of module is associated one to one;Display module, is configured as second and sentences
Disconnected module judges that the identification information that user inputs belongs to what the application-specific hiding with hiding module was associated one to one
During identification information specific, show the application-specific that the identification information with described user input is associated one to one so that only
There is the identification information specific inputted by user could show the application-specific of correspondence, rather than anyone can see specific
Application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user
People's privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection,
Improve the experience of user operation.
Disclosure embodiment provides a kind of mobile terminal and controls device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that user inputs belongs to identification information specific;
When the identification information judging that user inputs belongs to identification information specific, start and the identification information of user's input
The application-specific being associated one to one.
Fig. 7 is the block diagram according to a kind of mobile terminal (device) 700 shown in the disclosure one exemplary embodiment.Such as,
Mobile terminal 700 can be application program, it is also possible to be mobile device, such as mobile phone, computer, digital broadcast terminal, disappears
Breath transceiver, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Fig. 7, device 700 can include following one or more assembly: processes assembly 702, memorizer 704, power supply
Assembly 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and
Communications component 716.
Process assembly 702 and generally control the integrated operation of device 700, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 702 and can include that one or more processor 720 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 702 can include one or more module, just
Mutual in process between assembly 702 and other assemblies.Such as, process assembly 702 and can include multi-media module, many to facilitate
Media component 708 and process between assembly 702 mutual.
Memorizer 704 is configured to store various types of data to support the operation at device 700.Showing of these data
Example includes any application program for operation on device 700 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 704 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 706 is device 700 provide electric power.Power supply module 706 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 700, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 708 is included between described device 700 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing
Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action
Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers
Body assembly 708 includes a front-facing camera and/or post-positioned pick-up head.When device 700 is in operator scheme, such as screening-mode or
During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and
Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to output and/or input audio signal.Such as, audio-frequency assembly 710 includes a Mike
Wind (MIC), when device 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 704 or via communication set
Part 716 sends.In certain embodiments, audio-frequency assembly 710 also includes a speaker, is used for exporting audio signal.
I/O interface 712 provides interface for processing between assembly 702 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 714 includes one or more sensor, for providing the state of various aspects to comment for device 700
Estimate.Such as, what sensor cluster 714 can detect device 700 opens/closed mode, the relative localization of assembly, such as described
Assembly is display and the keypad of device 700, and sensor cluster 714 can also detect device 700 or 700 1 assemblies of device
Position change, the presence or absence that user contacts with device 700, device 700 orientation or acceleration/deceleration and device 700
Variations in temperature.Sensor cluster 714 can include proximity transducer, is configured to when not having any physical contact detect
The existence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming
Use as in application.In certain embodiments, this sensor cluster 714 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 716 is configured to facilitate the communication of wired or wireless mode between device 700 and other equipment.Device
700 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communications component 716 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, described communications component 716 also includes near-field communication (NFC) module, to promote junction service.Example
As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology,
Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 700 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 704 of instruction, above-mentioned instruction can have been performed said method by the processor 720 of device 700.Such as,
Described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by the process of mobile terminal
When device performs so that mobile terminal is able to carry out a kind of dynamic terminal control method, and the method includes:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that user inputs belongs to identification information specific;
When the identification information judging that user inputs belongs to identification information specific, start and the identification information of user's input
The application-specific being associated one to one.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or
Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (11)
1. a method for controlling mobile terminal, it is characterised in that including:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start and described user input
The application-specific that identification information is associated one to one.
2. want the method described in 1 according to right, it is characterised in that described identification information specific includes fingerprint identification information, password
At least one in identification information and verbal instructions identification information.
3. want the method described in 2 according to right, it is characterised in that described by application-specific and identification information specific one to one
It is associated, including:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one fingerprint
Fingerprint identification information be associated one to one.
4. want the method described in 1 according to right, it is characterised in that also include:
Hide in described application-specific all or part of;
Judge whether the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one
Identification information;
When judging that the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one
During identification information, show the application-specific that the identification information with described user input is associated one to one.
5. want the method described in 4 according to right, it is characterised in that described when judging that the identification information that described user inputs belongs to
During the identification information specific being associated one to one with hiding application-specific, the identification information that display inputs with described user
The application-specific being associated one to one, including:
When judging that the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one
During identification information, start the application-specific that the identification information with described user input is associated one to one.
6. a mobile terminal controls device, it is characterised in that including:
Relating module, is configured to be associated application-specific one to one with identification information specific;
Receiver module, is configured to receive the identification information of user's input;
First judge module, is configured to judge whether the identification information that described user inputs belongs to described identification information specific;
Start module, be configured as the identification information that described first judge module judges that described user inputs and belong to described spy
When surely identifying information, start the application-specific that the identification information with described user input is associated one to one.
7. want the device described in 6 according to right, it is characterised in that described identification information specific includes fingerprint identification information, password
At least one in identification information and verbal instructions identification information.
8. want the device described in 7 according to right, it is characterised in that described relating module is configured to:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one fingerprint
Fingerprint identification information be associated one to one.
9. want the device described in 6 according to right, it is characterised in that also include:
Hide module, be configured to all or part of in hiding described application-specific;
Second judge module, is configured to judge whether the identification information that described user inputs belongs to and hides with described hiding module
The identification information specific that is associated one to one of application-specific;
Display module, is configured as the identification information that described second judge module judges that described user inputs and belongs to described
When hiding the identification information specific that the hiding application-specific of module is associated one to one, the knowledge that display inputs with described user
The application-specific that other information is associated one to one.
10. want the device described in 9 according to right, it is characterised in that described display module also includes:
Promoter module, is configured as the identification information that described second judge module judges that described user inputs and belongs to and institute
When stating the identification information specific that the hiding application-specific of hiding module is associated one to one, start and described user input
The application-specific that identification information is associated one to one.
11. 1 kinds of mobile terminals control device, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start and described user input
The application-specific that identification information is associated one to one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610619357.7A CN106295294A (en) | 2016-07-29 | 2016-07-29 | Method for controlling mobile terminal and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610619357.7A CN106295294A (en) | 2016-07-29 | 2016-07-29 | Method for controlling mobile terminal and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106295294A true CN106295294A (en) | 2017-01-04 |
Family
ID=57663715
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610619357.7A Pending CN106295294A (en) | 2016-07-29 | 2016-07-29 | Method for controlling mobile terminal and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106295294A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108572775A (en) * | 2018-04-10 | 2018-09-25 | Oppo广东移动通信有限公司 | Application operating method and apparatus, storage medium, electronic equipment |
CN109376545A (en) * | 2018-09-17 | 2019-02-22 | 麒麟合盛网络技术股份有限公司 | Method for secret protection and device |
CN109448734A (en) * | 2018-09-20 | 2019-03-08 | 李庆湧 | Unlocking terminal equipment and application starting method and device based on vocal print |
CN110968326A (en) * | 2019-11-22 | 2020-04-07 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN111124543A (en) * | 2019-12-25 | 2020-05-08 | 重庆蓝岸通讯技术有限公司 | APP starting method and system in mobile terminal and mobile terminal with system |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110179366A1 (en) * | 2010-01-18 | 2011-07-21 | Samsung Electronics Co. Ltd. | Method and apparatus for privacy protection in mobile terminal |
CN102509055A (en) * | 2011-11-24 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for hiding programs of mobile terminal |
CN104182662A (en) * | 2014-08-22 | 2014-12-03 | 广东欧珀移动通信有限公司 | Mobile terminal, system and method for hiding and starting hidden application programs |
CN104182675A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment terminal and application hiding system and application hiding and starting method thereof |
CN104484589A (en) * | 2015-01-06 | 2015-04-01 | 上海华测导航技术有限公司 | Method for achieving multifunctional fingerprint unlocking on basis of computer software |
CN104751038A (en) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
CN105095790A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Hidden object view method and device |
-
2016
- 2016-07-29 CN CN201610619357.7A patent/CN106295294A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110179366A1 (en) * | 2010-01-18 | 2011-07-21 | Samsung Electronics Co. Ltd. | Method and apparatus for privacy protection in mobile terminal |
CN102509055A (en) * | 2011-11-24 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for hiding programs of mobile terminal |
CN104751038A (en) * | 2013-12-25 | 2015-07-01 | 腾讯科技(深圳)有限公司 | Identity authentication method, device and system |
CN104182662A (en) * | 2014-08-22 | 2014-12-03 | 广东欧珀移动通信有限公司 | Mobile terminal, system and method for hiding and starting hidden application programs |
CN104182675A (en) * | 2014-08-26 | 2014-12-03 | 上海斐讯数据通信技术有限公司 | Mobile equipment terminal and application hiding system and application hiding and starting method thereof |
CN104484589A (en) * | 2015-01-06 | 2015-04-01 | 上海华测导航技术有限公司 | Method for achieving multifunctional fingerprint unlocking on basis of computer software |
CN105095790A (en) * | 2015-07-28 | 2015-11-25 | 努比亚技术有限公司 | Hidden object view method and device |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108572775A (en) * | 2018-04-10 | 2018-09-25 | Oppo广东移动通信有限公司 | Application operating method and apparatus, storage medium, electronic equipment |
CN109376545A (en) * | 2018-09-17 | 2019-02-22 | 麒麟合盛网络技术股份有限公司 | Method for secret protection and device |
CN109448734A (en) * | 2018-09-20 | 2019-03-08 | 李庆湧 | Unlocking terminal equipment and application starting method and device based on vocal print |
CN110968326A (en) * | 2019-11-22 | 2020-04-07 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN110968326B (en) * | 2019-11-22 | 2024-01-30 | 连尚(新昌)网络科技有限公司 | Function processing method, device and computer storage medium |
CN111124543A (en) * | 2019-12-25 | 2020-05-08 | 重庆蓝岸通讯技术有限公司 | APP starting method and system in mobile terminal and mobile terminal with system |
CN112231758A (en) * | 2020-11-03 | 2021-01-15 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
CN112231758B (en) * | 2020-11-03 | 2023-11-17 | 深兰科技(上海)有限公司 | Privacy protection system and terminal equipment based on fingerprint identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104850769B (en) | Operation executes method and device | |
CN103916233B (en) | A kind of information ciphering method and device | |
CN106295294A (en) | Method for controlling mobile terminal and device | |
US9286482B1 (en) | Privacy control based on user recognition | |
CN106210256A (en) | Mobile terminal and control method thereof | |
CN104866749B (en) | Operate response method and device | |
CN104008348A (en) | Application program control method, application program control device and terminal | |
CN104639745B (en) | Phonetic prompt method and device | |
CN104219053B (en) | Method for information display, information concealing method and device | |
CN106453052A (en) | Message interaction method and apparatus thereof | |
CN103986840B (en) | Control method and the device of dialog information | |
CN105677214A (en) | Application management method and apparatus | |
CN106156561A (en) | Application locking method, application unlocking method and a device | |
CN105117101A (en) | Application display method and apparatus | |
CN106503628A (en) | method and device for fingerprint matching | |
CN107491681A (en) | Finger print information processing method and processing device | |
CN106126082A (en) | Control the method for terminal, device and terminal | |
CN104899501A (en) | Dialog list display method and device and terminal | |
CN107861669A (en) | The switching method and mobile terminal of a kind of custom system | |
CN106096964A (en) | Method of payment and device | |
CN106656746A (en) | Information output method and device | |
CN106296171A (en) | The method and device of swiping the card of mobile terminal | |
CN104182697B (en) | File encrypting method and device | |
CN107423378A (en) | Image display method and device | |
CN106778158A (en) | A kind of information protection device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170104 |