CN106295294A - Method for controlling mobile terminal and device - Google Patents

Method for controlling mobile terminal and device Download PDF

Info

Publication number
CN106295294A
CN106295294A CN201610619357.7A CN201610619357A CN106295294A CN 106295294 A CN106295294 A CN 106295294A CN 201610619357 A CN201610619357 A CN 201610619357A CN 106295294 A CN106295294 A CN 106295294A
Authority
CN
China
Prior art keywords
identification information
specific
application
fingerprint
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610619357.7A
Other languages
Chinese (zh)
Inventor
杨依珍
马宁
王中帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610619357.7A priority Critical patent/CN106295294A/en
Publication of CN106295294A publication Critical patent/CN106295294A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The disclosure is directed to method for controlling mobile terminal and device, described method includes: application-specific be associated one to one with identification information specific;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to identification information specific;When the identification information judging that user inputs belongs to identification information specific, start the application-specific that the identification information with described user input is associated one to one.The technology of the disclosure makes the identification information specific only inputted by user could start the application-specific of correspondence, rather than anyone can start application-specific.Therefore; the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects individual subscriber privacy application program; such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.

Description

Method for controlling mobile terminal and device
Technical field
It relates to communication technical field, particularly relate to method for controlling mobile terminal and device.
Background technology
Along with being on the increase of smart mobile phone function, large-size screen monitors smart mobile phone and portable computer increasingly become individual can not or The Communication social tool lacked, people also put into the packing of increasing individual privacy among mobile phone.Individual privacy safety Problem starts to perplex everyone, and the intelligent terminal APP such as Net silver, the credit card, track record, living habit, family's privacy etc. is complete Portion is included in mobile phone.So, except the use habit formed at ordinary times, protect outside oneself mobile phone do not loses, also want Note the protection work of mobile phone private.Therefore, the personal secrets protection of smart machine terminal APP increasingly becomes a lot of user's Hard requirement.
Now, there is cell phone system can accomplish to open application " attending to anything else " functions such as two wechat, as flat simultaneously Row space APP, is so easy to user and uses the APP of two said functions on a mobile phone simultaneously, but the use simultaneously exposed Family privacy concern, such as user are not intended to them and know oneself there are two micro-signals when adding wechat good friend, the mobile phone quilt of oneself Oneself is with two micro-signals, the person and one of them micro-signal good friend does not leaf through to be not intended to allow people see when leafing through.
Summary of the invention
For overcoming problem present in correlation technique, disclosure embodiment provides method for controlling mobile terminal and device.
First aspect according to disclosure embodiment, it is provided that a kind of method for controlling mobile terminal, including:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start defeated with described user The application-specific that the identification information entered is associated one to one.
Alternatively, described identification information specific includes fingerprint identification information, cipher code recognition information and verbal instructions identification letter At least one in breath.
Alternatively, described application-specific is associated one to one with identification information specific, including:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one The fingerprint identification information of fingerprint is associated one to one.
Alternatively, described method also includes:
Hide in described application-specific all or part of;
Judge whether identification information that described user inputs belongs to be associated one to one with the application-specific hidden Identification information specific;
It is associated one to one with the application-specific hidden when judging that identification information that described user inputs belongs to During identification information specific, show the application-specific that the identification information with described user input is associated one to one.
Alternatively, described when judge that the identification information that described user input belongs to and hiding application-specific a pair During the identification information specific that is associated, show the application-specific journey that the identification information with described user input is associated one to one Sequence, including:
It is associated one to one with the application-specific hidden when judging that identification information that described user inputs belongs to During identification information specific, start the application-specific that the identification information with described user input is associated one to one.
Second aspect according to disclosure embodiment, it is provided that a kind of mobile terminal controls device, including:
Relating module, is configured to be associated application-specific one to one with identification information specific;
Receiver module, is configured to receive the identification information of user's input;
First judge module, is configured to judge whether the identification information that described user inputs belongs to described specific identification letter Breath;
Start module, be configured as the identification information that described first judge module judges that described user inputs and belong to institute When stating identification information specific, start the application-specific that the identification information with described user input is associated one to one.
Alternatively, described identification information specific includes fingerprint identification information, cipher code recognition information and verbal instructions identification letter At least one in breath.
Alternatively, described relating module is configured to:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one The fingerprint identification information of fingerprint is associated one to one.
Alternatively, described device also includes:
Hide module, be configured to all or part of in hiding described application-specific;
Second judge module, is configured to judge whether the identification information that described user inputs belongs to and described hiding module The identification information specific that the application-specific hidden is associated one to one;
Display module, be configured as the identification information that described second judge module judges that described user inputs belong to During the identification information specific that the application-specific that described hiding module is hidden is associated one to one, display inputs with described user The application-specific that is associated one to one of identification information.
Alternatively, described display module also includes:
Promoter module, is configured as the identification information that described second judge module judges that described user inputs and belongs to During the identification information specific that the application-specific hidden with described hiding module is associated one to one, start defeated with described user The application-specific that the identification information entered is associated one to one.
The third aspect according to disclosure embodiment, it is provided that a kind of mobile terminal controls device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start defeated with described user The application-specific that the identification information entered is associated one to one.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Disclosure embodiment provides method for controlling mobile terminal and device, by by application-specific and specific identification Information is associated one to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to specific knowledge Other information;When the identification information judging that user inputs belongs to identification information specific, start and the identification of described user input The application-specific that information is associated one to one so that the identification information specific only inputted by user could start correspondence Application-specific, rather than anyone can start application-specific.Therefore, the mobile terminal of the disclosure controls technology profit Individual subscriber privacy application program, such as mobile terminal APP is protected by the identification information specific of user's input, seamless and significantly Improve and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of method for controlling mobile terminal shown in the disclosure one exemplary embodiment;
Fig. 2 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment;
Fig. 3 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment;
Fig. 4 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment;
Fig. 5 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment;
Fig. 6 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment;
Fig. 7 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of mobile terminal control technology, by application-specific being believed with specific identification Breath is associated one to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to specific identification Information;When the identification information judging that user inputs belongs to identification information specific, start and the identification information one of user's input The application-specific being associated to one so that the identification information specific only inputted by user could start the specific of correspondence Application program, rather than anyone can start application-specific.Therefore, the mobile terminal control technology of the disclosure utilizes user The identification information specific of input protects individual subscriber privacy application program, such as mobile terminal APP, seamless and substantially increase Protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
Fig. 1 is the flow chart according to a kind of method for controlling mobile terminal shown in the disclosure one exemplary embodiment, the party Method comprises the following steps S110, S120, S130, S140:
In step s 110, application-specific is associated one to one with identification information specific.
In one embodiment, application-specific refers in multiple application programs, and user is not intended to others and starts Application program.Such as, in multiple APP of mobile terminal, user may want to such as social media APP, bank finance The APP such as APP, Email APP can not arbitrarily be started by others and check, i.e. can be by these social media APP, bank's gold Melt APP, Email APP as application-specific.
In the step s 120, the identification information of user's input is received.
In one embodiment, identification information specific includes that fingerprint identification information, cipher code recognition information and verbal instructions are known At least one in other information.In the terminal, can be the most corresponding with application-specific by identification information specific Ground association, and this incidence relation is stored.
In one embodiment, finger print information, cipher code recognition information and verbal instructions identification are included when identification information specific During information, i.e. some application-specific can be associated one to one with fingerprint identification information, and other application-specific Can be associated one to one with cipher code recognition information, also have some can be associated one to one with verbal instructions identification information.Refer to Stricture of vagina identification information can be received and recognized by fingerprint identification module.Cipher code recognition information can be by physical keyboard or by Instruction, the dummy keyboard shown by touch screen or the instruction of key-press input of key input.Verbal instructions can be by mobile whole The voice messaging of the mike input of end, voice messaging can be word, letter, numeral, music or insignificant sound.
In step s 130, it is judged that whether the identification information of user's input belongs to identification information specific.
In one embodiment, when identification information specific is fingerprint identification information, it is judged that the fingerprint recognition of user's input Whether information belongs to the fingerprint identification information being associated one to one with application-specific.In one embodiment, when specific knowledge When other information is cipher code recognition information, it is judged that whether the cipher code recognition information of user's input belongs to application-specific one to one The cipher code recognition information being associated.In one embodiment, when identification information specific is verbal instructions identification information, it is judged that use Whether the verbal instructions identification information of family input belongs to the verbal instructions identification information being associated one to one with application-specific.
In step S140, when the identification information judging that user inputs belongs to identification information specific, start and user The application-specific that the identification information of input is associated one to one.
In one embodiment, when identification information specific is fingerprint identification information, when the fingerprint judging that user inputs Identification information belongs to the fingerprint identification information being associated one to one with application-specific, then start the identification letter with user's input The application-specific that breath is associated one to one.Such as, when the fingerprint recognition of application-specific A Yu the right hand thumb of user When information is associated one to one, when judging that the fingerprint identification information that user inputs belongs to and application-specific A phase one to one The fingerprint identification information of the right hand thumb of the user of association, then start application-specific A.
In one embodiment, when identification information specific is verbal instructions identification information, when judging what user inputted Verbal instructions identification information belongs to the verbal instructions identification information being associated one to one with application-specific, then start and user The application-specific that the identification information of input is associated one to one.Such as, know with special sound password when application-specific C When other information is associated one to one, when judging that the verbal instructions identification information that user inputs belongs to and application-specific C mono- The special sound password identification information being associated to one, then start application-specific C.
According to the method for controlling mobile terminal of disclosure embodiment, by by application-specific and identification information specific one It is associated to one;Receive the identification information of user's input;Judge whether the identification information that user inputs belongs to identification information specific; When the identification information judging that user inputs belongs to identification information specific, start and the identification information phase one to one of user's input The application-specific of association so that the identification information specific only inputted by user could start the application-specific journey of correspondence Sequence, rather than anyone can start application-specific.Therefore, the mobile terminal control technology of the disclosure utilizes user to input Identification information specific protects individual subscriber privacy application program, such as mobile terminal APP, seamless and substantially increase and protect Mobile terminal APP privacy safeguard protection, improves the experience of user operation.
In one embodiment, step S110 may include that when identification information specific is fingerprint identification information, by specific Application program is associated one to one with the fingerprint identification information comprising at least one fingerprint of user.
In one embodiment, when there being 10 application-specific, can be by 10 application-specific A to J and use The fingerprint identification information of at least one fingerprint comprised in 10 fingers at family is associated one to one and is associated one to one.Hereinafter say The situation that a bright application-specific is associated one to one with the fingerprint of a finger of user.Such as, by application-specific journey Sequence A is corresponding with the fingerprint of right hand thumb, application-specific B is corresponding with the fingerprint of right hand forefinger, by application-specific Program C is corresponding with the fingerprint of right hand middle finger, and application-specific D is corresponding with the fingerprint of right ring finger, answers specific Corresponding with the fingerprint of right hand little finger by program E, application-specific F is corresponding with the fingerprint of left hand thumb, by spy Determine application program G corresponding with the fingerprint of left index finger, application-specific H is corresponding with the fingerprint of left hand middle finger, by spy Determine fingerprint nameless with left hand for application program I corresponding, application-specific J is corresponding with the fingerprint of left hand little finger.
The situation that one application-specific of following description is associated one to one with the fingerprint of at least finger of user. In one embodiment, when there being 10 application-specific, can comprising 10 application-specific A to J and user The fingerprint identification information of at least one fingerprint in 10 fingers is associated one to one and is associated one to one.Such as, answer specific Corresponding with the fingerprint of right hand thumb by program A, application-specific B is corresponding with the fingerprint of right hand forefinger, by specific Application program C is corresponding with the fingerprint of right hand middle finger, application-specific D is corresponding with the fingerprint of right ring finger, by spy Determine application program E corresponding with the fingerprint of right hand little finger, by application-specific F and the fingerprint and the right side that comprise right hand thumb The fingerprint identification information of the fingerprint of hands forefinger is corresponding, by application-specific G with comprise the fingerprint of right hand thumb, the right hand food Refer to fingerprint corresponding with the fingerprint identification information of right hand middle finger, by application-specific H with comprise right hand forefinger fingerprint and The fingerprint identification information of right hand middle finger is corresponding, by application-specific I and the fingerprint and the right ring finger that comprise right hand middle finger Fingerprint identification information corresponding, application-specific J is known with the fingerprint comprising the fingerprint of right hand thumb and right hand middle finger Other information is corresponding.In the case, it is only necessary to the fingerprint of a right hand can be just 10 even more application-specific journeys Sequence arranges identification information specific.
According to the method for controlling mobile terminal of disclosure embodiment, by being fingerprint identification information when identification information specific Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user so that only The particular fingerprint identification information inputted by user could start the application-specific of correspondence, rather than anyone can start spy Determine application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user Individual privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy and protect safely Protect, improve the experience of user operation.
Fig. 2 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment, should Method comprises the following steps S210, S220, S230:
In step S210, hide in described application-specific all or part of.
In one embodiment, application-specific can be hidden, unless user have input and the application-specific hidden The identification information specific that program is corresponding one to one, just can show hidden application-specific, even performs the spy hidden Determine application program.
In step S220, it is judged that whether the identification information of user's input belongs to the application-specific hidden one to one The identification information specific being associated.
In step S230, when judging that the identification information that user inputs belongs to the application-specific hidden one to one During the identification information specific being associated, show the application-specific that the identification information with user's input is associated one to one.
Fig. 3 is the flow chart according to a kind of method for controlling mobile terminal shown in disclosure another exemplary embodiment, should Step S210 in method is identical with step S210 shown in S220 with Fig. 2 and S220, and step S230 in Fig. 3 also includes Step S330.
In step S330, when judging that the identification information that user inputs belongs to the application-specific hidden one to one During the identification information specific being associated, start the application-specific that the identification information with user's input is associated one to one.That is, When judging that the identification information that user inputs belongs to the identification information specific being associated one to one with the application-specific hidden Time, not only show, and start the application-specific that the identification information with user's input is associated one to one.
According to the method for controlling mobile terminal of disclosure embodiment, by hide whole in described application-specific or A part;Judge whether the identification information that user inputs belongs to the specific knowledge being associated one to one with the application-specific hidden Other information;When judging that the identification information that user inputs belongs to the specific knowledge being associated one to one with the application-specific hidden During other information, show the application-specific that the identification information with user's input is associated one to one so that only pass through user The identification information specific of input could show the application-specific of correspondence, rather than anyone can see application-specific. Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects the application of individual subscriber privacy Program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection, improve user The experience of operation.
Method for controlling mobile terminal referring to the concrete application scenarios explanation disclosure.
In one scenario, it would be desirable to the mobile terminal APP of secret protection, the such as social software the most main wechat of main wechat Number, it is defined as A, and auxiliary wechat be that is to say, and wechat " small size " is defined as B, and other owners are thought the APP of secret protection, such as Mobile banking, is defined as C.Operating system for mobile terminal arranges fingerprint recognition secret protection APP function, is simultaneously entered corresponding Finger print information, and its corresponding secret protection APP is mated in advance.In this case, it is possible to by main wechat A, auxiliary micro- Letter B and Mobile banking C respectively from different fingerprint identification information, such as, right hand thumb fingerprint, right hand index fingerprint and the right hand Middle finger fingerprint is associated one to one.If user is when using double wechat function of mobile terminal, if want to open main wechat A, can To use right hand thumb finger print information set in advance, if want to open auxiliary wechat B, it is possible to use the right hand set in advance is eaten Refer to finger print information.In one embodiment, user can show main wechat A the most on mobile terminals, hides auxiliary wechat B.At this In the case of, if use index fingerprint information set in advance, auxiliary wechat B can be shown on mobile terminals, the most permissible Perform auxiliary wechat B.That is, mobile desktop only shows the APP mark of main wechat A, and the mark of auxiliary wechat B is only using forefinger to make It is not hidden during for fingerprint identification module.Equally, Mobile banking C can also be carried out by user by using middle finger finger print information Secret protection.In one embodiment, the fingerprint information set and typing is different can be passed through, and with list set in advance One or the fingerprint identification information of various combination carry out the secret protection of different application programs.
Fig. 4 is the block diagram controlling device according to a kind of mobile terminal shown in the disclosure one exemplary embodiment.This device Including relating module 410, receiver module the 420, first judge module 430, start module 440.
Relating module 410 is configured to be associated application-specific one to one with identification information specific.
In one embodiment, application-specific refers in multiple application programs, and user is not intended to others and starts Application program.Such as, in multiple APP of mobile terminal, user may want to such as social media APP, bank finance The APP such as APP, Email APP can not arbitrarily be started by others and check, i.e. can be by these social media APP, bank's gold Melt APP, Email APP as application-specific.
Receiver module 420 is configured to receive the identification information of user's input.
In one embodiment, identification information specific includes that fingerprint identification information, cipher code recognition information and verbal instructions are known At least one in other information.In the terminal, can be the most corresponding with application-specific by identification information specific Ground association, and this incidence relation is stored.
In one embodiment, finger print information, cipher code recognition information and verbal instructions identification are included when identification information specific During information, i.e. some application-specific can be associated one to one with fingerprint identification information, and other application-specific Can be associated one to one with cipher code recognition information, also have some can be associated one to one with verbal instructions identification information.Refer to Stricture of vagina identification information can be received and recognized by fingerprint identification module.Cipher code recognition information can be by physical keyboard or by Instruction, the dummy keyboard shown by touch screen or the instruction of key-press input of key input.Verbal instructions can be by mobile whole The voice messaging of the mike input of end, voice messaging can be word, letter, numeral, music or insignificant sound.
First judge module 430 is configured to judge whether the identification information that user inputs belongs to identification information specific.
In one embodiment, when identification information specific is fingerprint identification information, it is judged that the fingerprint recognition of user's input Whether information belongs to the fingerprint identification information being associated one to one with application-specific.In one embodiment, when specific knowledge When other information is cipher code recognition information, it is judged that whether the cipher code recognition information of user's input belongs to application-specific one to one The cipher code recognition information being associated.In one embodiment, when identification information specific is verbal instructions identification information, it is judged that use Whether the verbal instructions identification information of family input belongs to the verbal instructions identification information being associated one to one with application-specific.
Start module 440 to be configured as the identification information that the first judge module 430 judges that user inputs and belong to specific During identification information, start the application-specific that the identification information with user's input is associated one to one.
In one embodiment, when identification information specific is fingerprint identification information, when the fingerprint judging that user inputs Identification information belongs to the fingerprint identification information being associated one to one with application-specific, then start the identification letter with user's input The application-specific that breath is associated one to one.Such as, when the fingerprint recognition of application-specific A Yu the right hand thumb of user When information is associated one to one, when judging that the fingerprint identification information that user inputs belongs to and application-specific A phase one to one The fingerprint identification information of the right hand thumb of the user of association, then start application-specific A.
In one embodiment, when identification information specific is verbal instructions identification information, when judging what user inputted Verbal instructions identification information belongs to the verbal instructions identification information being associated one to one with application-specific, then start and user The application-specific that the identification information of input is associated one to one.Such as, know with special sound password when application-specific C When other information is associated one to one, when judging that the verbal instructions identification information that user inputs belongs to and application-specific C mono- The special sound password identification information being associated to one, then start application-specific C.
Mobile terminal according to disclosure embodiment controls device, by relating module, is configured to application-specific journey Sequence is associated one to one with identification information specific;Receiver module, is configured to receive the identification information of user's input;First judges Module, is configured to judge whether the identification information that user inputs belongs to identification information specific;Start module, be configured as the One judge module is judged when the identification information that user inputs belongs to described identification information specific, starts and the identification of user's input The application-specific that information is associated one to one so that the identification information specific only inputted by user could start correspondence Application-specific, rather than anyone can start application-specific.Therefore, the mobile terminal of the disclosure controls technology profit Individual subscriber privacy application program, such as mobile terminal APP is protected by the identification information specific of user's input, seamless and significantly Improve and protect mobile terminal APP privacy safeguard protection, improve the experience of user operation.
In one embodiment, relating module 410 can be configured to: when identification information specific is fingerprint identification information Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user.
In one embodiment, when there being 10 application-specific, can be by 10 application-specific A to J and use The fingerprint identification information of at least one fingerprint comprised in 10 fingers at family is associated one to one and is associated one to one.Hereinafter say The situation that a bright application-specific is associated one to one with the fingerprint of a finger of user.Such as, by application-specific journey Sequence A is corresponding with the fingerprint of right hand thumb, application-specific B is corresponding with the fingerprint of right hand forefinger, by application-specific Program C is corresponding with the fingerprint of right hand middle finger, and application-specific D is corresponding with the fingerprint of right ring finger, answers specific Corresponding with the fingerprint of right hand little finger by program E, application-specific F is corresponding with the fingerprint of left hand thumb, by spy Determine application program G corresponding with the fingerprint of left index finger, application-specific H is corresponding with the fingerprint of left hand middle finger, by spy Determine fingerprint nameless with left hand for application program I corresponding, application-specific J is corresponding with the fingerprint of left hand little finger.
The situation that one application-specific of following description is associated one to one with the fingerprint of at least finger of user. In one embodiment, when there being 10 application-specific, can comprising 10 application-specific A to J and user The fingerprint identification information of at least one fingerprint in 10 fingers is associated one to one and is associated one to one.Such as, answer specific Corresponding with the fingerprint of right hand thumb by program A, application-specific B is corresponding with the fingerprint of right hand forefinger, by specific Application program C is corresponding with the fingerprint of right hand middle finger, application-specific D is corresponding with the fingerprint of right ring finger, by spy Determine application program E corresponding with the fingerprint of right hand little finger, by application-specific F and the fingerprint and the right side that comprise right hand thumb The fingerprint identification information of the fingerprint of hands forefinger is corresponding, by application-specific G with comprise the fingerprint of right hand thumb, the right hand food Refer to fingerprint corresponding with the fingerprint identification information of right hand middle finger, by application-specific H with comprise right hand forefinger fingerprint and The fingerprint identification information of right hand middle finger is corresponding, by application-specific I and the fingerprint and the right ring finger that comprise right hand middle finger Fingerprint identification information corresponding, application-specific J is known with the fingerprint comprising the fingerprint of right hand thumb and right hand middle finger Other information is corresponding.In the case, it is only necessary to the fingerprint of a right hand can be just 10 even more application-specific journeys Sequence arranges identification information specific.
Mobile terminal according to disclosure embodiment controls device, by being fingerprint identification information when identification information specific Time, application-specific is associated one to one with the fingerprint identification information comprising at least one fingerprint of user so that only The particular fingerprint identification information inputted by user could start the application-specific of correspondence, rather than anyone can start spy Determine application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user Individual privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy and protect safely Protect, improve the experience of user operation.
Fig. 5 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment, this dress Put and include hiding module the 510, second judge module 520, display module 530:
Hiding module 510 is configured to all or part of in hiding application-specific.
In one embodiment, application-specific can be hidden, unless user have input and the application-specific hidden The identification information specific that program is corresponding one to one, just can show hidden application-specific, even performs the spy hidden Determine application program.
Second judge module 520 is configured to judge the application-specific whether the identification information that user inputs belongs to and hide The identification information specific that program is associated one to one.
Display module 530 is configured as the identification information that the second judge module 520 judges that user inputs and belongs to hidden During the identification information specific that the application-specific hidden is associated one to one, show and the identification information phase one to one of user's input The application-specific of association.
Fig. 6 is the block diagram controlling device according to a kind of mobile terminal shown in disclosure another exemplary embodiment, this dress The hiding module 510 put and the second judge module 520 and the hiding module 510 shown in Fig. 5 and the second judge module 520 phase With, and the display module 530 in Fig. 6 also includes promoter module 630.
Promoter module 630 be configured as the identification information that the second judge module 520 judges that user inputs belong to During the identification information specific that the application-specific hidden is associated one to one, start the identification information with user's input one to one The application-specific being associated.That is, when the application-specific one judging that the identification information that user inputs belongs to and hides During the identification information specific being associated to, not only show, and the identification information with user's input that starts is associated one to one Application-specific.
Mobile terminal according to disclosure embodiment controls device, by hiding module, is configured to hide application-specific All or part of in program;Second judge module, is configured to judge whether the identification information that user inputs belongs to hidden Hide the identification information specific that the hiding application-specific of module is associated one to one;Display module, is configured as second and sentences Disconnected module judges that the identification information that user inputs belongs to what the application-specific hiding with hiding module was associated one to one During identification information specific, show the application-specific that the identification information with described user input is associated one to one so that only There is the identification information specific inputted by user could show the application-specific of correspondence, rather than anyone can see specific Application program.Therefore, the identification information specific that the mobile terminal control technology of the disclosure utilizes user to input protects user People's privacy application program, such as mobile terminal APP, seamless and substantially increase and protect mobile terminal APP privacy safeguard protection, Improve the experience of user operation.
Disclosure embodiment provides a kind of mobile terminal and controls device, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that user inputs belongs to identification information specific;
When the identification information judging that user inputs belongs to identification information specific, start and the identification information of user's input The application-specific being associated one to one.
Fig. 7 is the block diagram according to a kind of mobile terminal (device) 700 shown in the disclosure one exemplary embodiment.Such as, Mobile terminal 700 can be application program, it is also possible to be mobile device, such as mobile phone, computer, digital broadcast terminal, disappears Breath transceiver, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Fig. 7, device 700 can include following one or more assembly: processes assembly 702, memorizer 704, power supply Assembly 706, multimedia groupware 708, audio-frequency assembly 710, the interface 712 of input/output (I/O), sensor cluster 714, and Communications component 716.
Process assembly 702 and generally control the integrated operation of device 700, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 702 and can include that one or more processor 720 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 702 can include one or more module, just Mutual in process between assembly 702 and other assemblies.Such as, process assembly 702 and can include multi-media module, many to facilitate Media component 708 and process between assembly 702 mutual.
Memorizer 704 is configured to store various types of data to support the operation at device 700.Showing of these data Example includes any application program for operation on device 700 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 704 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.
The various assemblies that power supply module 706 is device 700 provide electric power.Power supply module 706 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 700, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 708 is included between described device 700 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers Body assembly 708 includes a front-facing camera and/or post-positioned pick-up head.When device 700 is in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 710 is configured to output and/or input audio signal.Such as, audio-frequency assembly 710 includes a Mike Wind (MIC), when device 700 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 704 or via communication set Part 716 sends.In certain embodiments, audio-frequency assembly 710 also includes a speaker, is used for exporting audio signal.
I/O interface 712 provides interface for processing between assembly 702 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 714 includes one or more sensor, for providing the state of various aspects to comment for device 700 Estimate.Such as, what sensor cluster 714 can detect device 700 opens/closed mode, the relative localization of assembly, such as described Assembly is display and the keypad of device 700, and sensor cluster 714 can also detect device 700 or 700 1 assemblies of device Position change, the presence or absence that user contacts with device 700, device 700 orientation or acceleration/deceleration and device 700 Variations in temperature.Sensor cluster 714 can include proximity transducer, is configured to when not having any physical contact detect The existence of neighbouring object.Sensor cluster 714 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 714 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 716 is configured to facilitate the communication of wired or wireless mode between device 700 and other equipment.Device 700 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communications component 716 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, described communications component 716 also includes near-field communication (NFC) module, to promote junction service.Example As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 700 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 704 of instruction, above-mentioned instruction can have been performed said method by the processor 720 of device 700.Such as, Described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by the process of mobile terminal When device performs so that mobile terminal is able to carry out a kind of dynamic terminal control method, and the method includes:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that user inputs belongs to identification information specific;
When the identification information judging that user inputs belongs to identification information specific, start and the identification information of user's input The application-specific being associated one to one.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. a method for controlling mobile terminal, it is characterised in that including:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start and described user input The application-specific that identification information is associated one to one.
2. want the method described in 1 according to right, it is characterised in that described identification information specific includes fingerprint identification information, password At least one in identification information and verbal instructions identification information.
3. want the method described in 2 according to right, it is characterised in that described by application-specific and identification information specific one to one It is associated, including:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one fingerprint Fingerprint identification information be associated one to one.
4. want the method described in 1 according to right, it is characterised in that also include:
Hide in described application-specific all or part of;
Judge whether the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one Identification information;
When judging that the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one During identification information, show the application-specific that the identification information with described user input is associated one to one.
5. want the method described in 4 according to right, it is characterised in that described when judging that the identification information that described user inputs belongs to During the identification information specific being associated one to one with hiding application-specific, the identification information that display inputs with described user The application-specific being associated one to one, including:
When judging that the identification information that described user inputs belongs to specific with what the application-specific hidden was associated one to one During identification information, start the application-specific that the identification information with described user input is associated one to one.
6. a mobile terminal controls device, it is characterised in that including:
Relating module, is configured to be associated application-specific one to one with identification information specific;
Receiver module, is configured to receive the identification information of user's input;
First judge module, is configured to judge whether the identification information that described user inputs belongs to described identification information specific;
Start module, be configured as the identification information that described first judge module judges that described user inputs and belong to described spy When surely identifying information, start the application-specific that the identification information with described user input is associated one to one.
7. want the device described in 6 according to right, it is characterised in that described identification information specific includes fingerprint identification information, password At least one in identification information and verbal instructions identification information.
8. want the device described in 7 according to right, it is characterised in that described relating module is configured to:
When described identification information specific is fingerprint identification information, application-specific and user comprised at least one fingerprint Fingerprint identification information be associated one to one.
9. want the device described in 6 according to right, it is characterised in that also include:
Hide module, be configured to all or part of in hiding described application-specific;
Second judge module, is configured to judge whether the identification information that described user inputs belongs to and hides with described hiding module The identification information specific that is associated one to one of application-specific;
Display module, is configured as the identification information that described second judge module judges that described user inputs and belongs to described When hiding the identification information specific that the hiding application-specific of module is associated one to one, the knowledge that display inputs with described user The application-specific that other information is associated one to one.
10. want the device described in 9 according to right, it is characterised in that described display module also includes:
Promoter module, is configured as the identification information that described second judge module judges that described user inputs and belongs to and institute When stating the identification information specific that the hiding application-specific of hiding module is associated one to one, start and described user input The application-specific that identification information is associated one to one.
11. 1 kinds of mobile terminals control device, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Application-specific is associated one to one with identification information specific;
Receive the identification information of user's input;
Judge whether the identification information that described user inputs belongs to described identification information specific;
When the identification information judging that described user inputs belongs to described identification information specific, start and described user input The application-specific that identification information is associated one to one.
CN201610619357.7A 2016-07-29 2016-07-29 Method for controlling mobile terminal and device Pending CN106295294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610619357.7A CN106295294A (en) 2016-07-29 2016-07-29 Method for controlling mobile terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610619357.7A CN106295294A (en) 2016-07-29 2016-07-29 Method for controlling mobile terminal and device

Publications (1)

Publication Number Publication Date
CN106295294A true CN106295294A (en) 2017-01-04

Family

ID=57663715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610619357.7A Pending CN106295294A (en) 2016-07-29 2016-07-29 Method for controlling mobile terminal and device

Country Status (1)

Country Link
CN (1) CN106295294A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108572775A (en) * 2018-04-10 2018-09-25 Oppo广东移动通信有限公司 Application operating method and apparatus, storage medium, electronic equipment
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device
CN109448734A (en) * 2018-09-20 2019-03-08 李庆湧 Unlocking terminal equipment and application starting method and device based on vocal print
CN110968326A (en) * 2019-11-22 2020-04-07 连尚(新昌)网络科技有限公司 Function processing method, device and computer storage medium
CN111124543A (en) * 2019-12-25 2020-05-08 重庆蓝岸通讯技术有限公司 APP starting method and system in mobile terminal and mobile terminal with system
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110179366A1 (en) * 2010-01-18 2011-07-21 Samsung Electronics Co. Ltd. Method and apparatus for privacy protection in mobile terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN104484589A (en) * 2015-01-06 2015-04-01 上海华测导航技术有限公司 Method for achieving multifunctional fingerprint unlocking on basis of computer software
CN104751038A (en) * 2013-12-25 2015-07-01 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110179366A1 (en) * 2010-01-18 2011-07-21 Samsung Electronics Co. Ltd. Method and apparatus for privacy protection in mobile terminal
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN104751038A (en) * 2013-12-25 2015-07-01 腾讯科技(深圳)有限公司 Identity authentication method, device and system
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN104182675A (en) * 2014-08-26 2014-12-03 上海斐讯数据通信技术有限公司 Mobile equipment terminal and application hiding system and application hiding and starting method thereof
CN104484589A (en) * 2015-01-06 2015-04-01 上海华测导航技术有限公司 Method for achieving multifunctional fingerprint unlocking on basis of computer software
CN105095790A (en) * 2015-07-28 2015-11-25 努比亚技术有限公司 Hidden object view method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108572775A (en) * 2018-04-10 2018-09-25 Oppo广东移动通信有限公司 Application operating method and apparatus, storage medium, electronic equipment
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device
CN109448734A (en) * 2018-09-20 2019-03-08 李庆湧 Unlocking terminal equipment and application starting method and device based on vocal print
CN110968326A (en) * 2019-11-22 2020-04-07 连尚(新昌)网络科技有限公司 Function processing method, device and computer storage medium
CN110968326B (en) * 2019-11-22 2024-01-30 连尚(新昌)网络科技有限公司 Function processing method, device and computer storage medium
CN111124543A (en) * 2019-12-25 2020-05-08 重庆蓝岸通讯技术有限公司 APP starting method and system in mobile terminal and mobile terminal with system
CN112231758A (en) * 2020-11-03 2021-01-15 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification
CN112231758B (en) * 2020-11-03 2023-11-17 深兰科技(上海)有限公司 Privacy protection system and terminal equipment based on fingerprint identification

Similar Documents

Publication Publication Date Title
CN104850769B (en) Operation executes method and device
CN103916233B (en) A kind of information ciphering method and device
CN106295294A (en) Method for controlling mobile terminal and device
US9286482B1 (en) Privacy control based on user recognition
CN106210256A (en) Mobile terminal and control method thereof
CN104866749B (en) Operate response method and device
CN104008348A (en) Application program control method, application program control device and terminal
CN104639745B (en) Phonetic prompt method and device
CN104219053B (en) Method for information display, information concealing method and device
CN106453052A (en) Message interaction method and apparatus thereof
CN103986840B (en) Control method and the device of dialog information
CN105677214A (en) Application management method and apparatus
CN106156561A (en) Application locking method, application unlocking method and a device
CN105117101A (en) Application display method and apparatus
CN106503628A (en) method and device for fingerprint matching
CN107491681A (en) Finger print information processing method and processing device
CN106126082A (en) Control the method for terminal, device and terminal
CN104899501A (en) Dialog list display method and device and terminal
CN107861669A (en) The switching method and mobile terminal of a kind of custom system
CN106096964A (en) Method of payment and device
CN106656746A (en) Information output method and device
CN106296171A (en) The method and device of swiping the card of mobile terminal
CN104182697B (en) File encrypting method and device
CN107423378A (en) Image display method and device
CN106778158A (en) A kind of information protection device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104