CN109740312A - A kind of application control method and terminal device - Google Patents

A kind of application control method and terminal device Download PDF

Info

Publication number
CN109740312A
CN109740312A CN201910079830.0A CN201910079830A CN109740312A CN 109740312 A CN109740312 A CN 109740312A CN 201910079830 A CN201910079830 A CN 201910079830A CN 109740312 A CN109740312 A CN 109740312A
Authority
CN
China
Prior art keywords
information
input
area
user
draws
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910079830.0A
Other languages
Chinese (zh)
Other versions
CN109740312B (en
Inventor
彭海清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910079830.0A priority Critical patent/CN109740312B/en
Publication of CN109740312A publication Critical patent/CN109740312A/en
Priority to PCT/CN2020/073805 priority patent/WO2020156440A1/en
Application granted granted Critical
Publication of CN109740312B publication Critical patent/CN109740312B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of application control method and terminal device.This method comprises: receiving first input of the user to first object application interface;In response to first input, the first prompt information is exported, first prompt information is for prompting user to draw area's input information in the corresponding encryption information of first input;It obtains the user and draws the first information inputted in area in the encryption information;By the first information, target object is encrypted, the target object includes: the first object application interface or the corresponding application program of the first object application interface.The present invention can be realized real-time encrypted setting, high-efficient and simple to operate.

Description

A kind of application control method and terminal device
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of application control method and terminal devices.
Background technique
With the continuous development of science and technology, intelligent terminal is continuous universal.It is raw that intelligent terminal (such as mobile phone) has become people Indispensable electronic product in work.In order to meet the use demand of user, various applications are installed on intelligent terminal.In order to protect The individual privacy of user is protected, some applications are that user is reluctant that other people is allowed to see, therefore, application lock is come into being.
But most application lock is required to user and enters in application management interface go to be arranged at present, specifically need into Row encryption application selection, some also need setting password, cumbersome, low efficiency are arranged, it has not been convenient to, user is more selection It does not go to use it.
Summary of the invention
The embodiment of the present invention provides a kind of application control method and terminal device, to solve existing encryption application setting operation The problem of cumbersome, low efficiency and inconvenience.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device the embodiment provides a kind of application control method, comprising:
Receive first input of the user to first object application interface;
In response to first input, the first prompt information is exported, first prompt information is for prompting user in institute It states the corresponding encryption information of the first input and draws area's input information;
It obtains the user and draws the first information inputted in area in the encryption information;
By the first information, target object is encrypted, the target object includes: the first object application Interface or the corresponding application program of the first object application interface.
Second aspect, the embodiment of the invention also provides a kind of terminal devices, comprising:
First receiving module, for receiving first input of the user to first object application interface;
First output module, for exporting the first prompt information, first prompt information in response to first input For prompting user to draw area's input information in the corresponding encryption information of first input;
Module is obtained, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module, for being encrypted to target object, the target object includes: institute by the first information State first object application interface or the corresponding application program of the first object application interface.
The third aspect the embodiment of the invention also provides a kind of terminal device, including processor, memory and is stored in institute The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor The step of realizing application control method as described above.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium The step of being stored with computer program on storage media, realizing application control method as described above.
In the above scheme of the embodiment of the present invention, by receiving first input of the user to first object application interface;It rings The first prompt information should be exported, first prompt information is for prompting user corresponding in first input in first input Encryption information draws area and inputs information;It obtains user and draws the first information that inputs in area in encryption information, first believed by this Breath, encrypts target object, the target object includes: first object application interface or the first object application interface Corresponding application program so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate, improve the peace of operation Quan Xing.
Detailed description of the invention
Fig. 1 is the flow diagram provided in an embodiment of the present invention using encryption method;
Fig. 2 is one of the specific implementation process schematic of application control method in one example of the embodiment of the present invention;
Fig. 3 is two of the specific implementation process schematic of application control method in one example of the embodiment of the present invention;
Fig. 4 is the realization process schematic of the step 103 of application control method in the example based on Fig. 3;
Fig. 5 is the specific implementation process signal of application control method after step 104 in one example of the embodiment of the present invention One of figure;
Fig. 6 is the specific implementation process signal of application control method after step 104 in one example of the embodiment of the present invention The two of figure;
Fig. 7 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 8 is the hardware structural diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
As shown in Figure 1, being the flow diagram of application control method provided in an embodiment of the present invention.It should scheme below specific Illustrate the implementation process of this method.
Step 101, first input of the user to first object application interface is received.
In this step, first input be pre-set input, this first input can include but is not limited to click input, Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words, First input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated Enter.
Step 102, in response to first input, the first prompt information is exported, first prompt information is for prompting User draws area in the corresponding encryption information of first input and inputs information.
This step, the first input that terminal device is received in response to above-mentioned steps 101, exports the first prompt information.
It should be noted that the first prompt information includes: text prompt, auditory tone cues, optical flare prompt etc..Here, One prompt information is used to help user and quickly identifies that encryption information draws area, in order to go on smoothly subsequent password setting.
Step 103, it obtains the user and draws the first information inputted in area in the encryption information.
In this step, the first information is encrypted message.Here, which is user in encryption information drafting area It is arranged, it may include: the mixed cipher of any combination between numerical ciphers, letter code, graphical passwords or three.
It should be noted that graphical passwords can be the graphical passwords that password setting is carried out according to default input template, It can be customized graphical passwords, such as gesture path etc..
Step 104, by the first information, target object is encrypted, the target object includes: described first Target application interface or the corresponding application program of the first object application interface.
Here, can be before terminal device be encrypted, through the selection operation of user, determination is to first object Application interface is encrypted, or is encrypted to the corresponding application program of first object application interface.Specifically, bullet can be passed through Out include encryption first object application interface and the corresponding application program of first object application interface selection dialog box, for Family selection, later, terminal device determines final encrypted object by the selection operation of user.
It is, of course, also possible to be arranged according to system default, determination is encrypted to first object application interface, or to The corresponding application program in one target application interface is encrypted.
In addition, can also be according to the interface type of first object application interface, determination to first object application interface into Row encryption, or the corresponding application program of first object application interface is encrypted.For example, if first object application interface is Chat interface then encrypts the first object application interface;If first object application interface is that first object application interface is corresponding The main interface of application program then encrypts the corresponding application program of first object application interface, i.e., carries out to entire application program Encryption.Here, determine that final encrypted object is not limited only to aforesaid way, other modes can also, be not specifically limited here.
In the embodiment of the present invention, by receiving first input of the user to first object application interface;In response to this first Input exports the first prompt information, and first prompt information is for prompting user to draw in the corresponding encryption information of the first input Area processed inputs information;It obtains user and draws the first information inputted in area in encryption information, by the first information, to target pair As being encrypted, the target object includes: first object application interface or the corresponding application of first object application interface Program so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate, improve the safety of operation.
Based on embodiment shown in FIG. 1, as an optional implementation, step 102 can with specifically includes the following steps:
Obtain the input trajectory of first input;
In this step, the input trajectory of the first input can be obtained by track identification.
It is preferred here that first input is to slidably input;Wherein, the starting point of the sliding trace slidably inputed Position is any position on the first side of screen, and the final position of the sliding trace slidably inputed is the second of the screen Any position on side, described first is the different sides of the screen while from described second;
Alternatively, the start position of the sliding trace slidably inputed and final position are respectively same one side of the screen Different location;
Alternatively, the sliding trace slidably inputed forms closed curve.
Based on the input trajectory, determine that encryption information draws area;
In this step, it is based on input trajectory, determines that encryption information draws area, method of determination is simply easy to handle, encryption letter The determination that breath draws area is high-efficient.
Here, it is preferred that, the first object application interface is divided into two regions by the input trajectory.
In other words, the screen that the input trajectory will be displayed with first object application interface is divided into two regions, wherein Area is drawn as encryption information in one region, another region can be used as application interface display area.
Here, before application interface display area can show the first input of reception, first object application interface is shown interior Hold.
In this step, following two implementation specifically can include but is not limited to.
First side region of the input trajectory is determined as encryption information and draws area by mode one.
Since first object application interface is divided into two regions by the input trajectory, the input trajectory two sides are right respectively Answer a region.
Here, the pre-set region of user can be used in the first side region of the input trajectory, can also be used and is System default zone.
Mode two determines one of region in described two regions for encryption according to the area in described two regions Information draws area.
Specifically, if the first object application interface is divided into area not two equal regions by the input trajectory, The ratio that on-screen display (osd) area area is then accounted for according to region area, determine region area account for on-screen display (osd) area ratio it is lesser Region is that encryption information draws area;Or the region for determining that region area accounts for the large percentage of on-screen display (osd) area is encryption information Draw area.
Or if the first object application interface is divided into area not two equal regions by the input trajectory, The lesser region of area in the two or the biggish region of area are then determined as encryption information and draw area.
Two kinds of implementation its treatment processes that above-mentioned determining encryption information draws area are simple and fast, and treatment effeciency is high.
Area is drawn based on the encryption information, exports the first prompt information.
In this step, if the first prompt information is text prompt information, it can be drawn in area in encryption information and show this article Word prompt information.
If the first prompt information is auditory tone cues information, the institute that area can be drawn by auditory tone cues encryption information is in place It sets.
If the first prompt information is optical flare prompt, encryption information can be controlled by terminal device and drawn corresponding to area Screen area carries out optical flare with default flicker frequency.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 102, before step 103, The method can also include:
Show that encryption information draws the region contour line in area.
Here, it draws area in encryption information in user and carries out password setting input, that is, it is especially logical when inputting the first information When crossing the customized graphical passwords of gesture input, the region contour line that encryption information draws area can constrain the input operation width of user Degree, to prevent cross region contour line except encryption information draw area in addition to other regions on input invalid input the case where hair It is raw.
Certainly, input operation when password setting is carried out in order to facilitate user, meets user demand, region contour line can lead to It crosses user and inputs to operate the size for being adjusted, and then adjusting encryption information drafting area.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 104, the method may be used also To include:
The second target application is shown in region of the first object application interface in addition to the encryption information draws area The desktop of interface or the terminal device.
It should be noted that using encrypted application interface or application program and being protected at any time for the ease of user The individual privacy of user can be Fuzzy Processing or by way of covering other images specifically when carrying out using encryption Area is drawn to encryption information to lock, and on this basis, other interfaces or application are made in order to not influence user With, encryption complete after, first object application interface except encryption information draw area in addition to region can show the second target The desktop of application interface or terminal device, with user-friendly.It is to be understood that being the area split screen display available screen Shang Liangge The content in domain.
Here, generally, the second target application interface is into the first object before the first object application interface The upper level interface of application interface.
Certainly, after step 104, other optional implementations can also be used.For example, if user is in encryption information The password for drawing area's setting is that graphical passwords by Fuzzy Processing or can cover other then when carrying out using encryption The mode of image locks first object application interface or the corresponding application program of first object application interface, later, In order to reinforce memory of the user to graphical passwords, in the form of the animation that the figure that entire screen can be drawn by user gradually amplifies most It is back to the desktop of terminal device afterwards.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 104, the method may be used also To include:
It hides the encryption information and draws area.
Here, the size that encryption information draws area can be adjusted by user's operation, realizes and the hidden of area is drawn to encryption information Hiding.
Specifically, turning encryption information down by user's operation draws area, area is drawn in the screen of terminal device in encryption information When accounting on curtain is decreased to zero, encryption information is drawn area and is hidden.
It should be noted that encryption information drafting area is hidden, its purpose is to facilitate user to except first answers With except interface other application interface or application program operate with.
Below with regard to an example, the realization process of the method for the present invention is illustrated.
It is slidably inputed firstly, terminal device receives user to the first of application interface A, as shown in the arrow of Fig. 2 left hand view Or shown in the arrow of Fig. 3 left hand view.
It should be noted that being provided with entering using encryption information drawing mode on the default side of the screen of terminal device Mouthful.After recalling the entrance by user's operation, input valid input of the above-mentioned user to application interface A.
Later, it first is slidably inputed in response to this, display encrypted message draws area 1 and application interface viewing area 2, such as Fig. 2 Shown in right part of flg or shown in Fig. 3 right part of flg.
Here, as shown in Fig. 2 right part of flg or shown in Fig. 3 right part of flg, different shape is separated by slidably inputing for user Two regions, one for encrypted message draw area, another be application interface viewing area.
It should be noted that the application interface viewing area 2 shows the information content of application interface A.
Then, it obtains user and draws the first information inputted in area in encryption information;
In other words, user is received to slidably input to encrypted message draws area 1 second;As shown in figure 4, the second sliding is defeated Entering the sliding trace to be formed is a triangle, that is to say, that this time password is set as graphical passwords, which is the first letter Breath.
Finally, by the first information, that is, second slidably input in response to this, encrypts application interface A or add The application program of close correspondence application interface A.
Application control method provided in an embodiment of the present invention, it is defeated to the first of first object application interface by receiving user Enter;In response to first input, the first prompt information is exported, first prompt information is for prompting user in first input pair The encryption information answered draws area's input information;Obtain user and draw the first information that inputs in area in encryption information, by this One information, encrypts target object, and the target object includes: first object application interface or the first object application The corresponding application program in interface so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate.
Based on embodiment shown in FIG. 1, as an optional implementation, after step 104, the method is also wrapped It includes:
Receive second input of the user to the first interface where the encrypted target object;
In this step, second input be pre-set input, this second input can include but is not limited to click input, Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words, Second input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated Enter.
In response to second input, the second prompt information is exported, second prompt information is for prompting user in institute It states the corresponding solution confidential information of the second input and draws area's input information;
It should be noted that the second prompt information includes: text prompt, auditory tone cues, optical flare prompt etc..Here, Two prompt informations are used to help user and quickly identify that solution confidential information draws area, in order to go on smoothly the defeated of subsequent solution confidential information Enter.
It obtains the user and draws the second information inputted in area in the solution confidential information;
In this step, the second information is the information for decrypting encrypted target object.
Using second information, the encrypted target object is decrypted.
In this step, specifically, drawing the first of area's input in encryption information when password is arranged before the second information is It, can the encrypted target object of successful decryption when information.
The second input in this implementation, by user to the first interface where encrypted target object;In response to Second input exports the second prompt information, and second prompt information is for prompting user in the corresponding decryption of the second input Information draws area and inputs information;It obtains user and draws the second information inputted in area in solution confidential information;It is right using second information Encrypted target object is decrypted, in this way, its decryption oprerations is simple and convenient, it is high-efficient.
It should also be noted that, using second information, after the encrypted target object is decrypted, The method, which may also include that, is displayed in full screen target object after decrypted on the screen of terminal device.
Specifically, if target object after decrypted is first object application interface, by the first object application interface It is displayed in full screen on the screen of terminal device.
If target object after decrypted is the corresponding application program of first object application interface, by the application program Application interface is displayed in full screen on the screen of terminal device.
Here, by after decrypted target object full screen display on the screen of terminal device, show terminal device enter Normal operation interface facilitates the subsequent operation of user.
Furthermore after this step, the method may also include that
Area is drawn in solution confidential information and shows target object after decrypted, and at the first interface in addition to solution confidential information draws area Region show the desktop of third target application interface or terminal device.
Here, in this step, user is not being influenced to the target object after decryption while operating with, moreover it is possible to convenient User operates with other interfaces or application, it is to be understood that for the content in two regions on split screen display available screen.
Generally, third target application interface is the upper level interface into first interface before first interface.
Optionally, as another optional implementation, in response to second input, the second prompt information of output it Afterwards, the user is being obtained before the solution confidential information draws the second information inputted in area, the method may also include that
Display solution confidential information draws the region contour line in area.
Here, area is drawn in solution confidential information in user and input is decrypted, that is, when inputting the second information, especially by hand Before gesture input when the customized graphical passwords of user, the region contour line that solution confidential information draws area can constrain the input of user Operation amplitude inputs in vain to prevent cross that region contour line inputs on other regions in addition to solution confidential information draws area It happens.
Certainly, input operation when being decrypted in order to facilitate user, meets user demand, region contour line can pass through use Family input operation is adjusted, and then adjusts the size that solution confidential information draws area.
Based on embodiment shown in FIG. 1, as an optional implementation, after step 104, the method be can wrap It includes:
User is received to input the third at the first interface where the encrypted target object;
In this step, third input be pre-set input, the third input can include but is not limited to click input, Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words, Third input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated Enter.
It is inputted in response to the third, shows that the third inputs corresponding solution confidential information and draws area;
In this step, solution confidential information draw area and encryption information draw area it is corresponding, in particular to, solution confidential information drafting area and Position where encryption information when password is arranged draws area on the screen of terminal device is identical, and shape is identical and equal in magnitude, The memory of password when its purpose is to help user quickly to remember to the setting of target object password, improves decryption efficiency.
It obtains the user and draws the third information inputted in area in the solution confidential information;
Using the third information, the encrypted target object is decrypted.
Below with two examples, the realization process of the method for the present invention after step 104 is illustrated.
Example one
The click of the application icon of the application program B encrypted on the desktop of terminal device is inputted firstly, receiving user, As shown in left hand view in Fig. 5.
Later, terminal device is inputted in response to the click, and display solution confidential information draws area 3 and application interface viewing area 4, such as In Fig. 5 shown in right part of flg.Here, specifically, application interface viewing area 4 shows the application drawing of the application program B encrypted Target desktop.
Then, it obtains user and draws the second information inputted in area in solution confidential information;
In other words, user is received to slidably input in the third that solution confidential information draws area 3, as shown in right part of flg in Fig. 5, the Three slidably input in the example of corresponding above-mentioned application control method second slidably input, correspond to shown in Fig. 4, third sliding The sliding trace that input is formed is a triangle, that is to say, that the password for decryption is graphical passwords.
Finally, by the first information, that is, slidably inputed in response to the third, decrypt the application program encrypted B。
Example two
The application interface C the 4th of terminal device encrypted is slidably inputed firstly, receiving user, the 4th slidably inputs Glide direction as indicated by the arrows in fig. 6.
Later, terminal device is slidably inputed in response to the 4th, and display solution confidential information draws area 3 and application interface viewing area 4, as shown in Figure 6.Here, specifically, application interface viewing area 4 shows the application interface C encrypted.Here, the 4th is sliding Dynamic input is resurrected for that will solve confidential information drafting area.
In addition, may also display solution confidential information after display solution confidential information draws area 3 and application interface viewing area 4 and draw The region contour line 5 in area 3.
Then, it obtains user and draws the third information inputted in area in solution confidential information;
In other words, it receives user to slidably input in solve confidential information drafting area 3 the 5th, as shown in fig. 6, the 5th sliding is defeated Second entered in the example of corresponding above-mentioned application control method slidably inputs, and corresponds to shown in Fig. 4, the 5th slidably inputs to be formed Sliding trace be a triangle, that is to say, that for decryption password be graphical passwords.
Finally, by the first information, that is, slidably inputed in response to the 5th, decrypt the application interface encrypted C。
Application control method provided in an embodiment of the present invention carries out target object to encrypt it by the first information Afterwards, second input of the user to the first interface where encrypted target object;In response to second input, the second prompt of output Information, second prompt information is for prompting user to draw area's input information in the corresponding solution confidential information of the second input;It obtains User draws the second information inputted in area in solution confidential information;Using second information, encrypted target object is solved It is close, in this way, its decryption oprerations is simple and convenient, it is high-efficient.
Based on the above method, the embodiment of the present invention provides a kind of terminal device to realize the above method.
As shown in fig. 7, being the structural schematic diagram of terminal device provided in an embodiment of the present invention.The embodiment of the present invention provides one Kind terminal device 700, the terminal device 700 may include: the first receiving module 701, the first output module 702, obtain module 703 and encrypting module 704.
First receiving module 701, for receiving first input of the user to first object application interface;
First output module 702, for exporting the first prompt information, first prompt in response to first input Information is for prompting user to draw area's input information in the corresponding encryption information of first input;
First obtains module 703, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module 704, for being encrypted to target object, the target object includes: by the first information The first object application interface or the corresponding application program of the first object application interface.
Optionally, the first output module 702 can specifically include:
First acquisition submodule, for obtaining the input trajectory of first input;
Submodule is handled, for being based on the input trajectory, determines that encryption information draws area;
Output sub-module exports the first prompt information for drawing area based on the encryption information.
Preferably, first input is to slidably input;Wherein, the start position of the sliding trace slidably inputed is Any position on the first side of the screen, the final position of the sliding trace slidably inputed are the second side of the screen Any position, described first is the different sides of the screen while from described second;Alternatively, the sliding rail slidably inputed The start position of mark and final position are respectively the different location on same one side of the screen;Alternatively, the cunning slidably inputed Dynamic rail mark forms closed curve.
Optionally, the first object application interface is divided into two regions by the input trajectory;
Correspondingly, the processing submodule, comprising:
First processing units draw area for the first side region of the input trajectory to be determined as encryption information;
Alternatively, the second processing unit determines in described two regions wherein for the area according to described two regions One region is that encryption information draws area.
Optionally, the terminal device 700 may also include that
First display module, for the region in the first object application interface in addition to the encryption information draws area Show the desktop of the second target application interface or the terminal device.
Optionally, the terminal device 700 can also include:
Hidden module, for after encrypting to target object, hiding the encryption letter by the first information Breath draws area.
Optionally, the terminal device 700 may also include that
Second receiving module, it is defeated to second of the first interface where the encrypted target object for receiving user Enter;
Second output module, for exporting the second prompt information, second prompt information in response to second input For prompting user to draw area's input information in the corresponding solution confidential information of second input;
Second obtains module, draws the second information inputted in area in the solution confidential information for obtaining the user;
First deciphering module is decrypted the encrypted target object for using second information.
Optionally, the terminal device 700 may also include that
Third receiving module, it is defeated to the third at the first interface where the encrypted target object for receiving user Enter;
Second display module shows that the third inputs corresponding solution confidential information and draws for inputting in response to the third Area processed;
Third obtains module, draws the third information inputted in area in the solution confidential information for obtaining the user;
Third deciphering module is decrypted the encrypted target object for using the third information.
Terminal device provided in an embodiment of the present invention can be realized mobile terminal in the embodiment of the method for Fig. 1 to Fig. 6 and realize Each process, to avoid repeating, which is not described herein again.
Terminal device provided in an embodiment of the present invention receives user to first object application interface by the first receiving module First input;First output module exports the first prompt information, first prompt information is for prompting in response to first input User draws area in the corresponding encryption information of the first input and inputs information;Later, user is obtained by the first acquisition module to exist Encryption information draws the first information inputted in area;Encrypting module encrypts target object by the first information, described Target object includes: first object application interface or the corresponding application program of first object application interface, so, it is possible reality Existing real-time encrypted setting, it is high-efficient and simple to operate.
A kind of hardware structural diagram of Fig. 8 terminal device of each embodiment to realize the present invention.
The terminal device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, defeated Enter unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor The components such as 810 and power supply 811.It will be understood by those skilled in the art that terminal device structure shown in Fig. 8 is not constituted Restriction to terminal device, terminal device may include than illustrating more or fewer components, perhaps combine certain components or Different component layouts.In embodiments of the present invention, terminal device include but is not limited to mobile phone, tablet computer, laptop, Palm PC, vehicle-mounted terminal equipment, wearable device and pedometer etc..
Wherein, user input unit 807 is used to receive first input of the user to first object application interface;Processor 810 for exporting the first prompt information, first prompt information is for prompting user described in response to first input The corresponding encryption information of first input draws area and inputs information;Obtain what the user inputted in encryption information drafting area The first information;By the first information, target object is encrypted, the target object includes: that the first object is answered With interface or the corresponding application program of the first object application interface.
In the embodiment of the present invention, real-time encrypted setting can be realized, it is high-efficient and simple to operate.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set Standby communication.
Terminal device provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809 The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc. Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor (Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 1006.It can be with through treated the picture frame of graphics processor 8041 It is stored in memory 809 (or other storage mediums) or is sent via radio frequency unit 801 or network module 802.Wheat Gram wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be with The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal device posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, Hygrometer, thermometer, infrared sensor etc., details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generation and mobile terminal device User setting and function control related key signals input.Specifically, user input unit 807 includes touch panel 8071 And other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch behaviour of user on it or nearby Make (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel Operation near 8071).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, it touches Detection device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touching It touches controller and receives touch information from touch detecting apparatus, and be converted into contact coordinate, then give processor 810, connect It receives the order that processor 810 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface acoustic wave Equal multiple types realize touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other inputs Equipment 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control Key, switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display Panel 8061 is the function that outputs and inputs of realizing mobile terminal device as two independent components, but in certain implementations In example, touch panel 8071 and display panel 8061 can be integrated and be realized the function that outputs and inputs of mobile terminal device, Specifically herein without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal device, utilizes various interfaces and the entire mobile terminal of connection The various pieces of equipment by running or execute the software program and/or module that are stored in memory 809, and are called and are deposited The data in memory 809 are stored up, the various functions and processing data of mobile terminal device are executed, thus to mobile terminal device Carry out integral monitoring.Processor 810 may include one or more processing units;Preferably, processor 810 can be integrated using processing Device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc., modulation Demodulation processor mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processing In device 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811 Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 810, and memory 809 is stored in It is real when which is executed by processor 810 on memory 809 and the computer program that can be run on processor 810 Each process of existing above-mentioned application control embodiment of the method, and identical technical effect can be reached, to avoid repeating, here no longer It repeats.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of above-mentioned application control embodiment of the method, and energy when being executed by processor Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within protection of the invention.

Claims (11)

1. a kind of application control method is applied to terminal device characterized by comprising
Receive first input of the user to first object application interface;
In response to first input, the first prompt information is exported, first prompt information is for prompting user described the The corresponding encryption information of one input draws area and inputs information;
It obtains the user and draws the first information inputted in area in the encryption information;
By the first information, target object is encrypted, the target object includes: the first object application interface Or the corresponding application program of the first object application interface.
2. application control method according to claim 1, which is characterized in that described in response to first input, output First prompt information, comprising:
Obtain the input trajectory of first input;
Based on the input trajectory, determine that encryption information draws area;
Area is drawn based on the encryption information, exports the first prompt information.
3. application control method according to claim 2, which is characterized in that first input is to slidably input;
Wherein, the start position of the sliding trace slidably inputed is any position on the first side of screen, and the sliding is defeated The final position of the sliding trace entered is any position on the second side of the screen, and described first is institute while with described second State the different sides of screen;
Alternatively, the start position of the sliding trace slidably inputed and final position be respectively same one side of the screen not Same position;
Alternatively, the sliding trace slidably inputed forms closed curve.
4. application control method according to claim 2, which is characterized in that the first object application interface is by described defeated Enter track and is divided into two regions;
It is described to be based on the input trajectory, determine that encryption information draws area, comprising:
First side region of the input trajectory is determined as encryption information and draws area;
Alternatively, determining that one of region in described two regions is drawn for encryption information according to the area in described two regions Area processed.
5. application control method according to claim 1, which is characterized in that it is described by the first information, to target After object is encrypted, the method also includes:
The second target application interface is shown in region of the first object application interface in addition to the encryption information draws area Or the desktop of the terminal device.
6. application control method according to claim 1, which is characterized in that it is described by the first information, to target After object is encrypted, the method also includes:
It hides the encryption information and draws area.
7. application control method according to claim 1, which is characterized in that it is described by the first information, to target After object is encrypted, which comprises
Receive second input of the user to the first interface where the encrypted target object;
In response to second input, the second prompt information is exported, second prompt information is for prompting user described the The corresponding solution confidential information of two inputs draws area and inputs information;
It obtains the user and draws the second information inputted in area in the solution confidential information;
Using second information, the encrypted target object is decrypted.
8. application control method according to claim 1, which is characterized in that it is described by the first information, to target After object is encrypted, which comprises
User is received to input the third at the first interface where the encrypted target object;
It is inputted in response to the third, shows that the third inputs corresponding solution confidential information and draws area;
It obtains the user and draws the third information inputted in area in the solution confidential information;
Using the third information, the encrypted target object is decrypted.
9. a kind of terminal device characterized by comprising
First receiving module, for receiving first input of the user to first object application interface;
First output module, for exporting the first prompt information, first prompt information is used in response to first input It prompts user to draw area in the corresponding encryption information of first input and inputs information;
First obtains module, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module, for being encrypted to target object by the first information, the target object includes: described the One target application interface or the corresponding application program of the first object application interface.
10. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute The computer program run on processor is stated, such as claim 1 to 8 is realized when the computer program is executed by the processor Any one of described in application control method the step of.
11. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes such as application control method described in any item of the claim 1 to 8 when the computer program is executed by processor The step of.
CN201910079830.0A 2019-01-28 2019-01-28 Application control method and terminal equipment Active CN109740312B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910079830.0A CN109740312B (en) 2019-01-28 2019-01-28 Application control method and terminal equipment
PCT/CN2020/073805 WO2020156440A1 (en) 2019-01-28 2020-01-22 Application control method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910079830.0A CN109740312B (en) 2019-01-28 2019-01-28 Application control method and terminal equipment

Publications (2)

Publication Number Publication Date
CN109740312A true CN109740312A (en) 2019-05-10
CN109740312B CN109740312B (en) 2021-04-06

Family

ID=66366310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910079830.0A Active CN109740312B (en) 2019-01-28 2019-01-28 Application control method and terminal equipment

Country Status (2)

Country Link
CN (1) CN109740312B (en)
WO (1) WO2020156440A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020156440A1 (en) * 2019-01-28 2020-08-06 维沃移动通信有限公司 Application control method and terminal device
CN111818466A (en) * 2020-05-29 2020-10-23 维沃移动通信有限公司 Information sending and receiving method and device, electronic equipment and readable storage medium
CN112261216A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2650808A1 (en) * 2010-12-06 2013-10-16 Intsig Information Co., Ltd. Method for integrating account management function in input method software
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN106919306A (en) * 2017-03-08 2017-07-04 珠海市魅族科技有限公司 Method into application interface and the system into application interface
CN107357511A (en) * 2017-06-05 2017-11-17 深圳天珑无线科技有限公司 Password Input Area generation method, electric terminal and computer-readable recording medium
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN108985084A (en) * 2018-07-13 2018-12-11 维沃移动通信有限公司 A kind of Object Encryption Process and terminal device
CN109002340A (en) * 2018-07-12 2018-12-14 维沃移动通信有限公司 A kind of screen locking method and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10686774B2 (en) * 2017-01-13 2020-06-16 Asignio Inc. Authentication systems and methods for online services
CN109740312B (en) * 2019-01-28 2021-04-06 维沃移动通信有限公司 Application control method and terminal equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2650808A1 (en) * 2010-12-06 2013-10-16 Intsig Information Co., Ltd. Method for integrating account management function in input method software
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
CN106919306A (en) * 2017-03-08 2017-07-04 珠海市魅族科技有限公司 Method into application interface and the system into application interface
CN107357511A (en) * 2017-06-05 2017-11-17 深圳天珑无线科技有限公司 Password Input Area generation method, electric terminal and computer-readable recording medium
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN109002340A (en) * 2018-07-12 2018-12-14 维沃移动通信有限公司 A kind of screen locking method and electronic equipment
CN108985084A (en) * 2018-07-13 2018-12-11 维沃移动通信有限公司 A kind of Object Encryption Process and terminal device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘志君等: "基于单片机的密码锁设计", 《万方数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020156440A1 (en) * 2019-01-28 2020-08-06 维沃移动通信有限公司 Application control method and terminal device
CN111818466A (en) * 2020-05-29 2020-10-23 维沃移动通信有限公司 Information sending and receiving method and device, electronic equipment and readable storage medium
CN112261216A (en) * 2020-10-20 2021-01-22 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium
CN112261216B (en) * 2020-10-20 2022-05-03 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium

Also Published As

Publication number Publication date
WO2020156440A1 (en) 2020-08-06
CN109740312B (en) 2021-04-06

Similar Documents

Publication Publication Date Title
CN107608514A (en) Information processing method and mobile terminal
CN108629171B (en) Unread message processing method and terminal
CN108491133A (en) A kind of application control method and terminal
WO2020233218A1 (en) Information encryption method, information decryption method, and terminal
CN107808084A (en) A kind of touch operation method and mobile terminal
CN110149628B (en) Information processing method and terminal equipment
WO2020199987A1 (en) Message display method and mobile terminal
CN108415641A (en) A kind of processing method and mobile terminal of icon
CN109145552A (en) Information ciphering method and terminal device
CN109032406A (en) A kind of control method and mobile terminal
CN110162241A (en) A kind of message treatment method and terminal
CN109740312A (en) A kind of application control method and terminal device
CN110035183A (en) Information sharing method and terminal
CN109981904A (en) A kind of method for controlling volume and terminal device
CN110457879A (en) Object displaying method and terminal device
CN109766680A (en) Authority control method and terminal
CN107358083A (en) A kind of information processing method, terminal and computer-readable recording medium
CN110213438A (en) A kind of processing method and terminal device of application program
CN109871176A (en) A kind of object displaying method and terminal device
CN109992939B (en) Login method and terminal equipment
CN111310250A (en) Application sharing method and electronic equipment
CN109446794A (en) A kind of cipher-code input method and its mobile terminal
CN109062492A (en) A kind of application access method and terminal
CN109753776A (en) A kind of method, apparatus and mobile terminal of information processing
CN108494958A (en) A kind of image processing method and flexible screen terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant