CN109800602A - Method for secret protection, mobile terminal and computer readable storage medium - Google Patents

Method for secret protection, mobile terminal and computer readable storage medium Download PDF

Info

Publication number
CN109800602A
CN109800602A CN201910077631.6A CN201910077631A CN109800602A CN 109800602 A CN109800602 A CN 109800602A CN 201910077631 A CN201910077631 A CN 201910077631A CN 109800602 A CN109800602 A CN 109800602A
Authority
CN
China
Prior art keywords
secret protection
application
desktop
screen
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910077631.6A
Other languages
Chinese (zh)
Other versions
CN109800602B (en
Inventor
覃攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhanghui Tianxia Technology Co ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201910077631.6A priority Critical patent/CN109800602B/en
Publication of CN109800602A publication Critical patent/CN109800602A/en
Application granted granted Critical
Publication of CN109800602B publication Critical patent/CN109800602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a kind of method for secret protection; applied to dual-screen mobile terminal; the dual-screen mobile terminal includes main screen and auxiliary screen; this method comprises: when the main screen or the auxiliary screen show desktop, obtain it is preset install with the dual-screen mobile terminal using corresponding secret protection grade;Load application display rule corresponding with the secret protection grade and application access rule;The regular corresponding application of show or hide in the desktop is shown according to the application, is positive normal access module or access restricted mode according to the application shown in desktop described in the application access rule control.The invention also discloses a kind of mobile terminals and a kind of computer readable storage medium.The present invention can be improved the safety of the secret protection based on dual-screen mobile terminal.

Description

Method for secret protection, mobile terminal and computer readable storage medium
Technical field
The present invention relates to technical field of mobile terminals more particularly to method for secret protection, mobile terminal and computer-readable Storage medium.
Background technique
With the continuous development of mobile terminal technology, dual-screen mobile terminal, as Dual-band Handy Phone (possesses front and back two The mobile phone of screen) become to become more and more popular by its advantage on content is shown.Dual-screen mobile terminal brought to user it is aobvious Show with it is operational convenient while, the problem of also bringing secret protection.
Currently, the secret protection measure of dual-screen mobile terminal is universal are as follows: when user wants access to main screen, need to input close The verification informations such as code, pattern, face are verified, and verification can normally access main screen after passing through;When user want access to it is auxiliary When screen, auxiliary screen can be directly accessed without doing any verification.The defect of this secret protection measure is, if other people usurp The verification information of user, just can be used directly any application in main screen, so easily leads to letting out for user privacy information Dew, and auxiliary screen more increases the risk of user privacy information leakage due to not taking any secret protection measure.
Therefore, it need to be improved currently based on the safety of the secret protection of dual-screen mobile terminal.
Summary of the invention
It is a primary object of the present invention to propose a kind of method for secret protection, mobile terminal and computer-readable storage medium Matter, it is intended to improve the safety of the secret protection based on dual-screen mobile terminal.
To achieve the above object, the present invention provides a kind of method for secret protection, is applied to dual-screen mobile terminal, the double screen Mobile terminal includes main screen and auxiliary screen, and described method includes following steps:
When the main screen or the auxiliary screen show desktop, the installation of the preset and dual-screen mobile terminal is obtained Using corresponding secret protection grade;
Load application display rule corresponding with the secret protection grade and application access rule;
The regular corresponding application of show or hide in the desktop is shown according to the application, according to the application access Shown in desktop described in rule control application be positive normal access module or access restricted mode.
Optionally, described when the main screen or when the auxiliary screen shows desktop, it obtains and preset is moved with the double screen Dynamic terminal installation using before the step of corresponding secret protection grade, further includes:
Receive the setting instruction of the secret protection grade for the application installed based on the dual-screen mobile terminal;
It is instructed according to the setting, different secret protection grades is set for different applications;
Optionally, described to be instructed according to the setting, it is the step of different secret protection grades are arranged in different applications Include:
It is instructed according to the setting, the application of dual-screen mobile terminal installation is divided according to preset classifying rules Class;
According to the corresponding relationship between preset application type and secret protection grade, not for different types of application setting Same secret protection grade.
Optionally, described when the main screen or when the auxiliary screen shows desktop, it obtains and preset is moved with the double screen Dynamic terminal installation using before the step of corresponding secret protection grade, further includes:
When receiving the access instruction based on the main screen, the access verification information of user's input is obtained;
The access verification information is verified, when passed the verification, shows desktop in the main screen;
When receiving the access instruction based on the auxiliary screen, desktop is shown in the auxiliary screen.
Optionally, the secret protection grade includes the first secret protection grade, described to show rule according to the application The corresponding application of show or hide in the desktop, according to the application shown in desktop described in the application access rule control Be positive normal access module or access restricted mode the step of include:
Display is in the application of the first secret protection grade in the desktop of the main screen, and controls the place of display In the first secret protection grade application for access restricted mode;
The application in the first secret protection grade is hidden in the desktop of the auxiliary screen.
Optionally, the application that the first secret protection grade is shown in the desktop of the main screen, and control After the step of application of the first secret protection grade of display is accesses restricted mode, further includes:
When receiving the enabling instruction based on the application in access restricted mode shown in the main screen, display Prompting interface enables password to prompt user to input;
It obtains the enabling password of user's input and the enabling password is verified, when passed the verification, in the master The application in access restricted mode is enabled in screen.
Optionally, the secret protection grade further includes the second secret protection grade, and described shown according to the application is advised The then corresponding application of show or hide in the desktop is answered according to what is shown in desktop described in the application access rule control Be positive normal access module or access restricted mode the step of further include:
Display is in the application of the second secret protection grade in the desktop of the main screen, and controls the place of display In the second secret protection grade using the normal access module that is positive;
Display is in the application of the second secret protection grade in the desktop of the auxiliary screen, and controls the place of display In the second secret protection grade application for access restricted mode.
Optionally, the secret protection grade further includes third secret protection grade, and described shown according to the application is advised The then corresponding application of show or hide in the desktop is answered according to what is shown in desktop described in the application access rule control Be positive normal access module or access restricted mode the step of further include:
Display is in the application of the third secret protection grade in the desktop of the main screen, and controls the place of display In the third secret protection grade using the normal access module that is positive;
Display is in the application of the third secret protection grade in the desktop of the auxiliary screen, and controls the place of display In the third secret protection grade using the normal access module that is positive.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal include: memory, Processor and it is stored in the secret protection program that can be run on the memory and on the processor, the secret protection journey The step of sequence realizes method for secret protection as described above when being executed by the processor.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium Secret protection program is stored on storage medium, the secret protection program realizes privacy as described above when being executed by processor The step of guard method.
The present invention obtains the preset and double screen and moves when the main screen of dual-screen mobile terminal or auxiliary screen display desktop Dynamic terminal installation using corresponding secret protection grade;Load corresponding with secret protection grade application display it is regular and Application access rule;The regular corresponding application of show or hide in the desktop is shown according to the application, is answered according to described Controlled with access rule shown in the desktop application be positive normal access module or access restricted mode.Compared to existing skill Art, the present invention can be according to the secret protection grades of application, and control is applied to be shown in the different screen of dual-screen mobile terminal Show or hide, for the application of display, its be positive normal access module or access restricted mode can be controlled, so that the present invention improves The safety of secret protection based on dual-screen mobile terminal.
Detailed description of the invention
A kind of hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention;
Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of method for secret protection first embodiment of the present invention;
Fig. 4 is the display schematic diagram for being in the first secret protection grade in the embodiment of the present invention using A;
Fig. 5 is the display schematic diagram for being in the second secret protection grade in the embodiment of the present invention using A;
Fig. 6 is the display schematic diagram for being in third secret protection grade in the embodiment of the present invention using A.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Based on above-mentioned mobile terminal hardware configuration, each embodiment of mobile terminal of the present invention is proposed.
In mobile terminal embodiment of the present invention, which includes main screen and auxiliary screen.Specifically, main screen and auxiliary Main screen and auxiliary screen can be adjusted to by the rotation of rotary shaft by any folder by a rotation axis connection between screen Angle;Alternatively, main screen and auxiliary screen are separately positioned on the front and back of mobile terminal.
Please refer to Fig. 1, in an embodiment of mobile terminal of the present invention, the mobile terminal include: main screen, auxiliary screen, Memory 109, processor 110 and it is stored in the secret protection that can be run on the memory 109 and on the processor 110 Program, the secret protection program perform the steps of when being executed by the processor 110
When the main screen or the auxiliary screen show desktop, the installation of the preset and dual-screen mobile terminal is obtained Using corresponding secret protection grade;
Load application display rule corresponding with the secret protection grade and application access rule;
The regular corresponding application of show or hide in the desktop is shown according to the application, according to the application access Shown in desktop described in rule control application be positive normal access module or access restricted mode.
Further, it is also performed the steps of when the secret protection program is executed by the processor 110
Receive the setting instruction of the secret protection grade for the application installed based on the dual-screen mobile terminal;
It is instructed according to the setting, different secret protection grades is set for different applications.
Further, it is also performed the steps of when the secret protection program is executed by the processor 110
It is instructed according to the setting, the application of dual-screen mobile terminal installation is divided according to preset classifying rules Class;
According to the corresponding relationship between preset application type and secret protection grade, not for different types of application setting Same secret protection grade.
Further, it is also performed the steps of when the secret protection program is executed by the processor 110
When receiving the access instruction based on the main screen, the access verification information of user's input is obtained;
The access verification information is verified, when passed the verification, shows desktop in the main screen;
When receiving the access instruction based on the auxiliary screen, desktop is shown in the auxiliary screen.
Further, the secret protection grade includes the first secret protection grade, and the secret protection program is described Processor 110 also performs the steps of when executing
Display is in the application of the first secret protection grade in the desktop of the main screen, and controls the place of display In the first secret protection grade application for access restricted mode;
The application in the first secret protection grade is hidden in the desktop of the auxiliary screen.
Further, it is also performed the steps of when the secret protection program is executed by the processor 110
When receiving the enabling instruction based on the application in access restricted mode shown in the main screen, display Prompting interface enables password to prompt user to input;
It obtains the enabling password of user's input and the enabling password is verified, when passed the verification, in the master The application in access restricted mode is enabled in screen.
Further, the secret protection grade further includes the second secret protection grade, and the secret protection program is by institute It states when processor 110 executes and also performs the steps of
Display is in the application of the second secret protection grade in the desktop of the main screen, and controls the place of display In the second secret protection grade using the normal access module that is positive;
Display is in the application of the second secret protection grade in the desktop of the auxiliary screen, and controls the place of display In the second secret protection grade application for access restricted mode.
Further, the secret protection grade further includes third secret protection grade, and the secret protection program is by institute It states when processor 110 executes and also performs the steps of
Display is in the application of the third secret protection grade in the desktop of the main screen, and controls the place of display In the third secret protection grade using the normal access module that is positive;
Display is in the application of the third secret protection grade in the desktop of the auxiliary screen, and controls the place of display In the third secret protection grade using the normal access module that is positive.
The specific embodiment of mobile terminal of the present invention and each specific embodiment of following method for secret protection are essentially identical, This is not repeated.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each reality of method for secret protection of the present invention is proposed Apply example.
The present invention provides a kind of method for secret protection, which is applied to dual-screen mobile terminal, which moves Dynamic terminal includes main screen and auxiliary screen.
It is the flow diagram of method for secret protection first embodiment of the present invention referring to Fig. 3, Fig. 3, which comprises
Step S10 is obtained preset mobile eventually with the double screen when the main screen or the auxiliary screen display desktop End installation using corresponding secret protection grade;
In the present embodiment, the default setting when main screen of dual-screen mobile terminal and auxiliary screen can continue to use factory, than It is main screen, screen supplemented by the screen at the back side if the default setting of default is usually positive screen;Furthermore main screen and auxiliary screen Curtain can also carry out flexible setting by user, and the present embodiment is not construed as limiting this.
The secret protection measure of existing dual-screen mobile terminal is universal are as follows: when user wants access to main screen, needs to input The verification informations such as password, pattern, face are verified, and verification can normally access main screen after passing through;When user wants access to When auxiliary screen, auxiliary screen can be directly accessed without doing any verification.The defect of this secret protection measure is, if other people steal With the verification information of user, any application in main screen just can be used directly, so easily lead to user privacy information Leakage, and auxiliary screen more increases the risk of user privacy information leakage due to not taking any secret protection measure.For this purpose, The present embodiment proposes a kind of method for secret protection.
When the main screen of dual-screen mobile terminal or auxiliary screen show desktop, obtain first preset mobile eventually with the double screen End installation using corresponding secret protection grade.Wherein, main screen shows that the application scenarios of desktop can be with are as follows: user's input is close The verification informations such as code, pattern, face unlock main screen hence into the desktop of main screen, or any answer is operated in main screen Used time presses the key of display desktop so that terminal jumps to desktop from the runnable interface of application.Auxiliary screen shows answering for desktop It is similar with main screen with scene, it does not repeat herein.
It further, can also include: to receive to answer based on what the dual-screen mobile terminal was installed before above-mentioned steps S10 The setting of secret protection grade instructs;It is instructed according to the setting, different secret protections etc. is set for different applications Grade.
In the present embodiment, the setting page that user can be provided by mobile terminal system triggers the privacy based on application The setting of protection class instructs, and is instructed according to the setting, and different secret protection grades is arranged for different applications, wherein The quantity of secret protection grade and its corresponding secret protection rule can be system intialization, can also be carried out in advance by user Personal settings.
It is described to be instructed according to the setting as a kind of set-up mode, for different applications, different secret protections is set The step of grade may include: to be instructed according to the setting, to dual-screen mobile terminal installation using according to preset point Rule-like is classified;According to the corresponding relationship between preset application type and secret protection grade, answered to be different types of With the different secret protection grade of setting.
Specifically, user can be arranged mobile terminal by one key of " press application type and secret protection grade is arranged " key and pacify The secret protection grade of all applications of dress, all applications that mobile terminal first installs it at this time are according to preset classification gauge Then classify, for example, can will using be divided into financial class, instant messaging class, browser class, music class, game class and other Several big types such as class;It then, is different types of according to the corresponding relationship between preset application type and secret protection grade Using the different secret protection grade of setting, for example high secret protection grade can be set by all applications under financial class, Middle secret protection grade is set by all applications under instant messaging class, browser class, music class, game class, when other classes Under all applications be set as low secret protection grade, the corresponding relationship between specific application type and secret protection grade can It is arranged by user flexibility, the present embodiment is not construed as limiting this.This setup realizes the hidden of batch setting same class application Private protection class simplifies setting operation, and the user experience is improved.
As another set-up mode, user can be different applications based on secret protection hierarchical selection frame manually respectively Different secret protection grades is set, for example when secret protection grade includes high, medium and low 3 grades, user, which can be set, to be answered It is high secret protection grade with A, be middle secret protection grade using B, using C is low secret protection grade, certainly, all applications Can default before user is not set is low secret protection grade, and user, which can according to need, to be manually adjusted using the hidden of A Private protection class is high-grade, is middle grade using the secret protection grade of B, when specific implementation can flexible setting.This set Mode flexibility ratio is high, is conducive to the personal settings that user carries out secret protection grade to different applications.
Step S20 loads application display rule corresponding with the secret protection grade and application access rule;
Get the preset installation with dual-screen mobile terminal using corresponding secret protection grade after, load and obtain The corresponding application display rule of the secret protection grade arrived and application access rule.
Wherein, application display rule corresponding with each secret protection grade and application access rule can flexibly be set in advance It sets.For example, when the secret protection grade of a certain application is high secret protection grade, using display rule and application access rule It can be with are as follows: allow this to apply and this is shown and controlled in the desktop of main screen apply in the desktop of main screen to access limited mould Formula, and be hidden the application in auxiliary desktop screen;When the secret protection grade of a certain application is middle secret protection grade When, it can be with using display rule and application access rule are as follows: allow this to apply and this is shown and controlled in the desktop of main screen answer Be positive normal access module in the desktop of main screen, allows this to apply and this is shown and controlled in the desktop of auxiliary screen applies It is access restricted mode in the desktop of auxiliary screen;When the secret protection grade of a certain application is low secret protection grade, application Display rule and application access rule can be with are as follows: allow this to apply and this is shown and controlled in the desktop of main screen apply in main screen It is positive normal access module in the desktop of curtain, allows this to apply and this is shown and controlled in the desktop of auxiliary screen apply in auxiliary screen Be positive normal access module in desktop.
Step S30 shows the regular corresponding application of show or hide in the desktop according to the application, according to described Shown in desktop described in application access rule control application be positive normal access module or access restricted mode.
In the step, according to it is above-mentioned get application display rule, in the desktop of main screen or auxiliary screen display or It hides corresponding application, while according to application access rule, controls the application shown in desktop and be positive normal access module or access Restricted mode.
It should be noted that the corresponding application of show or hide refers to the icon of show or hide application in desktop, Under normal access module, user can click directly on application icon to access application, in the case where accessing restricted mode, when the user clicks When application icon, mobile terminal, which also needs to carry out user proof of identity at least once, just allows user to access application.
In the present embodiment, when the main screen of dual-screen mobile terminal or auxiliary screen show desktop, preset and institute is obtained State dual-screen mobile terminal installation using corresponding secret protection grade;It is aobvious to load application corresponding with the secret protection grade Show rule and application access rule;According to application display rule corresponding application of show or hide, root in the desktop According to shown in desktop described in the application access rule control application be positive normal access module or access restricted mode.Compared to The prior art, the present embodiment can control the different screen applied in dual-screen mobile terminal according to the secret protection grade of application Middle carry out show or hide can control its be positive normal access module or access restricted mode for the application of display, thus this Embodiment improves the safety of the secret protection based on dual-screen mobile terminal.
Further, it is based on method for secret protection first embodiment of the present invention, proposes method for secret protection second of the present invention Embodiment.
It in the present embodiment, can also include: to work as to receive the access based on the main screen before above-mentioned steps S10 When instruction, the access verification information of user's input is obtained;The access verification information is verified, when passed the verification, Desktop is shown in the main screen;When receiving the access instruction based on the auxiliary screen, table is shown in the auxiliary screen Face.
In the present embodiment, if user wants to access main screen, user need to input access verification information, the access verification information It can be one of numerical ciphers, pattern, face or a variety of combinations, when mobile terminal receives the access based on main screen When instruction, obtains the access verification information of user's input and the access verification information is verified, when passed the verification, that is, exist Desktop is shown in main screen;If user wants to access auxiliary screen, auxiliary screen can be directly entered without inputting any access verification information The desktop of curtain.
In above-mentioned access mode, main screen desktop has the characteristics that access is limited compared to auxiliary screen, meets existing double Shield the operation scenario of mobile terminal.
Further, it is based on the first, second embodiment of method for secret protection of the present invention, proposes method for secret protection of the present invention 3rd embodiment.
In the present embodiment, the secret protection grade includes the first secret protection grade, accordingly, step S30 at this time It may include: application of the display in the first secret protection grade in the desktop of the main screen, and control display Application in the first secret protection grade is access restricted mode;It hides in the desktop of the auxiliary screen in described The application of first secret protection grade.
In the following, being illustrated by taking application A as an example.
Referring to Fig. 4, Fig. 4 is the display schematic diagram for being in the first secret protection grade in the embodiment of the present invention using A.Specifically Ground, the first secret protection grade can regard high secret protection grade as, can when being in the first secret protection grade using A Restricted mode is accessed to show and control in the desktop of main screen, and in the desktop of auxiliary screen, it directly will be hidden using A Hiding.The reason of being arranged in this way is, in practical application, since main screen desktop is compared to the spy that auxiliary screen has access limited Point, therefore relatively, the secret protection measure of auxiliary screen can be configured more harsh, preferably to protect in auxiliary screen Privacy information is not leaked.When it is implemented, first secret protection etc. can be set by some applications comprising sensitive information Grade, such as financial class application, address list, short message, mail applications etc..
It further, can also include: to work as to receive to be in based on what is shown in the main screen after step S30 When accessing the enabling instruction of the application of restricted mode, display reminding interface enables password to prompt user to input;It is defeated to obtain user The enabling password that enters simultaneously verifies the enabling password, when passed the verification, enabled in the main screen described in be in Access the application of restricted mode.
When user wants to open the enabling in application, can trigger and apply in access restricted mode shown in main screen Instruction, mobile terminal shows a prompting interface to prompt user to input and enable password at this time, later, obtains the enabling of user's input Password is simultaneously verified to password is enabled, and when passed the verification, i.e., the application in access restricted mode is enabled in main screen. In this way, the limited accass applied in main screen for realizing high secret protection grade, improves secret protection Safety.
Further, it is based on method for secret protection 3rd embodiment of the present invention, proposes method for secret protection the 4th of the present invention Embodiment.
In the present embodiment, the secret protection grade further includes the second secret protection grade, accordingly, step at this time S30 may include: application of the display in the second secret protection grade in the desktop of the main screen, and control display The application in the second secret protection grade be positive normal access module;Display is in institute in the desktop of the auxiliary screen The application of the second secret protection grade is stated, and the application in the second secret protection grade for controlling display is limited for access Mode.
Still by taking application A as an example, referring to Fig. 5, Fig. 5 is to be in the second secret protection grade using A in the embodiment of the present invention Display schematic diagram.Specifically, the second secret protection grade can regard middle secret protection grade as, when application A is in the second privacy When protection class, the normal access module that is positive can be shown and controlled in the desktop of main screen, meanwhile, it can be in auxiliary screen It shows and controls in desktop to access restricted mode.When it is implemented, user, which can according to need flexible setting, is in second hidden Application of private protection class, such as the application of instant messaging class, browser application etc..
Further, the secret protection grade further includes third secret protection grade, and accordingly, step S30 can at this time To include: application of the display in the third secret protection grade in the desktop of the main screen, and control the place of display In the third secret protection grade using the normal access module that is positive;Display is in described the in the desktop of the auxiliary screen The application of three secret protection grades, and mould is asked in the application frequentation that is positive in the third secret protection grade for controlling display Formula.
Still by taking application A as an example, referring to Fig. 6, Fig. 6 is to be in third secret protection grade using A in the embodiment of the present invention Display schematic diagram.Specifically, third secret protection grade can regard low secret protection grade as, when application A is in third privacy When protection class, the normal access module that is positive can be shown and controlled in the desktop of main screen, meanwhile, it can be in auxiliary screen It is shown in desktop and controls the normal access module that is positive.When it is implemented, can be by some unlikely leakage user sensitive informations Application be arranged in third secret protection grade, such as the application of music class, game class application etc..
Above-mentioned first secret protection grade, the second secret protection grade, the protection intensity of third secret protection grade are by height To low, the graduation protection to applying in main screen and auxiliary screen is realized, the flexibility of protection is improved.
The present invention also provides a kind of computer readable storage mediums.
Secret protection program is stored on computer readable storage medium of the present invention, the secret protection program is by processor The step of method for secret protection as described above is realized when execution.
Wherein, the secret protection program run on the processor, which is performed realized method, can refer to the present invention Method for secret protection embodiment, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of method for secret protection, which is characterized in that the method for secret protection is applied to dual-screen mobile terminal, the double screen Mobile terminal includes main screen and auxiliary screen, and the method for secret protection includes the following steps:
When the main screen or the auxiliary screen show desktop, the preset application with dual-screen mobile terminal installation is obtained Corresponding secret protection grade;
Load application display rule corresponding with the secret protection grade and application access rule;
The regular corresponding application of show or hide in the desktop is shown according to the application, according to the application access rule Control shown in the desktop application be positive normal access module or access restricted mode.
2. method for secret protection as described in claim 1, which is characterized in that described when the main screen or the auxiliary screen are aobvious When showing desktop, obtain it is preset install with the dual-screen mobile terminal using before the step of corresponding secret protection grade, Further include:
Receive the setting instruction of the secret protection grade for the application installed based on the dual-screen mobile terminal;
It is instructed according to the setting, different secret protection grades is set for different applications.
3. method for secret protection as claimed in claim 2, which is characterized in that it is described to be instructed according to the setting, it is different Include: using the step of different secret protection grades are arranged
It is instructed according to the setting, is classified to the application of dual-screen mobile terminal installation according to preset classifying rules;
According to the corresponding relationship between preset application type and secret protection grade, it is arranged for different types of application different Secret protection grade.
4. method for secret protection as described in claim 1, which is characterized in that described when the main screen or the auxiliary screen are aobvious When showing desktop, obtain it is preset install with the dual-screen mobile terminal using before the step of corresponding secret protection grade, Further include:
When receiving the access instruction based on the main screen, the access verification information of user's input is obtained;
The access verification information is verified, when passed the verification, shows desktop in the main screen;
When receiving the access instruction based on the auxiliary screen, desktop is shown in the auxiliary screen.
5. method for secret protection according to any one of claims 1 to 4, which is characterized in that the secret protection grade packet The first secret protection grade is included, it is described that the regular corresponding application of show or hide in the desktop is shown according to the application, According to the step using be positive normal access module or access restricted mode shown in desktop described in the application access rule control Suddenly include:
Display is in the application of the first secret protection grade in the desktop of the main screen, and control display in institute The application of the first secret protection grade is stated as access restricted mode;
The application in the first secret protection grade is hidden in the desktop of the auxiliary screen.
6. method for secret protection as claimed in claim 5, which is characterized in that described to show institute in the desktop of the main screen The application stated the application of the first secret protection grade, and control the first secret protection grade of display is access restricted mode The step of after, further includes:
When receiving the enabling instruction based on the application in access restricted mode shown in the main screen, display reminding Interface enables password to prompt user to input;
It obtains the enabling password of user's input and the enabling password is verified, when passed the verification, in the main screen Application in access restricted mode described in middle enabling.
7. method for secret protection as claimed in claim 5, which is characterized in that the secret protection grade further includes the second privacy Protection class, it is described that the regular corresponding application of show or hide in the desktop is shown according to the application, it is answered according to described Controlled with access rule shown in the desktop application be positive normal access module or access restricted mode the step of further include:
Display is in the application of the second secret protection grade in the desktop of the main screen, and control display in institute The application for stating the second secret protection grade is positive normal access module;
Display is in the application of the second secret protection grade in the desktop of the auxiliary screen, and control display in institute The application of the second secret protection grade is stated as access restricted mode.
8. method for secret protection as claimed in claim 7, which is characterized in that the secret protection grade further includes third privacy Protection class, it is described that the regular corresponding application of show or hide in the desktop is shown according to the application, it is answered according to described Controlled with access rule shown in the desktop application be positive normal access module or access restricted mode the step of further include:
Display is in the application of the third secret protection grade in the desktop of the main screen, and control display in institute The application for stating third secret protection grade is positive normal access module;
Display is in the application of the third secret protection grade in the desktop of the auxiliary screen, and control display in institute The application for stating third secret protection grade is positive normal access module.
9. a kind of mobile terminal, which is characterized in that the mobile terminal include: main screen, auxiliary screen, memory, processor and It is stored in the secret protection program that can be run on the memory and on the processor, the secret protection program is described It realizes when processor executes such as the step of method for secret protection described in any item of the claim 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with privacy guarantor on the computer readable storage medium Program is protected, such as secret protection described in any item of the claim 1 to 8 is realized when the secret protection program is executed by processor The step of method.
CN201910077631.6A 2019-01-25 2019-01-25 Privacy protection method, mobile terminal and computer readable storage medium Active CN109800602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910077631.6A CN109800602B (en) 2019-01-25 2019-01-25 Privacy protection method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910077631.6A CN109800602B (en) 2019-01-25 2019-01-25 Privacy protection method, mobile terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109800602A true CN109800602A (en) 2019-05-24
CN109800602B CN109800602B (en) 2023-05-16

Family

ID=66559069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910077631.6A Active CN109800602B (en) 2019-01-25 2019-01-25 Privacy protection method, mobile terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109800602B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569671A (en) * 2019-09-17 2019-12-13 Oppo(重庆)智能科技有限公司 Privacy protection method and related device
CN110750408A (en) * 2019-09-30 2020-02-04 湖南新云网科技有限公司 Method, device and apparatus for controlling USB debug mode switch, and storage medium
CN110839110A (en) * 2019-11-18 2020-02-25 深圳传音控股股份有限公司 Message protection method, mobile terminal and readable storage medium
CN111125761A (en) * 2019-12-23 2020-05-08 上海摩软通讯技术有限公司 Screen display method, device, equipment and storage medium based on privacy protection
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN114047858A (en) * 2021-11-15 2022-02-15 珠海读书郎软件科技有限公司 Double-screen telephone watch application management method
CN114745701A (en) * 2022-04-13 2022-07-12 中国联合网络通信集团有限公司 Dialing processing method and device and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108052831A (en) * 2017-11-23 2018-05-18 北京珠穆朗玛移动通信有限公司 Image watermarking and display methods, mobile terminal and storage medium
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN108521494A (en) * 2018-04-10 2018-09-11 Oppo广东移动通信有限公司 Terminal control method and device, readable storage medium storing program for executing, terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108052831A (en) * 2017-11-23 2018-05-18 北京珠穆朗玛移动通信有限公司 Image watermarking and display methods, mobile terminal and storage medium
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN108521494A (en) * 2018-04-10 2018-09-11 Oppo广东移动通信有限公司 Terminal control method and device, readable storage medium storing program for executing, terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110569671A (en) * 2019-09-17 2019-12-13 Oppo(重庆)智能科技有限公司 Privacy protection method and related device
CN110750408A (en) * 2019-09-30 2020-02-04 湖南新云网科技有限公司 Method, device and apparatus for controlling USB debug mode switch, and storage medium
CN110839110A (en) * 2019-11-18 2020-02-25 深圳传音控股股份有限公司 Message protection method, mobile terminal and readable storage medium
CN110839110B (en) * 2019-11-18 2023-09-26 深圳传音控股股份有限公司 Message protection method, mobile terminal and readable storage medium
CN111125761A (en) * 2019-12-23 2020-05-08 上海摩软通讯技术有限公司 Screen display method, device, equipment and storage medium based on privacy protection
CN111125770A (en) * 2019-12-27 2020-05-08 维沃移动通信有限公司 Privacy protection method and electronic equipment
CN114047858A (en) * 2021-11-15 2022-02-15 珠海读书郎软件科技有限公司 Double-screen telephone watch application management method
CN114745701A (en) * 2022-04-13 2022-07-12 中国联合网络通信集团有限公司 Dialing processing method and device and computer readable storage medium
CN114745701B (en) * 2022-04-13 2023-06-23 中国联合网络通信集团有限公司 Dialing processing method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN109800602B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN109831586A (en) A kind of user interface switching display methods, mobile terminal and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN108833690A (en) authority control method, terminal and computer readable storage medium
CN107580350A (en) A kind of signal intensity switching method, equipment and computer-readable recording medium
CN108172161A (en) Display methods, mobile terminal and computer readable storage medium based on flexible screen
CN110191465A (en) Authority control method, mobile terminal and computer readable storage medium
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN110187925A (en) A kind of desktop pretrigger control method, equipment and computer readable storage medium
CN107180184A (en) Application program right management method, device and computer-readable recording medium
CN109543474A (en) A kind of method for controlling mobile terminal and mobile terminal
CN108958936A (en) Application programe switch-over method, mobile terminal and computer readable storage medium
CN109151174A (en) Message display method, wearable device and computer readable storage medium
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN107682541A (en) Audio control method, mobile terminal and the storage medium of screen prjection
CN109445660A (en) A kind of wearable device control method, mobile terminal and wearable device
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium
CN109522276A (en) Application icon management method, terminal and computer readable storage medium
CN109101301A (en) A kind of display control method, mobile terminal and computer readable storage medium
CN108650415A (en) End message display methods, mobile terminal and computer readable storage medium
CN108037880A (en) A kind of Curved screen control method, terminal and computer-readable recording medium
CN109711850A (en) A kind of safe payment method, equipment and computer readable storage medium
CN109683796A (en) A kind of interaction control method, equipment and computer readable storage medium
CN109766211A (en) Method, terminal and the storage medium of shuangping san false-touch prevention

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230427

Address after: 1103, 10th Floor, Building B, No. 2 Zhongguancun South Street, Haidian District, Beijing, 100080

Applicant after: BEIJING ZHANGHUI TIANXIA TECHNOLOGY Co.,Ltd.

Address before: 518057 Dazu Innovation Building, 9018 Beihuan Avenue, Nanshan District, Shenzhen City, Guangdong Province, 6-8, 10-11, 6 and 6-10 floors in Area A, B and C

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant