CN104951703B - terminal control method and device - Google Patents

terminal control method and device Download PDF

Info

Publication number
CN104951703B
CN104951703B CN201510279205.2A CN201510279205A CN104951703B CN 104951703 B CN104951703 B CN 104951703B CN 201510279205 A CN201510279205 A CN 201510279205A CN 104951703 B CN104951703 B CN 104951703B
Authority
CN
China
Prior art keywords
terminal
software
application software
opening
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510279205.2A
Other languages
Chinese (zh)
Other versions
CN104951703A (en
Inventor
张鹏飞
夏勇峰
屈恒
王益冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510279205.2A priority Critical patent/CN104951703B/en
Publication of CN104951703A publication Critical patent/CN104951703A/en
Application granted granted Critical
Publication of CN104951703B publication Critical patent/CN104951703B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The disclosure is directed to a kind of terminal control method and devices, are applied to terminal, which comprises monitor the predetermined software the opening operation whether terminal receives for opening default application software and instruct;When the terminal receives the predetermined software opening operation instruction for opening default application software, third party's encrypting module in the terminal is called to lock the start-up course of the default application software;Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;When terminal binding has the hardware device, detects the hardware device and whether pass through radio connection and be connected with the terminal;It when the hardware device is connected with the terminal, controls third party's encrypting module and unlocks the start-up course of the default application software, and the default application software is started according to predetermined software opening operation instruction on the terminal.It can be with safe and convenient to setting application software locking and unlocking.

Description

Terminal control method and device
Technical field
This disclosure relates to field of terminal technology more particularly to a kind of terminal control method and device.
Background technique
With the continuous development of science and technology, mobile phone has become tool indispensable in user's life, and user is on mobile phone The application software installed and used is also more and more, and many application software may relate to the individual privacy and property safety of user Etc. the problem of.In order to improve the safety that application software on mobile phone uses, part of the application software has encryption function, such as hand Gesture password etc. only inputs these application software of correct password ability normal use.
However, user on mobile phone input password relative application software is unlocked when, once and seen by other people, So these people are after taking the mobile phone of the user, it is possible to which it is soft to open the related application on the mobile phone using the password got Part in turn results in the risk of user data leakage.Therefore, it is necessary to a kind of safer authentication mode on mobile phone using soft Part is unlocked.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of terminal control method and device.
According to the first aspect of the embodiments of the present disclosure, a kind of terminal control method is provided, comprising:
The predetermined software the opening operation whether terminal receives for opening default application software is monitored to instruct;
When the terminal receives the predetermined software opening operation instruction for opening default application software, call Third party's encrypting module in the terminal locks the start-up course of the default application software;
Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;
When the terminal binding have the hardware device when, detect the hardware device whether pass through radio connection with The terminal is connected;
When the hardware device is connected with the terminal, third party's encrypting module is controlled by the default application The start-up course of software unlocks, and starts the default application on the terminal according to predetermined software opening operation instruction Software.
With reference to first aspect, in the first possible implementation of the first aspect, whether the monitoring terminal Receive the predetermined software opening operation instruction for opening default application software, comprising:
Detect whether the terminal receives the instruction of software opening operation;
When the terminal receives software opening operation instruction, obtain what the software opening operation instruction carried Target application software identification;
Search whether that there are the mesh in the preset and associated default application software mark table of third party's encrypting module Mark application software mark;
When there are when the target application software identification, determine the terminal reception in the default application software mark table To the predetermined software opening operation instruction for opening default application software.
With reference to first aspect, in the second possible implementation of the first aspect, described to call in the terminal Third party's encrypting module locks the start-up course of the default application software, comprising:
Judge whether the terminal starts third party's encryption function;
When the terminal starts third party's encryption function, the storage address of third party's encrypting module is obtained;
The corresponding application program of third party's encrypting module is obtained according to the storage address;
The corresponding application program of third party's encrypting module is run, it will be in the start-up course of the default application software Only.
With reference to first aspect, in a third possible implementation of the first aspect, further includes:
When the hardware device is connected with the terminal, judge whether the hardware device is located at is with the terminal In the preset range at center;
When the hardware device is located in the preset range centered on the terminal, the control third is executed The step of square encrypting module unlocks the start-up course of the default application software.
With reference to first aspect, in a fourth possible implementation of the first aspect, further includes:
When the hardware device is not connected with the terminal, it is aobvious in the terminal to control third party's encrypting module Show that screen display unlocks input interface;
It detects and whether receives default unlock content in the unlock input interface, the default unlock content is at least wrapped It includes: unlocking pin and/or unlock gesture;
When receiving the default unlock content in the unlock input interface, controlling third party's encrypting module will The start-up course of the default application software unlocks, and starts the default application software on the terminal.
According to the second aspect of an embodiment of the present disclosure, a kind of terminal control mechanism is provided, comprising: monitoring unit, for supervising The predetermined software the opening operation whether terminal receives for opening default application software is surveyed to instruct;
Call unit, for calling the terminal when the terminal receives predetermined software opening operation instruction In third party's encrypting module the start-up course of the default application software is locked;
Detection unit is bound, whether binding the hardware that can be connect with the terminal wireless for detecting the terminal sets It is standby;
Connecting detection unit, for whether detecting the hardware device when terminal binding has the hardware device It is connected by radio connection with the terminal;
Control unit is unlocked, for when the hardware device is connected with the terminal, controlling third party's encryption Module unlocks the start-up course of the default application software;
Software opening unit, it is described default for being started on the terminal according to predetermined software opening operation instruction Application software.
In conjunction with second aspect, in the first possible implementation of the second aspect, the monitoring unit, comprising:
Software open detection module, for detecting whether the terminal receives the software opening operation instruction;
Software identification obtains module, for when the terminal receives software opening operation instruction, described in acquisition The target application software identification that the instruction of software opening operation carries;
Software indicates searching module, for identifying table with the associated default application software of third party's encrypting module preset In search whether that there are the target application software identifications;
Operational order receives determining module, for there are the target application is soft in the default application software mark table When part identifies, determine that the terminal receives the instruction of predetermined software opening operation.
In conjunction with second aspect, in a second possible implementation of the second aspect, the call unit, comprising:
Encryption function judgment module, for judging whether the terminal starts third party's encryption function;
Storage address obtains module, for obtaining the third party and adding when the terminal starts third party's encryption function The storage address of close module;
Application program obtains module, for obtaining the corresponding application of third party's encrypting module according to the storage address Program;
Software runs module, for running the corresponding application program of third party's encrypting module;
Start-stop module, for stopping the start-up course of the default application software.
In conjunction with second aspect, in the third possible implementation of the second aspect, further includes: preset range judgement is single Member;
The preset range judging unit is described hard for judging when the hardware device is connected with the terminal Part equipment is located in the preset range centered on the terminal;
The unlock control unit is also used to be located in the preset range centered on the terminal in the hardware device When, it controls third party's encrypting module and unlocks the start-up course of the default application software.
In conjunction with second aspect, in the fourth possible implementation of the second aspect, further includes: display control unit and Content detection unit;
The display control unit, for controlling the third when the hardware device is not connected with the terminal Square encrypting module shows unlock input interface on the terminal display screen;
Whether the content detection unit receives default unlock content, institute for detecting in the unlock input interface It states default unlock content to include at least: unlocking pin and/or unlock gesture;
The unlock control unit, when being also used to receive default unlock content in the unlock input interface, control Third party's encrypting module unlocks the start-up course of the default application software;
The software opening unit is also used to start on the terminal the default application software.
According to the third aspect of an embodiment of the present disclosure, a kind of terminal is provided, comprising:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The predetermined software the opening operation whether terminal receives for opening default application software is monitored to instruct;
When the terminal receives the predetermined software opening operation instruction for opening default application software, call Third party's encrypting module in the terminal locks the start-up course of the default application software;
Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;
When the terminal binding have the hardware device when, detect the hardware device whether pass through radio connection with The terminal is connected;
When the hardware device is connected with the terminal, third party's encrypting module is controlled by the default application The start-up course of software unlocks, and starts the default application on the terminal according to predetermined software opening operation instruction Software.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The terminal control method and device provided in the embodiment of the present disclosure is monitoring that terminal receives default application software After open command, third party's encrypting module in terminal is called to lock the start-up course for presetting application software.In the terminal In the case where hardware device binding, if the hardware device and terminal establish wireless communication connection, release to the default application The locking of software start-up course, and default application software open command received according to terminal to continue starting the default application soft Part it is related in each opening can to avoid user in the related technology with safe and convenient to relative application software locking and unlocking When application software, input password is required, and then can effectively prevent user and forget Password or user's quilt when inputting password The problem of others peeps.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of terminal control method shown according to an exemplary embodiment;
Fig. 2 is the flow chart of step S110 in Fig. 1;
Fig. 3 is the flow chart of step S120 in Fig. 1;
Fig. 4 is a kind of flow chart of the terminal control method shown according to another exemplary embodiment;
Fig. 5 is the flow chart of step S180 in Fig. 1;
Fig. 6 is a kind of flow chart of the terminal control method shown according to a further exemplary embodiment;
Fig. 7 is a kind of schematic diagram of terminal control mechanism shown according to an exemplary embodiment;
Fig. 8 is the structural schematic diagram of software monitors unit in Fig. 7;
Fig. 9 is the structural schematic diagram of software transfer unit in Fig. 7;
Figure 10 is a kind of schematic diagram of the terminal control mechanism shown according to another exemplary embodiment;
Figure 11 is a kind of structural schematic diagram of terminal shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
For the safety that the application software improved on user terminal uses, and can be easily to terminal using soft Part is unlocked, this public affairs embodiment, which is opened, provides firstly a kind of terminal control method, as shown in Figure 1, this method may include with Lower step:
In step s 110, whether monitoring terminal receives the predetermined software opening operation for opening default application software Instruction.
Taking the terminal as an example, due to that can be equipped with multiple application software on mobile phone, user be can according to need, need to The application software of safeguard protection is wanted to be set as default application software.During carrying out locking and unlocking to default application software, The predetermined software opening operation instruction that default application software whether is received in current phone needed to detect, only so as to subsequent split These the default application software opened carry out locking and unlocking operation.
Wherein, terminal can be mobile terminal, such as: mobile phone, tablet computer equipment.It takes the mobile phone as an example, according to actual It needs, user can install some required application software on mobile phone, for being related to privacy of user and property safety individually Application software, such as Tencent QQ, Alipay can verify use by modes such as setting gesture passwords when software is opened Whether family is legitimate user.But the hand of its own offer the application software for being related to safe property may be arranged in Most users Gesture password, but to some chat softwares, such as Tencent QQ, wechat, since frequency of use is higher, Most users will not be all arranged Gesture password.
Remember that the gesture password of user oneself setting, Most users habit use always a kind of gesture password for convenience, And many application software are all unlocked using same gesture password, as user by the password for opening mobile phone and opens using soft The password of part is all accustomed to using same gesture password.And once user when being unlocked to application software, by it is some other not Friendly user sees, then these hostile users are likely to after taking the mobile phone of the user, easily opens hand The application software of relevant user privacy and property safety on machine, privacy and property to user cause security risk, and user When using relative application software, input password is required every time, this brings inconvenience to users.
In addition, major applications software itself is not providing the function of encryption, user can not be well these softwares Use progress safeguard protection.For example, the information such as common access network address, collection on browser are leaked in order to prevent, some User is wished to carry out safety verification when in use to browser on mobile phone, be maintained secrecy with user's habit to oneself, but similar It is not provided with safety verification mode mostly in browser these application software itself, brings security risk to user.
When terminal receives the instruction of the predetermined software opening operation for opening default application software, in step S120 In, call third party's encrypting module in terminal to lock the start-up course of default application software.
There are SDK (Software Development Kit, the software development work of exploitation in the embodiment of the present disclosure, in terminal Tool packet).It wherein, include encrypting module, bracelet binding module and bracelet identification module etc. in SDK.
If monitoring that terminal receives the instruction of predetermined software opening operation, terminal can call the encryption mould in SDK Block, the encrypting module can lock the start-up course of the predetermined software.
In step s 130, whether detection terminal binds the hardware device that can be connect with terminal wireless.
Hardware device can be following one or more, such as: Intelligent bracelet, intelligent glasses wearable device may be used also To be the mobile terminal devices such as other mobile phones or tablet computer.
By taking handset binding bracelet as an example, a mobile phone can bind one or more bracelets.When a mobile phone needs and one It when a specified bracelet is bound, needs for the bracelet to be put near mobile phone, and opens the Bluetooth function on mobile phone and bracelet respectively, The identity identification information of the bracelet or corresponding account information are being locally stored by corresponding operation, such as terminal, making hand Machine and the bracelet are bound.For example, user connects on the specific key of bracelet after mobile phone and specified bracelet establish communication connection It is continuous both to get the identity identification information of the bracelet with the handset binding, mobile phone by 5s, and the identification information is saved in It is local, when next time, the bracelet was located near the mobile phone, it can be established and be communicated to connect with corresponding mobile phone automatically by bluetooth.
Therefore, whether mobile phone can be inquired locally is stored with the information such as the identity identification information of hardware device, if so, saying The bright mobile phone and the hardware device are bound;Otherwise, mobile phone is not bound with hardware device.In addition, if terminal can network, also The identity identification information of bracelet server can be sent to verify, judge the bracelet whether with handset binding.
When terminal binding has hardware device, in step S140, whether detection hardware device passes through radio connection It is connected with terminal.
Radio connection between terminal and hardware device can be a variety of, such as bluetooth, infrared, NFC (Near Field Communication, near-field communication) etc..
Currently, most common communication is attached by bluetooth approach between mobile phone and bracelet, an end End can establish bluetooth connection with a hardware device is said simultaneously.
When hardware device is connected with terminal, in step S150, control third party's encrypting module is soft by default application The start-up course of part unlocks, and starts default application software at the terminal according to the instruction of predetermined software opening operation.
In addition, in step S160, terminating this stream if terminal is not received by the instruction of predetermined software opening operation Journey.When terminal has not bound hardware device, in step S170, user is prompted to be manually entered password.
The terminal control method provided in the embodiment of the present disclosure refers to monitoring that terminal receives default application software and opens After order, third party's encrypting module in terminal is called to lock the start-up course for presetting application software.In the terminal and hardware In the case where apparatus bound, if the hardware device and terminal establish wireless communication connection, releasing is preset application software to this and is opened The locking of dynamic process, and receive default application software open command according to terminal and continue starting the default application software, can be with Safe and convenient to relative application software locking and unlocking, avoid in the related technology user every time open relative application software When, input password is required, and then can effectively prevent that user forgets Password or user is peeped when inputting password by others, And locking and unlocking function can also be provided to the software for not having software lock function.
It is instructed to monitor the predetermined software opening operation whether terminal receives for opening default application software, so as to The start-up course for presetting application software is locked, and then reaches the protective effect for presetting application software to this, as Fig. 1 The refinement of method, in another embodiment that the disclosure provides, as shown in Fig. 2, step S110 can also include the following steps:
In step S111, whether detection terminal receives the instruction of software opening operation.
It takes the mobile phone as an example, when user is needed using application software on mobile phone, the respective application on mobile phone screen can be clicked Software, user can be converted to the operational order on mobile phone to the clicking operation of application software, and mobile phone is receiving the operational order Afterwards, corresponding application software can be opened according to the operational order.Therefore, it can detecte and whether receive predetermined software on mobile phone and open Operational order is opened to determine whether corresponding application software will be opened.
If terminal receives software opening operation, in step S112, obtains the instruction of predetermined software opening operation and carry Target application software identification.
The instruction of predetermined software opening operation is the operational order opened to specified application software, and to other application Software does not work then, and the mark to be opened specified application software can be carried in the operational order, can be looked into according to the mark Look for corresponding application software.
In step S113, it is with lookup in the associated default application software mark table of third party's encrypting module preset It is no that there are target application software identifications.
It, can be in advance by these when third party's encrypting module in the terminal carries out locking and unlocking to required application software The identification information storage of application software is pre- by searching for this into the associated default application software mark table of third party's encrypting module If application software mark table is known which application software needs to call third party's encrypting module when opening, which is not required to It wants.With reach user can to the application software of required protection carry out locking and unlocking, to do not need using third party encrypt mould Block carries out the application software of locking and unlocking without the operation, carries out, makes according to the start-up course of original application software User has alternative, improves user experience.
When, there are when target application software identification, in step S114, determining that terminal connects in default application software mark table Receive the instruction of predetermined software opening operation.
When, there are when target application software identification, illustrating that terminal is opened according to predetermined software in default application software mark table The application software that operational order will be opened is target application software, needs that third party's encrypting module is called to carry out locking reconciliation Lock.
Target application is not present when terminal is not received by software opening operation or in default application software mark table Software identification, then terminating this process.
In order to elaborate how third party's encrypting module in terminal locks the start-up course of default application software, as The refinement of Fig. 1 method, in the another embodiment that the disclosure provides, as shown in figure 3, step S120 can also include following step It is rapid:
In step S121, judge whether terminal starts third party's encryption function.
According to the actual needs, the starting state of third party's encrypting module can be arranged in user in different environment.Example Such as, when user is in a comparatively safe environment, in family, third party's encrypting module can be in and close shape by user State, make user to default application software in use, reduce verification operation, can be quickly using default application software.If with Family is in a relatively unsafe environment, and when being located in public arena such as user, for the sake of security, user be can star Third party's encryption function, to guarantee the safety in utilization of application software in terminal.
Therefore, judge whether terminal starts third party's encryption function, two steps should be included at least and operated, first determine whether third Whether square encrypting module is in the open state, then judges whether third party's encrypting module is starting encryption function.
When terminal starts third party's encryption function, in step S122, the storage address of third party's encrypting module is obtained.
It is detecting that the default application software in terminal starting, and is needing that third party's encrypting module is called to answer this When being locked with software, need to obtain the storage address of third party's encrypting module in the terminal,
In step S123, the corresponding application program of third party's encrypting module is obtained according to storage address.
In step S124, the corresponding application program of operation third party's encrypting module, by the starting of default application software Journey stops.
In order to improve safety of the hardware device to application software unlock is preset in terminal, on the basis of Fig. 1 method, In the another embodiment that the disclosure provides, as shown in figure 4, can also include the following steps:
When hardware device is connected with terminal, in step S180, judge whether hardware device is located at terminal and is In the preset range of the heart.
When hardware device is located in the preset range centered on terminal, in step S150, control third party's encryption Module unlocks the start-up course of default application software, and starts default answer at the terminal according to the instruction of predetermined software opening operation Use software.
When hardware device is not in the preset range centered on terminal, in step S170, user hand is prompted Dynamic input password.
Wherein, as shown in figure 5, above-mentioned steps S180 can also include the following steps:
In step S151, judge wireless communication connection whether is established between terminal and hardware device.
Present mobile phone and the most common communication of bracelet, are attached by Blue-tooth communication method, blue at present Tooth communication mode can support it is one-to-many, can have multiple bracelets simultaneously with mobile phone by Blue-tooth communication method establish company It connects.It is, of course, also possible to have other communications, such as infrared.
When establishing wireless communication connection between terminal and hardware device, in step S152, detection terminal is set with hardware Current radio signal strength between standby.
Wireless signal strength can be detected as unit of dbm, since wireless signal strength can be with the increase of distance And successively decrease, therefore, wireless signal strength can be converted into the distance between terminal and hardware device.
In step S153, according to current radio signal strength, the current distance between terminal and hardware device is obtained.
Preset relation table can be searched, wherein preset relation table includes the letter of the wireless communication between terminal and hardware device Corresponding relationship number between intensity and reference distance.It can search and obtain default according to the signal strength of Current wireless communication Corresponding reference distance in relation table, using the reference distance as the current distance.
In step S154, judge whether current distance is less than or equal to preset threshold.
Illustratively, preset threshold can be set as to 1m, i.e. pre-determined distance between terminal and bracelet is set as 1m, Ke Yigen It is specifically set according to actual needs.
Determine hardware device in the default model of terminal in step S155 if current distance is less than or equal to preset threshold Within enclosing.
Using the region within preset range as trusted region, using other regions as region is distrusted, prevent illegal User is distrusting region to unlock by hardware device to relative application software, is causing user after getting the terminal of user Data are stolen.
If current distance be greater than preset threshold, in step S156, determine hardware device terminal preset range it Outside.
In addition, if in step S157, terminating this without establishing wireless communication connection between terminal and hardware device Process.
In order to improve safety of the hardware device to application software unlock is preset in terminal, on the basis of Fig. 1 method, In the another embodiment that the disclosure provides, as shown in fig. 6, can also include the following steps:
When hardware device is not connected or when the unbound hardware device of terminal with terminal, in step S610, control the Tripartite's encrypting module shows unlock input interface on terminal display screen.
Hardware device be not connected with terminal or the unbound hardware device of terminal in the case where, in order to make user and When use required application software, can by user input unlocking pin be unlocked, therefore, it is necessary first in the screen of terminal On unlocking pin input interface is shown.
In step S620, default unlock content whether is received in detection unlock input interface.Wherein, it presets in unlock Appearance includes at least: unlocking pin and/or unlock gesture.
User can input the passwords such as pre-set gesture password and/or number and be unlocked.
When receiving default unlock content in unlock input interface, in step S630, third party's encrypting module is controlled The start-up course of default application software is unlocked, and starts default application software at the terminal.
After user, which inputs correct unlocking pin, to be unlocked, default application software can be normally-open, so as to user Use.
The terminal control method provided in the embodiment of the present disclosure refers to monitoring that terminal receives default application software and opens After order, third party's encrypting module in terminal is called to lock the start-up course for presetting application software.In the terminal and hardware In the case where apparatus bound, if the hardware device and terminal establish wireless communication connection, releasing is preset application software to this and is opened The locking of dynamic process, and receive default application software open command according to terminal and continue starting the default application software, can be with Safe and convenient to relative application software locking and unlocking, avoid in the related technology user every time open relative application software When, input password is required, and then can effectively prevent that user forgets Password or user is peeped when inputting password by others The problem of.
Furthermore it is also possible to could be solved to default application software when being located at hardware device in the credible range of terminal Lock further improves the safety opened to default application software.Also, if the hardware device appearance with terminal binding is different Often or terminal and hardware device it is unbound, or when terminal and hardware device are bound, hardware device is in the default of terminal Except range, the setting application software after locking is unlocked in order to facilitate user, also provided for user be manually entered it is close The interface of code can timely use relative application software after user has input correct password.
By the description of above embodiment of the method, it is apparent to those skilled in the art that the disclosure can Realize by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases the former It is more preferably embodiment.Based on this understanding, the technical solution of the disclosure substantially makes tribute to the prior art in other words The part offered can be embodied in the form of software products, which is stored in a storage medium, packet Some instructions are included to use so that a computer equipment (can be personal computer, server or the network equipment etc.) executes The all or part of the steps of each embodiment the method for the disclosure.And storage medium above-mentioned includes: read-only memory (ROM), the various media that can store program code such as random access memory (RAM), magnetic or disk.
In addition, the embodiment of the present disclosure additionally provides a kind of terminal control mechanism as the realization to the various embodiments described above, it should Device is located in terminal, as shown in fig. 7, the device includes: monitoring unit 10, call unit 20, binding detection unit 30, connection Detection unit 40, unlock control unit 50 and software opening unit 60, wherein
Monitoring unit 10 be configured as monitoring the terminal whether receive it is soft for opening presetting for default application software The instruction of part opening operation;
Call unit 20 is configured as receiving in the terminal described for opening the predetermined software of default application software When opening operation instructs, third party's encrypting module in the terminal is called to lock the start-up course of the default application software It is fixed;
Whether binding detection unit 30 is configured as detecting the terminal and binds and can connect with the terminal wireless Hardware device;
Connecting detection unit 40 is configured as detecting the hardware device when the terminal, which is bound, the hardware device Whether it is connected by radio connection with the terminal;
Unlock control unit 50 is configured as controlling the third party when the hardware device is connected with the terminal Encrypting module unlocks the start-up course of the default application software;
Software opening unit 60 is configured as being instructed according to the predetermined software opening operation starts institute on the terminal State default application software.
In another embodiment of the disclosure, on the basis of Fig. 7 shows embodiment, as shown in figure 8, monitoring unit 10 can wrap Include: software open detection module 11, software identification obtain module 12, software indicates searching module 13 and operational order is received and determined Module 14, wherein
Software open detection module 11 is configured as detecting whether the terminal receives the software opening operation instruction;
Software identification obtains module 12 and is configured as obtaining when the terminal receives software opening operation instruction The target application software identification that the software opening operation instruction carries;
Software indicates that searching module 13 is configured as in the preset and associated default application software of third party's encrypting module Search whether that there are the target application software identifications in mark table;
Operational order receives determining module 14 and is configured as in the default application software mark table that there are the targets When application software identifies, determine that the terminal receives the predetermined software opening operation for opening default application software and refers to It enables.
In another embodiment of the disclosure, on the basis of the embodiment shown in fig. 7, as shown in figure 9, call unit 20 can be with It include: encryption function judgment module 21, storage address obtains module 22, application program obtains module 23, software operation module 24 With start-stop module 25, wherein
Encryption function judgment module 21 is configured as judging whether the terminal starts third party's encryption function;
Storage address obtains module 22 and is configured as obtaining the third when the terminal starts third party's encryption function The storage address of square encrypting module;
Application program obtains module 23 and is configured as being corresponded to according to storage address acquisition third party's encrypting module Application program;
Software operation module 24 is configured as running the corresponding application program of third party's encrypting module;
Start-stop module 25 is configured as stopping the start-up course of the default application software.
In the another embodiment of the disclosure, on the basis of the embodiment shown in fig. 7, the terminal provided in the embodiment of the present disclosure Control device, further includes: preset range judging unit, wherein
Preset range judging unit is configured as judging the hardware when the hardware device is connected with the terminal Equipment is located in the preset range centered on the terminal;
Unlock control unit is additionally configured to be located in the preset range centered on the terminal in the hardware device When, it controls third party's encrypting module and unlocks the start-up course of the default application software.
In the another embodiment of the disclosure, on the basis of the embodiment shown in fig. 7, as shown in Figure 10, the embodiment of the present disclosure The terminal control mechanism of middle offer, further includes: display control unit 80 and content detection unit 90, wherein
Display control unit 80 is configured as controlling the third when the hardware device is not connected with the terminal Square encrypting module shows unlock input interface on the terminal display screen;
Content detection unit 90 is configured as detecting default unlock content, institute whether are received in the unlock input interface It states default unlock content to include at least: unlocking pin and/or unlock gesture;
In addition, unlock control unit 50 is additionally configured to receive in the default unlock in the unlock input interface Rong Shi controls third party's encrypting module and unlocks the start-up course of the default application software;
Software opening unit 60 is additionally configured to start the default application software on the terminal.
The terminal control mechanism provided in the embodiment of the present disclosure refers to monitoring that terminal receives default application software and opens After order, third party's encrypting module in terminal is called to lock the start-up course for presetting application software.In the terminal and hardware In the case where apparatus bound, if the hardware device and terminal establish wireless communication connection, releasing is preset application software to this and is opened The locking of dynamic process, and receive default application software open command according to terminal and continue starting the default application software, can be with Safe and convenient to relative application software locking and unlocking, avoid in the related technology user every time open relative application software When, input password is required, and then can effectively prevent that user forgets Password or user is peeped when inputting password by others The problem of.
Furthermore it is also possible to could be solved to default application software when being located at hardware device in the credible range of terminal Lock further improves the safety opened to default application software.Also, if the hardware device appearance with terminal binding is different Often or terminal and hardware device it is unbound, or when terminal and hardware device are bound, hardware device is in the default of terminal Except range, the setting application software after locking is unlocked in order to facilitate user, also provided for user be manually entered it is close The interface of code can timely use relative application software after user has input correct password.
Figure 11 is a kind of structural schematic diagram of terminal 800 for terminal control shown according to an exemplary embodiment. For example, terminal 800 can be mobile phone, computer, digital broadcasting terminal, messaging device, game console, plate set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Referring to Fig.1 1, terminal 800 may include following one or more components: processing component 802, memory 804, power supply Component 806, multimedia component 808, audio component 810, the interface 812 of input/output (I/O), sensor module 814, and Communication component 816.
The integrated operation of the usual controlling terminal 800 of processing component 802, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing component 802 may include that one or more processors 820 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 802 may include one or more modules, just Interaction between processing component 802 and other assemblies.For example, processing component 802 may include multi-media module, it is more to facilitate Interaction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in terminal 800.These data are shown Example includes the instruction of any application or method for operating in terminal 800, contact data, and telephone book data disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of terminal 800.Power supply module 806 may include power management system System, one or more power supplys and other with for terminal 800 generate, manage, and distribute the associated component of electric power.
Multimedia component 808 includes the screen of one output interface of offer between the terminal 800 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 808 includes a front camera and/or rear camera.When terminal 800 is in operation mode, such as screening-mode or When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 810 is configured as output and/or input audio signal.For example, audio component 810 includes a Mike Wind (MIC), when terminal 800 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 804 or via communication set Part 816 is sent.In some embodiments, audio component 810 further includes a loudspeaker, is used for output audio signal.
I/O interface 812 provides interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 814 includes one or more sensors, and the state for providing various aspects for terminal 800 is commented Estimate.For example, sensor module 814 can detecte the state that opens/closes of terminal 800, and the relative positioning of component, for example, it is described Component is the display and keypad of terminal 800, and sensor module 814 can also detect 800 1 components of terminal 800 or terminal Position change, the existence or non-existence that user contacts with terminal 800,800 orientation of terminal or acceleration/deceleration and terminal 800 Temperature change.Sensor module 814 may include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 814 can also include optical sensor, such as CMOS or ccd image sensor, at As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal 800 and other equipment.Terminal 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 800 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 804 of instruction, above-metioned instruction can be executed by the processor 820 of terminal 800 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device executes, so that mobile terminal is able to carry out a kind of terminal control method, which comprises
The predetermined software the opening operation whether terminal receives for opening default application software is monitored to instruct;
When the terminal receives the predetermined software opening operation instruction for opening default application software, call Third party's encrypting module in the terminal locks the start-up course of the default application software;
Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;
When the terminal binding have the hardware device when, detect the hardware device whether pass through radio connection with The terminal is connected;
When the hardware device is connected with the terminal, third party's encrypting module is controlled by the default application The start-up course of software unlocks, and starts the default application on the terminal according to predetermined software opening operation instruction Software.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (5)

1. a kind of terminal control method characterized by comprising
The predetermined software the opening operation whether terminal receives for opening default application software is monitored to instruct;
When the terminal receives the predetermined software opening operation instruction for opening default application software, described in calling Third party's encrypting module in terminal locks the start-up course of the default application software;
Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;
When the terminal binding have the hardware device when, detect the hardware device whether pass through radio connection with it is described Terminal is connected;
When the hardware device is connected with the terminal, judge whether the hardware device is located at centered on the terminal Preset range in;
When the hardware device is located in the preset range centered on the terminal, controlling third party's encrypting module will The start-up course of the default application software unlocks, and is started on the terminal according to predetermined software opening operation instruction The default application software;
Whether the monitoring terminal receives the instruction of the predetermined software opening operation for opening default application software, packet It includes:
Detect whether the terminal receives the instruction of software opening operation;
When the terminal receives software opening operation instruction, the target that the software opening operation instruction carries is obtained Application software mark;
It is preset with search whether that there are the targets to answer in the associated default application software mark table of third party's encrypting module Use software identification;
When, there are when the target application software identification, determining that the terminal receives institute in the default application software mark table State the predetermined software opening operation instruction for opening default application software;
The third party's encrypting module called in the terminal locks the start-up course of the default application software, comprising:
Judge whether the terminal starts third party's encryption function;
When the terminal starts third party's encryption function, the storage address of third party's encrypting module is obtained;
The corresponding application program of third party's encrypting module is obtained according to the storage address;
The corresponding application program of third party's encrypting module is run, the start-up course of the default application software is stopped.
2. terminal control method according to claim 1, which is characterized in that further include:
When the hardware device is not connected with the terminal, third party's encrypting module is controlled in the terminal display screen Upper display unlocks input interface;
It detects and whether receives default unlock content in the unlock input interface, the default unlock content includes at least: solution Lock cipher and/or unlock gesture;
When receiving the default unlock content in the unlock input interface, controlling third party's encrypting module will be described The start-up course unlock of default application software, and start the default application software on the terminal.
3. a kind of terminal control mechanism characterized by comprising
Monitoring unit, for monitoring whether the terminal receives predetermined software opening operation for opening default application software Instruction;
Call unit refers to for receiving the predetermined software opening operation for opening default application software in the terminal When enabling, third party's encrypting module in the terminal is called to lock the start-up course of the default application software;
Detection unit is bound, for detecting whether the terminal binds the hardware device that can be connect with the terminal wireless;
Connecting detection unit, for detecting whether the hardware device passes through when terminal binding has the hardware device Radio connection is connected with the terminal;
Preset range judging unit, for judging the hardware device position when the hardware device is connected with the terminal In in the preset range centered on the terminal;
Control unit is unlocked, for controlling institute when the hardware device is located in the preset range centered on the terminal Third party's encrypting module is stated to unlock the start-up course of the default application software;
Software opening unit, for starting the default application on the terminal according to predetermined software opening operation instruction Software;
The monitoring unit, comprising:
Software open detection module, for detecting whether the terminal receives the software opening operation instruction;
Software identification obtains module, for obtaining the software when the terminal receives software opening operation instruction The target application software identification that opening operation instruction carries;
Software indicate searching module, for it is preset with looked into the associated default application software mark table of third party's encrypting module It looks for the presence or absence of the target application software identification;
Operational order receives determining module, for there are the target application software marks in the default application software mark table When knowledge, determine that the terminal receives the predetermined software opening operation instruction for opening default application software;
The call unit, comprising:
Encryption function judgment module, for judging whether the terminal starts third party's encryption function;
Storage address obtains module, for obtaining the third party and encrypting mould when the terminal starts third party's encryption function The storage address of block;
Application program obtains module, and for being obtained according to the storage address, third party's encrypting module is corresponding to apply journey Sequence;
Software runs module, for running the corresponding application program of third party's encrypting module;
Start-stop module, for stopping the start-up course of the default application software.
4. terminal control mechanism according to claim 3, which is characterized in that further include: display control unit and content inspection Survey unit;
The display control unit, for controlling the third party and adding when the hardware device is not connected with the terminal Close module shows unlock input interface on the terminal display screen;
The content detection unit, it is described pre- for detecting whether receive default unlock content in the unlock input interface If unlock content includes at least: unlocking pin and/or unlock gesture;
The unlock control unit, when being also used to receive the default unlock content in the unlock input interface, control Third party's encrypting module unlocks the start-up course of the default application software;
The software opening unit is also used to start on the terminal the default application software.
5. a kind of terminal characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The predetermined software the opening operation whether terminal receives for opening default application software is monitored to instruct;
When the terminal receives the predetermined software opening operation instruction for opening default application software, described in calling Third party's encrypting module in terminal locks the start-up course of the default application software;
Detect whether the terminal binds the hardware device that can be connect with the terminal wireless;
When the terminal binding have the hardware device when, detect the hardware device whether pass through radio connection with it is described Terminal is connected;
When the hardware device is connected with the terminal, judge whether the hardware device is located at centered on the terminal Preset range in;
When the hardware device is located in the preset range centered on the terminal, controlling third party's encrypting module will The start-up course of the default application software unlocks, and is started on the terminal according to predetermined software opening operation instruction The default application software;
Whether the monitoring terminal receives the instruction of the predetermined software opening operation for opening default application software, packet It includes:
Detect whether the terminal receives the instruction of software opening operation;
When the terminal receives software opening operation instruction, the target that the software opening operation instruction carries is obtained Application software mark;
It is preset with search whether that there are the targets to answer in the associated default application software mark table of third party's encrypting module Use software identification;
When, there are when the target application software identification, determining that the terminal receives institute in the default application software mark table State the predetermined software opening operation instruction for opening default application software;
The third party's encrypting module called in the terminal locks the start-up course of the default application software, comprising:
Judge whether the terminal starts third party's encryption function;
When the terminal starts third party's encryption function, the storage address of third party's encrypting module is obtained;
The corresponding application program of third party's encrypting module is obtained according to the storage address;
The corresponding application program of third party's encrypting module is run, the start-up course of the default application software is stopped.
CN201510279205.2A 2015-05-27 2015-05-27 terminal control method and device Active CN104951703B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510279205.2A CN104951703B (en) 2015-05-27 2015-05-27 terminal control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510279205.2A CN104951703B (en) 2015-05-27 2015-05-27 terminal control method and device

Publications (2)

Publication Number Publication Date
CN104951703A CN104951703A (en) 2015-09-30
CN104951703B true CN104951703B (en) 2019-01-18

Family

ID=54166352

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510279205.2A Active CN104951703B (en) 2015-05-27 2015-05-27 terminal control method and device

Country Status (1)

Country Link
CN (1) CN104951703B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105468775B (en) * 2015-12-11 2019-07-23 小米科技有限责任公司 Method and device for electronics explanation
CN106022114A (en) * 2016-05-09 2016-10-12 北京小米移动软件有限公司 A display method and device for an application lock unlocking interface
CN106296189A (en) * 2016-07-25 2017-01-04 北京小米移动软件有限公司 Electronic transaction safe verification method and device and electronic equipment
CN108495362B (en) * 2018-03-09 2021-06-01 广东小天才科技有限公司 Signal transmission method and communication circuit
CN110113154B (en) * 2019-04-23 2021-10-08 厦门中锐电力科技有限公司 Method for online control by using double keys of lock

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188670A (en) * 2011-12-28 2013-07-03 希姆通信息技术(上海)有限公司 System and method for verifying mobile terminal
CN103577237A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Application program starting control method and device
CN104093119A (en) * 2014-06-26 2014-10-08 小米科技有限责任公司 Unlocking method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091133A (en) * 2014-04-17 2014-10-08 中兴通讯股份有限公司 Method for protecting security of terminal, terminal and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188670A (en) * 2011-12-28 2013-07-03 希姆通信息技术(上海)有限公司 System and method for verifying mobile terminal
CN103577237A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Application program starting control method and device
CN104093119A (en) * 2014-06-26 2014-10-08 小米科技有限责任公司 Unlocking method and device

Also Published As

Publication number Publication date
CN104951703A (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN104951703B (en) terminal control method and device
CN104503688B (en) The control method and device of intelligent hardware devices
CN104866750B (en) Using startup method and apparatus
EP2985975B1 (en) Method, apparatus and system for authenticating access and computer program
CN104615240B (en) The unlocking method and a device of terminal
KR20130027571A (en) Securing a mobile computing device
CN106097494A (en) The method for unlocking of smart lock and device
CN104318177A (en) Protection method and protection device for data of terminal equipment
WO2015158043A1 (en) Method, terminal and system for protecting terminal security
CN104376273A (en) Data access control method and device
CN104965732B (en) Desktop starts method and device
CN104298902B (en) A kind of display methods of application program, device and equipment
CN107798231A (en) Display methods, device, terminal and the storage medium of operation interface
CN108319832A (en) Unlocking method and device
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN107045604A (en) Information processing method and device
CN106488450A (en) Connect the method and device of wireless network
JP2006319649A (en) Portable terminal, and its use restriction method
CN106534083B (en) Brush machine Tool validation method and device
CN105681365B (en) Method and apparatus for file transmission
CN106062762B (en) Using encryption method and device
CN105681261A (en) Security authentication method and apparatus
CN105069344B (en) mobile terminal locking method and device
CN105808995A (en) Password prompting method and device and terminal
CN106126986A (en) Lock unlocking processing method and the device of data partition

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant