CN105046145B - Information locking method and device and mobile terminal - Google Patents

Information locking method and device and mobile terminal Download PDF

Info

Publication number
CN105046145B
CN105046145B CN201510535812.0A CN201510535812A CN105046145B CN 105046145 B CN105046145 B CN 105046145B CN 201510535812 A CN201510535812 A CN 201510535812A CN 105046145 B CN105046145 B CN 105046145B
Authority
CN
China
Prior art keywords
list
application
recently
user
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510535812.0A
Other languages
Chinese (zh)
Other versions
CN105046145A (en
Inventor
彭钟裔
蔡晓杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Internet Security Software Co Ltd
Original Assignee
Beijing Kingsoft Internet Security Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Internet Security Software Co Ltd filed Critical Beijing Kingsoft Internet Security Software Co Ltd
Priority to CN201510535812.0A priority Critical patent/CN105046145B/en
Publication of CN105046145A publication Critical patent/CN105046145A/en
Application granted granted Critical
Publication of CN105046145B publication Critical patent/CN105046145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

The embodiment of the invention discloses an information locking method, an information locking device and a mobile terminal, and relates to the technical field of software, wherein the method comprises the following steps: monitoring a list display instruction aiming at the recently used application under the condition that a preset monitoring condition is met; detecting whether an instruction for displaying a list of recently used applications has the highest execution priority in a case where the list display instruction is monitored; if so, a list lock interface for the most recently used application is presented to the user. By applying the scheme provided by the embodiment of the invention to lock the information, the user privacy information included in the list of the applications recently used by the user can be effectively protected.

Description

A kind of information locking method, device and mobile terminal
Technical field
The present invention relates to software technology field, more particularly to a kind of information locking method, device and mobile terminal.
Background technology
With the fast development of hardware technology, the performance of user institute using terminal equipment is stronger and stronger, and user would generally Various applications are installed in its used terminal device, the privacy letter of user can be much related in these applications It ceases, in practical application, user would generally be realized by way of application locks are arranged for mounted individual applications believes its privacy The protection of breath.
However, in practical application, in terminal device other than comprising the information of application has been installed, user usually can be also recorded Recently using the information of application.Terminal device can be by way of showing the list for using application recently to user to user's exhibition Show its recently using the information of application, enables a user to quick and easy find its most recently used application, wherein most It generally will include the sectional drawing that application is used in user's a period of time recently in the nearly list using application, and it is past in these sectional drawings Toward the privacy information comprising user.
For example, user is most recently used social class application wechat, then may include user's in the corresponding sectional drawing of wechat Wechat friend information etc.;User is most recently used tool-class application-browsing device, then may include in the corresponding sectional drawing of browser User finally browses the sectional drawing etc. of webpage.
In this increasingly payes attention to the society of individual privacy, user increasingly payes attention to above-mentioned various privacy informations Protection, therefore, it is necessary to find the user privacy information included by a kind of can protect in user's list that use is applied recently Method.
Invention content
The embodiment of the invention discloses a kind of information locking method, device and mobile terminal, with being capable of effective protection user Recently using user privacy information included in the list of application.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information locking method, the method includes:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
In a specific embodiment of the present invention, described information locking means further include:
Obtain the encrypted message that user delimits face input by the list lock;
Judge obtained password with preset for whether consistent using the password applied recently;
If consistent, shown recently using the list of application to user.
In a specific embodiment of the present invention, described information locking means further include:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, execute Any one in operation below:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to Recently using the list displaying instruction of application, including:
It detects whether to be provided with for recently using the locking password of the list of application;
If being arranged, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to Recently using the list displaying instruction of application, including:
Judge used password when the last relieving lock state of screen whether be preset kind screen-lock password;
If it has, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to Recently using the list displaying instruction of application, including:
Judge from the last relieving lock state of screen at the time of play current time and stop, if do not released correctly pre- If application using lock-out state or whether do not released default application apply lock-out state;
If it has, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, instruction of the detection for showing the list using application recently Whether there is highest execution priority, including:
By judging the status indicator of the corresponding interface assembly of list using application recently, determine makes for showing recently Whether there is highest execution priority with the instruction of the list of application.
In a specific embodiment of the present invention, instruction of the detection for showing the list using application recently Whether there is highest execution priority, including:
Obtain the mark of the corresponding application of information included in the list using application recently;
Judge that is obtained identifies whether that at least one belongs to preset privacy application identities list, wherein described pre- If privacy application identities list, the mark for recording the application for being related to user privacy information;
If so, detection is for showing whether the instruction of the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the acquisition user passes through the list lock and delimits the close of face input Code information, including:
Encrypted message is obtained at least one of in the following manner:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information locking device, described device includes:
List shows command monitoring module, in the case where satisfaction presets monitoring condition, monitoring to be for use recently The list displaying instruction of application;
Priority detection module, in the case where monitoring the list displaying instruction, detection to be for showing recently Whether the instruction using the list of application has highest execution priority;
List lock delimits face display module, in the case of for being in the testing result of the priority detection module, To user's displaying face is delimited for the list lock recently using application.
In a specific embodiment of the present invention, described information locking device further includes:Encrypted message acquisition module, Password judgment module and first list display module;
Wherein, the encrypted message obtains module, and the password that face inputs is delimited by the list lock for obtaining user Information;
The password judgment module, for judge obtained password with it is preset for recently using application password be It is no consistent, if unanimously, triggering the first list display module displaying list;
The list display module, for being shown recently using the list of application to user.
In a specific embodiment of the present invention, described information locking device further includes:
Second list display module, for using the close of application for nearest with preset in the password for judging to be obtained In the case that code is inconsistent, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Password detection sub-module is locked, for detecting whether being provided with close for the locking recently using the list of application Code;
First list shows command monitoring submodule, is yes for the testing result in the locking password detection sub-module In the case of, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Screen-lock password judging submodule, whether used password when for judging the last relieving lock state of screen For the screen-lock password of preset kind;
Second list shows command detection submodule, is yes for the judging result in the screen-lock password judging submodule In the case of, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of play and work as The preceding moment stops, if do not released correctly default application using lock-out state or whether do not released the application lock of default application Determine state;
Third list shows command detection submodule, for the judging result in the condition adjudgement submodule that unlocks In the case of being, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the priority detection module, specifically for described in monitoring In the case of list displaying instruction, by judging the status indicator of the corresponding interface assembly of list using application recently, determine For showing whether the instruction of the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the priority detection module, including:
Application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining and using recently The mark of the corresponding application of information included in the list of application;
Application identities judging submodule identifies whether that at least one belongs to preset privacy and answers for judge to be obtained With identification list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information Know;
Priority detection sub-module, in the case of for being in the judging result of the application identities judging submodule, Detect whether the instruction for showing the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the encrypted message obtains module, is specifically used for by with lower section At least one of formula obtains encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of mobile terminal, the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual lead to Letter;
The memory stores executable program code;
The processor can perform to run with described by reading the executable program code stored in the memory The corresponding program of program code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
As seen from the above, in scheme provided in an embodiment of the present invention, in the case where meeting preset monitoring condition, if prison After measuring for instruction is shown using the list of application recently, and detect the instruction for showing the list using application recently When with highest execution priority, face is delimited for the list lock recently using application to user's displaying.It can be seen that user's exhibition Show the locking interface that the list is first illustrated before the list using application recently, user can not before not unlocking in this way See recently using application list, therefore, using scheme provided in an embodiment of the present invention can effective protection user make recently With user privacy information included in the list of application.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow diagram of information locking method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another information locking method provided in an embodiment of the present invention;
Fig. 3 a are the instance graph that list lock provided in an embodiment of the present invention delimits face;
Fig. 3 b are the instance graph of the nearest list using application provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of information locking device provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another information locking device provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow diagram of information locking method provided in an embodiment of the present invention, and this method includes:
S101:In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied.
It should be understood that before showing the list using application recently to user, if wanting to included in the list Information is locked, and the locking information for the list need to be preset, in this way in a kind of optional realization method of the present invention, Can pass through inspection when monitoring is for the nearest displaying instruction using the list applied in the case where meeting default monitoring condition It surveys whether to be provided with and determines whether to meet default monitoring condition for the nearest mode for using the locking password for the list applied, Detect be provided with locking password after it is considered that meet default monitoring condition, then monitoring is for recently using application List displaying instruction.
In addition, user can also be that terminal device sets screen-lock password in practical application, specifically, user can be one Terminal device sets a plurality of types of screen-lock passwords, for example, user, which can be a station terminal equipment, sets a numeric type Password, the password of graph style, image type password and a sound-type password, use the end in user During end equipment, input any of the above-described password can release the lock state of screen of the terminal device.For The above situation, default monitoring condition used password type when can also be with the last relieving lock state of screen Correlation, specifically, judge used password when the last relieving lock state of screen whether be preset kind screen locking it is close Code, if the screen-lock password of preset kind, then monitoring is for recently using the list displaying instruction of application.
It is illustrated below by a specific example.
It is assumed that user A, which is its terminal device, is provided with three passwords:The password of numeric type, the password of image type and The password of sound-type, wherein the face that the password of image type is the user A acquired in real time by image capture device schemes Picture, when password success relieving lock state of screen of the user by image type, it is believed that the terminal is being currently used The user of equipment is user A, so, in this case without restarting Privacy Preservation Mechanism for user A oneself, because This, A using terminals equipment can not lock recently using the list of application for the convenience of the user, and then without monitoring for nearest Instruction is shown using the list of application.And password that the password used in user's relieving lock state of screen is numeric type or When the password of person's sound-type, the identity information of user can not be determined according to encrypted message, i.e., whether can not determine active user For user A, the in this way list in order to protect the privacy information of user that locking is needed to use application recently, that is to say, that work as judgement When obtaining the password of password or sound-type that used password when the last relieving lock state of screen is numeric type, To think to meet default monitoring condition, monitoring is directed to be instructed using the list displaying of application recently, view of the above, it will be seen that The screen-lock password of preset kind is in this example:The password of numeric type and the password of sound-type.
It should be understood that in practical application, in terminal device existing many applications can be related to the privacy information of user, example Such as, address list management-type application, the application of short message managing class, social class application etc., user would generally be selected as these applications and set Application lock is set to protect its privacy information, in consideration of it, the case where above-mentioned default monitoring condition can also be with user using application Relevant testing conditions.
Specifically, in the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied When, can by judge from the last relieving lock state of screen at the time of play current time and stop, if it is correct to release Cross default application using lock-out state or whether do not released default application the mode using lock-out state to determine whether Meet and preset monitoring condition, if not releasing correctly or do not released default application applies lock-out state, it is believed that meet Default monitoring condition, then monitoring is for recently using the list displaying instruction of application.
It is illustrated below by a specific example.
It is assumed that user B, which is wechat, QQ, address list management-type application etc. in its terminal device, is provided with application lock, this A little applications usually can all include the privacy information of a large number of users, and above-mentioned default application includes:Wechat, QQ and address list management class are answered With.If specifically, from the last relieving lock state of screen at the time of play current time and stop, user successfully released micro- One in letter, QQ, address list management-type application or whole lock-out states, can show that active user's to a certain extent The identity of user is the user that user B or user B are authorized, and therefore, terminal device can for user convenience in this case Not lock recently using the list of application, and then instruction is shown for the list recently using application without monitoring.With this Opposite, stop if playing current time at the time of the last relieving lock state of screen, did not released wechat, QQ or logical correctly Letter record management-type application lock-out state, or do not released wechat, QQ or address list management-type application lock-out state, then without Method determines the user identity of active user, therefore, in order to protect the privacy information of user to need to lock recently using the row of application Table, and then need to monitor for recently using the list displaying instruction of application.
It should be noted that the application is only illustrated for above-mentioned, in practical application, meeting default monitoring item In the case of part, monitoring using the specific implementation of the list displaying instruction of application for being not limited to that recently, for example, above-mentioned Various situations can also consider etc., will not enumerate here.
S102:In the case where monitoring list displaying instruction, the finger for showing the list using application recently is detected Whether have highest execution priority, if having, execute S103 if enabling, otherwise, executes S104.
It is typically presented in the form of activity using the list of application recently in Android operation system, wherein Activity is one of most basic, most common four big component in Android component, and an activity is typically one individual Screen can show some controls in the above, which can also monitor, handle the event of user, make a response, It is communicated by intent between activity.
Specifically, can be by judging recently using the corresponding interface assembly of list applied in Android operation system Status indicator, i.e.,:By judging the status indicator of the corresponding activity of list using application recently, determine for showing most Whether the instruction of the nearly list using application has highest execution priority, is executed if the highest execution priority with if S103 then executes subsequent S104 without highest execution priority.
It in other words, can be by judging the packet name of the activity of stack top in current task stack in Android operation system Whether it is the nearest packet name using the corresponding activity of list applied, determines for showing the list using application recently Whether instruction has highest execution priority, specifically, making recently when the packet of the activity of stack top in current task stack is entitled When with the packet name of the corresponding activity of the list of application, determine that the instruction for showing the list using application recently has most High execution priority.
Above-mentioned activity packets name can be:
“com.android.internal.app.ResolverActivity”、
“com.android.systemui.recent.RecentsActivity”、
“com.android.systemui.recent.cardholder.CardHolderRecentsActivity”、
" com.android.systemui.tytaskmanager.RecentsActivity " etc..
The application is only illustrated for above-mentioned, and activity packets name is not limited to that in practical application.
It should be understood that can be understood as an interface, the interface using the corresponding activity of list of application recently For showing recently using the relevant information of application.When being shown recently using the list applied to user, corresponding to the list Activity state in which should be top set state, it is generally the case that the label bit identification activity can be passed through State in which indicates the activity for example, when the marker bit value for identifying the activity status is " 1 " Corresponding interface is in top set state, when the corresponding marker bit value is " 0 ", indicates that the corresponding interfaces the activity are in Non- top set state, it can be understood as showing that the interface of the list using application recently is not currently in top set state, user It can not see the relevant information on the interface.
In addition, for showing the execution priority rank of the instruction of the list using application recently and recently using application There are correspondences for the corresponding activity state in which of list, it is generally the case that terminal is received for showing most After the instruction of the nearly list using application, which, which enters in task execution queue, waits in line to be handled, if at present terminal In busy condition, it is used to handle the above-mentioned instruction for showing the list using application recently without available resources, then makes recently It is arranged to indicate the value of non-top set state with the value of the marker bit of the corresponding activity of the list of application, in this case A kind of common performance is that after user presses for showing the button of the list using application recently, terminal is not reacted;If There are available resources to be used to handle the above-mentioned instruction for showing the list using application recently for present terminal, then the instruction has Highest execution priority, while being arranged to recently as table using the value of the marker bit of the corresponding activity of list of application Show the value of top set state.
Above-mentioned is only to list how to be detected in Android operation system for showing recently using the list of application Whether have highest execution priority the case where, in practical application, can also be detected in other operating systems if instructing, for example, In ios operating systems etc., corresponding component packet name may be different in different operating system, here no longer one by one It enumerates.
It should be understood that being not the privacy information that all applications in terminal device can be related to user, for example, calculating Device, calendar, clock etc., so, in a kind of optional realization method of the invention, the case where monitoring list displaying instruction Under, when whether detect the instruction for showing the list using application recently has highest execution priority, can first it obtain most The mark of the corresponding application of information included in the nearly list using application, and judge to be obtained these identify whether at least One belongs to preset privacy application identities list, if so, detection is for showing the instruction of the list using application recently It is no that there is highest execution priority, S103 is executed in the case where detecting that there is highest execution priority, otherwise executes S104.
Wherein, preset privacy application identities list, the mark for recording the application for being related to user privacy information, for For each user, the content that above-mentioned preset privacy application identities list is included can be different, and user sets in using terminal The preset privacy application identities list can be changed in standby process according to the demand of oneself, certainly, which can also be Pre-set by developer, the application is defined not to this.
S103:To user's displaying face is delimited for the list lock recently using application.
S104:Terminate this flow.
In a specific embodiment of the present invention, referring to Fig. 2, the flow for providing another information locking method is shown It is intended to, compared with previous embodiment, in the present embodiment, further includes:
S105:Obtain the encrypted message that user delimits face input by list lock.
Specifically, when obtaining encrypted message of the user by list lock demarcation face input, it can be in the following manner At least one of obtain:
The first situation obtains message in cipher by way of acquiring touch control operation information of the user on list lock demarcation face Breath, touch control operation information of the user on list lock demarcation face can be that user is delimited by finger, stylus etc. in list lock Digital information or graphical information for being inputted on face etc..
The second situation obtains message in cipher by way of delimiting the voice messaging of face input by list lock acquiring user Breath, specifically, the voice messaging that face calls the voice capture devices such as microphone to acquire user can be delimited by list lock, in turn Obtain encrypted message.
The third situation obtains message in cipher by way of delimiting the image information of face input by list lock acquiring user Breath calls the image capture devices such as camera to acquire image information, and then obtains close specifically, face can be delimited by list lock Code information.
It should be noted that the application is only illustrated for above-mentioned, in practical application the case where acquisition password simultaneously It is not limited only to above-mentioned three kinds of situations.
S106:Judge that obtained password uses the password applied whether consistent with preset for nearest, if unanimously, holding Row S107.
S107:It is shown recently using the list of application to user.
Specifically, referring to Fig. 3 a and Fig. 3 b, wherein Fig. 3 a provide a kind of exemplary plot in list lock demarcation face, and Fig. 3 b are carried For a kind of exemplary plot of the nearest list using application.
In a kind of optional realization method of the present invention, above- mentioned information locking means can also include:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, can be with Execute any one in following operation:
The first:From nearest using the application for not being related to user privacy information is selected in application, according to selected application List of application is generated, and shows generated list to user, for example, including using application recently:Calendar, camera, calculating Device, wechat, address list, it is obvious that wechat and address list are usually directed to the privacy information of user, then can be according to calendar, photograph Machine, calculator generate corresponding list of application, and include the application of calendar information, camera, calculator information to user's displaying List;
Second:According to application mounted in terminal, not being related to user privacy information, list of application is generated, and to User shows generated list, for example, there is mounted application in terminal:Wechat, microblogging, calendar, camera, weather are pre- Report, shopping class application etc., can learn that calendar, camera, weather forecast are not related to user privacy information according to analysis, then can be with Corresponding list of application is generated according to calendar, camera, weather forecast, and is believed to user's displaying comprising calendar information, camera The list of application of breath, weather forecast information;
The third:The list of application being generated in advance to user's displaying, not being related to user privacy information, for example, exploitation The list of application of a forgery is generated in advance in the type for the terminal that personnel can be applicable in the development phase according to active client, Specifically, the terminal of Android operation system would generally be forced to be equipped with the applications such as calendar, camera, then developer can be A list of application comprising calendar information, camera information is generated in advance in client suitable for Android operation system;
4th kind:It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to adopt Collect image, the list of the application for not being related to user privacy information shown in this case to user can be according to aforementioned first What the list generation method mentioned in kind to the third operation generated, the application is defined not to this;
5th kind:It is more than in advance using the inconsistent number of the password of application recently in the password obtained and preset be directed to If in the case of number, calling image capture device to acquire image, and acquired image is stored to preset storage region, In this case, preset times can be 0,1,2,3 etc., which can adjust as the case may be, in addition, will be acquired Image is stored to preset storage region, can be by the way that acquired image is stored specific file in the terminal In, this document folder can be encrypted, can also be not encrypted, can also be and be sent to the photo acquired by network In preset mailbox, be stored in the corresponding storage region of the mailbox etc.;
6th kind:Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
It should be noted that the application is only illustrated for above-mentioned, in practical application, judge to be obtained Password is not necessarily limited to above-mentioned six with preset for what the nearest password using application can execute in the case of inconsistent Kind.
As seen from the above, in the scheme that above-mentioned each embodiment provides, in the case where meeting preset monitoring condition, if After monitoring for instruction is shown using the list of application recently, and detect the finger for showing the list using application recently When enabling with highest execution priority, face is delimited using the list lock applied to user's displaying for nearest.It can be seen that user Displaying recently using first illustrating the locking interface of the list before the list of application, in this way before not unlocking user without Method sees recently using the list of application, therefore, the scheme provided using above-mentioned each embodiment can effective protection user most Included user privacy information in the nearly list using application.
Corresponding with above-mentioned information locking method, the embodiment of the present invention additionally provides a kind of information locking device.
Fig. 4 is a kind of structural schematic diagram of information locking device provided in an embodiment of the present invention, which includes:List exhibition Show that command monitoring module 401, priority detection module 402 and list lock delimit face display module 403.
Wherein, list displaying command monitoring module 401, in the case where meeting default monitoring condition, monitoring to be directed to Recently using the list displaying instruction of application;
Priority detection module 402, in the case where monitoring the list displaying instruction, detection to be for showing most Whether the instruction of the nearly list using application has highest execution priority;
List lock delimits face display module 403, the feelings for being yes in the testing result of the priority detection module 402 Under condition, face is delimited for the list lock recently using application to user's displaying.
Specifically, the list displaying command monitoring module 401 may include:Lock password detection sub-module and first row Table shows command monitoring submodule (not shown).
Wherein, password detection sub-module is locked, for detecting whether being provided with for recently using the list of application Lock password;
First list shows command monitoring submodule, is yes for the testing result in the locking password detection sub-module In the case of, then monitoring is for recently using the list displaying instruction of application.
Specifically, the list displaying command monitoring module 401 may include:Screen-lock password judging submodule and secondary series Table shows command detection submodule (not shown).
Wherein, screen-lock password judging submodule, it is used close when for judging the last relieving lock state of screen Code whether be preset kind screen-lock password;
Second list shows command detection submodule, is yes for the judging result in the screen-lock password judging submodule In the case of, monitoring is for recently using the list displaying instruction of application.
Specifically, the list displaying command monitoring module 401 may include:Unlock condition adjudgement submodule and Three lists show command detection submodule (not shown).
Wherein, unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of Current time is played to stop, if do not released correctly default application using lock-out state or whether do not released default application Using lock-out state;
Third list shows command detection submodule, for the judging result in the condition adjudgement submodule that unlocks In the case of being, monitoring is for recently using the list displaying instruction of application.
Specifically, the priority detection module 402 can be specifically used in the feelings for monitoring the list displaying instruction Under condition, by judging the status indicator of the corresponding interface assembly of list using application recently, determine for showing nearest use Whether the instruction of the list of application has highest execution priority.
Specifically, the priority detection module 402 may include:Application identities obtain submodule, application identities judge Submodule and priority detection sub-module (not shown).
Wherein, application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining nearest The mark of the corresponding application of information included in list using application;
Application identities judging submodule identifies whether that at least one belongs to preset privacy and answers for judge to be obtained With identification list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information Know;
Priority detection sub-module, in the case of for being in the judging result of the application identities judging submodule, Detect whether the instruction for showing the list using application recently has highest execution priority.
In a specific embodiment of the present invention, referring to Fig. 5, the structure for providing another information locking device is shown It is intended to, compared with previous embodiment, in the present embodiment, further includes:Encrypted message obtains module 404,405 and of password judgment module First list display module 406.
Wherein, the encrypted message obtains module 404, and the close of face input is delimited by the list lock for obtaining user Code information;
The password judgment module 405, for judging obtained password with preset for recently using the close of application Whether code is consistent, if unanimously, triggering the first list display module 406 and showing list;
The first list display module 406, for being shown recently using the list of application to user.
Optionally, described information locking device can also include:Second list display module (not shown).
Wherein, second list display module, for being answered for nearest use with preset in the password for judging to be obtained In the case that password is inconsistent, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
It can be specifically used for obtaining at least one of in the following manner specifically, the encrypted message obtains module 404 Obtain encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
As seen from the above, in the scheme that above-mentioned each embodiment provides, in the case where meeting preset monitoring condition, if After monitoring for instruction is shown using the list of application recently, and detect the finger for showing the list using application recently When enabling with highest execution priority, face is delimited using the list lock applied to user's displaying for nearest.It can be seen that user Displaying recently using first illustrating the locking interface of the list before the list of application, in this way before not unlocking user without Method sees recently using the list of application, therefore, the scheme provided using above-mentioned each embodiment can effective protection user most Included user privacy information in the nearly list using application.
An embodiment of the present invention provides a kind of mobile terminal, the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual lead to Letter;
The memory stores executable program code;
The processor can perform to run with described by reading the executable program code stored in the memory The corresponding program of program code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
An embodiment of the present invention provides a kind of application program, the application program for executing the embodiment of the present invention at runtime The information locking method of offer.Wherein, information locking method, including:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
An embodiment of the present invention provides a kind of storage mediums, and for storing application program, the application program is for executing sheet The information locking method that inventive embodiments provide.Wherein, information locking method, including:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
For device embodiments, since it is substantially similar to the method embodiment, so fairly simple, the correlation of description Place illustrates referring to the part of embodiment of the method.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
One of ordinary skill in the art will appreciate that all or part of step in realization above method embodiment is can It is completed with instructing relevant hardware by program, the program can be stored in computer read/write memory medium, The storage medium designated herein obtained, such as:ROM/RAM, magnetic disc, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention It is interior.

Claims (19)

1. a kind of information locking method, which is characterized in that the method includes:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring that the list shows instruction, detect for whether showing the instruction using the list applied recently With highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying;Wherein, list lock demarcation face is: To the nearest list using application into line-locked interface, the nearest row using application are not shown in the interface Table.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
Obtain the encrypted message that user delimits face input by the list lock;
Judge obtained password with preset for whether consistent using the password applied recently;
If consistent, shown recently using the list of application to user.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, execute following Any one in operation:
From nearest using the application for not being related to user privacy information is selected in application, application row are generated according to selected application Table, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and give birth to user's displaying At list;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
In the password obtained with preset for the feelings for being more than preset times using the inconsistent number of the password of application recently Under condition, image capture device is called to acquire image, and acquired image is stored to preset storage region;
Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
4. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
It detects whether to be provided with for recently using the locking password of the list of application;
If being arranged, monitoring is for recently using the list displaying instruction of application.
5. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
Judge used password when the last relieving lock state of screen whether be preset kind screen-lock password;
If it has, then monitoring is for recently using the list displaying instruction of application.
6. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
Judge from the last relieving lock state of screen at the time of play current time and stop, if do not released default answer correctly Whether the default application lock-out state applied was not released using lock-out state or;
If it has, then monitoring is for recently using the list displaying instruction of application.
7. method according to any one of claim 1-3, which is characterized in that the detection is for showing that nearest use is answered Whether the instruction of list has highest execution priority, including:
By judging the status indicator of the corresponding interface assembly of list using application recently, determine for showing that nearest use is answered Whether the instruction of list has highest execution priority.
8. method according to any one of claim 1-3, which is characterized in that the detection is for showing that nearest use is answered Whether the instruction of list has highest execution priority, including:
Obtain the mark of the corresponding application of information included in the list using application recently;
Judge that is obtained identifies whether that at least one belongs to preset privacy application identities list, wherein described preset Privacy application identities list, the mark for recording the application for being related to user privacy information;
If so, detection is for showing whether the instruction of the list using application recently has highest execution priority.
9. according to the method described in claim 2, it is characterized in that, the acquisition user delimits face input by the list lock Encrypted message, including:
Encrypted message is obtained at least one of in the following manner:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
10. a kind of information locking device, which is characterized in that described device includes:
List shows command monitoring module, in the case where meeting default monitoring condition, monitoring to be for recently using application List displaying instruction;
Priority detection module, in the case where monitoring the list displaying instruction, detecting for showing nearest use Whether the instruction of the list of application has highest execution priority;
List lock delimits face display module, in the case of for being in the testing result of the priority detection module, Xiang Yong Family displaying delimits face for the list lock recently using application;Wherein, list lock demarcation face is:The nearest use is answered List does not show the nearest list using application into line-locked interface in the interface.
11. device according to claim 10, which is characterized in that described device further includes:Encrypted message obtains module, close Code judgment module and first list display module;
Wherein, the encrypted message obtains module, and the encrypted message that face inputs is delimited by the list lock for obtaining user;
The password judgment module, for judge obtained password with it is preset for recently using application password whether one It causes, if unanimously, triggering the first list display module displaying list;
The first list display module, for being shown recently using the list of application to user.
12. according to the devices described in claim 11, which is characterized in that described device further includes:
Second list display module, for using the password applied not for nearest with preset in the password for judging to be obtained Under unanimous circumstances, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, application row are generated according to selected application Table, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and give birth to user's displaying At list;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
In the password obtained with preset for the feelings for being more than preset times using the inconsistent number of the password of application recently Under condition, image capture device is called to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
13. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould Block, including:
Password detection sub-module is locked, for detecting whether being provided with for recently using the locking password of the list of application;
First list shows command monitoring submodule, the feelings for being yes in the testing result of the locking password detection sub-module Under condition, then monitoring is for recently using the list displaying instruction of application.
14. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould Block, including:
Screen-lock password judging submodule, whether used password is pre- when for judging the last relieving lock state of screen If the screen-lock password of type;
Second list shows command detection submodule, the feelings for being yes in the judging result of the screen-lock password judging submodule Under condition, monitoring is for recently using the list displaying instruction of application.
15. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould Block, including:
Unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of play current when Quarter stops, if do not released correctly default application using lock-out state or whether do not released the application locking shape of default application State;
Third list shows command detection submodule, for being yes in the judging result for unlocking condition adjudgement submodule In the case of, monitoring is for recently using the list displaying instruction of application.
16. according to the device described in any one of claim 10-12, which is characterized in that the priority detection module, specifically For in the case where monitoring the list displaying instruction, using the corresponding interface assembly of list of application recently by judgement Status indicator, determine for show recently using application list instruction whether have highest execution priority.
17. according to the device described in any one of claim 10-12, which is characterized in that the priority detection module, packet It includes:
Application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining recently using application List included in the corresponding application of information mark;
Application identities judging submodule identifies whether that at least one belongs to preset privacy application mark for judge to be obtained Know list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information;
Priority detection sub-module, in the case where the judging result of the application identities judging submodule is to be, detecting For showing whether the instruction of the list using application recently has highest execution priority.
18. according to the devices described in claim 11, which is characterized in that the encrypted message obtains module, specifically for passing through At least one of following manner obtains encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
19. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory The corresponding program of code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring that the list shows instruction, detect for whether showing the instruction using the list applied recently With highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
CN201510535812.0A 2015-08-27 2015-08-27 Information locking method and device and mobile terminal Active CN105046145B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510535812.0A CN105046145B (en) 2015-08-27 2015-08-27 Information locking method and device and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510535812.0A CN105046145B (en) 2015-08-27 2015-08-27 Information locking method and device and mobile terminal

Publications (2)

Publication Number Publication Date
CN105046145A CN105046145A (en) 2015-11-11
CN105046145B true CN105046145B (en) 2018-09-11

Family

ID=54452682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510535812.0A Active CN105046145B (en) 2015-08-27 2015-08-27 Information locking method and device and mobile terminal

Country Status (1)

Country Link
CN (1) CN105046145B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034397A (en) * 2012-11-29 2013-04-10 广东欧珀移动通信有限公司 Dynamic unlocking method, device and mobile terminal based on recent tasks
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN104516643A (en) * 2014-10-31 2015-04-15 厦门美图移动科技有限公司 Method and device for start application, and computing terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034397A (en) * 2012-11-29 2013-04-10 广东欧珀移动通信有限公司 Dynamic unlocking method, device and mobile terminal based on recent tasks
CN103139353A (en) * 2013-01-28 2013-06-05 广东欧珀移动通信有限公司 Lock unlocking method and lock unlocking device of mobile terminal
CN104516643A (en) * 2014-10-31 2015-04-15 厦门美图移动科技有限公司 Method and device for start application, and computing terminal

Also Published As

Publication number Publication date
CN105046145A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN104899952B (en) Work attendance method and device based on instant messaging application
CN109117044A (en) The device and method of user interface are manipulated for inputting based on fingerprint sensor
CN106201468B (en) A kind of processing method of screenshotss, device and electronic equipment
JP5925373B1 (en) Communication support system
CA2560747A1 (en) Profile based capture component for monitoring events in applications
CN105094630B (en) The prompt information processing method and device of application program PUSH message
CN109800098A (en) Service exception node positioning method, device, computer equipment and storage medium
CN108959376A (en) A kind of data processing method and device
CN104091102B (en) A kind of multi-user management method and its device based on Android system
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN104361281A (en) Method for solving phishing attack of Android platform
CN105868621A (en) A password resetting method and device
CN107451464B (en) Prompt message output method and device
CN106506443A (en) A kind of information inspection method and device
CN106919377A (en) Determine application program displaying interface whether be white screen method and device
CN108809810A (en) Message Record inspection method, system and computer equipment based on instant messaging
CN112800401B (en) Privacy processing method, privacy processing device and terminal
CN114268461A (en) User identity authentication method, device, server, terminal and storage medium
CN111639316B (en) Information processing method and device for WEB page
CN105046145B (en) Information locking method and device and mobile terminal
JP6212864B2 (en) Key management system, method and program
JP2008293137A (en) Individual management apparatus and program
CN109754345A (en) System and method for carrying out examinee's assessment based on fail-safe computer
US20050021651A1 (en) Method and system for identification and presentation of statistical usage data for messaging systems
CN107197344A (en) A kind of method for realizing user's self-defining remote control shortcut function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant