CN105046145B - Information locking method and device and mobile terminal - Google Patents
Information locking method and device and mobile terminal Download PDFInfo
- Publication number
- CN105046145B CN105046145B CN201510535812.0A CN201510535812A CN105046145B CN 105046145 B CN105046145 B CN 105046145B CN 201510535812 A CN201510535812 A CN 201510535812A CN 105046145 B CN105046145 B CN 105046145B
- Authority
- CN
- China
- Prior art keywords
- list
- application
- recently
- user
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
The embodiment of the invention discloses an information locking method, an information locking device and a mobile terminal, and relates to the technical field of software, wherein the method comprises the following steps: monitoring a list display instruction aiming at the recently used application under the condition that a preset monitoring condition is met; detecting whether an instruction for displaying a list of recently used applications has the highest execution priority in a case where the list display instruction is monitored; if so, a list lock interface for the most recently used application is presented to the user. By applying the scheme provided by the embodiment of the invention to lock the information, the user privacy information included in the list of the applications recently used by the user can be effectively protected.
Description
Technical field
The present invention relates to software technology field, more particularly to a kind of information locking method, device and mobile terminal.
Background technology
With the fast development of hardware technology, the performance of user institute using terminal equipment is stronger and stronger, and user would generally
Various applications are installed in its used terminal device, the privacy letter of user can be much related in these applications
It ceases, in practical application, user would generally be realized by way of application locks are arranged for mounted individual applications believes its privacy
The protection of breath.
However, in practical application, in terminal device other than comprising the information of application has been installed, user usually can be also recorded
Recently using the information of application.Terminal device can be by way of showing the list for using application recently to user to user's exhibition
Show its recently using the information of application, enables a user to quick and easy find its most recently used application, wherein most
It generally will include the sectional drawing that application is used in user's a period of time recently in the nearly list using application, and it is past in these sectional drawings
Toward the privacy information comprising user.
For example, user is most recently used social class application wechat, then may include user's in the corresponding sectional drawing of wechat
Wechat friend information etc.;User is most recently used tool-class application-browsing device, then may include in the corresponding sectional drawing of browser
User finally browses the sectional drawing etc. of webpage.
In this increasingly payes attention to the society of individual privacy, user increasingly payes attention to above-mentioned various privacy informations
Protection, therefore, it is necessary to find the user privacy information included by a kind of can protect in user's list that use is applied recently
Method.
Invention content
The embodiment of the invention discloses a kind of information locking method, device and mobile terminal, with being capable of effective protection user
Recently using user privacy information included in the list of application.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information locking method, the method includes:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected
Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
In a specific embodiment of the present invention, described information locking means further include:
Obtain the encrypted message that user delimits face input by the list lock;
Judge obtained password with preset for whether consistent using the password applied recently;
If consistent, shown recently using the list of application to user.
In a specific embodiment of the present invention, described information locking means further include:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, execute
Any one in operation below:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application
List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user
The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained
In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to
Recently using the list displaying instruction of application, including:
It detects whether to be provided with for recently using the locking password of the list of application;
If being arranged, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to
Recently using the list displaying instruction of application, including:
Judge used password when the last relieving lock state of screen whether be preset kind screen-lock password;
If it has, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, described in the case where meeting default monitoring condition, monitoring is directed to
Recently using the list displaying instruction of application, including:
Judge from the last relieving lock state of screen at the time of play current time and stop, if do not released correctly pre-
If application using lock-out state or whether do not released default application apply lock-out state;
If it has, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, instruction of the detection for showing the list using application recently
Whether there is highest execution priority, including:
By judging the status indicator of the corresponding interface assembly of list using application recently, determine makes for showing recently
Whether there is highest execution priority with the instruction of the list of application.
In a specific embodiment of the present invention, instruction of the detection for showing the list using application recently
Whether there is highest execution priority, including:
Obtain the mark of the corresponding application of information included in the list using application recently;
Judge that is obtained identifies whether that at least one belongs to preset privacy application identities list, wherein described pre-
If privacy application identities list, the mark for recording the application for being related to user privacy information;
If so, detection is for showing whether the instruction of the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the acquisition user passes through the list lock and delimits the close of face input
Code information, including:
Encrypted message is obtained at least one of in the following manner:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of information locking device, described device includes:
List shows command monitoring module, in the case where satisfaction presets monitoring condition, monitoring to be for use recently
The list displaying instruction of application;
Priority detection module, in the case where monitoring the list displaying instruction, detection to be for showing recently
Whether the instruction using the list of application has highest execution priority;
List lock delimits face display module, in the case of for being in the testing result of the priority detection module,
To user's displaying face is delimited for the list lock recently using application.
In a specific embodiment of the present invention, described information locking device further includes:Encrypted message acquisition module,
Password judgment module and first list display module;
Wherein, the encrypted message obtains module, and the password that face inputs is delimited by the list lock for obtaining user
Information;
The password judgment module, for judge obtained password with it is preset for recently using application password be
It is no consistent, if unanimously, triggering the first list display module displaying list;
The list display module, for being shown recently using the list of application to user.
In a specific embodiment of the present invention, described information locking device further includes:
Second list display module, for using the close of application for nearest with preset in the password for judging to be obtained
In the case that code is inconsistent, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application
List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user
The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained
In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Password detection sub-module is locked, for detecting whether being provided with close for the locking recently using the list of application
Code;
First list shows command monitoring submodule, is yes for the testing result in the locking password detection sub-module
In the case of, then monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Screen-lock password judging submodule, whether used password when for judging the last relieving lock state of screen
For the screen-lock password of preset kind;
Second list shows command detection submodule, is yes for the judging result in the screen-lock password judging submodule
In the case of, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the list shows command monitoring module, including:
Unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of play and work as
The preceding moment stops, if do not released correctly default application using lock-out state or whether do not released the application lock of default application
Determine state;
Third list shows command detection submodule, for the judging result in the condition adjudgement submodule that unlocks
In the case of being, monitoring is for recently using the list displaying instruction of application.
In a specific embodiment of the present invention, the priority detection module, specifically for described in monitoring
In the case of list displaying instruction, by judging the status indicator of the corresponding interface assembly of list using application recently, determine
For showing whether the instruction of the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the priority detection module, including:
Application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining and using recently
The mark of the corresponding application of information included in the list of application;
Application identities judging submodule identifies whether that at least one belongs to preset privacy and answers for judge to be obtained
With identification list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information
Know;
Priority detection sub-module, in the case of for being in the judging result of the application identities judging submodule,
Detect whether the instruction for showing the list using application recently has highest execution priority.
In a specific embodiment of the present invention, the encrypted message obtains module, is specifically used for by with lower section
At least one of formula obtains encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
In order to achieve the above objectives, the embodiment of the invention discloses a kind of mobile terminal, the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual lead to
Letter;
The memory stores executable program code;
The processor can perform to run with described by reading the executable program code stored in the memory
The corresponding program of program code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected
Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
As seen from the above, in scheme provided in an embodiment of the present invention, in the case where meeting preset monitoring condition, if prison
After measuring for instruction is shown using the list of application recently, and detect the instruction for showing the list using application recently
When with highest execution priority, face is delimited for the list lock recently using application to user's displaying.It can be seen that user's exhibition
Show the locking interface that the list is first illustrated before the list using application recently, user can not before not unlocking in this way
See recently using application list, therefore, using scheme provided in an embodiment of the present invention can effective protection user make recently
With user privacy information included in the list of application.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow diagram of information locking method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another information locking method provided in an embodiment of the present invention;
Fig. 3 a are the instance graph that list lock provided in an embodiment of the present invention delimits face;
Fig. 3 b are the instance graph of the nearest list using application provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of information locking device provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of another information locking device provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other without creative efforts
Embodiment shall fall within the protection scope of the present invention.
Fig. 1 is a kind of flow diagram of information locking method provided in an embodiment of the present invention, and this method includes:
S101:In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied.
It should be understood that before showing the list using application recently to user, if wanting to included in the list
Information is locked, and the locking information for the list need to be preset, in this way in a kind of optional realization method of the present invention,
Can pass through inspection when monitoring is for the nearest displaying instruction using the list applied in the case where meeting default monitoring condition
It surveys whether to be provided with and determines whether to meet default monitoring condition for the nearest mode for using the locking password for the list applied,
Detect be provided with locking password after it is considered that meet default monitoring condition, then monitoring is for recently using application
List displaying instruction.
In addition, user can also be that terminal device sets screen-lock password in practical application, specifically, user can be one
Terminal device sets a plurality of types of screen-lock passwords, for example, user, which can be a station terminal equipment, sets a numeric type
Password, the password of graph style, image type password and a sound-type password, use the end in user
During end equipment, input any of the above-described password can release the lock state of screen of the terminal device.For
The above situation, default monitoring condition used password type when can also be with the last relieving lock state of screen
Correlation, specifically, judge used password when the last relieving lock state of screen whether be preset kind screen locking it is close
Code, if the screen-lock password of preset kind, then monitoring is for recently using the list displaying instruction of application.
It is illustrated below by a specific example.
It is assumed that user A, which is its terminal device, is provided with three passwords:The password of numeric type, the password of image type and
The password of sound-type, wherein the face that the password of image type is the user A acquired in real time by image capture device schemes
Picture, when password success relieving lock state of screen of the user by image type, it is believed that the terminal is being currently used
The user of equipment is user A, so, in this case without restarting Privacy Preservation Mechanism for user A oneself, because
This, A using terminals equipment can not lock recently using the list of application for the convenience of the user, and then without monitoring for nearest
Instruction is shown using the list of application.And password that the password used in user's relieving lock state of screen is numeric type or
When the password of person's sound-type, the identity information of user can not be determined according to encrypted message, i.e., whether can not determine active user
For user A, the in this way list in order to protect the privacy information of user that locking is needed to use application recently, that is to say, that work as judgement
When obtaining the password of password or sound-type that used password when the last relieving lock state of screen is numeric type,
To think to meet default monitoring condition, monitoring is directed to be instructed using the list displaying of application recently, view of the above, it will be seen that
The screen-lock password of preset kind is in this example:The password of numeric type and the password of sound-type.
It should be understood that in practical application, in terminal device existing many applications can be related to the privacy information of user, example
Such as, address list management-type application, the application of short message managing class, social class application etc., user would generally be selected as these applications and set
Application lock is set to protect its privacy information, in consideration of it, the case where above-mentioned default monitoring condition can also be with user using application
Relevant testing conditions.
Specifically, in the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied
When, can by judge from the last relieving lock state of screen at the time of play current time and stop, if it is correct to release
Cross default application using lock-out state or whether do not released default application the mode using lock-out state to determine whether
Meet and preset monitoring condition, if not releasing correctly or do not released default application applies lock-out state, it is believed that meet
Default monitoring condition, then monitoring is for recently using the list displaying instruction of application.
It is illustrated below by a specific example.
It is assumed that user B, which is wechat, QQ, address list management-type application etc. in its terminal device, is provided with application lock, this
A little applications usually can all include the privacy information of a large number of users, and above-mentioned default application includes:Wechat, QQ and address list management class are answered
With.If specifically, from the last relieving lock state of screen at the time of play current time and stop, user successfully released micro-
One in letter, QQ, address list management-type application or whole lock-out states, can show that active user's to a certain extent
The identity of user is the user that user B or user B are authorized, and therefore, terminal device can for user convenience in this case
Not lock recently using the list of application, and then instruction is shown for the list recently using application without monitoring.With this
Opposite, stop if playing current time at the time of the last relieving lock state of screen, did not released wechat, QQ or logical correctly
Letter record management-type application lock-out state, or do not released wechat, QQ or address list management-type application lock-out state, then without
Method determines the user identity of active user, therefore, in order to protect the privacy information of user to need to lock recently using the row of application
Table, and then need to monitor for recently using the list displaying instruction of application.
It should be noted that the application is only illustrated for above-mentioned, in practical application, meeting default monitoring item
In the case of part, monitoring using the specific implementation of the list displaying instruction of application for being not limited to that recently, for example, above-mentioned
Various situations can also consider etc., will not enumerate here.
S102:In the case where monitoring list displaying instruction, the finger for showing the list using application recently is detected
Whether have highest execution priority, if having, execute S103 if enabling, otherwise, executes S104.
It is typically presented in the form of activity using the list of application recently in Android operation system, wherein
Activity is one of most basic, most common four big component in Android component, and an activity is typically one individual
Screen can show some controls in the above, which can also monitor, handle the event of user, make a response,
It is communicated by intent between activity.
Specifically, can be by judging recently using the corresponding interface assembly of list applied in Android operation system
Status indicator, i.e.,:By judging the status indicator of the corresponding activity of list using application recently, determine for showing most
Whether the instruction of the nearly list using application has highest execution priority, is executed if the highest execution priority with if
S103 then executes subsequent S104 without highest execution priority.
It in other words, can be by judging the packet name of the activity of stack top in current task stack in Android operation system
Whether it is the nearest packet name using the corresponding activity of list applied, determines for showing the list using application recently
Whether instruction has highest execution priority, specifically, making recently when the packet of the activity of stack top in current task stack is entitled
When with the packet name of the corresponding activity of the list of application, determine that the instruction for showing the list using application recently has most
High execution priority.
Above-mentioned activity packets name can be:
“com.android.internal.app.ResolverActivity”、
“com.android.systemui.recent.RecentsActivity”、
“com.android.systemui.recent.cardholder.CardHolderRecentsActivity”、
" com.android.systemui.tytaskmanager.RecentsActivity " etc..
The application is only illustrated for above-mentioned, and activity packets name is not limited to that in practical application.
It should be understood that can be understood as an interface, the interface using the corresponding activity of list of application recently
For showing recently using the relevant information of application.When being shown recently using the list applied to user, corresponding to the list
Activity state in which should be top set state, it is generally the case that the label bit identification activity can be passed through
State in which indicates the activity for example, when the marker bit value for identifying the activity status is " 1 "
Corresponding interface is in top set state, when the corresponding marker bit value is " 0 ", indicates that the corresponding interfaces the activity are in
Non- top set state, it can be understood as showing that the interface of the list using application recently is not currently in top set state, user
It can not see the relevant information on the interface.
In addition, for showing the execution priority rank of the instruction of the list using application recently and recently using application
There are correspondences for the corresponding activity state in which of list, it is generally the case that terminal is received for showing most
After the instruction of the nearly list using application, which, which enters in task execution queue, waits in line to be handled, if at present terminal
In busy condition, it is used to handle the above-mentioned instruction for showing the list using application recently without available resources, then makes recently
It is arranged to indicate the value of non-top set state with the value of the marker bit of the corresponding activity of the list of application, in this case
A kind of common performance is that after user presses for showing the button of the list using application recently, terminal is not reacted;If
There are available resources to be used to handle the above-mentioned instruction for showing the list using application recently for present terminal, then the instruction has
Highest execution priority, while being arranged to recently as table using the value of the marker bit of the corresponding activity of list of application
Show the value of top set state.
Above-mentioned is only to list how to be detected in Android operation system for showing recently using the list of application
Whether have highest execution priority the case where, in practical application, can also be detected in other operating systems if instructing, for example,
In ios operating systems etc., corresponding component packet name may be different in different operating system, here no longer one by one
It enumerates.
It should be understood that being not the privacy information that all applications in terminal device can be related to user, for example, calculating
Device, calendar, clock etc., so, in a kind of optional realization method of the invention, the case where monitoring list displaying instruction
Under, when whether detect the instruction for showing the list using application recently has highest execution priority, can first it obtain most
The mark of the corresponding application of information included in the nearly list using application, and judge to be obtained these identify whether at least
One belongs to preset privacy application identities list, if so, detection is for showing the instruction of the list using application recently
It is no that there is highest execution priority, S103 is executed in the case where detecting that there is highest execution priority, otherwise executes S104.
Wherein, preset privacy application identities list, the mark for recording the application for being related to user privacy information, for
For each user, the content that above-mentioned preset privacy application identities list is included can be different, and user sets in using terminal
The preset privacy application identities list can be changed in standby process according to the demand of oneself, certainly, which can also be
Pre-set by developer, the application is defined not to this.
S103:To user's displaying face is delimited for the list lock recently using application.
S104:Terminate this flow.
In a specific embodiment of the present invention, referring to Fig. 2, the flow for providing another information locking method is shown
It is intended to, compared with previous embodiment, in the present embodiment, further includes:
S105:Obtain the encrypted message that user delimits face input by list lock.
Specifically, when obtaining encrypted message of the user by list lock demarcation face input, it can be in the following manner
At least one of obtain:
The first situation obtains message in cipher by way of acquiring touch control operation information of the user on list lock demarcation face
Breath, touch control operation information of the user on list lock demarcation face can be that user is delimited by finger, stylus etc. in list lock
Digital information or graphical information for being inputted on face etc..
The second situation obtains message in cipher by way of delimiting the voice messaging of face input by list lock acquiring user
Breath, specifically, the voice messaging that face calls the voice capture devices such as microphone to acquire user can be delimited by list lock, in turn
Obtain encrypted message.
The third situation obtains message in cipher by way of delimiting the image information of face input by list lock acquiring user
Breath calls the image capture devices such as camera to acquire image information, and then obtains close specifically, face can be delimited by list lock
Code information.
It should be noted that the application is only illustrated for above-mentioned, in practical application the case where acquisition password simultaneously
It is not limited only to above-mentioned three kinds of situations.
S106:Judge that obtained password uses the password applied whether consistent with preset for nearest, if unanimously, holding
Row S107.
S107:It is shown recently using the list of application to user.
Specifically, referring to Fig. 3 a and Fig. 3 b, wherein Fig. 3 a provide a kind of exemplary plot in list lock demarcation face, and Fig. 3 b are carried
For a kind of exemplary plot of the nearest list using application.
In a kind of optional realization method of the present invention, above- mentioned information locking means can also include:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, can be with
Execute any one in following operation:
The first:From nearest using the application for not being related to user privacy information is selected in application, according to selected application
List of application is generated, and shows generated list to user, for example, including using application recently:Calendar, camera, calculating
Device, wechat, address list, it is obvious that wechat and address list are usually directed to the privacy information of user, then can be according to calendar, photograph
Machine, calculator generate corresponding list of application, and include the application of calendar information, camera, calculator information to user's displaying
List;
Second:According to application mounted in terminal, not being related to user privacy information, list of application is generated, and to
User shows generated list, for example, there is mounted application in terminal:Wechat, microblogging, calendar, camera, weather are pre-
Report, shopping class application etc., can learn that calendar, camera, weather forecast are not related to user privacy information according to analysis, then can be with
Corresponding list of application is generated according to calendar, camera, weather forecast, and is believed to user's displaying comprising calendar information, camera
The list of application of breath, weather forecast information;
The third:The list of application being generated in advance to user's displaying, not being related to user privacy information, for example, exploitation
The list of application of a forgery is generated in advance in the type for the terminal that personnel can be applicable in the development phase according to active client,
Specifically, the terminal of Android operation system would generally be forced to be equipped with the applications such as calendar, camera, then developer can be
A list of application comprising calendar information, camera information is generated in advance in client suitable for Android operation system;
4th kind:It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to adopt
Collect image, the list of the application for not being related to user privacy information shown in this case to user can be according to aforementioned first
What the list generation method mentioned in kind to the third operation generated, the application is defined not to this;
5th kind:It is more than in advance using the inconsistent number of the password of application recently in the password obtained and preset be directed to
If in the case of number, calling image capture device to acquire image, and acquired image is stored to preset storage region,
In this case, preset times can be 0,1,2,3 etc., which can adjust as the case may be, in addition, will be acquired
Image is stored to preset storage region, can be by the way that acquired image is stored specific file in the terminal
In, this document folder can be encrypted, can also be not encrypted, can also be and be sent to the photo acquired by network
In preset mailbox, be stored in the corresponding storage region of the mailbox etc.;
6th kind:Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
It should be noted that the application is only illustrated for above-mentioned, in practical application, judge to be obtained
Password is not necessarily limited to above-mentioned six with preset for what the nearest password using application can execute in the case of inconsistent
Kind.
As seen from the above, in the scheme that above-mentioned each embodiment provides, in the case where meeting preset monitoring condition, if
After monitoring for instruction is shown using the list of application recently, and detect the finger for showing the list using application recently
When enabling with highest execution priority, face is delimited using the list lock applied to user's displaying for nearest.It can be seen that user
Displaying recently using first illustrating the locking interface of the list before the list of application, in this way before not unlocking user without
Method sees recently using the list of application, therefore, the scheme provided using above-mentioned each embodiment can effective protection user most
Included user privacy information in the nearly list using application.
Corresponding with above-mentioned information locking method, the embodiment of the present invention additionally provides a kind of information locking device.
Fig. 4 is a kind of structural schematic diagram of information locking device provided in an embodiment of the present invention, which includes:List exhibition
Show that command monitoring module 401, priority detection module 402 and list lock delimit face display module 403.
Wherein, list displaying command monitoring module 401, in the case where meeting default monitoring condition, monitoring to be directed to
Recently using the list displaying instruction of application;
Priority detection module 402, in the case where monitoring the list displaying instruction, detection to be for showing most
Whether the instruction of the nearly list using application has highest execution priority;
List lock delimits face display module 403, the feelings for being yes in the testing result of the priority detection module 402
Under condition, face is delimited for the list lock recently using application to user's displaying.
Specifically, the list displaying command monitoring module 401 may include:Lock password detection sub-module and first row
Table shows command monitoring submodule (not shown).
Wherein, password detection sub-module is locked, for detecting whether being provided with for recently using the list of application
Lock password;
First list shows command monitoring submodule, is yes for the testing result in the locking password detection sub-module
In the case of, then monitoring is for recently using the list displaying instruction of application.
Specifically, the list displaying command monitoring module 401 may include:Screen-lock password judging submodule and secondary series
Table shows command detection submodule (not shown).
Wherein, screen-lock password judging submodule, it is used close when for judging the last relieving lock state of screen
Code whether be preset kind screen-lock password;
Second list shows command detection submodule, is yes for the judging result in the screen-lock password judging submodule
In the case of, monitoring is for recently using the list displaying instruction of application.
Specifically, the list displaying command monitoring module 401 may include:Unlock condition adjudgement submodule and
Three lists show command detection submodule (not shown).
Wherein, unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of
Current time is played to stop, if do not released correctly default application using lock-out state or whether do not released default application
Using lock-out state;
Third list shows command detection submodule, for the judging result in the condition adjudgement submodule that unlocks
In the case of being, monitoring is for recently using the list displaying instruction of application.
Specifically, the priority detection module 402 can be specifically used in the feelings for monitoring the list displaying instruction
Under condition, by judging the status indicator of the corresponding interface assembly of list using application recently, determine for showing nearest use
Whether the instruction of the list of application has highest execution priority.
Specifically, the priority detection module 402 may include:Application identities obtain submodule, application identities judge
Submodule and priority detection sub-module (not shown).
Wherein, application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining nearest
The mark of the corresponding application of information included in list using application;
Application identities judging submodule identifies whether that at least one belongs to preset privacy and answers for judge to be obtained
With identification list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information
Know;
Priority detection sub-module, in the case of for being in the judging result of the application identities judging submodule,
Detect whether the instruction for showing the list using application recently has highest execution priority.
In a specific embodiment of the present invention, referring to Fig. 5, the structure for providing another information locking device is shown
It is intended to, compared with previous embodiment, in the present embodiment, further includes:Encrypted message obtains module 404,405 and of password judgment module
First list display module 406.
Wherein, the encrypted message obtains module 404, and the close of face input is delimited by the list lock for obtaining user
Code information;
The password judgment module 405, for judging obtained password with preset for recently using the close of application
Whether code is consistent, if unanimously, triggering the first list display module 406 and showing list;
The first list display module 406, for being shown recently using the list of application to user.
Optionally, described information locking device can also include:Second list display module (not shown).
Wherein, second list display module, for being answered for nearest use with preset in the password for judging to be obtained
In the case that password is inconsistent, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, generated and applied according to selected application
List, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and show to user
The list generated;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
It is more than preset times for the number for using the password of application inconsistent recently with preset in the password obtained
In the case of, call image capture device to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
It can be specifically used for obtaining at least one of in the following manner specifically, the encrypted message obtains module 404
Obtain encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
As seen from the above, in the scheme that above-mentioned each embodiment provides, in the case where meeting preset monitoring condition, if
After monitoring for instruction is shown using the list of application recently, and detect the finger for showing the list using application recently
When enabling with highest execution priority, face is delimited using the list lock applied to user's displaying for nearest.It can be seen that user
Displaying recently using first illustrating the locking interface of the list before the list of application, in this way before not unlocking user without
Method sees recently using the list of application, therefore, the scheme provided using above-mentioned each embodiment can effective protection user most
Included user privacy information in the nearly list using application.
An embodiment of the present invention provides a kind of mobile terminal, the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual lead to
Letter;
The memory stores executable program code;
The processor can perform to run with described by reading the executable program code stored in the memory
The corresponding program of program code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected
Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
An embodiment of the present invention provides a kind of application program, the application program for executing the embodiment of the present invention at runtime
The information locking method of offer.Wherein, information locking method, including:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected
Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
An embodiment of the present invention provides a kind of storage mediums, and for storing application program, the application program is for executing sheet
The information locking method that inventive embodiments provide.Wherein, information locking method, including:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring the list displaying instruction, the instruction for showing the list using application recently is detected
Whether there is highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
For device embodiments, since it is substantially similar to the method embodiment, so fairly simple, the correlation of description
Place illustrates referring to the part of embodiment of the method.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
One of ordinary skill in the art will appreciate that all or part of step in realization above method embodiment is can
It is completed with instructing relevant hardware by program, the program can be stored in computer read/write memory medium,
The storage medium designated herein obtained, such as:ROM/RAM, magnetic disc, CD etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the scope of the present invention.It is all
Any modification, equivalent replacement, improvement and so within the spirit and principles in the present invention, are all contained in protection scope of the present invention
It is interior.
Claims (19)
1. a kind of information locking method, which is characterized in that the method includes:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring that the list shows instruction, detect for whether showing the instruction using the list applied recently
With highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying;Wherein, list lock demarcation face is:
To the nearest list using application into line-locked interface, the nearest row using application are not shown in the interface
Table.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
Obtain the encrypted message that user delimits face input by the list lock;
Judge obtained password with preset for whether consistent using the password applied recently;
If consistent, shown recently using the list of application to user.
3. according to the method described in claim 2, it is characterized in that, the method further includes:
The password that judges to be obtained with it is preset for it is inconsistent using the password of application recently in the case of, execute following
Any one in operation:
From nearest using the application for not being related to user privacy information is selected in application, application row are generated according to selected application
Table, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and give birth to user's displaying
At list;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
In the password obtained with preset for the feelings for being more than preset times using the inconsistent number of the password of application recently
Under condition, image capture device is called to acquire image, and acquired image is stored to preset storage region;
Execute described the step of delimiting face for the nearest list lock using application to user's displaying.
4. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition
Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
It detects whether to be provided with for recently using the locking password of the list of application;
If being arranged, monitoring is for recently using the list displaying instruction of application.
5. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition
Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
Judge used password when the last relieving lock state of screen whether be preset kind screen-lock password;
If it has, then monitoring is for recently using the list displaying instruction of application.
6. method according to any one of claim 1-3, which is characterized in that described to meet the feelings for presetting monitoring condition
Under condition, monitoring is directed to be instructed using the list displaying of application recently, including:
Judge from the last relieving lock state of screen at the time of play current time and stop, if do not released default answer correctly
Whether the default application lock-out state applied was not released using lock-out state or;
If it has, then monitoring is for recently using the list displaying instruction of application.
7. method according to any one of claim 1-3, which is characterized in that the detection is for showing that nearest use is answered
Whether the instruction of list has highest execution priority, including:
By judging the status indicator of the corresponding interface assembly of list using application recently, determine for showing that nearest use is answered
Whether the instruction of list has highest execution priority.
8. method according to any one of claim 1-3, which is characterized in that the detection is for showing that nearest use is answered
Whether the instruction of list has highest execution priority, including:
Obtain the mark of the corresponding application of information included in the list using application recently;
Judge that is obtained identifies whether that at least one belongs to preset privacy application identities list, wherein described preset
Privacy application identities list, the mark for recording the application for being related to user privacy information;
If so, detection is for showing whether the instruction of the list using application recently has highest execution priority.
9. according to the method described in claim 2, it is characterized in that, the acquisition user delimits face input by the list lock
Encrypted message, including:
Encrypted message is obtained at least one of in the following manner:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
10. a kind of information locking device, which is characterized in that described device includes:
List shows command monitoring module, in the case where meeting default monitoring condition, monitoring to be for recently using application
List displaying instruction;
Priority detection module, in the case where monitoring the list displaying instruction, detecting for showing nearest use
Whether the instruction of the list of application has highest execution priority;
List lock delimits face display module, in the case of for being in the testing result of the priority detection module, Xiang Yong
Family displaying delimits face for the list lock recently using application;Wherein, list lock demarcation face is:The nearest use is answered
List does not show the nearest list using application into line-locked interface in the interface.
11. device according to claim 10, which is characterized in that described device further includes:Encrypted message obtains module, close
Code judgment module and first list display module;
Wherein, the encrypted message obtains module, and the encrypted message that face inputs is delimited by the list lock for obtaining user;
The password judgment module, for judge obtained password with it is preset for recently using application password whether one
It causes, if unanimously, triggering the first list display module displaying list;
The first list display module, for being shown recently using the list of application to user.
12. according to the devices described in claim 11, which is characterized in that described device further includes:
Second list display module, for using the password applied not for nearest with preset in the password for judging to be obtained
Under unanimous circumstances, any one in following operation is executed:
From nearest using the application for not being related to user privacy information is selected in application, application row are generated according to selected application
Table, and generated list is shown to user;
According to application mounted in terminal, not being related to user privacy information, list of application is generated, and give birth to user's displaying
At list;
The list of application being generated in advance to user's displaying, not being related to user privacy information;
It is not related to the list of the application of user privacy information to user's displaying, and image capture device is called to acquire image;
In the password obtained with preset for the feelings for being more than preset times using the inconsistent number of the password of application recently
Under condition, image capture device is called to acquire image, and acquired image is stored to preset storage region;
It triggers the list lock demarcation face display module and delimits face using the list lock applied for nearest to user's displaying.
13. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould
Block, including:
Password detection sub-module is locked, for detecting whether being provided with for recently using the locking password of the list of application;
First list shows command monitoring submodule, the feelings for being yes in the testing result of the locking password detection sub-module
Under condition, then monitoring is for recently using the list displaying instruction of application.
14. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould
Block, including:
Screen-lock password judging submodule, whether used password is pre- when for judging the last relieving lock state of screen
If the screen-lock password of type;
Second list shows command detection submodule, the feelings for being yes in the judging result of the screen-lock password judging submodule
Under condition, monitoring is for recently using the list displaying instruction of application.
15. according to the device described in any one of claim 10-12, which is characterized in that the list shows command monitoring mould
Block, including:
Unlock condition adjudgement submodule, for judge from the last relieving lock state of screen at the time of play current when
Quarter stops, if do not released correctly default application using lock-out state or whether do not released the application locking shape of default application
State;
Third list shows command detection submodule, for being yes in the judging result for unlocking condition adjudgement submodule
In the case of, monitoring is for recently using the list displaying instruction of application.
16. according to the device described in any one of claim 10-12, which is characterized in that the priority detection module, specifically
For in the case where monitoring the list displaying instruction, using the corresponding interface assembly of list of application recently by judgement
Status indicator, determine for show recently using application list instruction whether have highest execution priority.
17. according to the device described in any one of claim 10-12, which is characterized in that the priority detection module, packet
It includes:
Application identities obtain submodule, in the case where monitoring the list displaying instruction, obtaining recently using application
List included in the corresponding application of information mark;
Application identities judging submodule identifies whether that at least one belongs to preset privacy application mark for judge to be obtained
Know list, wherein the preset privacy application identities list, the mark for recording the application for being related to user privacy information;
Priority detection sub-module, in the case where the judging result of the application identities judging submodule is to be, detecting
For showing whether the instruction of the list using application recently has highest execution priority.
18. according to the devices described in claim 11, which is characterized in that the encrypted message obtains module, specifically for passing through
At least one of following manner obtains encrypted message:
Encrypted message is obtained by way of acquiring touch control operation information of the user on the list lock demarcation face;
Encrypted message is obtained by way of delimiting the voice messaging of face input by the list lock acquiring user;
Encrypted message is obtained by way of delimiting the image information of face input by the list lock acquiring user.
19. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Processor, memory, communication interface and bus;
The processor, the memory are connected by the bus with the communication interface and complete mutual communication;
The memory stores executable program code;
The processor is run and the executable program by reading the executable program code stored in the memory
The corresponding program of code, for:
In the case where meeting default monitoring condition, monitoring is for recently using the list displaying instruction applied;
In the case where monitoring that the list shows instruction, detect for whether showing the instruction using the list applied recently
With highest execution priority;
If having, face is delimited for the list lock recently using application to user's displaying.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510535812.0A CN105046145B (en) | 2015-08-27 | 2015-08-27 | Information locking method and device and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510535812.0A CN105046145B (en) | 2015-08-27 | 2015-08-27 | Information locking method and device and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105046145A CN105046145A (en) | 2015-11-11 |
CN105046145B true CN105046145B (en) | 2018-09-11 |
Family
ID=54452682
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510535812.0A Active CN105046145B (en) | 2015-08-27 | 2015-08-27 | Information locking method and device and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105046145B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034397A (en) * | 2012-11-29 | 2013-04-10 | 广东欧珀移动通信有限公司 | Dynamic unlocking method, device and mobile terminal based on recent tasks |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN104516643A (en) * | 2014-10-31 | 2015-04-15 | 厦门美图移动科技有限公司 | Method and device for start application, and computing terminal |
-
2015
- 2015-08-27 CN CN201510535812.0A patent/CN105046145B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103034397A (en) * | 2012-11-29 | 2013-04-10 | 广东欧珀移动通信有限公司 | Dynamic unlocking method, device and mobile terminal based on recent tasks |
CN103139353A (en) * | 2013-01-28 | 2013-06-05 | 广东欧珀移动通信有限公司 | Lock unlocking method and lock unlocking device of mobile terminal |
CN104516643A (en) * | 2014-10-31 | 2015-04-15 | 厦门美图移动科技有限公司 | Method and device for start application, and computing terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105046145A (en) | 2015-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104899952B (en) | Work attendance method and device based on instant messaging application | |
CN109117044A (en) | The device and method of user interface are manipulated for inputting based on fingerprint sensor | |
CN106201468B (en) | A kind of processing method of screenshotss, device and electronic equipment | |
JP5925373B1 (en) | Communication support system | |
CA2560747A1 (en) | Profile based capture component for monitoring events in applications | |
CN105094630B (en) | The prompt information processing method and device of application program PUSH message | |
CN109800098A (en) | Service exception node positioning method, device, computer equipment and storage medium | |
CN108959376A (en) | A kind of data processing method and device | |
CN104091102B (en) | A kind of multi-user management method and its device based on Android system | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN104361281A (en) | Method for solving phishing attack of Android platform | |
CN105868621A (en) | A password resetting method and device | |
CN107451464B (en) | Prompt message output method and device | |
CN106506443A (en) | A kind of information inspection method and device | |
CN106919377A (en) | Determine application program displaying interface whether be white screen method and device | |
CN108809810A (en) | Message Record inspection method, system and computer equipment based on instant messaging | |
CN112800401B (en) | Privacy processing method, privacy processing device and terminal | |
CN114268461A (en) | User identity authentication method, device, server, terminal and storage medium | |
CN111639316B (en) | Information processing method and device for WEB page | |
CN105046145B (en) | Information locking method and device and mobile terminal | |
JP6212864B2 (en) | Key management system, method and program | |
JP2008293137A (en) | Individual management apparatus and program | |
CN109754345A (en) | System and method for carrying out examinee's assessment based on fail-safe computer | |
US20050021651A1 (en) | Method and system for identification and presentation of statistical usage data for messaging systems | |
CN107197344A (en) | A kind of method for realizing user's self-defining remote control shortcut function |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |