CN105389484A - Permission controlling method and device for application programs - Google Patents

Permission controlling method and device for application programs Download PDF

Info

Publication number
CN105389484A
CN105389484A CN201510996508.6A CN201510996508A CN105389484A CN 105389484 A CN105389484 A CN 105389484A CN 201510996508 A CN201510996508 A CN 201510996508A CN 105389484 A CN105389484 A CN 105389484A
Authority
CN
China
Prior art keywords
application program
locked
lock
application
locking password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510996508.6A
Other languages
Chinese (zh)
Inventor
唐钰林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201510996508.6A priority Critical patent/CN105389484A/en
Publication of CN105389484A publication Critical patent/CN105389484A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2147Locking files

Abstract

The invention discloses a permission controlling method and device for application programs. The permission controlling method comprises the following steps of: selecting one or more application programs to be locked from application programs installed on a terminal, and setting a locking password; and after a locking instruction is detected, locking the application programs to be locked by using the locking password. The permission controlling method and device solve the technical problem in the prior art that the application programs installed on the terminal can be freely used by a user, and security access can not be pointedly carried out on the application programs according to the demands of the user.

Description

The authority control method of application program and device
Technical field
The present invention relates to application program controlling field, in particular to a kind of authority control method and device of application program.
Background technology
Along with the universal use of mobile terminal, increasing user habit uses handset processes routine matter, even if oneself leave behind mobile phone or oneself mobile phone when being inconvenient to use, the mobile phone also can using others operates.But, the privacy that application-specific on each customer mobile terminal preserves oneself (such as, the chat record of the chat application softwares such as mobile phone QQ, micro-letter, the photo etc. taken in mobile phone picture library), user, after mobile terminal being lent other people and using, does not wish that other people can use above-mentioned application-specific.
Arbitrarily can be used by user for the application program be arranged in prior art in terminal, cannot for the demand of user targetedly application programs carry out the technical matters of secure access, at present effective solution is not yet proposed.
Summary of the invention
Embodiments provide a kind of authority control method and device of application program, arbitrarily can be used by user at least to solve in prior art the application program be arranged in terminal, cannot for the demand of user targetedly application programs carry out the technical matters of secure access.
According to an aspect of the embodiment of the present invention, provide a kind of authority control method of application program, comprising: selected one or more application program to be locked in the application program of installing in terminal, and locking password is set; After lock instruction being detected, locking password is used application program to be locked to be locked.
According to the another aspect of the embodiment of the present invention, additionally provide a kind of permission control device of application program, comprising: chosen module, selected one or more application program to be locked in the application program of installing in terminal, and locking password is set; Locking module, for after lock instruction being detected, uses locking password application program to be locked to be locked.
In embodiments of the present invention, if need the application program by user formulates to lock, the application program of one or more user formulation can be selected as application program to be locked from the application program that terminal is installed, and the locking password of application program to be locked is set, after receiving lock instruction, the locking password set is used application program to be locked to be locked.Easily notice, due to one or more application program to be locked can be selected from the application program that terminal is installed, and after lock instruction being detected, selected application program is locked, achieve and both user terminal can be lent other people use, application locking user can specified again, do not allow other people to access and formulate application, thus the application program be arranged in prior art in terminal arbitrarily can be used by user, cannot for the demand of user targetedly application programs carry out the technical matters of secure access, improve the security of terminal system, lock operation is simple, do not affect Consumer's Experience.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the process flow diagram of the authority control method of a kind of application program according to the embodiment of the present invention;
Fig. 2 is the schematic diagram of the authority control method of a kind of optional application program according to the embodiment of the present invention; And
Fig. 3 is the schematic diagram of the permission control device of a kind of application program according to the embodiment of the present invention.
Embodiment
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first ", " second " etc. in instructions of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the data used like this can be exchanged in the appropriate case, so as embodiments of the invention described herein can with except here diagram or describe those except order implement.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment is not necessarily limited to clearly list, but can comprise clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment 1
According to the embodiment of the present invention, provide a kind of authority control method embodiment of application program, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the process flow diagram of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 1 is the process flow diagram of the authority control method of a kind of application program according to the embodiment of the present invention, and as shown in Figure 1, the method comprises the steps:
Step S102, selected one or more application program to be locked in the application program that terminal is installed, and locking password is set.
Particularly, above-mentioned terminal can be smart mobile phone (as Android phone, iOS mobile phone etc.), and panel computer, the terminal devices such as palm PC also can be terminals.
In the optional scheme of one, user can formulate and not wish that other people access the application program of use on Android system equipment, namely select and do not wish that other people access one or more application programs of use, and setting does not wish that other people access the locking password of the application program of use, user can select one or more application program as required as application program to be locked in terminal, and after selected application program success, for selected application program arranges password.
Such as, be Android system equipment for terminal, the above embodiments of the present application are described in detail.User can formulate and not wish that other people access the application program of use on Android system equipment, such as QQ, micro-letter and photograph album, and arrange and lock password accordingly, such as 123654, Android system equipment is by QQ, and micro-letter and photograph album as application program to be locked, and obtain the locking password 123654 of user's input.
Step S104, after lock instruction being detected, uses locking password application program to be locked to be locked.
In the optional scheme of one, after lock instruction being detected, the locking password set can be used selected application program one or more to be locked to be locked.Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.User can trigger lock instruction by short power key of pressing, and Android system equipment, after this lock instruction being detected, uses the application program QQ that user selectes by the locking password 123654 of user's input, micro-letter and photograph album locking.
In scheme disclosed in the above embodiments of the present application, if need the application program by user formulates to lock, the application program of one or more user formulation can be selected as application program to be locked from the application program that terminal is installed, and the locking password of application program to be locked is set, after receiving lock instruction, the locking password set is used application program to be locked to be locked.Easily notice, due to one or more application program to be locked can be selected from the application program that terminal is installed, and after lock instruction being detected, selected application program is locked, achieve and both user terminal can be lent other people use, application locking user can specified again, do not allow other people to access and formulate application, thus the application program be arranged in prior art in terminal arbitrarily can be used by user, cannot for the demand of user targetedly application programs carry out the technical matters of secure access, improve the security of terminal system, lock operation is simple, do not affect Consumer's Experience.
According to the above embodiments of the present application, before lock instruction being detected, said method also comprises:
Step S112, triggers generation lock instruction by any one mode following: start lock function switch, control terminal shutdown and control terminal standby.
Particularly, above-mentioned lock function switch can be the restrict access functional switch button during terminal system application is arranged.
In the optional scheme of one, restrict access functional status button by clicking restrict access functional switch button, can be shown as unlatching by user, thus triggers generation lock instruction; Can by short flow process of pressing the dormancy of power key triggering system, control terminal is standby, thus triggers generation lock instruction.Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.When user thinks locking applications time, can by short flow process of pressing the dormancy of power key triggering system, thus triggering lock instruction, Android system equipment is after this lock instruction being detected, use the application program QQ that user selectes by the locking password 123654 of user's input, micro-letter and photograph album locking.
According to the above embodiments of the present application, in step S112, after triggering generation lock instruction by any one mode, said method also comprises:
Step S114, is set to lock-out state respectively by the lock flag position of each application program to be locked, maybe the lock flag position of sharing of all application programs to be locked is set to lock-out state.
Particularly, lock flag position can be the lock zone bit variable i sLock of setting separately or shared lock zone bit variable i sLock, when lock flag position is the lock zone bit variable of setting separately, the corresponding lock zone bit variable of each application program in the application program one or more to be locked that user selectes; In the lock zone bit variable situation that lock flag position is shared, the corresponding lock zone bit variable of all application programs in the application program one or more to be locked that user selectes.
In the optional scheme of one, after user triggers and produces lock instruction, if lock flag position is the lock zone bit variable of setting separately, then in the application program one or more to be locked user selected, the value of the lock zone bit variable i sLock that each application program is corresponding is revised as true; If lock flag position is shared lock zone bit variable, then the value of shared lock zone bit variable i sLock is revised as true.Lock zone bit variable i sLock is defaulted as true, the value of isLock can be set to true when starting lock function switch.To ensure when restrict access function is opened, the application that the system of entering can be formulated at every turn locks.
It should be noted that, from the angle that technology realizes, the lock zone bit variable that each amendment is shared only needs amendment value, and routine processes amount is few herein; The lock zone bit variable that each amendment sets separately all needs, by circulation, the value of lock zone bit variable corresponding for each application program to be modified.From security, user can borrow mobile phone to use to other people, and allows other people that restrict access cannot be used to apply.
According to the above embodiments of the present application, in step S104, after application program to be locked locks by use locking password, said method also comprises:
Step S122, if when detecting that any one locked application program is accessed, verifies locking password.
In the optional scheme of one, when user is by newly-built the OnCreate () stage or regenerate the OnResume () stage and start locked application program, lock inputting interface can be called, just application can be entered after only having the correct password of input, and without the need to reloading application program, save the original mode of operation of application program.
Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.When user accesses the QQ application program of locking time, Android system equipment calls lock inputting interface, the password 123654 of user's input, verifies the password of user's input.
Step S124, if the success of checking locking password, then unlocks successfully any one locked application program, or unlocks successfully all locked application programs.
In the optional scheme of one, if lock flag position is the lock zone bit variable of setting separately, then unlock successfully by this application program, other application programs are still locked, need the correct password of input just can be unlocked, user can only access and be unlocked successful application program; If lock flag position is shared lock zone bit variable, then unlock successfully by the application program of all lockings, user can the multiple application program of connected reference.After user inputs correct password, user can normally use all application programs, and once shortly all application programs to be locked by power key upper.Due to simple to operate, can not Consumer's Experience be affected, also improve the security of system simultaneously.
Such as, be Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When the password 123654 of authentication of users input is identical with locking password, the success of checking locking password, then QQ, micro-letter and photograph album all unlock successfully.
According to the above embodiments of the present application, in step S124, after the success of checking locking password, said method also comprises:
Step S126, is set to released state by the lock flag position of any one locked application program, maybe the lock flag position of sharing of all locked application programs is set to released state.
In the optional scheme of one, after user inputs correct password, if lock flag position is the lock zone bit variable of setting separately, the value of the lock zone bit variable i sLock of the application program of then user being accessed is revised as false, and the value of the lock zone bit variable i sLock of other locked application programs remains true; If lock flag position is shared lock zone bit variable, then the value of shared lock zone bit variable i sLock is revised as false.
It should be noted that herein, from Consumer's Experience angle, when locking zone bit variable and sharing, restrict access application how much is applied as when being provided with regardless of user, time user thinks to use many moneys restrict access to apply continuously, the password that input is once correct is only needed namely to may have access to all restrict access application; Under lock zone bit variable independently situation, widely apply as restrict access application when user is provided with, time user thinks to use many moneys restrict access to apply continuously, need the password once correct to each input of every a application that this could be used to apply, namely be that an application input once correctly can unlock this application, other application remains lock-out state.
According to the above embodiments of the present application, step S102, in the application program that terminal is installed, selected one or more application program to be locked comprises:
Step S1022, display application program listing in terminal, wherein, comprises all application programs that terminal is installed in the application list.
Step S1024, using one or more application programs of choosing as application program to be locked.
In the optional scheme of one, terminal can show the list of all application programs, user can by the one or more application programs in selective gist program listing as application program to be locked.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.After restrict access function is opened, user can arrange restrict access application in terminal is arranged, i.e. above-mentioned application program to be locked, be arranged through load application list to select for user, one or more application programs that Android system equipment reception user chooses are applied as restrict access, application program namely to be locked.
According to the above embodiments of the present application, when terminal is touch-screen, if the display icon place of any one application program senses predetermined touch operation in touch-screen, then determine to sense that the application program of predetermined touch operation is application program to be locked, wherein, predetermined touch operation comprises any one operation following: clicking operation, slide, drag operation.
In the optional scheme of one, user needs the display icon of the application program locked in can being shielded by point touching, determine application program to be locked; User also can slide this application program selected as application program to be locked by pressing counter clock wise circles on the display icon of application program needing locking.
According to the above embodiments of the present application, in step S104, after application program to be locked locks by use locking password, said method also comprises:
Step S106, by application storage to be locked in restrict access list.
In the optional scheme of one, after the application program locking of specifying, in the Bao Mingcun to the restrict access list AppAccessLimit.db of database of restrict access application user chosen, and the restrict access list AppAccessLimit.db in database is exposed to other application or the access of other classes and operation by content provider's assembly.
According to the above embodiments of the present application, in step S102, selected one or more application program to be locked in the application program that terminal is installed, and before arranging locking password, said method also comprises:
Step S132, after trigger pip lock function switch being detected, detects whether there is locking password.
, there is locking password if detected, then start lock function switch, and enter after lock instruction being detected in step S134, uses locking password that application program to be locked is entered line-locked step.
, there is not locking password if detected, then arrange locking password in step S136, and after locking password arranges successfully, starts lock function switch.
In the optional scheme of one, after user clicks lock function switch, detect whether locking password has been set, if arranged, then start lock function switch; If do not arrange locking password, then show lock and interface for users is set locking password is set, if locking password arranges successfully, then start lock function switch.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.User clicks restrict access functional switch button in system application is arranged, whether the drop lock (namely above-mentioned locking password) arranging the restriction of meeting test access is arranged, if do not arranged, then can recall restrict access lock and interface for users settings are set, drop lock exists in configuration file AccessLimitKey.xml, if user does not arrange and successfully exits, the display of restrict access functional switch button state is closed, if restrict access drop lock is arranged successfully or arrange, then open application access limitation function, restrict access functional switch status button in arranging is shown as unlatching.Restrict access functional switch state value isAppAccessLimitOpen and lock zone bit variable i sLock exists in the variable configuration file arranged.
According to the above embodiments of the present application, if when detecting that any one locked application program is accessed, in step S122, before verifying locking password, said method also comprises:
Step S142, whether the lock flag position detecting any one locked application program is lock-out state, or whether the lock flag position of sharing of all locked application programs is lock-out state.
Step S144, if the lock flag position any one locked application program being detected is lock-out state, or the lock flag position of sharing of all locked application programs is lock-out state, then verify locking password.
In the optional scheme of one, when user accesses the application program of locking, whether if lock flag position is the lock zone bit variable of setting separately, then detecting lock flag position corresponding to this application program is lock-out state, if determine it is lock-out state, then carry out locking password authentification; If lock flag position is shared lock zone bit variable, then detect whether shared lock zone bit variable is lock-out state, if determine it is lock-out state, then carry out locking password authentification.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When user is by newly-built the OnCreate () stage or regenerate the OnResume () stage and start locked application program, the content of meeting loading of databases, the value of the lock zone bit variable shared is judged, if the value of lock zone bit variable i sLock is true, be locking state, then can call coded lock interface, after only having the correct password of input, just can enter application, and without the need to reloading application program, save the original mode of operation of application program.
According to the above embodiments of the present application, if the failure of checking locking password, said method also comprises:
Step S152, verifies locking password again, and the authentication failed number of times of record locking password.
Step S154, if authentication failed number of times reaches predetermined threshold value, then generates information, and wherein, information unlocks unsuccessfully for characterizing any one locked application program, or all locked application programs unlock unsuccessfully.
In the optional scheme of one, if user input password bad, then user re-enters password, and authentication failed number of times is added 1, when authentication failed number of times reaches predetermined threshold value, such as 3 time, terminal demonstration information, informs that user unlocks failure.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.If the code error of user's input, then re invocation lock inputting interface is for user's input, and the number of times of recording user input code error, the application operating page cannot be entered, when the number of times that user inputs code error is greater than 3 times, prompting user unlocks failure or waits for a period of time and again unlocks.
It should be noted that, lock inputting interface occurs in task no longer recently herein, and also do not respond return key and to exit and other application cannot kill lock inputting interface application program, user's intelligence is by the main interface of home key retrieval system.
According to the above embodiments of the present application, in step S104, after application program to be locked locks by use locking password, said method also comprises:
Step S162, in the process that any one application program that terminal is installed is deleted, judges whether to exist in restrict access list the application program with the application matches of any one.
Step S164, if there is the application program with the application matches of any one in restrict access list, then deletes the application program in restrict access list.
In the optional scheme of one, when terminal detects that user carries out the operation of application program deletion, application program in restrict access list in application program to be deleted and database is compared, judge that whether application program to be detected is the application program in restrict access list, if, then after application program to be deleted is deleted, application program corresponding in access list is deleted.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When deletion application, whether the application that system can detect deletion is the application in restrict access list, is if so, then deleted by this record in restrict access list.
Below in conjunction with Fig. 2, a kind of preferred embodiment of the application is described.In this embodiment, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, as shown in Figure 2:
Android system equipment provides restrict access functional switch button (first must arrange lock just can enable) in system application is arranged, and provides coded lock to set and the list of change load application, provides user to select button.User can click access function shift knob, opens application access limitation function, enters step S21, arrange drop lock, namely above-mentioned locking password, and the drop lock set be stored in database AccessLimitKey.xml, obtain configuration file; Enter step S22, setting configuration variables value, namely zone bit variable i sLock (namely above-mentioned lock flag position) and restrict access functional switch variable i sAppAccessLimitOpen (namely above-mentioned lock function switch) is locked, and the configuration variables value set can be kept in the variable configuration file of database, obtain variable configuration file; Enter step S23, operational applications list, obtain the restrict access application that user selectes, and the variable bag name that restrict access is applied is stored in database AppAccessLimit.db, obtain restrict access list.
After restrict access function opens (namely starting lock function switch), when the shutdown of Android system equipment or dormancy, enter step S24, reset lock zone bit variable, lock zone bit variable i sLock is reset to ture, obtains the variable configuration file after resetting.
After restrict access function opens (namely starting lock function switch), when opening (newly-built or live again) application at system boot or after waking up, enter step S25, the restrict access application of read access restriction list, if restrict access application when determining the application of opening in restrict access list, then enter step S26, read the value of locking zone bit variable in configuration variables value, if the value of lock zone bit variable is true, then show lock inputting interface, after the value getting user's input, enter step S27, drop lock is read from configuration file, judge that whether the value inputted is correct, if correct, then to enable or live again application, if incorrect, then lock inputting interface and again eject, the application operating page cannot be entered.
When deleting application, if the application of deleting is the application in the restrict access list of database, then entering step S28, deleting in restrict access list and applying record, obtain the restrict access list after deleting.
The scheme that the above embodiments of the present application provide, by arranging not wishing to be conducted interviews to limit by the application that other people use, improve the security of cell phone system, open this function, also the once correct password of input is only needed can to use the application of all restrict access when unlocking, and lock only need short by power key dormancy just by the application lock of all restrict access, solve in prior art the application program be arranged in terminal arbitrarily to be used by user, cannot for the demand of user targetedly application programs carry out the technical matters of secure access, achieve the Android system equipment of user can lend other people use while can allow formulate application lock on, do not allow other people to access and formulate application, thus improve security of system, simple to operate, do not affect Consumer's Experience.
Embodiment 2
According to the embodiment of the present invention, provide a kind of permission control device embodiment of application program, as shown in Figure 3, this device comprises: chosen module 31 and locking module 33.
Wherein, chosen module 31 is selected one or more application program to be locked in the application program of installing in terminal, and arranges locking password.
Particularly, above-mentioned terminal can be smart mobile phone (as Android phone, iOS mobile phone etc.), and panel computer, the terminal devices such as palm PC also can be terminals.
In the optional scheme of one, user can formulate and not wish that other people access the application program of use on Android system equipment, namely select and do not wish that other people access one or more application programs of use, and setting does not wish that other people access the locking password of the application program of use, user can select one or more application program as required as application program to be locked in terminal, and after selected application program success, for selected application program arranges password.
Such as, be Android system equipment for terminal, the above embodiments of the present application are described in detail.User can formulate and not wish that other people access the application program of use on Android system equipment, such as QQ, micro-letter and photograph album, and arrange and lock password accordingly, such as 123654, Android system equipment is by QQ, and micro-letter and photograph album as application program to be locked, and obtain the locking password 123654 of user's input.
Locking module 33, for after lock instruction being detected, uses locking password application program to be locked to be locked.
In the optional scheme of one, after lock instruction being detected, the locking password set can be used selected application program one or more to be locked to be locked.Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.User can trigger lock instruction by short power key of pressing, and Android system equipment, after this lock instruction being detected, uses the application program QQ that user selectes by the locking password 123654 of user's input, micro-letter and photograph album locking.
In scheme disclosed in the above embodiments of the present application, if need the application program by user formulates to lock, the application program of one or more user formulation can be selected as application program to be locked from the application program that terminal is installed, and the locking password of application program to be locked is set, after receiving lock instruction, the locking password set is used application program to be locked to be locked.Easily notice, due to one or more application program to be locked can be selected from the application program that terminal is installed, and after lock instruction being detected, selected application program is locked, achieve and both user terminal can be lent other people use, application locking user can specified again, do not allow other people to access and formulate application, thus the application program be arranged in prior art in terminal arbitrarily can be used by user, cannot for the demand of user targetedly application programs carry out the technical matters of secure access, improve the security of terminal system, lock operation is simple, do not affect Consumer's Experience.
According to the above embodiments of the present application, before lock instruction being detected, said apparatus also comprises: generation module.
Wherein, generation module is used for triggering generation lock instruction by any one mode following: start lock function switch, control terminal shutdown and control terminal standby.
Particularly, above-mentioned lock function switch can be the restrict access functional switch button during terminal system application is arranged.
In the optional scheme of one, restrict access functional status button by clicking restrict access functional switch button, can be shown as unlatching by user, thus triggers generation lock instruction; Can by short flow process of pressing the dormancy of power key triggering system, control terminal is standby, thus triggers generation lock instruction.Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.When user thinks locking applications time, can by short flow process of pressing the dormancy of power key triggering system, thus triggering lock instruction, Android system equipment is after this lock instruction being detected, use the application program QQ that user selectes by the locking password 123654 of user's input, micro-letter and photograph album locking.
According to the above embodiments of the present application, said apparatus also comprises: first arranges module.
Wherein, first arranges module for the lock flag position of each application program to be locked is set to lock-out state respectively, maybe the lock flag position of sharing of all application programs to be locked is set to lock-out state.
Particularly, lock flag position can be the lock zone bit variable i sLock of setting separately or shared lock zone bit variable i sLock, when lock flag position is the lock zone bit variable of setting separately, the corresponding lock zone bit variable of each application program in the application program one or more to be locked that user selectes; In the lock zone bit variable situation that lock flag position is shared, the corresponding lock zone bit variable of all application programs in the application program one or more to be locked that user selectes.
In the optional scheme of one, after user triggers and produces lock instruction, if lock flag position is the lock zone bit variable of setting separately, then in the application program one or more to be locked user selected, the value of the lock zone bit variable i sLock that each application program is corresponding is revised as true; If lock flag position is shared lock zone bit variable, then the value of shared lock zone bit variable i sLock is revised as true.Lock zone bit variable i sLock is defaulted as true, the value of isLock can be set to true when starting lock function switch.To ensure when restrict access function is opened, the application that the system of entering can be formulated at every turn locks.
It should be noted that, from the angle that technology realizes, the lock zone bit variable that each amendment is shared only needs amendment value, and routine processes amount is few herein; The lock zone bit variable that each amendment sets separately all needs, by circulation, the value of lock zone bit variable corresponding for each application program to be modified.From security, user can borrow mobile phone to use to other people, and allows other people that restrict access cannot be used to apply.
According to the above embodiments of the present application, said apparatus also comprises: the first authentication module and unlocked state.
Wherein, if when the first authentication module is used for detecting that any one locked application program is accessed, locking password is verified.
In the optional scheme of one, when user is by newly-built the OnCreate () stage or regenerate the OnResume () stage and start locked application program, lock inputting interface can be called, just application can be entered after only having the correct password of input, and without the need to reloading application program, save the original mode of operation of application program.
Such as, be still Android system equipment for terminal, the above embodiments of the present application are described in detail.When user accesses the QQ application program of locking time, Android system equipment calls lock inputting interface, the password 123654 of user's input, verifies the password of user's input.
If unlocked state is used for the success of checking locking password, then any one locked application program is unlocked successfully, or all locked application programs are unlocked successfully.
In the optional scheme of one, if lock flag position is the lock zone bit variable of setting separately, then unlock successfully by this application program, other application programs are still locked, need the correct password of input just can be unlocked, user can only access and be unlocked successful application program; If lock flag position is shared lock zone bit variable, then unlock successfully by the application program of all lockings, user can the multiple application program of connected reference.After user inputs correct password, user can normally use all application programs, and once shortly all application programs to be locked by power key upper.Due to simple to operate, can not Consumer's Experience be affected, also improve the security of system simultaneously.
Such as, be Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When the password 123654 of authentication of users input is identical with locking password, the success of checking locking password, then QQ, micro-letter and photograph album all unlock successfully.
According to the above embodiments of the present application, said apparatus also comprises: second arranges module.
Wherein, second arranges module for the lock flag position of any one locked application program is set to released state, maybe the lock flag position of sharing of all locked application programs is set to released state.
In the optional scheme of one, after user inputs correct password, if lock flag position is the lock zone bit variable of setting separately, the value of the lock zone bit variable i sLock of the application program of then user being accessed is revised as false, and the value of the lock zone bit variable i sLock of other locked application programs remains true; If lock flag position is shared lock zone bit variable, then the value of shared lock zone bit variable i sLock is revised as false.
It should be noted that herein, from Consumer's Experience angle, when locking zone bit variable and sharing, restrict access application how much is applied as when being provided with regardless of user, time user thinks to use many moneys restrict access to apply continuously, the password that input is once correct is only needed namely to may have access to all restrict access application; Under lock zone bit variable independently situation, widely apply as restrict access application when user is provided with, time user thinks to use many moneys restrict access to apply continuously, need the password once correct to each input of every a application that this could be used to apply, namely be that an application input once correctly can unlock this application, other application remains lock-out state.
According to the above embodiments of the present application, described chosen module 31 comprises: display sub-module and process submodule.
Wherein, display sub-module, for display application program listing in terminal, wherein, comprises all application programs that terminal is installed in the application list.
Process submodule be used for will the one or more application programs that choose as application program to be locked.
In the optional scheme of one, terminal can show the list of all application programs, user can by the one or more application programs in selective gist program listing as application program to be locked.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.After restrict access function is opened, user can arrange restrict access application in terminal is arranged, i.e. above-mentioned application program to be locked, be arranged through load application list to select for user, one or more application programs that Android system equipment reception user chooses are applied as restrict access, application program namely to be locked.
According to the above embodiments of the present application, said apparatus also comprises: determination module, for when terminal is touch-screen, if the display icon place of any one application program senses predetermined touch operation in touch-screen, then determine to sense that the application program of predetermined touch operation is application program to be locked, wherein, predetermined touch operation comprises any one operation following: clicking operation, slide, drag operation.
In the optional scheme of one, user needs the display icon of the application program locked in can being shielded by point touching, determine application program to be locked; User also can slide this application program selected as application program to be locked by pressing counter clock wise circles on the display icon of application program needing locking.
According to the above embodiments of the present application, said apparatus also comprises: memory module.
Wherein, memory module is used for application storage to be locked in restrict access list.
In the optional scheme of one, after the application program locking of specifying, in the Bao Mingcun to the restrict access list AppAccessLimit.db of database of restrict access application user chosen, and the restrict access list AppAccessLimit.db in database is exposed to other application or the access of other classes and operation by content provider's assembly.
According to the above embodiments of the present application, said apparatus also comprises: first detection module, starts module and the 3rd and arranges module.
Wherein, first detection module is used for after trigger pip lock function switch being detected, detects whether there is locking password.
If start module to be used for detecting to there is locking password, then start lock function switch, and enter after lock instruction being detected, use locking password that application program to be locked is entered line-locked step.
If the 3rd arranges module there is not locking password for detecting, then locking password is set, and after locking password arranges successfully, starts lock function switch.
In the optional scheme of one, after user clicks lock function switch, detect whether locking password has been set, if arranged, then start lock function switch; If do not arrange locking password, then show lock and interface for users is set locking password is set, if locking password arranges successfully, then start lock function switch.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.User clicks restrict access functional switch button in system application is arranged, whether the drop lock (namely above-mentioned locking password) arranging the restriction of meeting test access is arranged, if do not arranged, then can recall restrict access lock and interface for users settings are set, drop lock exists in configuration file AccessLimitKey.xml, if user does not arrange and successfully exits, the display of restrict access functional switch button state is closed, if restrict access drop lock is arranged successfully or arrange, then open application access limitation function, restrict access functional switch status button in arranging is shown as unlatching.Restrict access functional switch state value isAppAccessLimitOpen and lock zone bit variable i sLock exists in the variable configuration file arranged.
According to the above embodiments of the present application, said apparatus also comprises: first detection module and the second authentication module.
First detection module is for detecting whether the lock flag position of any one locked application program is lock-out state, or whether the lock flag position of sharing of all locked application programs is lock-out state.
If the second authentication module is used for detecting that the lock flag position of any one locked application program is lock-out state, or the lock flag position of sharing of all locked application programs is lock-out state, then locking password is verified.
In the optional scheme of one, when user accesses the application program of locking, whether if lock flag position is the lock zone bit variable of setting separately, then detecting lock flag position corresponding to this application program is lock-out state, if determine it is lock-out state, then carry out locking password authentification; If lock flag position is shared lock zone bit variable, then detect whether shared lock zone bit variable is lock-out state, if determine it is lock-out state, then carry out locking password authentification.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When user is by newly-built the OnCreate () stage or regenerate the OnResume () stage and start locked application program, the content of meeting loading of databases, the value of the lock zone bit variable shared is judged, if the value of lock zone bit variable i sLock is true, be locking state, then can call coded lock interface, after only having the correct password of input, just can enter application, and without the need to reloading application program, save the original mode of operation of application program.
According to the above embodiments of the present application, if the failure of checking locking password, said apparatus also comprises: logging modle and generation module.
Wherein, logging modle is used for again verifying locking password, and the authentication failed number of times of record locking password.
If generation module is used for authentication failed number of times reach predetermined threshold value, then generate information, wherein, information unlocks unsuccessfully for characterizing any one locked application program, or all locked application programs unlock unsuccessfully.
In the optional scheme of one, if user input password bad, then user re-enters password, and authentication failed number of times is added 1, when authentication failed number of times reaches predetermined threshold value, such as 3 time, terminal demonstration information, informs that user unlocks failure.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.If the code error of user's input, then re invocation lock inputting interface is for user's input, and the number of times of recording user input code error, the application operating page cannot be entered, when the number of times that user inputs code error is greater than 3 times, prompting user unlocks failure or waits for a period of time and again unlocks.
It should be noted that, lock inputting interface occurs in task no longer recently herein, and also do not respond return key and to exit and other application cannot kill lock inputting interface application program, user's intelligence is by the main interface of home key retrieval system.
According to the above embodiments of the present application, said apparatus also comprises: judge module and removing module.
Wherein, judge module, in the process that any one application program of installing in terminal is deleted, judges whether to exist in restrict access list the application program with the application matches of any one.
If removing module is used for existing in restrict access list the application program with the application matches of any one, then the application program in restrict access list is deleted.
In the optional scheme of one, when terminal detects that user carries out the operation of application program deletion, application program in restrict access list in application program to be deleted and database is compared, judge that whether application program to be detected is the application program in restrict access list, if, then after application program to be deleted is deleted, application program corresponding in access list is deleted.
Such as, be still Android system equipment with terminal, lock flag position is shared lock zone bit variable is example, is described in detail the above embodiments of the present application.When deletion application, whether the application that system can detect deletion is the application in restrict access list, is if so, then deleted by this record in restrict access list.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
In the above embodiment of the present invention, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed technology contents, the mode by other realizes.Wherein, device embodiment described above is only schematic, the such as division of described unit, can be that a kind of logic function divides, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of unit or module or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed on multiple unit.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, ROM (read-only memory) (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (22)

1. an authority control method for application program, is characterized in that, comprising:
Selected one or more application program to be locked in the application program that terminal is installed, and locking password is set;
After lock instruction being detected, described locking password is used described application program to be locked to be locked.
2. method according to claim 1, is characterized in that, before lock instruction being detected, described method also comprises:
Triggered by any one mode following and produce described lock instruction: start lock function switch, control described terminal closedown and control described terminal standby.
3. method according to claim 2, is characterized in that, after triggered the described lock instruction of generation by any one mode described, described method also comprises:
The lock flag position of each application program to be locked is set to lock-out state respectively, maybe the lock flag position of sharing of all application programs to be locked is set to lock-out state.
4. method as claimed in any of claims 1 to 3, is characterized in that, after described application program to be locked locks by the described locking password of use, described method also comprises:
If when detecting that any one locked application program is accessed, described locking password is verified;
If verify the success of described locking password, then any one locked application program described is unlocked successfully, or all locked application programs are unlocked successfully.
5. method according to claim 4, is characterized in that, after the described locking password success of checking, described method also comprises:
The lock flag position of any one locked application program described is set to released state, maybe the lock flag position of sharing of all locked application programs is set to released state.
6. method according to claim 1, is characterized in that, in the application program that terminal is installed, selected one or more application program to be locked comprises:
Display application program listing in described terminal, wherein, comprises all application programs that described terminal is installed in described the application list;
Using one or more application programs of choosing as described application program to be locked.
7. method according to claim 1, it is characterized in that, when described terminal is touch-screen, if the display icon place of any one application program senses predetermined touch operation in described touch-screen, then determine to sense that the application program of described predetermined touch operation is described application program to be locked, wherein, described predetermined touch operation comprises any one operation following: clicking operation, slide, drag operation.
8. method according to claim 1, is characterized in that, after described application program to be locked locks by the described locking password of use, described method also comprises:
By described application storage to be locked in restrict access list.
9. method according to claim 1, is characterized in that, selected one or more application program to be locked in the application program that terminal is installed, and before arranging locking password, described method also comprises:
After trigger pip lock function switch being detected, detect whether there is described locking password;
If detect to there is described locking password, then start described lock function switch, and enter after lock instruction being detected, use described locking password that described application program to be locked is entered line-locked step;
If detect to there is not described locking password, then described locking password is set, and after described locking password arranges successfully, starts described lock function switch.
10. method according to claim 4, is characterized in that, if when detecting that any one locked application program is accessed, before verifying described locking password, described method also comprises:
Whether the lock flag position detecting any one locked application program described is lock-out state, or whether the lock flag position of sharing of all locked application programs is lock-out state;
If the lock flag position any one locked application program described being detected is described lock-out state, or the lock flag position of sharing of all locked application programs is described lock-out state, then verify described locking password.
11. methods according to claim 4, is characterized in that, if verify the failure of described locking password, described method also comprises:
Again described locking password is verified, and record the authentication failed number of times of described locking password;
If described authentication failed number of times reaches predetermined threshold value, then generate information, wherein, described information unlocks unsuccessfully for characterizing any one locked application program described, or described all locked application programs unlock unsuccessfully.
12. methods according to claim 1, is characterized in that, after described application program to be locked locks by the described locking password of use, described method also comprises:
Described terminal in the process that any one application program of installing is deleted, judge whether to exist in restrict access list the application program with any one application matches described;
If there is the application program with any one application matches described in described restrict access list, then the described application program in described restrict access list is deleted.
The permission control device of 13. 1 kinds of application programs, is characterized in that, comprising:
Chosen module, selected one or more application program to be locked in the application program of installing in terminal, and locking password is set;
Locking module, for after lock instruction being detected, uses described locking password described application program to be locked to be locked.
14. devices according to claim 13, is characterized in that, described device also comprises:
Generation module, produces described lock instruction for being triggered by any one mode following: start lock function switch, control described terminal closedown and control described terminal standby.
15. devices according to claim 13, is characterized in that, described device also comprises:
First arranges module, for the lock flag position of each application program to be locked is set to lock-out state respectively, maybe the lock flag position of sharing of all application programs to be locked is set to lock-out state.
16. according to claim 13 to the device described in any one in 15, and it is characterized in that, described device also comprises:
First authentication module, if for detecting that any one locked application program is accessed time, described locking password is verified;
Unlocked state, if for verifying the success of described locking password, then unlock successfully any one locked application program described, or unlock successfully all locked application programs.
17. devices according to claim 16, is characterized in that, described device also comprises:
Second arranges module, for the lock flag position of any one locked application program described is set to released state, maybe the lock flag position of sharing of all locked application programs is set to released state.
18. devices according to claim 13, is characterized in that, described chosen module comprises:
Display sub-module, for display application program listing in described terminal, wherein, comprises all application programs that described terminal is installed in described the application list;
Process submodule, for the one or more application programs that will choose as described application program to be locked.
19. devices according to claim 13, is characterized in that, described device also comprises:
Memory module, for by described application storage to be locked in restrict access list.
20. devices according to claim 13, is characterized in that, described device also comprises:
First detection module, for after trigger pip lock function switch being detected, detects whether there is described locking password;
Start module, if there is described locking password for detecting, then start described lock function switch, and enter after lock instruction being detected, use described locking password that described application program to be locked is entered line-locked step;
3rd arranges module, if there is not described locking password for detecting, then arranges described locking password, and after described locking password arranges successfully, starts described lock function switch.
21. devices according to claim 16, is characterized in that, described device also comprises:
First detection module, for detecting whether the lock flag position of any one locked application program described is lock-out state, or whether the lock flag position of sharing of all locked application programs is lock-out state;
Second authentication module, if be described lock-out state for the lock flag position any one locked application program described being detected, or the lock flag position of sharing of all locked application programs is described lock-out state, then verify described locking password.
22. devices according to claim 13, is characterized in that, described device also comprises:
Judge module, in the process that any one application program for installing in described terminal is deleted, judges whether to exist in restrict access list the application program with any one application matches described;
Removing module, if for there is the application program with any one application matches described in described restrict access list, then deleted the described application program in described restrict access list.
CN201510996508.6A 2015-12-23 2015-12-23 Permission controlling method and device for application programs Pending CN105389484A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510996508.6A CN105389484A (en) 2015-12-23 2015-12-23 Permission controlling method and device for application programs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510996508.6A CN105389484A (en) 2015-12-23 2015-12-23 Permission controlling method and device for application programs

Publications (1)

Publication Number Publication Date
CN105389484A true CN105389484A (en) 2016-03-09

Family

ID=55421764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510996508.6A Pending CN105389484A (en) 2015-12-23 2015-12-23 Permission controlling method and device for application programs

Country Status (1)

Country Link
CN (1) CN105389484A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105892819A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 Method and device for locking application program
CN106055972A (en) * 2016-05-26 2016-10-26 广东欧珀移动通信有限公司 Control method and device of intelligent mobile and intelligent mobile
CN106055971A (en) * 2016-05-26 2016-10-26 广东欧珀移动通信有限公司 Anti-addiction method, device and mobile terminal
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106484465A (en) * 2016-09-19 2017-03-08 北京小米移动软件有限公司 Unlocking method and device
CN106503573A (en) * 2016-09-13 2017-03-15 北京小米移动软件有限公司 Cipher set-up method and device
CN106529264A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Application locking and unlocking method and apparatus
CN106778173A (en) * 2016-12-15 2017-05-31 北京数字天域科技有限责任公司 The method and device that a kind of application lock based on intelligent operating system is set
CN106775189A (en) * 2016-11-17 2017-05-31 上海斐讯数据通信技术有限公司 A kind of application program locks method and locking system
CN106778145A (en) * 2017-03-28 2017-05-31 罗肖 A kind of safety access control method and device of mobile terminal associated application
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device
CN106897608A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of authority processing method of application program, device and mobile terminal
WO2017140158A1 (en) * 2016-02-16 2017-08-24 上海斐讯数据通信技术有限公司 Method for app login protection and mobile terminal
CN108108607A (en) * 2017-12-27 2018-06-01 深圳豪客互联网有限公司 A kind of application program locking function open method and device
CN108171044A (en) * 2017-12-28 2018-06-15 深圳豪客互联网有限公司 A kind of permission automatic obtaining method and device
CN108616662A (en) * 2018-05-11 2018-10-02 Oppo(重庆)智能科技有限公司 application control method, electronic device and computer readable storage medium
CN110708605A (en) * 2019-10-09 2020-01-17 青岛海信电器股份有限公司 Parent lock control method of display equipment and display equipment
CN112015488A (en) * 2020-08-31 2020-12-01 中移(杭州)信息技术有限公司 Implementation method of special terminal, electronic equipment and storage medium
CN112534434A (en) * 2017-11-02 2021-03-19 松永力 Data management system and data management method
WO2022160081A1 (en) * 2021-01-26 2022-08-04 苏州思萃人工智能研究所有限公司 Mobile phone application program authorization control method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068425A (en) * 2007-06-29 2007-11-07 华为技术有限公司 Locking and unlocking method and device for mobile terminal local information
CN104267982A (en) * 2014-09-22 2015-01-07 捷开通讯科技(上海)有限公司 Application program start control system and method
CN104834865A (en) * 2015-04-30 2015-08-12 上海锐鸿通信技术有限公司 Method for setting access permission of mobile terminal and mobile terminal
CN104915111A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for operating and controlling terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068425A (en) * 2007-06-29 2007-11-07 华为技术有限公司 Locking and unlocking method and device for mobile terminal local information
CN104267982A (en) * 2014-09-22 2015-01-07 捷开通讯科技(上海)有限公司 Application program start control system and method
CN104834865A (en) * 2015-04-30 2015-08-12 上海锐鸿通信技术有限公司 Method for setting access permission of mobile terminal and mobile terminal
CN104915111A (en) * 2015-05-28 2015-09-16 努比亚技术有限公司 Method and device for operating and controlling terminal

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017140158A1 (en) * 2016-02-16 2017-08-24 上海斐讯数据通信技术有限公司 Method for app login protection and mobile terminal
CN105892819A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 Method and device for locking application program
CN106055972A (en) * 2016-05-26 2016-10-26 广东欧珀移动通信有限公司 Control method and device of intelligent mobile and intelligent mobile
CN106055971A (en) * 2016-05-26 2016-10-26 广东欧珀移动通信有限公司 Anti-addiction method, device and mobile terminal
CN106055972B (en) * 2016-05-26 2019-06-28 Oppo广东移动通信有限公司 A kind of control method of intelligent terminal, device and intelligent terminal
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106228085B (en) * 2016-07-27 2019-01-11 维沃移动通信有限公司 The method for secret protection and mobile terminal of application program
CN106503573A (en) * 2016-09-13 2017-03-15 北京小米移动软件有限公司 Cipher set-up method and device
CN106503573B (en) * 2016-09-13 2019-04-12 北京小米移动软件有限公司 Cipher set-up method and device
CN106484465A (en) * 2016-09-19 2017-03-08 北京小米移动软件有限公司 Unlocking method and device
CN106529264A (en) * 2016-10-19 2017-03-22 广东欧珀移动通信有限公司 Application locking and unlocking method and apparatus
CN106529264B (en) * 2016-10-19 2019-05-21 Oppo广东移动通信有限公司 Using locking and unlocking method and device
CN106775189A (en) * 2016-11-17 2017-05-31 上海斐讯数据通信技术有限公司 A kind of application program locks method and locking system
CN106778173B (en) * 2016-12-15 2021-02-23 北京数字天域科技有限责任公司 Method and device for setting application lock based on intelligent operating system
CN106778173A (en) * 2016-12-15 2017-05-31 北京数字天域科技有限责任公司 The method and device that a kind of application lock based on intelligent operating system is set
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device
CN106897608A (en) * 2017-01-19 2017-06-27 北京奇虎科技有限公司 A kind of authority processing method of application program, device and mobile terminal
CN106778145B (en) * 2017-03-28 2019-10-29 罗肖 A kind of safety access control method and device of mobile terminal associated application
CN106778145A (en) * 2017-03-28 2017-05-31 罗肖 A kind of safety access control method and device of mobile terminal associated application
CN112534434A (en) * 2017-11-02 2021-03-19 松永力 Data management system and data management method
CN108108607A (en) * 2017-12-27 2018-06-01 深圳豪客互联网有限公司 A kind of application program locking function open method and device
CN108171044A (en) * 2017-12-28 2018-06-15 深圳豪客互联网有限公司 A kind of permission automatic obtaining method and device
CN108616662A (en) * 2018-05-11 2018-10-02 Oppo(重庆)智能科技有限公司 application control method, electronic device and computer readable storage medium
CN110708605A (en) * 2019-10-09 2020-01-17 青岛海信电器股份有限公司 Parent lock control method of display equipment and display equipment
CN110708605B (en) * 2019-10-09 2022-06-28 海信视像科技股份有限公司 Parent lock control method for display equipment and display equipment
CN112015488A (en) * 2020-08-31 2020-12-01 中移(杭州)信息技术有限公司 Implementation method of special terminal, electronic equipment and storage medium
WO2022160081A1 (en) * 2021-01-26 2022-08-04 苏州思萃人工智能研究所有限公司 Mobile phone application program authorization control method

Similar Documents

Publication Publication Date Title
CN105389484A (en) Permission controlling method and device for application programs
US9264449B1 (en) Automatic privilege determination
US7302698B1 (en) Operation of trusted state in computing platform
WO2002087152A1 (en) Universal, customizable security system for computers and other devices
CN106127077B (en) A kind of method and terminal for protecting user privacy information
US11336599B2 (en) Architecture for performing action in a third-party service by an email client
US11811790B2 (en) Anti-phishing system
CN105094652A (en) Touch screen unlocking method and device, electronic equipment, display and mobile terminal
CN106648384A (en) Method and device for service calling
CN104954534A (en) Control method and control device for communication terminal, and corresponding communication terminal
RU2645265C2 (en) System and method of blocking elements of application interface
CN103824004A (en) Application program protection method and device
CN106022077A (en) Screen unlocking method and terminal
CN109815700A (en) Processing method and processing device, storage medium, the computer equipment of application program
CN104809373B (en) A kind of method of terminal unlocking
EP3528152A1 (en) Method and apparatus for user authentication
US20180012037A1 (en) Secure operation apparatuses and methods therefor
US9992327B1 (en) Interaction lock mode for mobile devices
CN111046356B (en) Content access method and device and computer readable storage medium
Mulliner et al. Hidden GEMs: automated discovery of access control vulnerabilities in graphical user interfaces
CN107391987A (en) Application guard method, device and electronic equipment based on living things feature recognition
CN104995635B (en) Picture sending method and device and terminal device
RU2748575C1 (en) Method and device for trusted computer booting with control of peripheral interfaces
CN111506893A (en) External equipment management method and device, electronic equipment and storage medium
CN105868600A (en) Terminal control method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160309