CN105631260B - The management method and managing device of background application - Google Patents

The management method and managing device of background application Download PDF

Info

Publication number
CN105631260B
CN105631260B CN201510334609.7A CN201510334609A CN105631260B CN 105631260 B CN105631260 B CN 105631260B CN 201510334609 A CN201510334609 A CN 201510334609A CN 105631260 B CN105631260 B CN 105631260B
Authority
CN
China
Prior art keywords
user
background application
memory space
background
receiving
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510334609.7A
Other languages
Chinese (zh)
Other versions
CN105631260A (en
Inventor
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Dongguan Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Coolpad Software Technology Co Ltd filed Critical Dongguan Coolpad Software Technology Co Ltd
Priority to CN201510334609.7A priority Critical patent/CN105631260B/en
Publication of CN105631260A publication Critical patent/CN105631260A/en
Application granted granted Critical
Publication of CN105631260B publication Critical patent/CN105631260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of management method of background application and devices, wherein the management method of the background application, including:Create the memory space that storage is encrypted for the background application to terminal;When receiving the instruction that user checks the background application in the memory space, the identity of the user is authenticated;If passing through to the identification authentication of the user, the user is allowed to check the background application in the memory space, otherwise, the user is forbidden to check the background application in the memory space.Technical scheme of the present invention, to carry out privacy protection to background application, can effectively prevent the privacy compromise of user by creating encrypted memory space, be conducive to the experience for promoting user.

Description

The management method and managing device of background application
Technical field
The present invention relates to field of terminal technology, in particular to the management method and one kind of a kind of background application The managing device of background application.
Background technology
Currently, smart mobile phone in the market largely has the management function of background application, i.e., answered in smart mobile phone It can be in running background with program, it is not necessary to open another application program, multithreading application again after terminating an application program The playability of mobile phone is considerably increased, while user also can be very clear to background application.
In the prior art, when some APP (Application, application program) that user opens are in running background, appoint Which application program the back-stage management interface that who can recall mobile phone has checked in running background, this is just easy to expose use The privacy at family greatly reduces the safety of private data, influences the usage experience of user.
Therefore, how by the management to background application, the privacy compromise of user is avoided, to improve user Experience become technical problem urgently to be resolved hurrily.
Invention content
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of manager of new background application Case can carry out privacy protection to background application, effectively prevent the privacy compromise of user, be conducive to the body for promoting user It tests.
In view of this, the present invention proposes a kind of management method of background application, including:It creates for terminal The memory space of storage is encrypted in background application;User is being received to the background application in the memory space When the instruction checked, the identity of the user is authenticated;If passing through to the identification authentication of the user, allow institute Otherwise stating the background application that user checks in the memory space forbids the user to check in the memory space Background application.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:It is empty that the storage is not stored in receiving to the terminal When the instruction that interior background application is managed, display is not stored in all background application journeys in the memory space Sequence;If receiving to any background application direction in all background applications for being not stored in the memory space Any background application is then stored in the memory space by the slide of first direction.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store In the display interface of all background applications in the memory space, which is slided towards first direction Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that further include:If receiving all in the memory space to being not stored in Any background application in background application then closes any background application towards the slide of second direction Program.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in In the display interface of all background applications in the memory space, by by the background application towards second direction Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:It is receiving to the background application in the memory space When the instruction being managed, all background applications in the memory space are shown;If receiving to the memory space Any background application in interior all background applications towards third direction slide, then by it is described it is any after Platform application program is removed out of described memory space;If receiving in all background applications in the memory space Any background application then closes any background application towards the slide of fourth direction.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space When, the display interface of all background applications that can be in memory space, by the background application towards third direction Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together When, the display interface of all background applications that can also be in memory space, by background application direction four directions It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the step of being authenticated to the identity of the user specifically includes:Acquisition institute The authentication information for stating user, judges whether the authentication information matches with pre-stored authentication feature, if so, determining to institute The identification authentication for stating user passes through;The authentication information includes following any one or more combination:The password input by user Information, the voiceprint of the user, the finger print information of the user, the user iris information.
In the technical scheme, by acquire user authentication information, judge authentication information whether with pre-stored authentication Feature matches, if so, determination passes through the identification authentication of user so that removes with anyone outdoor because identification authentication is obstructed It crosses, and can not check the background application of memory space, efficiently avoid the privacy compromise of user, to improve user's Experience.
According to the second aspect of the invention, it is also proposed that a kind of managing device of background application, including:It creates single Member creates the memory space that storage is encrypted for the background application to terminal;Authenticating unit, for receiving use When the instruction that the background application in the memory space is checked at family, the identity of the user is authenticated;The One processing unit, for the authenticating unit to the identification authentication of the user by when, allow the user to check described Otherwise background application in memory space forbids the user to check the background application in the memory space.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:First display unit, for receiving in the terminal When the instruction that the background application being not stored in the memory space is managed, display is not stored in the memory space Interior all background applications;Second processing unit, for receiving to being not stored in owning in the memory space Any background application in background application towards first direction slide when, by any background application journey Sequence is stored in the memory space.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store In the display interface of all background applications in the memory space, which is slided towards first direction Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the second processing unit is additionally operable to, described to being not stored in receiving Any background application in all background applications in memory space towards second direction slide when, close Any background application.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in In the display interface of all background applications in the memory space, by by the background application towards second direction Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:Second display unit, for receiving to storage sky When the instruction that interior background application is managed, all background applications in the memory space are shown;Third Processing unit, for receiving to any background application court in all background applications in the memory space To third direction slide when, any background application is removed out of described memory space, and for connecing Receive the sliding towards fourth direction to any background application in all background applications in the memory space When operation, any background application is closed.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space When, the display interface of all background applications that can be in memory space, by the background application towards third direction Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together When, the display interface of all background applications that can also be in memory space, by background application direction four directions It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the authenticating unit is specifically used for:The authentication information of the user is acquired, Judge whether the authentication information matches with pre-stored authentication feature, if so, determining the identification authentication to the user Pass through;The authentication information includes following any one or more combination:The encrypted message input by user, the user sound Line information, the finger print information of the user, the user iris information.
In the technical scheme, by acquire user authentication information, judge authentication information whether with pre-stored authentication Feature matches, if so, determination passes through the identification authentication of user so that removes with anyone outdoor because identification authentication is obstructed It crosses, and can not check the background application of memory space, efficiently avoid the privacy compromise of user, to improve user's Experience.
It, can be by creating encrypted memory space, with management backstage application program, effectively by above technical scheme The privacy compromise for avoiding user, to improve the experience of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the management method of background application according to an embodiment of the invention;
Fig. 2 shows the schematic block diagrams of the managing device of background application according to an embodiment of the invention;
Fig. 3 A to Fig. 3 E show the interface signal of the management method of background application according to an embodiment of the invention Figure.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the management method of background application according to an embodiment of the invention.
As shown in Figure 1, the management method of background application according to an embodiment of the invention, including:Step 102, create the memory space that storage is encrypted for the background application to terminal;Step 104, user couple is being received When the instruction that the background application in the memory space is checked, the identity of the user is authenticated;Step 106, if passing through to the identification authentication of the user, the user is allowed to check the background application journey in the memory space Otherwise sequence forbids the user to check the background application in the memory space.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:It is empty that the storage is not stored in receiving to the terminal When the instruction that interior background application is managed, display is not stored in all background application journeys in the memory space Sequence;If receiving to any background application direction in all background applications for being not stored in the memory space Any background application is then stored in the memory space by the slide of first direction.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store In the display interface of all background applications in the memory space, which is slided towards first direction Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that further include:If receiving all in the memory space to being not stored in Any background application in background application then closes any background application towards the slide of second direction Program.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in In the display interface of all background applications in the memory space, by by the background application towards second direction Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:It is receiving to the background application in the memory space When the instruction being managed, all background applications in the memory space are shown;If receiving to the memory space Any background application in interior all background applications towards third direction slide, then by it is described it is any after Platform application program is removed out of described memory space;If receiving in all background applications in the memory space Any background application then closes any background application towards the slide of fourth direction.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space When, the display interface of all background applications that can be in memory space, by the background application towards third direction Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together When, the display interface of all background applications that can also be in memory space, by background application direction four directions It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the step of being authenticated to the identity of the user specifically includes:Acquisition institute The authentication information for stating user, judges whether the authentication information matches with pre-stored authentication feature, if so, determining to institute The identification authentication for stating user passes through;The authentication information includes following any one or more combination:The password input by user Information, the voiceprint of the user, the finger print information of the user, the user iris information.
By the authentication information of acquisition user, judge whether authentication information matches with pre-stored authentication feature, if so, Then determination passes through the identification authentication of user so that except, because identification authentication is not passed through, and can not being checked and be deposited with anyone outdoor The background application for storing up space, efficiently avoids the privacy compromise of user, to improve the experience of user.
Fig. 2 shows the schematic block diagrams of the managing device of background application according to an embodiment of the invention.
As shown in Fig. 2, the managing device 200 of background application according to an embodiment of the invention, including:It creates Unit 202 creates the memory space that storage is encrypted for the background application to terminal;Authenticating unit 204 is used for When receiving the instruction that user checks the background application in the memory space, the identity of the user is carried out Authentication;First processing units 206, for the authenticating unit 204 to the identification authentication of the user by when, described in permission User checks the background application in the memory space, otherwise, after forbidding the user to check in the memory space Platform application program.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:First display unit 208, for receiving to the terminal In the background application that is not stored in the memory space be managed instruction when, display is not stored in the storage sky Interior all background applications;Second processing unit 210, for receiving to being not stored in the memory space Any background application in all background applications towards first direction slide when, any backstage is answered It is stored in the memory space with program.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store In the display interface of all background applications in the memory space, which is slided towards first direction Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the second processing unit 210 is additionally operable to, and is being received to being not stored in Any background application in all background applications in the memory space towards second direction slide when, Close any background application.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in In the display interface of all background applications in the memory space, by by the background application towards second direction Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:Second display unit 212, for receiving to the storage When the instruction that the background application in space is managed, all background applications in the memory space are shown;The Three processing units 214, for receiving to any background application in all background applications in the memory space Program towards third direction slide when, any background application is removed out of described memory space, is used in combination In receiving to any background application in all background applications in the memory space towards fourth direction Slide when, close any background application.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space When, the display interface of all background applications that can be in memory space, by the background application towards third direction Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together When, the display interface of all background applications that can also be in memory space, by background application direction four directions It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the authenticating unit 204 is specifically used for:Acquire the authentication letter of the user Breath, judges whether the authentication information matches with pre-stored authentication feature, reflects to the identity of the user if so, determining Power passes through;The authentication information includes following any one or more combination:The encrypted message input by user, the user Voiceprint, the finger print information of the user, the user iris information.
By the authentication information of acquisition user, judge whether authentication information matches with pre-stored authentication feature, if so, Then determination passes through the identification authentication of user so that except, because identification authentication is not passed through, and can not being checked and be deposited with anyone outdoor The background application for storing up space, efficiently avoids the privacy compromise of user, to improve the experience of user.
Technical scheme of the present invention is further described below in conjunction with Fig. 3 A to Fig. 3 E:
As shown in Figure 3A, when the Home key of user's long-press terminal (can certainly be other buttons), after terminal be shown " newly-built secret background folder " button 2 can be arranged in the lower left corner at back-stage management interface in platform administration interface;Such as Fig. 3 B A secret background folder interface will be created after shown click, and some background applications can be put into secret In background folder.
As shown in Figure 3 C, it after secret background folder creates successfully, when checking secret background folder, will pop up The interface of input password is needed, and only input correct password to enter secret background mode, i.e., only inputted correct Password could show secret background folder in background application.
As shown in Figure 3D, when long-press Home key enters background process administration interface, one among lower section can be clicked Key removes button 5 and removes background process, while can also individually be managed, and specifically, such as works as and answers the backstage being currently running With when sliding to the right (sliding of finger 6 in such as Fig. 3 D), this application can be removed from backstage;When background application is slided to the left This background application can be added to secret backstage, that is, only enter secret backstage mould by (sliding of finger 7 in such as Fig. 3 D) It is just shown when formula, but is still extension running background.
As shown in FIGURE 3 E, when showing the background application in secret background folder, the backstage being currently running can be answered With sliding to the right (sliding of finger 8 in such as Fig. 3 E) is applied to remove this;And (hand in such as Fig. 3 E when sliding background application to the left Refer to 9 sliding), this application can be removed to conventional backstage from secret background mode, that is, be not necessarily to enter secret background folder It can be checked.
In the technical solution of above-described embodiment, by creating secret background folder, the backstage that can will be currently running Using be moved to secret background folder in, while without terminate background application, and be arranged password with to user carry out identity Certification efficiently avoids the privacy compromise of user, to improve the experience of user.
Those skilled in the art is it is to be appreciated that in the embodiment shown in Fig. 3 A to Fig. 3 E, only to check secret Background needs to be illustrated for input password when pressing from both sides, and passes through the modes such as Application on Voiceprint Recognition, fingerprint recognition, iris recognition The authentication of progress is also within protection scope of the present invention;Meanwhile glide direction shown in Fig. 3 A to Fig. 3 E is corresponding Operation can also be adjusted according to actual needs.
Technical scheme of the present invention is described in detail above in association with attached drawing, the present invention proposes a kind of new background application journey The Managed Solution of sequence can carry out privacy protection to background application, effectively prevent the privacy compromise of user, be conducive to carry Rise the experience of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair Change, equivalent replacement, improvement etc., should be included within the scope of the present invention.

Claims (8)

1. a kind of management method of background application, which is characterized in that including:
Create the memory space that storage is encrypted for the background application to terminal;
When receiving the instruction that user checks the background application in the memory space, to the body of the user Part is authenticated;
If passing through to the identification authentication of the user, the user is allowed to check the background application journey in the memory space Otherwise sequence forbids the user to check the background application in the memory space;
In the instruction that the background application being not stored in the memory space in receiving to the terminal is managed, Display is not stored in all background applications in the memory space;
If receiving to any background application court in all background applications for being not stored in the memory space To the slide of first direction, then any background application is stored in the memory space.
2. the management method of background application according to claim 1, which is characterized in that further include:
If receiving to any background application court in all background applications for being not stored in the memory space To the slide of second direction, then any background application is closed.
3. the management method of background application according to claim 1, which is characterized in that further include:
When receiving the instruction being managed to the background application in the memory space, show in the memory space All background applications;
If receiving to any background application in all background applications in the memory space towards third party To slide, then any background application is removed out of described memory space;
If receiving to any background application direction four directions in all background applications in the memory space To slide, then close any background application.
4. the management method of background application according to any one of claim 1 to 3, which is characterized in that described The step of identity of user authenticates specifically includes:
The authentication information for acquiring the user, judges whether the authentication information matches with pre-stored authentication feature, if so, Then determination passes through the identification authentication of the user;
The authentication information includes following any one or more combination:The encrypted message input by user, the user sound Line information, the finger print information of the user, the user iris information.
5. a kind of managing device of background application, which is characterized in that including:
Creating unit creates the memory space that storage is encrypted for the background application to terminal;
Authenticating unit, for when receiving the instruction that user checks the background application in the memory space, The identity of the user is authenticated;
First processing units, for the authenticating unit to the identification authentication of the user by when, allow the user to look into It sees the background application in the memory space, otherwise, the user is forbidden to check the background application in the memory space Program;
First display unit, the background application for being not stored in receiving to the terminal in the memory space When the instruction being managed, display is not stored in all background applications in the memory space;
Second processing unit, for appointing in receiving to all background applications for being not stored in the memory space One background application towards first direction slide when, any background application is stored in the memory space It is interior.
6. the managing device of background application according to claim 5, which is characterized in that the second processing unit is also For any background application court in receiving to all background applications for being not stored in the memory space To second direction slide when, close any background application.
7. the managing device of background application according to claim 5, which is characterized in that further include:
Second display unit, for when receiving the instruction being managed to the background application in the memory space, Show all background applications in the memory space;
Third processing unit, for answering any backstage in all background applications in the memory space receiving With program towards third direction slide when, any background application is removed out of described memory space, and For receiving to any background application direction four directions in all background applications in the memory space To slide when, close any background application.
8. the managing device of background application according to any one of claims 5 to 7, which is characterized in that the mirror Power unit is specifically used for:
The authentication information for acquiring the user, judges whether the authentication information matches with pre-stored authentication feature, if so, Then determination passes through the identification authentication of the user;
The authentication information includes following any one or more combination:The encrypted message input by user, the user sound Line information, the finger print information of the user, the user iris information.
CN201510334609.7A 2015-06-16 2015-06-16 The management method and managing device of background application Active CN105631260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510334609.7A CN105631260B (en) 2015-06-16 2015-06-16 The management method and managing device of background application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510334609.7A CN105631260B (en) 2015-06-16 2015-06-16 The management method and managing device of background application

Publications (2)

Publication Number Publication Date
CN105631260A CN105631260A (en) 2016-06-01
CN105631260B true CN105631260B (en) 2018-08-24

Family

ID=56046188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510334609.7A Active CN105631260B (en) 2015-06-16 2015-06-16 The management method and managing device of background application

Country Status (1)

Country Link
CN (1) CN105631260B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103577237A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Application program starting control method and device
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103825999A (en) * 2012-11-19 2014-05-28 腾讯科技(深圳)有限公司 Application program function display method and device
CN103077341A (en) * 2013-01-30 2013-05-01 广东欧珀移动通信有限公司 Application program unlocking method and device
CN103577237A (en) * 2013-11-15 2014-02-12 北京奇虎科技有限公司 Application program starting control method and device

Also Published As

Publication number Publication date
CN105631260A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
RU2718226C2 (en) Biometric data safe handling systems and methods
US8943326B2 (en) Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
EP3163483A1 (en) Mobile terminal user mode starting method and system based on iris identification
CN105207900B (en) A kind of private information transmission method based on immediate communication platform
WO2016114841A1 (en) A multi-user strong authentication token
CN105894616A (en) Access Management System And Method
US20150278495A1 (en) Fingerprint password
CN102710847A (en) Method for managing access of multiple visitors to mobile terminal
CN105528306B (en) A kind of data read-write method and dual system termi-nal of dual system termi-nal
US9792421B1 (en) Secure storage of fingerprint related elements
CN108806041A (en) Building access control method, Cloud Server and computer readable storage medium
JP7023139B2 (en) Unlocking system, unlocking device, unlocking method, terminal device and program
CN105809007A (en) Privacy protection method and device
CN106055941A (en) Terminal method and apparatus
CN105989269A (en) Unlocking method and device and multi-system terminal
CN105701386A (en) Security certification method and device
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
AU2013205126A1 (en) Facial recognition streamlined login
WO2016112712A1 (en) Secure access method, apparatus, and terminal, storage medium
CN105912895A (en) Operation limiting method and system for intelligent terminal
CN105631260B (en) The management method and managing device of background application
CN105072084B (en) The method for building up of mobile terminal and external equipment data connection
WO2018006349A1 (en) Method and system for verifying user entry based on picture password
US10440017B2 (en) Secure health data storage and transaction system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231207

Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong

Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd.

Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province

Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd.

TR01 Transfer of patent right