CN105631260B - The management method and managing device of background application - Google Patents
The management method and managing device of background application Download PDFInfo
- Publication number
- CN105631260B CN105631260B CN201510334609.7A CN201510334609A CN105631260B CN 105631260 B CN105631260 B CN 105631260B CN 201510334609 A CN201510334609 A CN 201510334609A CN 105631260 B CN105631260 B CN 105631260B
- Authority
- CN
- China
- Prior art keywords
- user
- background application
- memory space
- background
- receiving
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000007726 management method Methods 0.000 title claims abstract description 23
- 230000001737 promoting effect Effects 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention provides a kind of management method of background application and devices, wherein the management method of the background application, including:Create the memory space that storage is encrypted for the background application to terminal;When receiving the instruction that user checks the background application in the memory space, the identity of the user is authenticated;If passing through to the identification authentication of the user, the user is allowed to check the background application in the memory space, otherwise, the user is forbidden to check the background application in the memory space.Technical scheme of the present invention, to carry out privacy protection to background application, can effectively prevent the privacy compromise of user by creating encrypted memory space, be conducive to the experience for promoting user.
Description
Technical field
The present invention relates to field of terminal technology, in particular to the management method and one kind of a kind of background application
The managing device of background application.
Background technology
Currently, smart mobile phone in the market largely has the management function of background application, i.e., answered in smart mobile phone
It can be in running background with program, it is not necessary to open another application program, multithreading application again after terminating an application program
The playability of mobile phone is considerably increased, while user also can be very clear to background application.
In the prior art, when some APP (Application, application program) that user opens are in running background, appoint
Which application program the back-stage management interface that who can recall mobile phone has checked in running background, this is just easy to expose use
The privacy at family greatly reduces the safety of private data, influences the usage experience of user.
Therefore, how by the management to background application, the privacy compromise of user is avoided, to improve user
Experience become technical problem urgently to be resolved hurrily.
Invention content
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of manager of new background application
Case can carry out privacy protection to background application, effectively prevent the privacy compromise of user, be conducive to the body for promoting user
It tests.
In view of this, the present invention proposes a kind of management method of background application, including:It creates for terminal
The memory space of storage is encrypted in background application;User is being received to the background application in the memory space
When the instruction checked, the identity of the user is authenticated;If passing through to the identification authentication of the user, allow institute
Otherwise stating the background application that user checks in the memory space forbids the user to check in the memory space
Background application.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating
Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user
Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit
Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal
It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user
Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:It is empty that the storage is not stored in receiving to the terminal
When the instruction that interior background application is managed, display is not stored in all background application journeys in the memory space
Sequence;If receiving to any background application direction in all background applications for being not stored in the memory space
Any background application is then stored in the memory space by the slide of first direction.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store
In the display interface of all background applications in the memory space, which is slided towards first direction
Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to
Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that further include:If receiving all in the memory space to being not stored in
Any background application in background application then closes any background application towards the slide of second direction
Program.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in
In the display interface of all background applications in the memory space, by by the background application towards second direction
Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can
It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:It is receiving to the background application in the memory space
When the instruction being managed, all background applications in the memory space are shown;If receiving to the memory space
Any background application in interior all background applications towards third direction slide, then by it is described it is any after
Platform application program is removed out of described memory space;If receiving in all background applications in the memory space
Any background application then closes any background application towards the slide of fourth direction.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space
When, the display interface of all background applications that can be in memory space, by the background application towards third direction
Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together
When, the display interface of all background applications that can also be in memory space, by background application direction four directions
It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third
Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions
To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the step of being authenticated to the identity of the user specifically includes:Acquisition institute
The authentication information for stating user, judges whether the authentication information matches with pre-stored authentication feature, if so, determining to institute
The identification authentication for stating user passes through;The authentication information includes following any one or more combination:The password input by user
Information, the voiceprint of the user, the finger print information of the user, the user iris information.
In the technical scheme, by acquire user authentication information, judge authentication information whether with pre-stored authentication
Feature matches, if so, determination passes through the identification authentication of user so that removes with anyone outdoor because identification authentication is obstructed
It crosses, and can not check the background application of memory space, efficiently avoid the privacy compromise of user, to improve user's
Experience.
According to the second aspect of the invention, it is also proposed that a kind of managing device of background application, including:It creates single
Member creates the memory space that storage is encrypted for the background application to terminal;Authenticating unit, for receiving use
When the instruction that the background application in the memory space is checked at family, the identity of the user is authenticated;The
One processing unit, for the authenticating unit to the identification authentication of the user by when, allow the user to check described
Otherwise background application in memory space forbids the user to check the background application in the memory space.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating
Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user
Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit
Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal
It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user
Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:First display unit, for receiving in the terminal
When the instruction that the background application being not stored in the memory space is managed, display is not stored in the memory space
Interior all background applications;Second processing unit, for receiving to being not stored in owning in the memory space
Any background application in background application towards first direction slide when, by any background application journey
Sequence is stored in the memory space.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store
In the display interface of all background applications in the memory space, which is slided towards first direction
Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to
Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the second processing unit is additionally operable to, described to being not stored in receiving
Any background application in all background applications in memory space towards second direction slide when, close
Any background application.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in
In the display interface of all background applications in the memory space, by by the background application towards second direction
Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can
It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:Second display unit, for receiving to storage sky
When the instruction that interior background application is managed, all background applications in the memory space are shown;Third
Processing unit, for receiving to any background application court in all background applications in the memory space
To third direction slide when, any background application is removed out of described memory space, and for connecing
Receive the sliding towards fourth direction to any background application in all background applications in the memory space
When operation, any background application is closed.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space
When, the display interface of all background applications that can be in memory space, by the background application towards third direction
Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together
When, the display interface of all background applications that can also be in memory space, by background application direction four directions
It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third
Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions
To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the authenticating unit is specifically used for:The authentication information of the user is acquired,
Judge whether the authentication information matches with pre-stored authentication feature, if so, determining the identification authentication to the user
Pass through;The authentication information includes following any one or more combination:The encrypted message input by user, the user sound
Line information, the finger print information of the user, the user iris information.
In the technical scheme, by acquire user authentication information, judge authentication information whether with pre-stored authentication
Feature matches, if so, determination passes through the identification authentication of user so that removes with anyone outdoor because identification authentication is obstructed
It crosses, and can not check the background application of memory space, efficiently avoid the privacy compromise of user, to improve user's
Experience.
It, can be by creating encrypted memory space, with management backstage application program, effectively by above technical scheme
The privacy compromise for avoiding user, to improve the experience of user.
Description of the drawings
Fig. 1 shows the schematic flow diagram of the management method of background application according to an embodiment of the invention;
Fig. 2 shows the schematic block diagrams of the managing device of background application according to an embodiment of the invention;
Fig. 3 A to Fig. 3 E show the interface signal of the management method of background application according to an embodiment of the invention
Figure.
Specific implementation mode
To better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real
Mode is applied the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application
Feature in example and embodiment can be combined with each other.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be implemented different from other modes described here using other, therefore, protection scope of the present invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the management method of background application according to an embodiment of the invention.
As shown in Figure 1, the management method of background application according to an embodiment of the invention, including:Step
102, create the memory space that storage is encrypted for the background application to terminal;Step 104, user couple is being received
When the instruction that the background application in the memory space is checked, the identity of the user is authenticated;Step
106, if passing through to the identification authentication of the user, the user is allowed to check the background application journey in the memory space
Otherwise sequence forbids the user to check the background application in the memory space.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating
Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user
Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit
Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal
It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user
Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:It is empty that the storage is not stored in receiving to the terminal
When the instruction that interior background application is managed, display is not stored in all background application journeys in the memory space
Sequence;If receiving to any background application direction in all background applications for being not stored in the memory space
Any background application is then stored in the memory space by the slide of first direction.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store
In the display interface of all background applications in the memory space, which is slided towards first direction
Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to
Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that further include:If receiving all in the memory space to being not stored in
Any background application in background application then closes any background application towards the slide of second direction
Program.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in
In the display interface of all background applications in the memory space, by by the background application towards second direction
Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can
It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:It is receiving to the background application in the memory space
When the instruction being managed, all background applications in the memory space are shown;If receiving to the memory space
Any background application in interior all background applications towards third direction slide, then by it is described it is any after
Platform application program is removed out of described memory space;If receiving in all background applications in the memory space
Any background application then closes any background application towards the slide of fourth direction.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space
When, the display interface of all background applications that can be in memory space, by the background application towards third direction
Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together
When, the display interface of all background applications that can also be in memory space, by background application direction four directions
It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third
Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions
To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the step of being authenticated to the identity of the user specifically includes:Acquisition institute
The authentication information for stating user, judges whether the authentication information matches with pre-stored authentication feature, if so, determining to institute
The identification authentication for stating user passes through;The authentication information includes following any one or more combination:The password input by user
Information, the voiceprint of the user, the finger print information of the user, the user iris information.
By the authentication information of acquisition user, judge whether authentication information matches with pre-stored authentication feature, if so,
Then determination passes through the identification authentication of user so that except, because identification authentication is not passed through, and can not being checked and be deposited with anyone outdoor
The background application for storing up space, efficiently avoids the privacy compromise of user, to improve the experience of user.
Fig. 2 shows the schematic block diagrams of the managing device of background application according to an embodiment of the invention.
As shown in Fig. 2, the managing device 200 of background application according to an embodiment of the invention, including:It creates
Unit 202 creates the memory space that storage is encrypted for the background application to terminal;Authenticating unit 204 is used for
When receiving the instruction that user checks the background application in the memory space, the identity of the user is carried out
Authentication;First processing units 206, for the authenticating unit 204 to the identification authentication of the user by when, described in permission
User checks the background application in the memory space, otherwise, after forbidding the user to check in the memory space
Platform application program.
In the technical scheme, the storage sky of storage is encrypted for the background application to terminal by creating
Between, when receiving the instruction that user checks the background application in memory space, to be carried out to the identity of user
Authentication, and to the identification authentication of user by when, allow user to check the background application in memory space, otherwise, prohibit
Only user checks the background application in memory space so that in addition to the validated user (user that i.e. the authentication is passed) of terminal
It is any the background application in memory space directly to be viewed by back-stage management interface per capita, effectively prevent user
Privacy compromise, ensure that the information security of user, be conducive to promoted user usage experience.
In the above-mentioned technical solutions, it is preferable that further include:First display unit 208, for receiving to the terminal
In the background application that is not stored in the memory space be managed instruction when, display is not stored in the storage sky
Interior all background applications;Second processing unit 210, for receiving to being not stored in the memory space
Any background application in all background applications towards first direction slide when, any backstage is answered
It is stored in the memory space with program.
In the technical scheme, it when user is not intended to a certain background application to be seen by others, can not store
In the display interface of all background applications in the memory space, which is slided towards first direction
Dynamic, to be stored in the memory space, operating process is easy, while also efficiently avoiding the privacy compromise of user, is conducive to
Promote the experience of user.Wherein, first direction can be either direction, can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the second processing unit 210 is additionally operable to, and is being received to being not stored in
Any background application in all background applications in the memory space towards second direction slide when,
Close any background application.
In the technical scheme, it when user, which determines, does not need certain application program in running background, can be not stored in
In the display interface of all background applications in the memory space, by by the background application towards second direction
Sliding, so that it may it is easy to operate to close the program, simultaneously effective reduce the operating load of terminal.Wherein, second direction can
It, can also be according to the self-defined setting of user's use habit to be the either direction in addition to first direction.
In the above-mentioned technical solutions, it is preferable that further include:Second display unit 212, for receiving to the storage
When the instruction that the background application in space is managed, all background applications in the memory space are shown;The
Three processing units 214, for receiving to any background application in all background applications in the memory space
Program towards third direction slide when, any background application is removed out of described memory space, is used in combination
In receiving to any background application in all background applications in the memory space towards fourth direction
Slide when, close any background application.
In the technical scheme, when user determines without continuing to maintain secrecy to a certain background application in memory space
When, the display interface of all background applications that can be in memory space, by the background application towards third direction
Sliding, which is removed out of memory space, easy to operate, and reduces the occupancy to memory space;Together
When, the display interface of all background applications that can also be in memory space, by background application direction four directions
It is easy to operate to close the background application to sliding, simultaneously effective reduce the operating load of terminal.Wherein, third
Direction can be either direction, and fourth direction can be the either direction in addition to third direction, certainly, third direction and four directions
To can also be according to the self-defined setting of user's use habit.
In the above-mentioned technical solutions, it is preferable that the authenticating unit 204 is specifically used for:Acquire the authentication letter of the user
Breath, judges whether the authentication information matches with pre-stored authentication feature, reflects to the identity of the user if so, determining
Power passes through;The authentication information includes following any one or more combination:The encrypted message input by user, the user
Voiceprint, the finger print information of the user, the user iris information.
By the authentication information of acquisition user, judge whether authentication information matches with pre-stored authentication feature, if so,
Then determination passes through the identification authentication of user so that except, because identification authentication is not passed through, and can not being checked and be deposited with anyone outdoor
The background application for storing up space, efficiently avoids the privacy compromise of user, to improve the experience of user.
Technical scheme of the present invention is further described below in conjunction with Fig. 3 A to Fig. 3 E:
As shown in Figure 3A, when the Home key of user's long-press terminal (can certainly be other buttons), after terminal be shown
" newly-built secret background folder " button 2 can be arranged in the lower left corner at back-stage management interface in platform administration interface;Such as Fig. 3 B
A secret background folder interface will be created after shown click, and some background applications can be put into secret
In background folder.
As shown in Figure 3 C, it after secret background folder creates successfully, when checking secret background folder, will pop up
The interface of input password is needed, and only input correct password to enter secret background mode, i.e., only inputted correct
Password could show secret background folder in background application.
As shown in Figure 3D, when long-press Home key enters background process administration interface, one among lower section can be clicked
Key removes button 5 and removes background process, while can also individually be managed, and specifically, such as works as and answers the backstage being currently running
With when sliding to the right (sliding of finger 6 in such as Fig. 3 D), this application can be removed from backstage;When background application is slided to the left
This background application can be added to secret backstage, that is, only enter secret backstage mould by (sliding of finger 7 in such as Fig. 3 D)
It is just shown when formula, but is still extension running background.
As shown in FIGURE 3 E, when showing the background application in secret background folder, the backstage being currently running can be answered
With sliding to the right (sliding of finger 8 in such as Fig. 3 E) is applied to remove this;And (hand in such as Fig. 3 E when sliding background application to the left
Refer to 9 sliding), this application can be removed to conventional backstage from secret background mode, that is, be not necessarily to enter secret background folder
It can be checked.
In the technical solution of above-described embodiment, by creating secret background folder, the backstage that can will be currently running
Using be moved to secret background folder in, while without terminate background application, and be arranged password with to user carry out identity
Certification efficiently avoids the privacy compromise of user, to improve the experience of user.
Those skilled in the art is it is to be appreciated that in the embodiment shown in Fig. 3 A to Fig. 3 E, only to check secret
Background needs to be illustrated for input password when pressing from both sides, and passes through the modes such as Application on Voiceprint Recognition, fingerprint recognition, iris recognition
The authentication of progress is also within protection scope of the present invention;Meanwhile glide direction shown in Fig. 3 A to Fig. 3 E is corresponding
Operation can also be adjusted according to actual needs.
Technical scheme of the present invention is described in detail above in association with attached drawing, the present invention proposes a kind of new background application journey
The Managed Solution of sequence can carry out privacy protection to background application, effectively prevent the privacy compromise of user, be conducive to carry
Rise the experience of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, any made by repair
Change, equivalent replacement, improvement etc., should be included within the scope of the present invention.
Claims (8)
1. a kind of management method of background application, which is characterized in that including:
Create the memory space that storage is encrypted for the background application to terminal;
When receiving the instruction that user checks the background application in the memory space, to the body of the user
Part is authenticated;
If passing through to the identification authentication of the user, the user is allowed to check the background application journey in the memory space
Otherwise sequence forbids the user to check the background application in the memory space;
In the instruction that the background application being not stored in the memory space in receiving to the terminal is managed,
Display is not stored in all background applications in the memory space;
If receiving to any background application court in all background applications for being not stored in the memory space
To the slide of first direction, then any background application is stored in the memory space.
2. the management method of background application according to claim 1, which is characterized in that further include:
If receiving to any background application court in all background applications for being not stored in the memory space
To the slide of second direction, then any background application is closed.
3. the management method of background application according to claim 1, which is characterized in that further include:
When receiving the instruction being managed to the background application in the memory space, show in the memory space
All background applications;
If receiving to any background application in all background applications in the memory space towards third party
To slide, then any background application is removed out of described memory space;
If receiving to any background application direction four directions in all background applications in the memory space
To slide, then close any background application.
4. the management method of background application according to any one of claim 1 to 3, which is characterized in that described
The step of identity of user authenticates specifically includes:
The authentication information for acquiring the user, judges whether the authentication information matches with pre-stored authentication feature, if so,
Then determination passes through the identification authentication of the user;
The authentication information includes following any one or more combination:The encrypted message input by user, the user sound
Line information, the finger print information of the user, the user iris information.
5. a kind of managing device of background application, which is characterized in that including:
Creating unit creates the memory space that storage is encrypted for the background application to terminal;
Authenticating unit, for when receiving the instruction that user checks the background application in the memory space,
The identity of the user is authenticated;
First processing units, for the authenticating unit to the identification authentication of the user by when, allow the user to look into
It sees the background application in the memory space, otherwise, the user is forbidden to check the background application in the memory space
Program;
First display unit, the background application for being not stored in receiving to the terminal in the memory space
When the instruction being managed, display is not stored in all background applications in the memory space;
Second processing unit, for appointing in receiving to all background applications for being not stored in the memory space
One background application towards first direction slide when, any background application is stored in the memory space
It is interior.
6. the managing device of background application according to claim 5, which is characterized in that the second processing unit is also
For any background application court in receiving to all background applications for being not stored in the memory space
To second direction slide when, close any background application.
7. the managing device of background application according to claim 5, which is characterized in that further include:
Second display unit, for when receiving the instruction being managed to the background application in the memory space,
Show all background applications in the memory space;
Third processing unit, for answering any backstage in all background applications in the memory space receiving
With program towards third direction slide when, any background application is removed out of described memory space, and
For receiving to any background application direction four directions in all background applications in the memory space
To slide when, close any background application.
8. the managing device of background application according to any one of claims 5 to 7, which is characterized in that the mirror
Power unit is specifically used for:
The authentication information for acquiring the user, judges whether the authentication information matches with pre-stored authentication feature, if so,
Then determination passes through the identification authentication of the user;
The authentication information includes following any one or more combination:The encrypted message input by user, the user sound
Line information, the finger print information of the user, the user iris information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510334609.7A CN105631260B (en) | 2015-06-16 | 2015-06-16 | The management method and managing device of background application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510334609.7A CN105631260B (en) | 2015-06-16 | 2015-06-16 | The management method and managing device of background application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105631260A CN105631260A (en) | 2016-06-01 |
CN105631260B true CN105631260B (en) | 2018-08-24 |
Family
ID=56046188
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510334609.7A Active CN105631260B (en) | 2015-06-16 | 2015-06-16 | The management method and managing device of background application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105631260B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103077341A (en) * | 2013-01-30 | 2013-05-01 | 广东欧珀移动通信有限公司 | Application program unlocking method and device |
CN103577237A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Application program starting control method and device |
CN103825999A (en) * | 2012-11-19 | 2014-05-28 | 腾讯科技(深圳)有限公司 | Application program function display method and device |
-
2015
- 2015-06-16 CN CN201510334609.7A patent/CN105631260B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103825999A (en) * | 2012-11-19 | 2014-05-28 | 腾讯科技(深圳)有限公司 | Application program function display method and device |
CN103077341A (en) * | 2013-01-30 | 2013-05-01 | 广东欧珀移动通信有限公司 | Application program unlocking method and device |
CN103577237A (en) * | 2013-11-15 | 2014-02-12 | 北京奇虎科技有限公司 | Application program starting control method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105631260A (en) | 2016-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
RU2718226C2 (en) | Biometric data safe handling systems and methods | |
US8943326B2 (en) | Systems and methods for accessing a tamperproof storage device in a wireless communication device using biometric data | |
CN111835689B (en) | Identity authentication method of digital key, terminal device and medium | |
EP3163483A1 (en) | Mobile terminal user mode starting method and system based on iris identification | |
CN105207900B (en) | A kind of private information transmission method based on immediate communication platform | |
WO2016114841A1 (en) | A multi-user strong authentication token | |
CN105894616A (en) | Access Management System And Method | |
US20150278495A1 (en) | Fingerprint password | |
CN102710847A (en) | Method for managing access of multiple visitors to mobile terminal | |
CN105528306B (en) | A kind of data read-write method and dual system termi-nal of dual system termi-nal | |
US9792421B1 (en) | Secure storage of fingerprint related elements | |
CN108806041A (en) | Building access control method, Cloud Server and computer readable storage medium | |
JP7023139B2 (en) | Unlocking system, unlocking device, unlocking method, terminal device and program | |
CN105809007A (en) | Privacy protection method and device | |
CN106055941A (en) | Terminal method and apparatus | |
CN105989269A (en) | Unlocking method and device and multi-system terminal | |
CN105701386A (en) | Security certification method and device | |
WO2016119341A1 (en) | Method and device for implementing multi-user login mode, and computer storage medium | |
AU2013205126A1 (en) | Facial recognition streamlined login | |
WO2016112712A1 (en) | Secure access method, apparatus, and terminal, storage medium | |
CN105912895A (en) | Operation limiting method and system for intelligent terminal | |
CN105631260B (en) | The management method and managing device of background application | |
CN105072084B (en) | The method for building up of mobile terminal and external equipment data connection | |
WO2018006349A1 (en) | Method and system for verifying user entry based on picture password | |
US10440017B2 (en) | Secure health data storage and transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20231207 Address after: 518000 floor 21, block a, Kupai building, intersection of Keyuan Avenue and Baoshen Road, north high tech Zone, songpingshan community, Xili street, Nanshan District, Shenzhen, Guangdong Patentee after: YULONG COMPUTER TELECOMMUNICATION SCIENTIFIC (SHENZHEN) Co.,Ltd. Address before: 523000 Dongguan Songshan Lake Hi-tech Industrial Development Zone, Guangdong Province Patentee before: DONGGUAN COOLPAD SOFTWARE TECH Co.,Ltd. |
|
TR01 | Transfer of patent right |