CN105868617A - Application encryption method and mobile terminal - Google Patents
Application encryption method and mobile terminal Download PDFInfo
- Publication number
- CN105868617A CN105868617A CN201610179532.5A CN201610179532A CN105868617A CN 105868617 A CN105868617 A CN 105868617A CN 201610179532 A CN201610179532 A CN 201610179532A CN 105868617 A CN105868617 A CN 105868617A
- Authority
- CN
- China
- Prior art keywords
- application program
- mobile terminal
- user
- application
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides an application encryption method and a mobile terminal. The application encryption method is applied to the mobile terminal and comprises the steps that operation of a user for moving a first application icon is received, and the first application icon is moved to a target location from the default location; a visitor mode is entered, and in the visitor mode, second applications enter an encryption status, wherein the second applications are at least one preset application. According to the application encryption method, the user can conduct encryption on the second applications only by executing the simple operation of moving the first application icon, and operation is convenient and rapid.
Description
Technical field
The present invention relates to application program technical field, particularly relate to a kind of application program encryption method and shifting
Dynamic terminal.
Background technology
At present there is the application program much relating to individual privacy, such as on mobile terminal: picture library,
Pay application, microblogging, wechat, QQ etc..But mobile terminal is lent other people by unavoidable existence in daily life
, when mobile terminal being lent other people and using, then there is the danger of leakage individual privacy in interim situation about using
Dangerous or awkward, it is encrypted typically by application program when solving the problem revealing individual privacy
Realize.
The existing scheme being encrypted application program, needing user is each application program needing encryption
Being respectively provided with privacy password, user is required for each application program to be encrypted and is respectively provided with hiding password,
Complex operation, is not easy to user operation.
Summary of the invention
In view of the problem of complex operation present in existing application program encipherment scheme, it is proposed that this
Bright to provide a kind of application program encryption method overcoming the problems referred to above and mobile terminal.
According to one aspect of the present invention, it is provided that a kind of application program encryption method, described application program
Method is applied to mobile terminal, including: receive user and move the first application program image target operation, described
First application icon moves to target location from predeterminated position;Enter guest mode, described visitor's mould
Under formula, the second application program enters encrypted state, and described second application program is at least pre-set
Individual application program.
According to a further aspect in the invention, it is provided that a kind of mobile terminal, including: the first receiver module,
Moving the first application program image target operation for receiving user, described first application icon is from presetting
Position moves to target location;First handover module, is used for entering guest mode, under described guest mode,
Second application program enters encrypted state, and described second application program is at least one application pre-set
Program.
Compared with prior art, the invention have the advantages that
The application program encryption method of embodiment of the present invention offer and mobile terminal, mobile terminal determines first
Application icon from preset move to target location after, i.e. enter guest mode the second application program is entered
Row encryption.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to should by first
Moving to position unmatched with predeterminated position by program icon, user only needs to perform simple movement
Second application program can be encrypted by the first application program image target operation, simple operation.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention
Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other
Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various advantages and benefit are general for this area
Logical technical staff will be clear from understanding.Accompanying drawing is only used for illustrating preferred implementation, and is not considered as
Limitation of the present invention.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts.
In the accompanying drawings:
Fig. 1 is the flow chart of steps of a kind of application program encryption method of according to embodiments of the present invention;
Fig. 2 is the flow chart of steps of a kind of application program encryption method of according to embodiments of the present invention two;
Fig. 3 is by mutual schematic diagram during application program encryption between user and mobile phone;
Fig. 4 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention three;
Fig. 5 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention four;
Fig. 6 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention five;
Fig. 7 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention six.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows
The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not
Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly
Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Embodiment one
With reference to Fig. 1, it is shown that the steps flow chart of a kind of application program encryption method of the embodiment of the present invention one
Figure.
The application program encryption method of the embodiment of the present invention comprises the following steps:
Step S102: receive user and move the first application program image target operation.
Wherein, the first application program image is designated as user and arranges the application program selected in interface in advance in encryption
Icon.When user selects the first application program image timestamp, mobile terminal just record in encryption arranges interface
Under the position that is marked in mobile terminal desktop of selected application program image, this position is this first application
The predeterminated position that program icon is corresponding.
Wherein, mobile terminal includes multiple application icon, and application icon is distributed in the different pages
In, the application icon in each page embarks on journey again, arrangement in column.Application program image is marked on movement
Position in terminal desktop is characterized by the number of pages residing for application icon, line number and columns.
Such as: interface of mobile terminal comprises APP1, APP2, APP3, APP4, APP5, APP6,
The icon of APP7, APP8, APP9, APP10.User have selected in advance in encryption arranges interface should
With the icon of program APP3, now, the icon of application A PP3 is the first application icon,
The picture mark position of mobile terminal records APP3.When user is intended to be encrypted application program, by first
Application icon moves to target location from predeterminated position.
Step S104: enter guest mode.
When mobile terminal is under guest mode, the second application program enters encrypted state.
Wherein, the second application program is at least one application program pre-set.
Wherein, the second application program can be selected to set by user.Second application program can be comprise hidden
Private content and the application program needing account to log in, such as: wechat, qq etc.;It is of course also possible to be
The application program comprising privacy content but log in without account, such as: photograph album, information, phone etc..
The present invention uses position encryption principle in implementing, when the first application program image target position there occurs change
During change, then the second application program is encrypted, when the first application program image cursor position becomes
During change, the second application program is not encrypted.
The application program encryption method that the embodiment of the present invention provides, mobile terminal determines the first application program image
Mark from preset move to target location after, i.e. enter guest mode the second application program is encrypted place
Reason.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to by the first application program image
Mark moves to position unmatched with predeterminated position, and user only needs to perform simple mobile first application
Second application program can be encrypted by the operation of program icon, simple operation.
Embodiment two
With reference to Fig. 2, it is shown that the steps flow chart of a kind of application program encryption method of the embodiment of the present invention two
Figure.
The application program encryption method that the embodiment of the present invention provides specifically includes below scheme:
Step S202: display encryption arranges interface.
The embodiment of the present invention determines by judging whether the first application program image cursor position changes
Whether the second application icon is encrypted.User needs to set the first application icon,
And the first application program image target sets and needs to select in encryption arranges interface, accordingly, it would be desirable in advance
First show that encryption arranges interface, select the first application icon for user.
The mode that a kind of preferred display encryption arranges interface is: receive the checking password of user's input;
Judge that described checking password arranges with encryption whether unlatching password mates;The most then show that encryption arranges boundary
Face.That is, user needs input validation password, can show that when verifying password match encryption is arranged
Interface, then could select the first application icon further in this interface.
Step S204: receive and the first application program image target is selected operation.
During implementing, user can only select first application icon, and user is permissible
Selecting multiple first application icon, the first application program image target number of selection is the most, after encryption
The second application program image target safety the highest.
Step S206: record the position that the first application program image is marked in mobile terminal desktop, by record
Position as the first application program image target predeterminated position.
When record, can be by corresponding with preset position information for each first application icon storage.
It should be noted that step S202 is optional step to step S206, if being pre-selected
First application icon, then without performing this step again.
Step S208: receive user and move the first application program image target operation.
Wherein, this moves and middle from predeterminated position, the first application icon is moved to target location.
When the mobile terminal owner is intended to the second application program encryption, mobile one first sets application program image
Mark.
Step S210: enter guest mode.
When mobile first application icon, by it when predeterminated position moves to target location, then illustrate
The mobile terminal owner specially moves the first application icon, and mobile terminal to be indicated is to the second application
Program is encrypted.Mobile terminal then enters guest mode, and under guest mode, the second application program enters
Row encrypted state.Wherein, in mobile terminal, the second application program can be configured in advance by user, excellent
The application program comprising privacy content is set to the second application program by selection of land user, specifically comprises privacy
The application program of content comprises: need login account, comprise privacy content application program, such as: micro-
Letter, qq etc.;And need not login account but the application program comprising privacy content, such as: picture library,
Phone, information etc..
One preferably enters guest mode, is encrypted by the second application program in mobile terminal
Mode be: by the second application program, the status modifier of listed application program is for being not logged in state;
By in the second application program, hide without privacy content corresponding to each application program logged in.
Being encrypted by the second application program by step S208 to step S210, the later stage is if desired
Second application program is decrypted, then needs to move the first application icon to predeterminated position, with
Cancelling the encryption to the second application program after encryption, idiographic flow such as step S212 is to step S218 institute
Show.
Step S212: receive user and move the first application program image target operation.
Wherein, in this operation, the first application icon is moved to preset position by user from current location
Put.
Step S214: enter user model.Under user model, the encrypted state quilt of the second application program
Cancel.
When the first application program image target current location is mated with predeterminated position, it is determined that have received and take
The instruction that second application program that disappears is encrypted, now, mobile terminal will enter user model, cancel encryption
The cryptographic operation of the second application program after process.
One preferably enters user model, cancels the cryptographic operation of the second application program to encryption
Mode as follows: the logging status of the second application program that logging status is switched revert to encryption before
State;Cancel hiding without privacy content corresponding to application program that log in the second application program.
The application program encryption method that the embodiment of the present invention provides, mobile terminal determines the first application program image
Mark from preset move to target location after, guest mode can be entered the second application program is encrypted place
Reason.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to by the first application program image
Mark moves to position unmatched with predeterminated position, and user only needs to perform the operation of simple moving icon
Second application program can be encrypted, simple operation.When user is intended to solve the second application program
Time close, it is only necessary to the position moving to mate with predeterminated position by the first application icon can complete adding
The deciphering of the second close application program, simple operation, it is possible to promote the experience of user.
Referring to Fig. 3, with an instantiation from the angle of user and mobile phone interaction to the embodiment of the present invention
Application program encryption method illustrate.
This instantiation mainly includes three parts: password arranges, to the second application program encryption and to the
Two application programs deciphering, specifically include following steps:
Step S302: user opens " position encryption mode " in arranging, and selects the first application program.
When user preset puts password, need to open " position encryption " in mobile phone relevant is arranged, shifting
Dynamic terminal then shows that encryption arranges interface.User selects to need the first application icon of predeterminated position.
User can select one or more first application icon according to the actual requirements.The the first application journey selected
Sequence icon number is the most, and when being encrypted the second application program, accessible safety is the highest.
Step S304: the first application program position that mobile terminal records user selects.
Whenever user selects first application icon, and this first application program image then recorded by mobile phone
Target current location.During using, when selected first application program image cursor position changes,
Then can open the second application program image target encryption comprising privacy content.
Wherein, in mobile phone, the second application program can be configured in advance by user, and preferably user will wrap
Application program containing privacy content is set to the second application program, specifically comprises the application journey of privacy content
Sequence comprises: need login account, comprise privacy content application program, such as: wechat, qq etc.;With
And need not login account but the application program comprising privacy content, such as: picture library, phone, information
Deng.
Step S306: user is mobile first application program image target position on mobile phone desktop.
Step S308: the first application program image target current location and the position recorded are carried out by mobile phone
Coupling.
Wherein, the predeterminated position that the position recorded that is first application icon is corresponding.If in step
S302 only presets first application icon, then only mate in step S308 this first should
With the current location of program icon and record position.If presetting multiple first in step s 302
Application icon, then then need to mate each first application program image target respectively in step S308
Current location and record position, if all mating, it is determined that final result is coupling, as long as having one not
Coupling, it is determined that final result is not for mate.
Step S310: if not mating, the state of listed second application all will revise in mobile phone
For being not logged in state, and hiding short message content, associated person information and photo.
When user is intended to be encrypted application program, it is only necessary to mobile first application program image target position is i.e.
Mobile phone can be adjusted to guest mode.Wherein, guest mode will listed second application in mobile phone
State is all modified to be not logged in state, such as: these settings such as wechat, QQ, microblogging, Alipay
There is the application of account, then cancel the logging status of this kind of application.Comprise hidden to need not login account
Second application program of private content, such as: short message, phone, picture library etc. comprise the second of privacy content
Content under application program is hidden.
It should be noted that any change is not done in other application not comprising privacy content, enter visitor's mould
Second application program of formula, in addition to cancelling logging status, still can normally log in other accounts, no
The second application program needing login account still to comprise privacy content can normally produce new content.
Step S312: user clicks on the second application program needing to log in.
Owing to this application program is the most encrypted, therefore its state is for being not logged in state.
Step S314: the first application icon is re-moved the position of record on mobile phone desktop by user
Put.
When user is intended to be decrypted the second application program of encryption, user has only to the first application journey
Sequence icon moves on to the position of record in step S304 can return to user model by mobile phone.
Step S316: current location and the position recorded of the first application program are mated by mobile phone.
Step S318: the match is successful, is original logging status by the second application full recovery in mobile phone,
Cancel and all of privacy content are hidden.
Step S320: user clicks on the second application program needing to log in.
The second application program clicked on due to user is the most decrypted, the login shape before therefore its state is encryption
State.
The method that this instantiation provides, user has only to record one or the first above application program image
Target position, when lending mobile phone, mobile the first application icon once adjusts its position, can be right
The second application program comprising hiding content is encrypted and makes to change cellphone into guest mode, simple operation.
When mobile phone enters guest mode, the second application program being in logging status is removed logging status, and
And hiding private information and photo, visitor clicks on the second application program and still can normally use.When being intended to release
During to the encryption of the second application program, user has only to move on to the first application icon the position of record
Can be by the second application recovery after encryption to normal condition, it is simple to user operation.
Embodiment three
With reference to Fig. 4, it is shown that the structured flowchart of a kind of mobile terminal of the embodiment of the present invention three.
The mobile terminal of the embodiment of the present invention includes: the first receiver module 402, is used for receiving user and moves
First application program image target operation, described first application icon moves to target position from predeterminated position
Put;First handover module 404, is used for entering guest mode, under described guest mode, and the second application journey
Sequence enters encrypted state, and described second application program is at least one application program pre-set.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting
After moving to target location, i.e. enter guest mode and the second application program is encrypted.Correspondingly,
When user is intended to be encrypted the second application program, it is only necessary to the first application icon is moved to in advance
If unmatched position, position, user only needs to perform the operation of simple moving icon and can answer second
It is encrypted by program, simple operation.
Embodiment four
With reference to Fig. 5, it is shown that the structured flowchart of a kind of mobile terminal of the embodiment of the present invention four.
The mobile terminal of the embodiment of the present invention is the further optimization to the mobile terminal in embodiment three, excellent
Mobile terminal after change includes: the first receiver module 502, is used for receiving user and moves the first application program
The operation of icon, described first application icon moves to target location from predeterminated position;First switching
Module 504, is used for entering guest mode, and under described guest mode, the second application program enters encryption shape
State, described second application program is at least one application program pre-set.
Preferably, described mobile terminal also includes: display module 506, for receiving mould described first
Block 502 receive user move first application program image target operation before, display encryption interface is set;The
Two receiver modules 508, select operation for receiving to the first application program image target;Logging modle 510,
For recording the position that the first application program image is marked in mobile terminal desktop, using the position of record as institute
State the first application program image target predeterminated position.
Preferably, described mobile terminal also includes: password acceptance module 512, at described display mould
Before block 506 shows that encryption arranges interface, receive the checking password of user's input;Judge module 514,
For judging that described checking password arranges with encryption whether unlatching password mates;Calling module 516, is used for
When the judged result of described judge module 514 is for being, calls the display encryption of described display module and circle is set
Face.
Preferably, described first handover module 504 includes: state switching submodule 5042, for by the
In two application programs, the state of listed application program switches to the state of being not logged in;Content hides submodule
5044, for will the second application program be hidden without the privacy content that each application program logged in is corresponding.
Preferably, described mobile terminal also includes: the 3rd receiver module 518, is used for entering guest mode
Receiving user afterwards and move the first application program image target operation, described first application icon is from currently
Position moves to predeterminated position;Second handover module 520, is used for entering user model, described user's mould
Under formula, the encrypted state of described second application program is cancelled.
Preferably, described second handover module 520 includes: recovering state submodule 5202, for stepping on
The logging status of the second application program that record state is switched reverts to the state before encryption;Unhide son
Module 5204, for cancel in the second application program without privacy content corresponding to application program logged in
Hide.
The mobile terminal of the embodiment of the present invention is used for realizing corresponding application program in previous embodiment one, two
Encryption method, and there is beneficial effect corresponding with embodiment of the method, do not repeat them here.
Embodiment five
With reference to Fig. 6, it is shown that the structured flowchart of the mobile terminal of the embodiment of the present invention.
The mobile terminal 600 of the embodiment of the present invention includes: at least one processor 601, memorizer 602,
At least one network interface 604 and user interface 603.Each assembly in mobile terminal 600 is by total
Wire system 605 is coupled.It is understood that bus system 605 is for realizing the company between these assemblies
Connect letter.Bus system 605 in addition to including data/address bus, also include power bus, control bus and
Status signal bus in addition.But for the sake of understanding explanation, in figure 6 various buses are all designated as total linear system
System 605.
Wherein, user interface 603 can include display, keyboard or pointing device (such as, mouse,
Trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 602 being appreciated that in the embodiment of the present invention can be volatile memory or non-volatile
Property memorizer, maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory
Can be read only memory (Read-OnlyMemory, ROM), programmable read only memory
(ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM,
EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or sudden strain of a muscle
Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM),
It is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms can
With, such as static RAM (StaticRAM, SRAM), dynamic random access memory
(DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM,
SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM,
DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM,
ESDRAM), synchronized links dynamic random access memory (SynchlinkDRAM, SLDRAM) and
Directly rambus random access memory (DirectRambusRAM, DRRAM).The present invention implements
The memorizer 602 of the system and method that example describes is intended to include but not limited to these and other applicable class any
The memorizer of type.
In some embodiments, memorizer 602 stores following element, executable module or number
According to structure, or their subset, or their superset: operating system 6021 and application program
6022。
Wherein, operating system 6021, comprise various system program, such as ccf layer, core library layer, drive
Dynamic layers etc., are used for realizing various basic business and processing hardware based task.Application program 6022,
Comprise various application program, such as media player (MediaPlayer), browser (Browser) etc., use
In realizing various applied business.The program realizing embodiment of the present invention method may be embodied in application program
In 6022.
It is in embodiments of the present invention, by calling program or the instruction of memorizer 602 storage, concrete,
Can be program or the instruction of storage in application program 6022, processor 601 be used for receiving user and moves
First application program image target operation, described first application icon moves to target position from predeterminated position
Put;Entering guest mode, under described guest mode, the second application program enters encrypted state, and described the
Two application programs are at least one application program pre-set.
The method that the invention described above embodiment discloses can apply in processor 601, or by processor
601 realize.Processor 601 is probably a kind of IC chip, has the disposal ability of signal.?
During realization, each step of said method can be by the integration logic electricity of the hardware in processor 601
The instruction of road or software form completes.Above-mentioned processor 601 can be general processor, numeral letter
Number processor (DigitalSignalProcessor, DSP), special IC
(ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array
(FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or
Person's transistor logic, discrete hardware components.Can realize or perform the public affairs in the embodiment of the present invention
Each method, step and the logic diagram opened.General processor can be microprocessor or this processor also
It can be the processor etc. of any routine.Step in conjunction with the method disclosed in the embodiment of the present invention can be straight
Connect and be presented as that hardware decoding processor has performed, or by the hardware in decoding processor and software module
Combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme
The storage medium that this areas such as read only memory or electrically erasable programmable memorizer, depositor are ripe
In.This storage medium is positioned at memorizer 602, and processor 601 reads the information in memorizer 602, knot
Close its hardware and complete the step of said method.
It is understood that embodiments described herein can use hardware, software, firmware, centre
Part, microcode or a combination thereof realize.Realizing for hardware, processing unit can be implemented in one or more
Special IC (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor
(DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), can
Programmed logic equipment (ProgrammableLogicDevice, PLD), field programmable gate array
(Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller,
Microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can by perform function described in the embodiment of the present invention module (such as process,
Function etc.) realize the technology described in the embodiment of the present invention.Software code is storable in memorizer also
Performed by processor.Memorizer can within a processor or realize outside processor.
Alternatively, processor 601 is before reception user moves the first application program image target operation, also
For: display encryption arranges interface;Receive and the first application program image target is selected operation;Record first
Application program image is marked on the position in mobile terminal desktop, using the position of record as described first application journey
The predeterminated position of sequence icon.
Alternatively, processor 601, before display encryption arranges interface, is additionally operable to receive user's input
Checking password;Judge that described checking password arranges with encryption whether unlatching password mates;The most then perform
Described display encryption arranges the step at interface.
Alternatively, when processor 601 controls mobile terminal entrance guest mode: by the second application program
The state of listed application program switches to the state of being not logged in;By in the second application program without log in
The privacy content that each application program is corresponding is hidden.
Alternatively, entering after guest mode, processor 601 be additionally operable to receive user move first should
With the operation of program icon, described first application icon moves to predeterminated position from current location;
Entering user model, under described user model, the encrypted state of described second application program is cancelled.
Alternatively, when processor 601 controls mobile terminal entrance user model: logging status is switched
The logging status of the second application program revert to the state before encryption;Cancel nothing in the second application program
Hiding of the privacy content that the application program that need to log in is corresponding.
Mobile terminal 600 is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding
Repeat, repeat no more here.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting
After moving to target location, i.e. enter guest mode and the second application program is encrypted.Correspondingly,
When user is intended to be encrypted the second application program, it is only necessary to the first application icon is moved to in advance
If unmatched position, position, user only needs to perform the operation of simple moving icon and can answer first
It is encrypted by program, simple operation.
Embodiment six
With reference to Fig. 7, it is shown that the structured flowchart of the mobile terminal of the embodiment of the present invention.
Mobile terminal 700 in the embodiment of the present invention can be mobile phone, panel computer, personal digital assistant
(PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (RadioFrequency, RF) circuit 710, memorizer
720, input block 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi
(WirelessFidelity) module 780 and power supply 790.
Wherein, input block 730 can be used for receiving numeral or the character information of user's input, and produces
The signal input relevant with the user setup of mobile terminal 700 and function control.Specifically, the present invention
In embodiment, this input block 730 can include contact panel 731.Contact panel 731, also referred to as
Touch screen, can collect user thereon or neighbouring touch operation (such as user uses finger, stylus etc.
Any applicable object or adnexa operation on contact panel 731), and according to formula set in advance
Drive corresponding attachment means.Optionally, contact panel 731 can include touch detecting apparatus and touch control
Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation
The signal brought, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus
Touch information, and it is converted into contact coordinate, then give this processor 760, and processor can be received
760 orders sent also are performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray and
The polytypes such as surface acoustic wave realize contact panel 731.Except contact panel 731, input block 730
Can also include other input equipments 732, other input equipments 732 can include but not limited to secondary or physical bond
In dish, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more.
Wherein, display unit 740 can be used for the information that display is inputted or the information being supplied to user by user
And the various menu interfaces of mobile terminal 700.Display unit 740 can include display floater 741, can
Choosing, LCD or Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) can be used
Display floater 741 is configured etc. form.
It should be noted that contact panel 731 can cover display floater 741, formed and touch display screen, when this
Touch display screen detect thereon or after neighbouring touch operation, send processor 760 to tactile to determine
Touch the type of event, touch offer phase on display screen with preprocessor 760 according to the type of touch event
The visual output answered.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This application program circle
The arrangement mode of viewing area, face and this conventional control viewing area does not limit, can be arranged above and below, left and right
Arrangement etc. can distinguish the arrangement mode of two viewing areas.This Application Program Interface viewing area may be used for showing
Show the interface of application program.Each interface can comprise at least one application program icon and/or
The interface elements such as widget desktop control.This Application Program Interface viewing area can also be any interior for not comprising
The empty interface held.This conventional control viewing area is for showing the control that utilization rate is higher, and such as, setting is pressed
The application icons etc. such as button, interface numbering, scroll bar, phone directory icon.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interface and connection
The various piece of whole mobile phone, is stored in the software program in first memory 721 by running or performing
And/or module, and call the data being stored in second memory 722, perform mobile terminal 700
Various functions and process data, thus mobile terminal 700 is carried out integral monitoring.Optionally, process
Device 760 can include one or more processing unit.
In embodiments of the present invention, by call the software program stored in this first memory 721 and/
Or the data in module and/or this second memory 722, processor 760 is used for receiving user and moves first
Application program image target operates, and described first application icon moves to target location from predeterminated position;
Entering guest mode, under described guest mode, the second application program enters encrypted state, and described second should
It it is at least one application program pre-set by program.
Alternatively, processor 760 is before reception user moves the first application program image target operation, also
For: display encryption arranges interface;Receive and the first application program image target is selected operation;Record first
Application program image is marked on the position in mobile terminal desktop, using the position of record as described first application journey
The predeterminated position of sequence icon.
Alternatively, processor 760, before display encryption arranges interface, is additionally operable to receive user's input
Checking password;Judge that described checking password arranges with encryption whether unlatching password mates;The most then perform
Described display encryption arranges the step at interface.
Alternatively, when processor 760 controls mobile terminal entrance guest mode: by the second application program
The state of listed application program switches to the state of being not logged in;By in the second application program without log in
The privacy content that each application program is corresponding is hidden.
Alternatively, entering after guest mode, processor 760 be additionally operable to receive user move first should
With the operation of program icon, described first application icon moves to predeterminated position from current location;
Entering user model, under described user model, the encrypted state of described second application program is cancelled.
Preferably, processor 760 controls mobile terminal when entering user model: the logging status be switched
The logging status of two application programs reverts to the state before encryption;Cancel in the second application program without stepping on
Hiding of the privacy content corresponding to application program of record.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting
After moving to target location, i.e. enter guest mode and the second application program is i.e. entered guest mode by second
Application program is encrypted.Correspondingly, when user is intended to be encrypted the second application program, only
First application icon need to move to position unmatched with predeterminated position, and user only needs to perform
Second application program can be encrypted by simple moving icon operation, simple operation.
For device embodiment, due to itself and embodiment of the method basic simlarity, so the comparison described
Simply, relevant part sees the part of embodiment of the method and illustrates.
Provided herein application program encipherment scheme not with any certain computer, virtual system or other
Equipment is intrinsic relevant.Various general-purpose systems can also be used together with based on teaching in this.According to above
Description, construct the structure required by the system with the present invention program and be apparent from.Additionally, this
Invention is also not for any certain programmed language.It is understood that, it is possible to use various programming languages realize
This present disclosure described, and the description above done language-specific is to disclose the present invention
Preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this
Inventive embodiment can be put into practice in the case of not having these details.In some instances, not
It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one
Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes
It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure
Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim
The middle more feature of feature be expressly recited.More precisely, as the following claims reflect,
Inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows be embodied as
Claims of mode are thus expressly incorporated in this detailed description of the invention, the most each claim itself
All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly
Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible
Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used
To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or
Outside at least some in unit excludes each other, can use any combination that (this specification is included companion
With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or
All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion
With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase
Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include it
Some feature included in its embodiment rather than further feature, but the group of the feature of different embodiment
Close and mean to be within the scope of the present invention and formed different embodiments.Such as, in claim
In book, one of arbitrarily can mode using in any combination of embodiment required for protection.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more
The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should
Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize basis
Some or all parts in the application program encipherment scheme of the embodiment of the present invention some or all
Function.The present invention be also implemented as perform method as described herein part or all
Equipment or device program (such as, computer program and computer program).Such realization is originally
The program of invention can store on a computer-readable medium, or can have one or more signal
Form.Such signal can be downloaded from internet website and obtain, or provides on carrier signal,
Or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment,
And those skilled in the art can design replacement without departing from the scope of the appended claims
Embodiment.In the claims, any reference marks that should not will be located between bracket is configured to right
The restriction required.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.Position
Word "a" or "an" before element does not excludes the presence of multiple such element.The present invention can
With by means of including the hardware of some different elements and realizing by means of properly programmed computer.
If in the unit claim listing equipment for drying, several in these devices can be by same
Individual hardware branch specifically embodies.Word first, second and third use do not indicate that any order.
Can be title by these word explanations.
Claims (12)
1. an application program encryption method, is applied to mobile terminal, it is characterised in that including:
Receiving user and move the first application program image target operation, described first application icon is from presetting
Position moves to target location;
Entering guest mode, under described guest mode, the second application program enters encrypted state, and described the
Two application programs are at least one application program pre-set.
Method the most according to claim 1, it is characterised in that move the described reception user
Before the step of one application program image target operation, described method also includes:
Display encryption arranges interface;
Receive and the first application program image target is selected operation;
Record the position that the first application program image is marked in mobile terminal desktop, using the position of record as institute
State the first application program image target predeterminated position.
Method the most according to claim 2, it is characterised in that circle is set in described display encryption
Before the step in face, described method also includes:
Receive the checking password of user's input;
Judge that described checking password arranges with encryption whether unlatching password mates;
The most then perform described display encryption and the step at interface is set.
4. according to the method described in any one of claim 1-3, it is characterised in that described entrance visitor
The step of pattern includes:
The state of application program listed in the second application program is switched to the state of being not logged in;
Second application program will be hidden without the privacy content that each application program logged in is corresponding.
Method the most according to claim 1, it is characterised in that at described entrance guest mode
After step, described method also includes:
Receiving user and move the first application program image target operation, described first application icon is from currently
Position moves to predeterminated position;
Entering user model, under described user model, the encrypted state of described second application program is cancelled.
Method the most according to claim 5, it is characterised in that the step of described entrance user model
Suddenly include:
The logging status of the second application program logging status being switched reverts to the state before encryption;
Cancel hiding without privacy content corresponding to application program that log in the second application program.
7. a mobile terminal, it is characterised in that including:
First receiver module, is used for receiving user and moves the first application program image target operation, and described first
Application icon moves to target location from predeterminated position;
First handover module, is used for entering guest mode, and under described guest mode, the second application program enters
Entering encrypted state, described second application program is at least one application program pre-set.
Mobile terminal the most according to claim 7, it is characterised in that described mobile terminal also wraps
Include:
Display module, moves the first application program image target for receiving user at described first receiver module
Before operation, display encryption arranges interface;
Second receiver module, selects operation for receiving to the first application program image target;
Logging modle, the position being marked in mobile terminal desktop for record the first application program image, will note
The position of record is as described first application program image target predeterminated position.
Mobile terminal the most according to claim 8, it is characterised in that described mobile terminal also wraps
Include:
Password acceptance module, before arranging interface in the display encryption of described display module, receives user
The checking password of input;
Judge module, is used for judging that described checking password arranges with encryption whether unlatching password mates;
Calling module, for when the judged result of described judge module is for being, calls described display module
Display encryption arranges interface.
10. according to the mobile terminal described in any one of claim 7-9, it is characterised in that described first
Handover module includes:
State switching submodule, for switching the state of application program listed in the second application program
For being not logged in state;
Content hides submodule, for by corresponding without each application program of login in the second application program
Privacy content is hidden.
11. mobile terminals according to claim 7, it is characterised in that described mobile terminal also wraps
Include:
3rd receiver module, receives user and moves the first application icon after being used for entering guest mode
Operation, described first application icon moves to predeterminated position from current location;
Second handover module, is used for entering user model, under described user model, and described second application journey
The encrypted state of sequence is cancelled.
12. mobile terminals according to claim 11, it is characterised in that described second switching mould
Block includes:
Recovering state submodule, the logging status of the second application program for logging status being switched is extensive
Multiple for the state before encryption;
Unhide submodule, for cancelling corresponding without the application program that logs in the second application program
Privacy content hide.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610179532.5A CN105868617B (en) | 2016-03-25 | 2016-03-25 | Application program encryption method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610179532.5A CN105868617B (en) | 2016-03-25 | 2016-03-25 | Application program encryption method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105868617A true CN105868617A (en) | 2016-08-17 |
CN105868617B CN105868617B (en) | 2020-02-04 |
Family
ID=56626028
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610179532.5A Active CN105868617B (en) | 2016-03-25 | 2016-03-25 | Application program encryption method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105868617B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
CN107220552A (en) * | 2017-05-25 | 2017-09-29 | 维沃移动通信有限公司 | A kind of encryption and decryption approaches and mobile terminal |
CN108270757A (en) * | 2017-01-03 | 2018-07-10 | 腾讯科技(深圳)有限公司 | A kind of user account switching method, device, client and system |
CN109145583A (en) * | 2018-07-27 | 2019-01-04 | 奇酷互联网络科技(深圳)有限公司 | Using unlocking method, system, mobile terminal and storage medium |
CN109543370A (en) * | 2017-09-22 | 2019-03-29 | 西安中兴新软件有限责任公司 | A kind of application processing method, terminal and computer readable storage medium |
WO2020156441A1 (en) * | 2019-01-29 | 2020-08-06 | 维沃移动通信有限公司 | Privacy space operation method and terminal device |
CN114675897A (en) * | 2020-12-24 | 2022-06-28 | 荣耀终端有限公司 | Application program starting method and related device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103092468A (en) * | 2013-01-30 | 2013-05-08 | 上海斐讯数据通信技术有限公司 | Mobile terminal unlocking system and mobile terminal unlocking method |
CN103616981A (en) * | 2013-10-31 | 2014-03-05 | 小米科技有限责任公司 | Application process method, device and mobile terminal |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
US20150317470A1 (en) * | 2012-07-16 | 2015-11-05 | Tencent Technology (Shenzhen) Company Limited | Method and system for controlling access to applications on mobile terminal |
-
2016
- 2016-03-25 CN CN201610179532.5A patent/CN105868617B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150317470A1 (en) * | 2012-07-16 | 2015-11-05 | Tencent Technology (Shenzhen) Company Limited | Method and system for controlling access to applications on mobile terminal |
CN103092468A (en) * | 2013-01-30 | 2013-05-08 | 上海斐讯数据通信技术有限公司 | Mobile terminal unlocking system and mobile terminal unlocking method |
CN103616981A (en) * | 2013-10-31 | 2014-03-05 | 小米科技有限责任公司 | Application process method, device and mobile terminal |
CN103745147A (en) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | System mode starting method and application program starting method and device |
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
CN106250754B (en) * | 2016-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of control method and mobile terminal of application program |
CN108270757A (en) * | 2017-01-03 | 2018-07-10 | 腾讯科技(深圳)有限公司 | A kind of user account switching method, device, client and system |
CN108270757B (en) * | 2017-01-03 | 2022-02-18 | 腾讯科技(深圳)有限公司 | User account switching method, device, client and system |
CN107220552A (en) * | 2017-05-25 | 2017-09-29 | 维沃移动通信有限公司 | A kind of encryption and decryption approaches and mobile terminal |
CN109543370A (en) * | 2017-09-22 | 2019-03-29 | 西安中兴新软件有限责任公司 | A kind of application processing method, terminal and computer readable storage medium |
CN109543370B (en) * | 2017-09-22 | 2024-01-23 | 西安中兴新软件有限责任公司 | Application processing method, terminal and computer readable storage medium |
CN109145583A (en) * | 2018-07-27 | 2019-01-04 | 奇酷互联网络科技(深圳)有限公司 | Using unlocking method, system, mobile terminal and storage medium |
WO2020156441A1 (en) * | 2019-01-29 | 2020-08-06 | 维沃移动通信有限公司 | Privacy space operation method and terminal device |
CN114675897A (en) * | 2020-12-24 | 2022-06-28 | 荣耀终端有限公司 | Application program starting method and related device |
Also Published As
Publication number | Publication date |
---|---|
CN105868617B (en) | 2020-02-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105868617A (en) | Application encryption method and mobile terminal | |
CN107450800A (en) | A kind of task method to set up, mobile terminal and computer-readable recording medium | |
CN106126077A (en) | A kind of application program image target display control method and mobile terminal | |
CN104424412A (en) | Method for protecting information in intelligent terminal, page switching method and intelligent terminal | |
CN106506401A (en) | A kind of flow managing method and mobile terminal | |
CN106127076A (en) | The inspection method of a kind of photograph album photo and mobile terminal | |
CN106095250A (en) | The method of application icon layout and mobile terminal | |
CN106357866A (en) | Contact list management method and mobile intelligent terminal | |
CN107450799B (en) | Message display method and mobile terminal | |
CN106951335A (en) | A kind of process guard method and mobile terminal | |
CN106503579A (en) | A kind of method and device of access target file | |
CN106157125A (en) | A kind of payment interface changing method and device | |
CN106055198A (en) | Method for displaying notifications based on content and mobile terminal | |
CN106484231A (en) | A kind of method and device of application hides | |
CN106228085A (en) | The method for secret protection of application program and mobile terminal | |
CN106681604A (en) | Method for adjusting video playing progress and mobile terminal | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN106569662A (en) | Display method of application interface and mobile terminal | |
CN105549810A (en) | Application icon processing method and device, and terminal | |
CN105912954A (en) | Privacy information protection method and system suitable for mobile terminal | |
CN106529275A (en) | A method for application program operating mode switching and a mobile terminal | |
CN106780314A (en) | The method and mobile terminal of a kind of picture mosaic preview | |
CN106156600A (en) | The unlocking method of a kind of application program and mobile terminal | |
CN102880408B (en) | Scene unlocking method for terminal equipment and terminal equipment | |
CN106250757A (en) | The control method of a kind of application program and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |