CN105868617A - Application encryption method and mobile terminal - Google Patents

Application encryption method and mobile terminal Download PDF

Info

Publication number
CN105868617A
CN105868617A CN201610179532.5A CN201610179532A CN105868617A CN 105868617 A CN105868617 A CN 105868617A CN 201610179532 A CN201610179532 A CN 201610179532A CN 105868617 A CN105868617 A CN 105868617A
Authority
CN
China
Prior art keywords
application program
mobile terminal
user
application
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610179532.5A
Other languages
Chinese (zh)
Other versions
CN105868617B (en
Inventor
杜逸珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610179532.5A priority Critical patent/CN105868617B/en
Publication of CN105868617A publication Critical patent/CN105868617A/en
Application granted granted Critical
Publication of CN105868617B publication Critical patent/CN105868617B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides an application encryption method and a mobile terminal. The application encryption method is applied to the mobile terminal and comprises the steps that operation of a user for moving a first application icon is received, and the first application icon is moved to a target location from the default location; a visitor mode is entered, and in the visitor mode, second applications enter an encryption status, wherein the second applications are at least one preset application. According to the application encryption method, the user can conduct encryption on the second applications only by executing the simple operation of moving the first application icon, and operation is convenient and rapid.

Description

A kind of application program encryption method and mobile terminal
Technical field
The present invention relates to application program technical field, particularly relate to a kind of application program encryption method and shifting Dynamic terminal.
Background technology
At present there is the application program much relating to individual privacy, such as on mobile terminal: picture library, Pay application, microblogging, wechat, QQ etc..But mobile terminal is lent other people by unavoidable existence in daily life , when mobile terminal being lent other people and using, then there is the danger of leakage individual privacy in interim situation about using Dangerous or awkward, it is encrypted typically by application program when solving the problem revealing individual privacy Realize.
The existing scheme being encrypted application program, needing user is each application program needing encryption Being respectively provided with privacy password, user is required for each application program to be encrypted and is respectively provided with hiding password, Complex operation, is not easy to user operation.
Summary of the invention
In view of the problem of complex operation present in existing application program encipherment scheme, it is proposed that this Bright to provide a kind of application program encryption method overcoming the problems referred to above and mobile terminal.
According to one aspect of the present invention, it is provided that a kind of application program encryption method, described application program Method is applied to mobile terminal, including: receive user and move the first application program image target operation, described First application icon moves to target location from predeterminated position;Enter guest mode, described visitor's mould Under formula, the second application program enters encrypted state, and described second application program is at least pre-set Individual application program.
According to a further aspect in the invention, it is provided that a kind of mobile terminal, including: the first receiver module, Moving the first application program image target operation for receiving user, described first application icon is from presetting Position moves to target location;First handover module, is used for entering guest mode, under described guest mode, Second application program enters encrypted state, and described second application program is at least one application pre-set Program.
Compared with prior art, the invention have the advantages that
The application program encryption method of embodiment of the present invention offer and mobile terminal, mobile terminal determines first Application icon from preset move to target location after, i.e. enter guest mode the second application program is entered Row encryption.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to should by first Moving to position unmatched with predeterminated position by program icon, user only needs to perform simple movement Second application program can be encrypted by the first application program image target operation, simple operation.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various advantages and benefit are general for this area Logical technical staff will be clear from understanding.Accompanying drawing is only used for illustrating preferred implementation, and is not considered as Limitation of the present invention.And in whole accompanying drawing, it is denoted by the same reference numerals identical parts. In the accompanying drawings:
Fig. 1 is the flow chart of steps of a kind of application program encryption method of according to embodiments of the present invention;
Fig. 2 is the flow chart of steps of a kind of application program encryption method of according to embodiments of the present invention two;
Fig. 3 is by mutual schematic diagram during application program encryption between user and mobile phone;
Fig. 4 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention three;
Fig. 5 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention four;
Fig. 6 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention five;
Fig. 7 is the structured flowchart of a kind of mobile terminal of according to embodiments of the present invention six.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Embodiment one
With reference to Fig. 1, it is shown that the steps flow chart of a kind of application program encryption method of the embodiment of the present invention one Figure.
The application program encryption method of the embodiment of the present invention comprises the following steps:
Step S102: receive user and move the first application program image target operation.
Wherein, the first application program image is designated as user and arranges the application program selected in interface in advance in encryption Icon.When user selects the first application program image timestamp, mobile terminal just record in encryption arranges interface Under the position that is marked in mobile terminal desktop of selected application program image, this position is this first application The predeterminated position that program icon is corresponding.
Wherein, mobile terminal includes multiple application icon, and application icon is distributed in the different pages In, the application icon in each page embarks on journey again, arrangement in column.Application program image is marked on movement Position in terminal desktop is characterized by the number of pages residing for application icon, line number and columns.
Such as: interface of mobile terminal comprises APP1, APP2, APP3, APP4, APP5, APP6, The icon of APP7, APP8, APP9, APP10.User have selected in advance in encryption arranges interface should With the icon of program APP3, now, the icon of application A PP3 is the first application icon, The picture mark position of mobile terminal records APP3.When user is intended to be encrypted application program, by first Application icon moves to target location from predeterminated position.
Step S104: enter guest mode.
When mobile terminal is under guest mode, the second application program enters encrypted state.
Wherein, the second application program is at least one application program pre-set.
Wherein, the second application program can be selected to set by user.Second application program can be comprise hidden Private content and the application program needing account to log in, such as: wechat, qq etc.;It is of course also possible to be The application program comprising privacy content but log in without account, such as: photograph album, information, phone etc..
The present invention uses position encryption principle in implementing, when the first application program image target position there occurs change During change, then the second application program is encrypted, when the first application program image cursor position becomes During change, the second application program is not encrypted.
The application program encryption method that the embodiment of the present invention provides, mobile terminal determines the first application program image Mark from preset move to target location after, i.e. enter guest mode the second application program is encrypted place Reason.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to by the first application program image Mark moves to position unmatched with predeterminated position, and user only needs to perform simple mobile first application Second application program can be encrypted by the operation of program icon, simple operation.
Embodiment two
With reference to Fig. 2, it is shown that the steps flow chart of a kind of application program encryption method of the embodiment of the present invention two Figure.
The application program encryption method that the embodiment of the present invention provides specifically includes below scheme:
Step S202: display encryption arranges interface.
The embodiment of the present invention determines by judging whether the first application program image cursor position changes Whether the second application icon is encrypted.User needs to set the first application icon, And the first application program image target sets and needs to select in encryption arranges interface, accordingly, it would be desirable in advance First show that encryption arranges interface, select the first application icon for user.
The mode that a kind of preferred display encryption arranges interface is: receive the checking password of user's input; Judge that described checking password arranges with encryption whether unlatching password mates;The most then show that encryption arranges boundary Face.That is, user needs input validation password, can show that when verifying password match encryption is arranged Interface, then could select the first application icon further in this interface.
Step S204: receive and the first application program image target is selected operation.
During implementing, user can only select first application icon, and user is permissible Selecting multiple first application icon, the first application program image target number of selection is the most, after encryption The second application program image target safety the highest.
Step S206: record the position that the first application program image is marked in mobile terminal desktop, by record Position as the first application program image target predeterminated position.
When record, can be by corresponding with preset position information for each first application icon storage.
It should be noted that step S202 is optional step to step S206, if being pre-selected First application icon, then without performing this step again.
Step S208: receive user and move the first application program image target operation.
Wherein, this moves and middle from predeterminated position, the first application icon is moved to target location.
When the mobile terminal owner is intended to the second application program encryption, mobile one first sets application program image Mark.
Step S210: enter guest mode.
When mobile first application icon, by it when predeterminated position moves to target location, then illustrate The mobile terminal owner specially moves the first application icon, and mobile terminal to be indicated is to the second application Program is encrypted.Mobile terminal then enters guest mode, and under guest mode, the second application program enters Row encrypted state.Wherein, in mobile terminal, the second application program can be configured in advance by user, excellent The application program comprising privacy content is set to the second application program by selection of land user, specifically comprises privacy The application program of content comprises: need login account, comprise privacy content application program, such as: micro- Letter, qq etc.;And need not login account but the application program comprising privacy content, such as: picture library, Phone, information etc..
One preferably enters guest mode, is encrypted by the second application program in mobile terminal Mode be: by the second application program, the status modifier of listed application program is for being not logged in state; By in the second application program, hide without privacy content corresponding to each application program logged in.
Being encrypted by the second application program by step S208 to step S210, the later stage is if desired Second application program is decrypted, then needs to move the first application icon to predeterminated position, with Cancelling the encryption to the second application program after encryption, idiographic flow such as step S212 is to step S218 institute Show.
Step S212: receive user and move the first application program image target operation.
Wherein, in this operation, the first application icon is moved to preset position by user from current location Put.
Step S214: enter user model.Under user model, the encrypted state quilt of the second application program Cancel.
When the first application program image target current location is mated with predeterminated position, it is determined that have received and take The instruction that second application program that disappears is encrypted, now, mobile terminal will enter user model, cancel encryption The cryptographic operation of the second application program after process.
One preferably enters user model, cancels the cryptographic operation of the second application program to encryption Mode as follows: the logging status of the second application program that logging status is switched revert to encryption before State;Cancel hiding without privacy content corresponding to application program that log in the second application program.
The application program encryption method that the embodiment of the present invention provides, mobile terminal determines the first application program image Mark from preset move to target location after, guest mode can be entered the second application program is encrypted place Reason.Correspondingly, when user is intended to be encrypted the second application program, it is only necessary to by the first application program image Mark moves to position unmatched with predeterminated position, and user only needs to perform the operation of simple moving icon Second application program can be encrypted, simple operation.When user is intended to solve the second application program Time close, it is only necessary to the position moving to mate with predeterminated position by the first application icon can complete adding The deciphering of the second close application program, simple operation, it is possible to promote the experience of user.
Referring to Fig. 3, with an instantiation from the angle of user and mobile phone interaction to the embodiment of the present invention Application program encryption method illustrate.
This instantiation mainly includes three parts: password arranges, to the second application program encryption and to the Two application programs deciphering, specifically include following steps:
Step S302: user opens " position encryption mode " in arranging, and selects the first application program.
When user preset puts password, need to open " position encryption " in mobile phone relevant is arranged, shifting Dynamic terminal then shows that encryption arranges interface.User selects to need the first application icon of predeterminated position. User can select one or more first application icon according to the actual requirements.The the first application journey selected Sequence icon number is the most, and when being encrypted the second application program, accessible safety is the highest.
Step S304: the first application program position that mobile terminal records user selects.
Whenever user selects first application icon, and this first application program image then recorded by mobile phone Target current location.During using, when selected first application program image cursor position changes, Then can open the second application program image target encryption comprising privacy content.
Wherein, in mobile phone, the second application program can be configured in advance by user, and preferably user will wrap Application program containing privacy content is set to the second application program, specifically comprises the application journey of privacy content Sequence comprises: need login account, comprise privacy content application program, such as: wechat, qq etc.;With And need not login account but the application program comprising privacy content, such as: picture library, phone, information Deng.
Step S306: user is mobile first application program image target position on mobile phone desktop.
Step S308: the first application program image target current location and the position recorded are carried out by mobile phone Coupling.
Wherein, the predeterminated position that the position recorded that is first application icon is corresponding.If in step S302 only presets first application icon, then only mate in step S308 this first should With the current location of program icon and record position.If presetting multiple first in step s 302 Application icon, then then need to mate each first application program image target respectively in step S308 Current location and record position, if all mating, it is determined that final result is coupling, as long as having one not Coupling, it is determined that final result is not for mate.
Step S310: if not mating, the state of listed second application all will revise in mobile phone For being not logged in state, and hiding short message content, associated person information and photo.
When user is intended to be encrypted application program, it is only necessary to mobile first application program image target position is i.e. Mobile phone can be adjusted to guest mode.Wherein, guest mode will listed second application in mobile phone State is all modified to be not logged in state, such as: these settings such as wechat, QQ, microblogging, Alipay There is the application of account, then cancel the logging status of this kind of application.Comprise hidden to need not login account Second application program of private content, such as: short message, phone, picture library etc. comprise the second of privacy content Content under application program is hidden.
It should be noted that any change is not done in other application not comprising privacy content, enter visitor's mould Second application program of formula, in addition to cancelling logging status, still can normally log in other accounts, no The second application program needing login account still to comprise privacy content can normally produce new content.
Step S312: user clicks on the second application program needing to log in.
Owing to this application program is the most encrypted, therefore its state is for being not logged in state.
Step S314: the first application icon is re-moved the position of record on mobile phone desktop by user Put.
When user is intended to be decrypted the second application program of encryption, user has only to the first application journey Sequence icon moves on to the position of record in step S304 can return to user model by mobile phone.
Step S316: current location and the position recorded of the first application program are mated by mobile phone.
Step S318: the match is successful, is original logging status by the second application full recovery in mobile phone, Cancel and all of privacy content are hidden.
Step S320: user clicks on the second application program needing to log in.
The second application program clicked on due to user is the most decrypted, the login shape before therefore its state is encryption State.
The method that this instantiation provides, user has only to record one or the first above application program image Target position, when lending mobile phone, mobile the first application icon once adjusts its position, can be right The second application program comprising hiding content is encrypted and makes to change cellphone into guest mode, simple operation. When mobile phone enters guest mode, the second application program being in logging status is removed logging status, and And hiding private information and photo, visitor clicks on the second application program and still can normally use.When being intended to release During to the encryption of the second application program, user has only to move on to the first application icon the position of record Can be by the second application recovery after encryption to normal condition, it is simple to user operation.
Embodiment three
With reference to Fig. 4, it is shown that the structured flowchart of a kind of mobile terminal of the embodiment of the present invention three.
The mobile terminal of the embodiment of the present invention includes: the first receiver module 402, is used for receiving user and moves First application program image target operation, described first application icon moves to target position from predeterminated position Put;First handover module 404, is used for entering guest mode, under described guest mode, and the second application journey Sequence enters encrypted state, and described second application program is at least one application program pre-set.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting After moving to target location, i.e. enter guest mode and the second application program is encrypted.Correspondingly, When user is intended to be encrypted the second application program, it is only necessary to the first application icon is moved to in advance If unmatched position, position, user only needs to perform the operation of simple moving icon and can answer second It is encrypted by program, simple operation.
Embodiment four
With reference to Fig. 5, it is shown that the structured flowchart of a kind of mobile terminal of the embodiment of the present invention four.
The mobile terminal of the embodiment of the present invention is the further optimization to the mobile terminal in embodiment three, excellent Mobile terminal after change includes: the first receiver module 502, is used for receiving user and moves the first application program The operation of icon, described first application icon moves to target location from predeterminated position;First switching Module 504, is used for entering guest mode, and under described guest mode, the second application program enters encryption shape State, described second application program is at least one application program pre-set.
Preferably, described mobile terminal also includes: display module 506, for receiving mould described first Block 502 receive user move first application program image target operation before, display encryption interface is set;The Two receiver modules 508, select operation for receiving to the first application program image target;Logging modle 510, For recording the position that the first application program image is marked in mobile terminal desktop, using the position of record as institute State the first application program image target predeterminated position.
Preferably, described mobile terminal also includes: password acceptance module 512, at described display mould Before block 506 shows that encryption arranges interface, receive the checking password of user's input;Judge module 514, For judging that described checking password arranges with encryption whether unlatching password mates;Calling module 516, is used for When the judged result of described judge module 514 is for being, calls the display encryption of described display module and circle is set Face.
Preferably, described first handover module 504 includes: state switching submodule 5042, for by the In two application programs, the state of listed application program switches to the state of being not logged in;Content hides submodule 5044, for will the second application program be hidden without the privacy content that each application program logged in is corresponding.
Preferably, described mobile terminal also includes: the 3rd receiver module 518, is used for entering guest mode Receiving user afterwards and move the first application program image target operation, described first application icon is from currently Position moves to predeterminated position;Second handover module 520, is used for entering user model, described user's mould Under formula, the encrypted state of described second application program is cancelled.
Preferably, described second handover module 520 includes: recovering state submodule 5202, for stepping on The logging status of the second application program that record state is switched reverts to the state before encryption;Unhide son Module 5204, for cancel in the second application program without privacy content corresponding to application program logged in Hide.
The mobile terminal of the embodiment of the present invention is used for realizing corresponding application program in previous embodiment one, two Encryption method, and there is beneficial effect corresponding with embodiment of the method, do not repeat them here.
Embodiment five
With reference to Fig. 6, it is shown that the structured flowchart of the mobile terminal of the embodiment of the present invention.
The mobile terminal 600 of the embodiment of the present invention includes: at least one processor 601, memorizer 602, At least one network interface 604 and user interface 603.Each assembly in mobile terminal 600 is by total Wire system 605 is coupled.It is understood that bus system 605 is for realizing the company between these assemblies Connect letter.Bus system 605 in addition to including data/address bus, also include power bus, control bus and Status signal bus in addition.But for the sake of understanding explanation, in figure 6 various buses are all designated as total linear system System 605.
Wherein, user interface 603 can include display, keyboard or pointing device (such as, mouse, Trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 602 being appreciated that in the embodiment of the present invention can be volatile memory or non-volatile Property memorizer, maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory Can be read only memory (Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or sudden strain of a muscle Deposit.Volatile memory can be random access memory (RandomAccessMemory, RAM), It is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms can With, such as static RAM (StaticRAM, SRAM), dynamic random access memory (DynamicRAM, DRAM), Synchronous Dynamic Random Access Memory (SynchronousDRAM, SDRAM), double data speed synchronous dynamic RAM (DoubleDataRate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links dynamic random access memory (SynchlinkDRAM, SLDRAM) and Directly rambus random access memory (DirectRambusRAM, DRRAM).The present invention implements The memorizer 602 of the system and method that example describes is intended to include but not limited to these and other applicable class any The memorizer of type.
In some embodiments, memorizer 602 stores following element, executable module or number According to structure, or their subset, or their superset: operating system 6021 and application program 6022。
Wherein, operating system 6021, comprise various system program, such as ccf layer, core library layer, drive Dynamic layers etc., are used for realizing various basic business and processing hardware based task.Application program 6022, Comprise various application program, such as media player (MediaPlayer), browser (Browser) etc., use In realizing various applied business.The program realizing embodiment of the present invention method may be embodied in application program In 6022.
It is in embodiments of the present invention, by calling program or the instruction of memorizer 602 storage, concrete, Can be program or the instruction of storage in application program 6022, processor 601 be used for receiving user and moves First application program image target operation, described first application icon moves to target position from predeterminated position Put;Entering guest mode, under described guest mode, the second application program enters encrypted state, and described the Two application programs are at least one application program pre-set.
The method that the invention described above embodiment discloses can apply in processor 601, or by processor 601 realize.Processor 601 is probably a kind of IC chip, has the disposal ability of signal.? During realization, each step of said method can be by the integration logic electricity of the hardware in processor 601 The instruction of road or software form completes.Above-mentioned processor 601 can be general processor, numeral letter Number processor (DigitalSignalProcessor, DSP), special IC (ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or Person's transistor logic, discrete hardware components.Can realize or perform the public affairs in the embodiment of the present invention Each method, step and the logic diagram opened.General processor can be microprocessor or this processor also It can be the processor etc. of any routine.Step in conjunction with the method disclosed in the embodiment of the present invention can be straight Connect and be presented as that hardware decoding processor has performed, or by the hardware in decoding processor and software module Combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are able to programme The storage medium that this areas such as read only memory or electrically erasable programmable memorizer, depositor are ripe In.This storage medium is positioned at memorizer 602, and processor 601 reads the information in memorizer 602, knot Close its hardware and complete the step of said method.
It is understood that embodiments described herein can use hardware, software, firmware, centre Part, microcode or a combination thereof realize.Realizing for hardware, processing unit can be implemented in one or more Special IC (ApplicationSpecificIntegratedCircuits, ASIC), digital signal processor (DigitalSignalProcessing, DSP), digital signal processing appts (DSPDevice, DSPD), can Programmed logic equipment (ProgrammableLogicDevice, PLD), field programmable gate array (Field-ProgrammableGateArray, FPGA), general processor, controller, microcontroller, Microprocessor, for performing in other electronic unit or a combination thereof of herein described function.
Software is realized, can by perform function described in the embodiment of the present invention module (such as process, Function etc.) realize the technology described in the embodiment of the present invention.Software code is storable in memorizer also Performed by processor.Memorizer can within a processor or realize outside processor.
Alternatively, processor 601 is before reception user moves the first application program image target operation, also For: display encryption arranges interface;Receive and the first application program image target is selected operation;Record first Application program image is marked on the position in mobile terminal desktop, using the position of record as described first application journey The predeterminated position of sequence icon.
Alternatively, processor 601, before display encryption arranges interface, is additionally operable to receive user's input Checking password;Judge that described checking password arranges with encryption whether unlatching password mates;The most then perform Described display encryption arranges the step at interface.
Alternatively, when processor 601 controls mobile terminal entrance guest mode: by the second application program The state of listed application program switches to the state of being not logged in;By in the second application program without log in The privacy content that each application program is corresponding is hidden.
Alternatively, entering after guest mode, processor 601 be additionally operable to receive user move first should With the operation of program icon, described first application icon moves to predeterminated position from current location; Entering user model, under described user model, the encrypted state of described second application program is cancelled.
Alternatively, when processor 601 controls mobile terminal entrance user model: logging status is switched The logging status of the second application program revert to the state before encryption;Cancel nothing in the second application program Hiding of the privacy content that the application program that need to log in is corresponding.
Mobile terminal 600 is capable of each process that in previous embodiment, mobile terminal realizes, for avoiding Repeat, repeat no more here.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting After moving to target location, i.e. enter guest mode and the second application program is encrypted.Correspondingly, When user is intended to be encrypted the second application program, it is only necessary to the first application icon is moved to in advance If unmatched position, position, user only needs to perform the operation of simple moving icon and can answer first It is encrypted by program, simple operation.
Embodiment six
With reference to Fig. 7, it is shown that the structured flowchart of the mobile terminal of the embodiment of the present invention.
Mobile terminal 700 in the embodiment of the present invention can be mobile phone, panel computer, personal digital assistant (PersonalDigital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (RadioFrequency, RF) circuit 710, memorizer 720, input block 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (WirelessFidelity) module 780 and power supply 790.
Wherein, input block 730 can be used for receiving numeral or the character information of user's input, and produces The signal input relevant with the user setup of mobile terminal 700 and function control.Specifically, the present invention In embodiment, this input block 730 can include contact panel 731.Contact panel 731, also referred to as Touch screen, can collect user thereon or neighbouring touch operation (such as user uses finger, stylus etc. Any applicable object or adnexa operation on contact panel 731), and according to formula set in advance Drive corresponding attachment means.Optionally, contact panel 731 can include touch detecting apparatus and touch control Two parts of device processed.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives from touch detecting apparatus Touch information, and it is converted into contact coordinate, then give this processor 760, and processor can be received 760 orders sent also are performed.Furthermore, it is possible to use resistance-type, condenser type, infrared ray and The polytypes such as surface acoustic wave realize contact panel 731.Except contact panel 731, input block 730 Can also include other input equipments 732, other input equipments 732 can include but not limited to secondary or physical bond In dish, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Wherein, display unit 740 can be used for the information that display is inputted or the information being supplied to user by user And the various menu interfaces of mobile terminal 700.Display unit 740 can include display floater 741, can Choosing, LCD or Organic Light Emitting Diode (OrganicLight-EmittingDiode, OLED) can be used Display floater 741 is configured etc. form.
It should be noted that contact panel 731 can cover display floater 741, formed and touch display screen, when this Touch display screen detect thereon or after neighbouring touch operation, send processor 760 to tactile to determine Touch the type of event, touch offer phase on display screen with preprocessor 760 according to the type of touch event The visual output answered.
Touch display screen and include Application Program Interface viewing area and conventional control viewing area.This application program circle The arrangement mode of viewing area, face and this conventional control viewing area does not limit, can be arranged above and below, left and right Arrangement etc. can distinguish the arrangement mode of two viewing areas.This Application Program Interface viewing area may be used for showing Show the interface of application program.Each interface can comprise at least one application program icon and/or The interface elements such as widget desktop control.This Application Program Interface viewing area can also be any interior for not comprising The empty interface held.This conventional control viewing area is for showing the control that utilization rate is higher, and such as, setting is pressed The application icons etc. such as button, interface numbering, scroll bar, phone directory icon.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interface and connection The various piece of whole mobile phone, is stored in the software program in first memory 721 by running or performing And/or module, and call the data being stored in second memory 722, perform mobile terminal 700 Various functions and process data, thus mobile terminal 700 is carried out integral monitoring.Optionally, process Device 760 can include one or more processing unit.
In embodiments of the present invention, by call the software program stored in this first memory 721 and/ Or the data in module and/or this second memory 722, processor 760 is used for receiving user and moves first Application program image target operates, and described first application icon moves to target location from predeterminated position; Entering guest mode, under described guest mode, the second application program enters encrypted state, and described second should It it is at least one application program pre-set by program.
Alternatively, processor 760 is before reception user moves the first application program image target operation, also For: display encryption arranges interface;Receive and the first application program image target is selected operation;Record first Application program image is marked on the position in mobile terminal desktop, using the position of record as described first application journey The predeterminated position of sequence icon.
Alternatively, processor 760, before display encryption arranges interface, is additionally operable to receive user's input Checking password;Judge that described checking password arranges with encryption whether unlatching password mates;The most then perform Described display encryption arranges the step at interface.
Alternatively, when processor 760 controls mobile terminal entrance guest mode: by the second application program The state of listed application program switches to the state of being not logged in;By in the second application program without log in The privacy content that each application program is corresponding is hidden.
Alternatively, entering after guest mode, processor 760 be additionally operable to receive user move first should With the operation of program icon, described first application icon moves to predeterminated position from current location; Entering user model, under described user model, the encrypted state of described second application program is cancelled. Preferably, processor 760 controls mobile terminal when entering user model: the logging status be switched The logging status of two application programs reverts to the state before encryption;Cancel in the second application program without stepping on Hiding of the privacy content corresponding to application program of record.
The mobile terminal that the embodiment of the present invention provides, mobile terminal determines that the first application icon is from presetting After moving to target location, i.e. enter guest mode and the second application program is i.e. entered guest mode by second Application program is encrypted.Correspondingly, when user is intended to be encrypted the second application program, only First application icon need to move to position unmatched with predeterminated position, and user only needs to perform Second application program can be encrypted by simple moving icon operation, simple operation.
For device embodiment, due to itself and embodiment of the method basic simlarity, so the comparison described Simply, relevant part sees the part of embodiment of the method and illustrates.
Provided herein application program encipherment scheme not with any certain computer, virtual system or other Equipment is intrinsic relevant.Various general-purpose systems can also be used together with based on teaching in this.According to above Description, construct the structure required by the system with the present invention program and be apparent from.Additionally, this Invention is also not for any certain programmed language.It is understood that, it is possible to use various programming languages realize This present disclosure described, and the description above done language-specific is to disclose the present invention Preferred forms.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of not having these details.In some instances, not It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim The middle more feature of feature be expressly recited.More precisely, as the following claims reflect, Inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows be embodied as Claims of mode are thus expressly incorporated in this detailed description of the invention, the most each claim itself All as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or Outside at least some in unit excludes each other, can use any combination that (this specification is included companion With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include it Some feature included in its embodiment rather than further feature, but the group of the feature of different embodiment Close and mean to be within the scope of the present invention and formed different embodiments.Such as, in claim In book, one of arbitrarily can mode using in any combination of embodiment required for protection.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize basis Some or all parts in the application program encipherment scheme of the embodiment of the present invention some or all Function.The present invention be also implemented as perform method as described herein part or all Equipment or device program (such as, computer program and computer program).Such realization is originally The program of invention can store on a computer-readable medium, or can have one or more signal Form.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, Or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, And those skilled in the art can design replacement without departing from the scope of the appended claims Embodiment.In the claims, any reference marks that should not will be located between bracket is configured to right The restriction required.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.Position Word "a" or "an" before element does not excludes the presence of multiple such element.The present invention can With by means of including the hardware of some different elements and realizing by means of properly programmed computer. If in the unit claim listing equipment for drying, several in these devices can be by same Individual hardware branch specifically embodies.Word first, second and third use do not indicate that any order. Can be title by these word explanations.

Claims (12)

1. an application program encryption method, is applied to mobile terminal, it is characterised in that including:
Receiving user and move the first application program image target operation, described first application icon is from presetting Position moves to target location;
Entering guest mode, under described guest mode, the second application program enters encrypted state, and described the Two application programs are at least one application program pre-set.
Method the most according to claim 1, it is characterised in that move the described reception user Before the step of one application program image target operation, described method also includes:
Display encryption arranges interface;
Receive and the first application program image target is selected operation;
Record the position that the first application program image is marked in mobile terminal desktop, using the position of record as institute State the first application program image target predeterminated position.
Method the most according to claim 2, it is characterised in that circle is set in described display encryption Before the step in face, described method also includes:
Receive the checking password of user's input;
Judge that described checking password arranges with encryption whether unlatching password mates;
The most then perform described display encryption and the step at interface is set.
4. according to the method described in any one of claim 1-3, it is characterised in that described entrance visitor The step of pattern includes:
The state of application program listed in the second application program is switched to the state of being not logged in;
Second application program will be hidden without the privacy content that each application program logged in is corresponding.
Method the most according to claim 1, it is characterised in that at described entrance guest mode After step, described method also includes:
Receiving user and move the first application program image target operation, described first application icon is from currently Position moves to predeterminated position;
Entering user model, under described user model, the encrypted state of described second application program is cancelled.
Method the most according to claim 5, it is characterised in that the step of described entrance user model Suddenly include:
The logging status of the second application program logging status being switched reverts to the state before encryption;
Cancel hiding without privacy content corresponding to application program that log in the second application program.
7. a mobile terminal, it is characterised in that including:
First receiver module, is used for receiving user and moves the first application program image target operation, and described first Application icon moves to target location from predeterminated position;
First handover module, is used for entering guest mode, and under described guest mode, the second application program enters Entering encrypted state, described second application program is at least one application program pre-set.
Mobile terminal the most according to claim 7, it is characterised in that described mobile terminal also wraps Include:
Display module, moves the first application program image target for receiving user at described first receiver module Before operation, display encryption arranges interface;
Second receiver module, selects operation for receiving to the first application program image target;
Logging modle, the position being marked in mobile terminal desktop for record the first application program image, will note The position of record is as described first application program image target predeterminated position.
Mobile terminal the most according to claim 8, it is characterised in that described mobile terminal also wraps Include:
Password acceptance module, before arranging interface in the display encryption of described display module, receives user The checking password of input;
Judge module, is used for judging that described checking password arranges with encryption whether unlatching password mates;
Calling module, for when the judged result of described judge module is for being, calls described display module Display encryption arranges interface.
10. according to the mobile terminal described in any one of claim 7-9, it is characterised in that described first Handover module includes:
State switching submodule, for switching the state of application program listed in the second application program For being not logged in state;
Content hides submodule, for by corresponding without each application program of login in the second application program Privacy content is hidden.
11. mobile terminals according to claim 7, it is characterised in that described mobile terminal also wraps Include:
3rd receiver module, receives user and moves the first application icon after being used for entering guest mode Operation, described first application icon moves to predeterminated position from current location;
Second handover module, is used for entering user model, under described user model, and described second application journey The encrypted state of sequence is cancelled.
12. mobile terminals according to claim 11, it is characterised in that described second switching mould Block includes:
Recovering state submodule, the logging status of the second application program for logging status being switched is extensive Multiple for the state before encryption;
Unhide submodule, for cancelling corresponding without the application program that logs in the second application program Privacy content hide.
CN201610179532.5A 2016-03-25 2016-03-25 Application program encryption method and mobile terminal Active CN105868617B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610179532.5A CN105868617B (en) 2016-03-25 2016-03-25 Application program encryption method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610179532.5A CN105868617B (en) 2016-03-25 2016-03-25 Application program encryption method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105868617A true CN105868617A (en) 2016-08-17
CN105868617B CN105868617B (en) 2020-02-04

Family

ID=56626028

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610179532.5A Active CN105868617B (en) 2016-03-25 2016-03-25 Application program encryption method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105868617B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN107220552A (en) * 2017-05-25 2017-09-29 维沃移动通信有限公司 A kind of encryption and decryption approaches and mobile terminal
CN108270757A (en) * 2017-01-03 2018-07-10 腾讯科技(深圳)有限公司 A kind of user account switching method, device, client and system
CN109145583A (en) * 2018-07-27 2019-01-04 奇酷互联网络科技(深圳)有限公司 Using unlocking method, system, mobile terminal and storage medium
CN109543370A (en) * 2017-09-22 2019-03-29 西安中兴新软件有限责任公司 A kind of application processing method, terminal and computer readable storage medium
WO2020156441A1 (en) * 2019-01-29 2020-08-06 维沃移动通信有限公司 Privacy space operation method and terminal device
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103092468A (en) * 2013-01-30 2013-05-08 上海斐讯数据通信技术有限公司 Mobile terminal unlocking system and mobile terminal unlocking method
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
US20150317470A1 (en) * 2012-07-16 2015-11-05 Tencent Technology (Shenzhen) Company Limited Method and system for controlling access to applications on mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150317470A1 (en) * 2012-07-16 2015-11-05 Tencent Technology (Shenzhen) Company Limited Method and system for controlling access to applications on mobile terminal
CN103092468A (en) * 2013-01-30 2013-05-08 上海斐讯数据通信技术有限公司 Mobile terminal unlocking system and mobile terminal unlocking method
CN103616981A (en) * 2013-10-31 2014-03-05 小米科技有限责任公司 Application process method, device and mobile terminal
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
CN106250754B (en) * 2016-07-27 2018-11-30 维沃移动通信有限公司 A kind of control method and mobile terminal of application program
CN108270757A (en) * 2017-01-03 2018-07-10 腾讯科技(深圳)有限公司 A kind of user account switching method, device, client and system
CN108270757B (en) * 2017-01-03 2022-02-18 腾讯科技(深圳)有限公司 User account switching method, device, client and system
CN107220552A (en) * 2017-05-25 2017-09-29 维沃移动通信有限公司 A kind of encryption and decryption approaches and mobile terminal
CN109543370A (en) * 2017-09-22 2019-03-29 西安中兴新软件有限责任公司 A kind of application processing method, terminal and computer readable storage medium
CN109543370B (en) * 2017-09-22 2024-01-23 西安中兴新软件有限责任公司 Application processing method, terminal and computer readable storage medium
CN109145583A (en) * 2018-07-27 2019-01-04 奇酷互联网络科技(深圳)有限公司 Using unlocking method, system, mobile terminal and storage medium
WO2020156441A1 (en) * 2019-01-29 2020-08-06 维沃移动通信有限公司 Privacy space operation method and terminal device
CN114675897A (en) * 2020-12-24 2022-06-28 荣耀终端有限公司 Application program starting method and related device

Also Published As

Publication number Publication date
CN105868617B (en) 2020-02-04

Similar Documents

Publication Publication Date Title
CN105868617A (en) Application encryption method and mobile terminal
CN107450800A (en) A kind of task method to set up, mobile terminal and computer-readable recording medium
CN106126077A (en) A kind of application program image target display control method and mobile terminal
CN104424412A (en) Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN106506401A (en) A kind of flow managing method and mobile terminal
CN106127076A (en) The inspection method of a kind of photograph album photo and mobile terminal
CN106095250A (en) The method of application icon layout and mobile terminal
CN106357866A (en) Contact list management method and mobile intelligent terminal
CN107450799B (en) Message display method and mobile terminal
CN106951335A (en) A kind of process guard method and mobile terminal
CN106503579A (en) A kind of method and device of access target file
CN106157125A (en) A kind of payment interface changing method and device
CN106055198A (en) Method for displaying notifications based on content and mobile terminal
CN106484231A (en) A kind of method and device of application hides
CN106228085A (en) The method for secret protection of application program and mobile terminal
CN106681604A (en) Method for adjusting video playing progress and mobile terminal
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN106569662A (en) Display method of application interface and mobile terminal
CN105549810A (en) Application icon processing method and device, and terminal
CN105912954A (en) Privacy information protection method and system suitable for mobile terminal
CN106529275A (en) A method for application program operating mode switching and a mobile terminal
CN106780314A (en) The method and mobile terminal of a kind of picture mosaic preview
CN106156600A (en) The unlocking method of a kind of application program and mobile terminal
CN102880408B (en) Scene unlocking method for terminal equipment and terminal equipment
CN106250757A (en) The control method of a kind of application program and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant