CN106250757B - A kind of control method and mobile terminal of application program - Google Patents

A kind of control method and mobile terminal of application program Download PDF

Info

Publication number
CN106250757B
CN106250757B CN201610616293.5A CN201610616293A CN106250757B CN 106250757 B CN106250757 B CN 106250757B CN 201610616293 A CN201610616293 A CN 201610616293A CN 106250757 B CN106250757 B CN 106250757B
Authority
CN
China
Prior art keywords
mobile terminal
target icon
icon
application program
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610616293.5A
Other languages
Chinese (zh)
Other versions
CN106250757A (en
Inventor
殷求明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610616293.5A priority Critical patent/CN106250757B/en
Publication of CN106250757A publication Critical patent/CN106250757A/en
Application granted granted Critical
Publication of CN106250757B publication Critical patent/CN106250757B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides a kind of control method of application program and mobile terminals, wherein and the control method of application program is applied to mobile terminal, including:Detect the drag operation to target icon;Obtain the dragging track that the drag operation detected is formed;When the dragging track and default decryption path matching, start the destination application encrypted.Scheme provided by the invention starts the destination application encrypted by directly matching to being dragged to track, avoids the application program for executing multiple operations to open encryption, greatly reduces operating process, improve user experience;Simultaneously because the unfolding mode used is more hidden, so improving safety;The dragging track for opening encryption application program again oneself can be set, and improve interest.

Description

A kind of control method and mobile terminal of application program
Technical field
The present invention relates to field of communication technology more particularly to the control methods and mobile terminal of a kind of application program.
Background technique
With the improvement of living standards, requirement of the people to privacy is also higher and higher, occur adding for various scenes therewith It is close, such as:The encryption of application APP;And it is generally at present into the mode of the APP of encryption:The APP of encryption is clicked, then A figure unlock interface or numerical ciphers unlock interface are popped up, password is then inputted, after success, into the APP of encryption.
But the mode of this APP for entering encryption is excessively single, process is cumbersome, and there are certain safety issues.
Summary of the invention
The embodiment of the present invention provides a kind of control method of application program, to solve to enter encryption APP's in the prior art The cumbersome problem of process.
In a first aspect, the embodiment of the present invention provides a kind of control method of application program, it is applied to mobile terminal, including:
Detect the drag operation to target icon;
Obtain the dragging track that the drag operation detected is formed;
When the dragging track and default decryption path matching, start the destination application encrypted.
The present invention also provides a kind of mobile terminals, including:
Detection module, for detecting the drag operation to target icon;
First obtains module, the dragging track formed for obtaining the drag operation that the detection module detects;
Starting module, for when the first dragging track that gets of acquisition module and default decryption path matching, Start the destination application encrypted.
In this way, in the embodiment of the present invention, by directly matching to being dragged to track, and then starts the target encrypted and answer With program, the application program for executing multiple operations to open encryption is avoided, operating process is greatly reduced, improves user's body It tests;Simultaneously because the unfolding mode used is more hidden, so improving safety;The dragging rail of encryption application program is opened again Mark oneself can be set, and improve interest.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is the starting method flow diagram of the application program of the embodiment of the present invention one;
Fig. 2 is the starting method flow diagram of the application program of the embodiment of the present invention two;
Fig. 3 is the concrete application flow chart of the embodiment of the present invention two;
Fig. 4 is the starting method flow diagram of the application program of the embodiment of the present invention three;
Fig. 5 is the concrete application flow chart of the embodiment of the present invention three;
Fig. 6 is the mobile terminal structure schematic diagram one of the embodiment of the present invention four;
Fig. 7 is the mobile terminal structure schematic diagram two of the embodiment of the present invention four;
Fig. 8 is the mobile terminal structure schematic diagram three of the embodiment of the present invention four;
Fig. 9 is the mobile terminal structure schematic diagram four of the embodiment of the present invention four;
Figure 10 is the mobile terminal structure schematic diagram five of the embodiment of the present invention four;
Figure 11 is the mobile terminal structure schematic diagram six of the embodiment of the present invention four;
Figure 12 is the mobile terminal structure schematic diagram of the embodiment of the present invention five;
Figure 13 is the mobile terminal structure schematic diagram of the embodiment of the present invention six.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
The cumbersome problem of the present invention process that middle entrance encrypts APP in view of the prior art, provides a variety of solutions, It is specific as follows:
Embodiment one
As shown in Figure 1, the control method for the application program that the embodiment of the present invention one provides, is applied to mobile terminal, including:
Step 101:Detect the drag operation to target icon.
It is, detection carries out mobile trigger action to target icon.It can be detected, can also be passed through by pressure sensor Temperature sensor detection, is not limited thereto.
Step 102:Obtain the dragging track that the drag operation detected is formed.
It is, the sliding trace that target icon generates.Dragging track can be V, W, O, M, C, rectangle, triangle etc. Shape.
Step 103:When the dragging track and default decryption path matching, start the destination application encrypted.
The track and default decryption path matching of being dragged to can be, and sliding trace is consistent with default sliding trace, alternatively, Sliding trace is mutually chimeric with default sliding trace, is not limited thereto.
The control method for the application program that the embodiment of the present invention one provides by directly matching to being dragged to track, Start the destination application encrypted in turn, avoids the application program for executing multiple operations to open encryption, greatly reduce Operating process, improves user experience;Simultaneously because the unfolding mode used is more hidden, so improving safety;Again The dragging track for opening encryption application program oneself can be set, and improve interest.
Embodiment two
The case where icon corresponding for goal-selling application program for target icon, as shown in Fig. 2, the embodiment of the present invention The control method of two application programs provided, including:
Step 201:Detect the drag operation to target icon.
It is, detection carries out mobile trigger action to target icon.It can be detected, can also be passed through by pressure sensor Temperature sensor detection, is not limited thereto.
Step 202:Obtain the dragging track that the drag operation detected is formed.
It is, the sliding trace that target icon generates.Dragging track can be V, W, O, M, C, rectangle, triangle etc. Shape.
Step 203:When the dragging track and default decryption path matching, if the target icon is the default mesh The corresponding icon of application program is marked, then the destination application is decrypted.
The track and default decryption path matching of being dragged to can be, and sliding trace is consistent with default sliding trace, alternatively, Sliding trace is mutually chimeric with default sliding trace, is not limited thereto.
Step 204:The destination application after starting decryption.
It can be the initial interface for opening destination application, be also possible to open a certain predetermined function of destination application Can, it is not limited thereto.
Further, before the step of drag operation detected to target icon, the control method further includes:It connects Receive the pressing operation to target icon;Based on the pressing operation, compressing time is determined;When the compressing time is more than default Between threshold value when, setting the target icon to can dragging state.
It is, it is preferred that in the icon for clicking application program, and it is long on time, start to obtain the figure to the application program What mark be dragged to operation is dragged to track.It can prevent maloperation.
In order to guarantee the use feeling of user, after described the step of starting the destination application encrypted, the control Method processed further includes:By the position recovering of the target icon to initial position.
Target icon it is dragged after position be overlapped with the position before dragging when, omit the operation of reduction.
In order to improve interest, before the step of detection is to the drag operation of target icon, the control method is also Including:The target icon be in unencryption and can dragging state when, obtain mobile terminal user and drag the target icon It is formed by dragging track;The default decryption track is set by the dragging track, and encrypts the destination application.
The state of unencryption is namely in the corresponding destination application of target icon, and target icon is in and can drag It when dynamic state, obtains mobile terminal user's drag target icon and is formed by dragging track, set default solution for dragging track Close track, and encrypt destination application.
In order to further increase safety in utilization, the embodiment of the invention also includes:Track and default decryption are dragged to described Track mismatch, and execute number be more than frequency threshold value when, lock the destination application.It is preferred that frequency threshold value is 5.
Namely after being continuously dragged to 5 times, not yet with default decryption path matching, then locked on application program launching Function or the operating function of terminal etc..
The control method of application program provided by Embodiment 2 of the present invention is further described below.
In short, scheme provided by Embodiment 2 of the present invention is:The application icon of long-pressing encryption slides a rail Mark (one track of dragging) unlocks if the track of sliding and preset path matching and enters this application program, then will Application program image target position recovering.
Specifically as shown in figure 3, including:
Step 301:Receive the pressing operation to target icon.
It determines whether the time of pressing is greater than a time threshold, if so, being determined as that long-pressing acts, target icon is set Being set to can dragging state.
Step 302:Obtain the track of dragging.
It could also say that, user drags application icon, any direction sliding.With application program image target center The variation of coordinate generates a dragging track.
Step 303:Judge dragging track whether with default decryption path matching.
The track of dragging can be V, W, O, M, C, rectangle, triangle etc. shape.If dragging track with it is preset Path matching is decrypted, then 306 are entered step, if it does not match, entering step 304.
Step 304:Judge to drag whether number is more than frequency threshold value, if so, 305 are entered step, if it is not, then returning to step Rapid 302, it drags again.
Step 305:Application program is lockked, for example 5 times unsuccessful, lockked.
Step 306:It unlocks and enters this application program.
If the track dragged in step 303 and preset decryption path matching, directly unlocks and enter this and apply journey Sequence.
Step 307:By application icon position recovering.
During being marked on dragging due to this application program image, position may change, so entering application program Later, the picture mark position of this application program is restored on backstage.
From the foregoing, it will be observed that scheme provided by Embodiment 2 of the present invention is by directly matching to being dragged to track, and then start The destination application encrypted avoids the application program for executing multiple operations to open encryption, greatly reduces operation stream Journey improves user experience;Due to using a kind of application program unlocked than more covert mode and rapidly enter locking, so Safety has certain guarantee, while having certain interest.
Embodiment three
The case where for the target icon not being the goal-selling application program corresponding icon, as shown in figure 4, this The control method for the application program that inventive embodiments three provide, including:
Step 401:Detect the drag operation to target icon.
It is, detection carries out mobile trigger action to target icon.It can be detected, can also be passed through by pressure sensor Temperature sensor detection, is not limited thereto.
Step 402:Obtain the dragging track that the drag operation detected is formed.
It is, the sliding trace that target icon generates.Dragging track can be V, W, O, M, C, rectangle, triangle etc. Shape.
Step 403:When the dragging track and default decryption path matching, if the target icon is not described default The corresponding icon of destination application is then decrypted the application programs encrypted all in mobile terminal.
The track and default decryption path matching of being dragged to can be, and sliding trace is consistent with default sliding trace, alternatively, Sliding trace is mutually chimeric with default sliding trace, is not limited thereto.
Step 404:Mobile terminal user is received to the selection operation of icon.
Selection operation can be click, double-click, again by the operation such as, long-pressing, be not limited thereto.
Step 405:Application program corresponding to selected icon is determined as the destination application.
Namely using application program corresponding to selected icon as application program to be launched.
Step 406:Start the destination application.
It can be the initial interface for opening destination application, be also possible to open a certain predetermined function of destination application Can, it is not limited thereto.
Described herein as, in embodiment two other than step 203,204 and related content, other any contents are applicable In the present embodiment, details are not described herein.
The control method of the application program provided below the embodiment of the present invention three is further described.
In short, the scheme of the offer of the embodiment of the present invention three is:The specific application icon of long-pressing slides a rail Mark (one track of dragging), if the track of sliding and preset path matching, show hiding application icon, or The application program of locking is all unlocked, the application program of locking is clicked, then can be directly entered.
Specifically as shown in figure 5, including:
Step 501:Receive the pressing operation to target icon.
Here it is the specific application icon (non-encrypted) of pressing, is not the application icon that some is locked.
Step 502:Obtain the track of dragging.
It could also say that, user drags application icon, any direction sliding.With application program image target center The variation of coordinate generates a dragging track.
Step 503:Judge dragging track whether with default decryption path matching.
The track of dragging can be V, W, O, M, C, rectangle, triangle etc. shape.If dragging track with it is preset Path matching is decrypted, then 506 are entered step, if it does not match, entering step 504.
Step 504:Judge to drag whether number is more than frequency threshold value, if so, 505 are entered step, if it is not, then returning to step Rapid 502, it drags again.
Step 505:Application program is lockked, for example 5 times unsuccessful, lockked.
Step 506:Unlock the application program of encryption or the application program that display is hiding.
If track and the preset decryption path matching of dragging, are set to decrypted state for all application programs, or Person all shows hiding application program.
Step 507:It clicks and opens application program.
Due to all displays of the application program by hiding in step 506, the application program of locking is all It is decrypted, so application program can be directly entered.
Step 508:By application icon position recovering.
During being marked on dragging due to this application program image, position may change, so entering application program Later, the picture mark position of this application program is restored on backstage.
From the foregoing, it will be observed that the scheme that the embodiment of the present invention three provides unlocks all add than more covert mode by using a kind of The application icon that the application program of lock or display are hidden, subsequently into application program;With safety and interest, mention User experience is risen.
Example IV
As shown in Fig. 6 to Figure 11, the mobile terminal that the embodiment of the present invention four provides includes:
Detection module 601, for detecting the drag operation to target icon.
It is, detection carries out mobile trigger action to target icon.
First obtains module 602, the dragging rail formed for obtaining the drag operation that the detection module detects Mark.
It is, the sliding trace that target icon generates.
Starting module 603, dragging track and default decryption path matching for being got when the first acquisition module When, start the destination application encrypted.
The track and default decryption path matching of being dragged to can be, and sliding trace is consistent with default sliding trace, alternatively, Sliding trace is mutually chimeric with default sliding trace, is not limited thereto.
Further, as shown in fig. 7, the mobile terminal further includes:Receiving module 701, in the detection module Before 601 detections are to the drag operation of target icon, the pressing operation to target icon is received;Determining module 702, for being based on The pressing operation, determines compressing time;Setup module 703, the compressing time for determining in the determining module are super When crossing preset time threshold, setting the target icon to can dragging state.
It is, it is preferred that in the icon for clicking application program, and it is long on time, start to obtain the figure to the application program What mark be dragged to operation is dragged to track.It can prevent maloperation.
The case where icon corresponding for goal-selling application program for target icon, as shown in figure 8, the starting module 603 include:First decryption submodule 801, if being the corresponding icon of the goal-selling application program for the target icon, Then the destination application is decrypted;First promoter module 802, for starting the first decryption submodule decryption The destination application afterwards.
The case where for the target icon not being the goal-selling application program corresponding icon, as shown in figure 9, institute Stating starting module 603 includes:Second decryption submodule 901, if not being the goal-selling application journey for the target icon The corresponding icon of sequence is then decrypted the application programs encrypted all in mobile terminal;Receiving submodule 902, for connecing Mobile terminal user is received to the selection operation of icon;Submodule 903 is determined, for by application journey corresponding to the icon being selected Sequence is determined as the destination application;Second promoter module 904, the mesh determined for starting the determining submodule Mark application program.
In order to guarantee the use feeling of user, as shown in Figure 10, the mobile terminal further includes:Recovery module 1001 is used After the destination application that has encrypted of the starting module 603 starting, by the position recovering of the target icon to initial Position.
Target icon it is dragged after position be overlapped with the position before dragging when, omit the operation of reduction.
In order to improve interest, as shown in figure 11, the mobile terminal further includes:Second obtains module 1101, is used for institute Before the detection of detection module 601 is stated to the drag operation of target icon, unencryption is in the target icon and can drag shape When state, obtains mobile terminal user's dragging target icon and be formed by dragging track;Processing module 1102, being used for will be described The dragging track that second acquisition module obtains is set as the default decryption track, and encrypts the destination application.
The state of unencryption is namely in the corresponding destination application of target icon, and target icon is in and can drag It when dynamic state, obtains mobile terminal user's drag target icon and is formed by dragging track, set default solution for dragging track Close track, and encrypt destination application.
The mobile terminal that the embodiment of the present invention four provides is started by directly matching to being dragged to track The destination application of encryption avoids the application program for executing multiple operations to open encryption, greatly reduces operating process, Improve user experience;Simultaneously because the unfolding mode used is more hidden, so improving safety;Encryption application is opened again The dragging track of program oneself can be set, and improve interest.
Wherein, the realization embodiment of the control method of above-mentioned application program is suitable for the embodiment of the mobile terminal In, it can also reach identical technical effect.
Embodiment five
As shown in figure 12, the mobile terminal 1200 of the offer of the embodiment of the present invention five includes:
At least one processor 1201, memory 1202, at least one network interface 1204 and user interface 1203.It is mobile Various components in terminal 1200 are coupled by bus system 1205.It is understood that bus system 1205 is for realizing this Connection communication between a little components.Bus system 1205 except include data/address bus in addition to, further include power bus, control bus and Status signal bus in addition.But for the sake of clear explanation, various buses are all designated as bus system 1205 in Figure 12.
Wherein, user interface 1203 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 1202 in the embodiment of the present invention can be volatile memory or non-volatile memories Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only Read memory (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, ) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), use Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random-access Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous Connect dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 1202 of system and method described herein is intended to include but is not limited to this A little and any other suitable type memory.
In some embodiments, memory 1202 stores following element, executable modules or data structures, or Their subset of person or their superset:Operating system 12021 and application program 12022.
Wherein, operating system 12021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 12022 includes various application programs, such as matchmaker Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented The program of example method may be embodied in application program 12022.
In embodiments of the present invention, by the program or instruction of calling memory 1202 to store, specifically, can be application The program or instruction stored in program 12022, processor 1201 are used to detect the drag operation to target icon;Acquisition detects The drag operation formed dragging track;When the dragging track and default decryption path matching, what starting had encrypted Destination application.
The method that the embodiments of the present invention disclose can be applied in processor 1201, or real by processor 1201 It is existing.Processor 1201 may be a kind of IC chip, the processing capacity with signal.During realization, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1201 or software form.Above-mentioned Processor 1201 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 1202, processor 1201 reads the information in memory 1202, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, processor 1201 is specifically used for:Before detection is to the drag operation of target icon, receive to target icon Pressing operation;Based on the pressing operation, compressing time is determined;It, will when the compressing time is more than preset time threshold The target icon is set as can dragging state.
Optionally, processor 1201 is specifically used for:If the target icon is that the goal-selling application program is corresponding Icon is then decrypted the destination application;The destination application after starting decryption.
Optionally, processor 1201 is specifically also used to:If the target icon is not the goal-selling application program pair The icon answered then is decrypted the application programs encrypted all in mobile terminal;Mobile terminal user is received to icon Selection operation;Application program corresponding to selected icon is determined as the destination application;Start the target to answer Use program.
Optionally, processor 1201 is specifically also used to:After starting the destination application encrypted, by the target figure Target position recovering is to initial position.
Optionally, processor 1201 is specifically also used to:Before detection is to the drag operation of target icon, in the target figure Mark in unencryption and can dragging state when, obtain mobile terminal user and drag the target icon and be formed by dragging track; The default decryption track is set by the dragging track, and encrypts the destination application.
Mobile terminal 1200 can be realized each process that mobile terminal is realized in previous embodiment, to avoid repeating, this In repeat no more.
To sum up, the mobile terminal that the embodiment of the present invention five provides is by directly matching to being dragged to track, in turn Start the destination application encrypted, avoids the application program for executing multiple operations to open encryption, greatly reduce behaviour Make process, improves user experience;Simultaneously because the unfolding mode used is more hidden, so improving safety;It opens again The dragging track for encrypting application program oneself can be set, and improve interest.
Embodiment six
Specifically, as shown in figure 13, the mobile terminal 1300 in the embodiment of the present invention six can for mobile phone, tablet computer, Personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc..
Mobile terminal 1300 in Figure 13 include radio frequency (Radio Frequency, RF) circuit 1310, memory 1320, Input unit 1330, display unit 1340, processor 1360, voicefrequency circuit 1370, WiFi (Wireless Fidelity) module 1380 and power supply 1390.
Wherein, input unit 1330 can be used for receiving the number or character information of user's input, and generate with movement eventually The related signal input of the user setting and function control at end 1300.Specifically, in the embodiment of the present invention, the input unit 1330 may include touch panel 1331.Touch panel 1331, also referred to as touch screen collect the touching of user on it or nearby It touches operation (for example user uses the operations of any suitable object or attachment on touch panel 1331 such as finger, stylus), and Corresponding attachment device is driven according to preset formula.Optionally, touch panel 1331 may include touch detecting apparatus and Two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation bring letter Number, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into Contact coordinate, then give the processor 1360, and order that processor 1360 is sent can be received and executed.Furthermore, it is possible to Touch panel 1331 is realized using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1331, input unit 1330 can also include other input equipments 1332, other input equipments 1332 can include but is not limited to One of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are more Kind.
Wherein, display unit 1340 can be used for showing information input by user or be supplied to the information and movement of user The various menu interfaces of terminal 1300.Display unit 1340 may include display panel 1341, optionally, using LCD or can have The forms such as machine light emitting diode (Organic Light-Emitting Diode, OLED) configure display panel 1341.
It should be noted that touch panel 1331 can cover display panel 1341, touch display screen is formed, when the touch display screen After detecting touch operation on it or nearby, processor 1360 is sent to determine the type of touch event, is followed by subsequent processing Device 1360 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface elements such as the icon comprising at least one application program and/or widget desktop control.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 1360 is the control centre of mobile terminal 1300, utilizes various interfaces and connection whole mobile phone Various pieces, by running or execute the software program and/or module that are stored in first memory 1321, and call and deposit The data in second memory 1322 are stored up, the various functions and processing data of mobile terminal 1300 are executed, thus eventually to movement End 1300 carries out integral monitoring.Optionally, processor 1360 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 1321 in software program and/or module and/ Or the data in the second memory 1322, processor 1360 are used to detect the drag operation to target icon;Acquisition detects The drag operation formed dragging track;When the dragging track and default decryption path matching, what starting had encrypted Destination application.
Optionally, processor 1360 is specifically used for:Before detection is to the drag operation of target icon, receive to target icon Pressing operation;Based on the pressing operation, compressing time is determined;It, will when the compressing time is more than preset time threshold The target icon is set as can dragging state.
Optionally, processor 1360 is specifically used for:If the target icon is that the goal-selling application program is corresponding Icon is then decrypted the destination application;The destination application after starting decryption.
Optionally, processor 1360 is specifically also used to:If the target icon is not the goal-selling application program pair The icon answered then is decrypted the application programs encrypted all in mobile terminal;Mobile terminal user is received to icon Selection operation;Application program corresponding to selected icon is determined as the destination application;Start the target to answer Use program.
Optionally, processor 1360 is specifically also used to:After starting the destination application encrypted, by the target figure Target position recovering is to initial position.
Optionally, processor 1360 is specifically also used to:Before detection is to the drag operation of target icon, in the target figure Mark in unencryption and can dragging state when, obtain mobile terminal user and drag the target icon and be formed by dragging track; The default decryption track is set by the dragging track, and encrypts the destination application.
As it can be seen that the mobile terminal that the embodiment of the present invention six provides is by directly matching to being dragged to track, in turn Start the destination application encrypted, avoids the application program for executing multiple operations to open encryption, greatly reduce behaviour Make process, improves user experience;Simultaneously because the unfolding mode used is more hidden, so improving safety;It opens again The dragging track for encrypting application program oneself can be set, and improve interest.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various to can store program code Medium.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or the terminal device that include a series of elements not only include that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of terminal device.In the absence of more restrictions, the element limited by sentence "including a ...", and It is not precluded in the process, method including the element, article or terminal device that there is also other identical elements.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (10)

1. a kind of control method of application program, it is applied to mobile terminal, which is characterized in that the control method includes:
Detect the drag operation to target icon;
Obtain the dragging track that the drag operation detected is formed;
When the dragging track and default decryption path matching, start the destination application encrypted;
Wherein, described the step of starting the destination application encrypted, including:
If the target icon is not the corresponding icon of goal-selling application program, in mobile terminal it is all encrypted answer It is decrypted with program;
Mobile terminal user is received to the selection operation of icon;
Application program corresponding to selected icon is determined as the destination application;
Start the destination application.
2. control method according to claim 1, which is characterized in that step of the detection to the drag operation of target icon Before rapid, the control method further includes:
Receive the pressing operation to target icon;
Based on the pressing operation, compressing time is determined;
When the compressing time is more than preset time threshold, setting the target icon to can dragging state.
3. control method according to claim 1, which is characterized in that the step for starting the destination application encrypted Suddenly, including:
If the target icon is the corresponding icon of goal-selling application program, the destination application is decrypted;
The destination application after starting decryption.
4. control method according to claim 1, which is characterized in that the step for starting the destination application encrypted After rapid, the control method further includes:
By the position recovering of the target icon to initial position.
5. control method according to claim 1, which is characterized in that step of the detection to the drag operation of target icon Before rapid, the control method further includes:
The target icon be in unencryption and can dragging state when, obtain mobile terminal user and drag the target icon institute The dragging track of formation;
The default decryption track is set by the dragging track, and encrypts the destination application.
6. a kind of mobile terminal, which is characterized in that including:
Detection module, for detecting the drag operation to target icon;
First obtains module, the dragging track formed for obtaining the drag operation that the detection module detects;
Starting module, for starting when described first obtains the dragging track that module is got and default decryption path matching The destination application encrypted;
Wherein, the starting module includes:
Second decryption submodule, if not being the corresponding icon of goal-selling application program for the target icon, to movement All application programs encrypted are decrypted in terminal;
Receiving submodule, for receiving mobile terminal user to the selection operation of icon;
Submodule is determined, for application program corresponding to the icon being selected to be determined as the destination application;
Second promoter module, the destination application determined for starting the determining submodule.
7. mobile terminal according to claim 6, which is characterized in that the mobile terminal further includes:
Receiving module, for receiving to target icon before the detection module is detected to the drag operation of target icon Pressing operation;
Determining module determines compressing time for being based on the pressing operation;
Setup module, when the compressing time for determining in the determining module is more than preset time threshold, by the mesh Mark of marking on a map is set as can dragging state.
8. mobile terminal according to claim 6, which is characterized in that the starting module includes:
First decryption submodule, if being the corresponding icon of goal-selling application program for the target icon, to the mesh Mark application program is decrypted;
First promoter module, for starting the destination application after the first decryption submodule is decrypted.
9. mobile terminal according to claim 6, which is characterized in that the mobile terminal further includes:
Recovery module, after starting the destination application encrypted for the starting module, by the position of the target icon It sets and is restored to initial position.
10. mobile terminal according to claim 6, which is characterized in that the mobile terminal further includes:
Second obtains module, before detecting for the detection module to the drag operation of target icon, in the target icon In unencryption and can dragging state when, obtain mobile terminal user and drag the target icon and be formed by dragging track;
Processing module, the dragging track for obtaining the second acquisition module is set as the default decryption track, and adds The close destination application.
CN201610616293.5A 2016-07-29 2016-07-29 A kind of control method and mobile terminal of application program Active CN106250757B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610616293.5A CN106250757B (en) 2016-07-29 2016-07-29 A kind of control method and mobile terminal of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610616293.5A CN106250757B (en) 2016-07-29 2016-07-29 A kind of control method and mobile terminal of application program

Publications (2)

Publication Number Publication Date
CN106250757A CN106250757A (en) 2016-12-21
CN106250757B true CN106250757B (en) 2018-11-30

Family

ID=57606860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610616293.5A Active CN106250757B (en) 2016-07-29 2016-07-29 A kind of control method and mobile terminal of application program

Country Status (1)

Country Link
CN (1) CN106250757B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107194236A (en) * 2017-05-24 2017-09-22 深圳天珑无线科技有限公司 One kind application decryption method and device
CN107273721A (en) * 2017-06-14 2017-10-20 深圳天珑无线科技有限公司 To the processing method and processing device of application
CN107608585A (en) * 2017-09-18 2018-01-19 深圳市万普拉斯科技有限公司 The operating method and equipment and mobile terminal of a kind of application program
CN109002247A (en) * 2018-06-15 2018-12-14 维沃移动通信有限公司 A kind of data clearing method, mobile terminal
CN111427587B (en) * 2019-05-30 2023-08-29 杭州海康威视数字技术股份有限公司 Target deleting method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN102479027A (en) * 2010-11-24 2012-05-30 中兴通讯股份有限公司 Control method and device of application icons on touch screen
CN103543936A (en) * 2012-07-16 2014-01-29 中兴通讯股份有限公司 Method for user to unlock touch screen terminal and have access to application fast and touch screen terminal
CN104123164A (en) * 2014-07-31 2014-10-29 广东欧珀移动通信有限公司 Application program starting method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8127254B2 (en) * 2007-06-29 2012-02-28 Nokia Corporation Unlocking a touch screen device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN102479027A (en) * 2010-11-24 2012-05-30 中兴通讯股份有限公司 Control method and device of application icons on touch screen
CN103543936A (en) * 2012-07-16 2014-01-29 中兴通讯股份有限公司 Method for user to unlock touch screen terminal and have access to application fast and touch screen terminal
CN104123164A (en) * 2014-07-31 2014-10-29 广东欧珀移动通信有限公司 Application program starting method and device

Also Published As

Publication number Publication date
CN106250757A (en) 2016-12-21

Similar Documents

Publication Publication Date Title
CN106126077B (en) Display control method of application program icons and mobile terminal
CN106250757B (en) A kind of control method and mobile terminal of application program
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106681623B (en) A kind of sharing method and mobile terminal of screenshotss image
CN106844067B (en) A kind of processing method and mobile terminal of content
CN106406656B (en) A kind of control method and mobile terminal of application tool bar
CN106951174B (en) A kind of method of adjustment and mobile terminal of dummy keyboard
CN106020613A (en) Operation method and mobile terminal for unread messages
CN106357866B (en) A kind of book management method and mobile intelligent terminal
CN106055195A (en) Operating method for folder and mobile terminal
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN106325753B (en) A kind of display methods and mobile terminal of payment interface
CN106372470B (en) A kind of method and mobile terminal for reminding input password
CN107644170B (en) A kind of image processing method and mobile terminal
CN105867830B (en) A kind of processing method and mobile terminal based on fingerprint recognition
CN106027794B (en) A kind of encryption method and mobile terminal of photo
CN107506111A (en) The encryption and decryption method and terminal of a kind of terminal applies
CN106959797B (en) A kind of setting method and mobile terminal notifying footmark
CN107390991B (en) A kind of processing method and mobile terminal of screenshot
CN106445328B (en) Unlocking method of mobile terminal screen and mobile terminal
CN106446614B (en) A kind of right management method and mobile terminal of application program
CN106156600B (en) A kind of unlocking method and mobile terminal of application program
CN107229396A (en) A kind of hiding method of mobile terminal application icon and mobile terminal
CN106502545B (en) A kind of operating method and mobile terminal for sliding control
CN107632870A (en) The startup method and terminal of a kind of application

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant