CN106775189A - A kind of application program locks method and locking system - Google Patents

A kind of application program locks method and locking system Download PDF

Info

Publication number
CN106775189A
CN106775189A CN201611010035.9A CN201611010035A CN106775189A CN 106775189 A CN106775189 A CN 106775189A CN 201611010035 A CN201611010035 A CN 201611010035A CN 106775189 A CN106775189 A CN 106775189A
Authority
CN
China
Prior art keywords
application program
instruction
lock
locked
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611010035.9A
Other languages
Chinese (zh)
Inventor
李慧灵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201611010035.9A priority Critical patent/CN106775189A/en
Publication of CN106775189A publication Critical patent/CN106775189A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The present invention relates to a kind of application program locking method and locking system, the enterprising line slip operation of icon of the application software that user can directly in mobile communication terminals, to lock or unlock application software, prevents the individual privacy leaking data in application software.

Description

A kind of application program locks method and locking system
Technical field
The present invention relates to a kind of application program locking method and locking system.
Background technology
Application program, refers to complete one or more computer program of particular job, is generally basede on computer, intelligent hand The hardware platforms such as machine, panel computer.Application program can be interacted with user, in starting state, be shown on the desktop of platform Show visual exercisable user interface, in closing or resting state, an icon is shown as on the table.
In mobile communication terminals, input equipment and output equipment it is general all it is integrated on a touch screen so that user Can on the touchscreen be entered the operating instructions using finger, man-machine interaction is realized using touch-screen.
With the development of the communication technology and data technique, communication terminal (such as smart mobile phone, panel computer) to data at Reason ability more and more higher, the application program run on communication terminals(APP)Also more and more, common application program includes logical Letter software, office software, video software, etc..Allow that mobile device is widely used in the aspects such as study, amusement, work, More and more important role is play in daily life.
Mobile device is frequently used for the instrument for being exchanged or being kept record as modern, because mobile device is private thing Product, it is general to be used while only having a user, furthermore, the frequent mobile device of user is carried, it is not easy to be missed, therefore mobile Device interior often stores substantial amounts of individual privacy information and capsule information document, and such as secret photo, private video is related to The information of privacy, such as company's bill, competitive bidding book, electronic contract are related to the data of business secret.
User causes that user is unwilling storage individual privacy information and capsule information text for the dependence of mobile device Shelves cannot be transferred to and be managed elsewhere, but manage on the mobile apparatus.And in these privacy informations and capsule information Document there is a problem that maliciously being obtained by other people, particularly when user loses mobile device, as long as normal open mobile setting The standby individual privacy information and capsule information document that just very can easily obtain its storage, security is very poor.
During using application program, it is no lack of many private datas in the user data of application program, for example, contacts The data such as people's information and chat record.Therefore, thing followed Privacy Protection is also more and more important.Such as user is using During mobile phone, if the mobile phone screen of user is seen by people(Such case often occurs), or mobile phone lost, or Mobile phone needs to lend others and uses, then can cause the leakage of the privacy of user data of application program in mobile phone.
Prior art provides a kind of guard method of the privacy of user data of application program, is that application program sets password Lock defencive function, if a certain application program is locked, that is, is provided with and accesses password, then when user accesses the application journey of the locking During sequence, an interface for password input can be ejected, user needs to input correct password in the cryptographic interface and could start and should answer With program, and access the user data in the application program.
Above-mentioned technical proposal is disadvantageous in that:The method directly limit the right of user's access application, though So other people cannot learn the privacy of user data of application program in the very first time, but the method clearly points out other people:" this application Have secret in program, however it is necessary that password could be accessed ", this clearly prompting can cause other people to produce the dynamic of decryption Machine, decryption can be easy to using existing code-breaking techniques, so as to cause the privacy of user data of application program Leakage.
The content of the invention
It is an object of the invention to:A kind of application program locking method is provided, with solving existing mobile communication terminal Application software(APP)The technical problem that existing privacy of user data are easily revealed.
In order to solve the above technical problems, the present invention provides a kind of application program locking method, including:Lock program selection step Suddenly, application program to be locked is selected;Password presets step, presets at least one locking password, and each locking password correspondence one is treated The application program of locking;Lock instruction obtaining step, obtains lock instruction, and the lock instruction includes locking password;And lock Determine step, the application program identification to be locked is locked application program by locking applications.
Further, the application program locking method, also includes:Operating instruction obtaining step, obtains at least one and runs Instruction;Object judging step is performed, whether the execution object for judging the operating instruction is locked application program;If so, Intercept and capture the operating instruction;If it is not, the operating instruction is sent to the application program.
Further, the application program is mounted in mobile communication terminals;The mobile communication terminal includes input Output interface;The I/O Interface includes an at least icon, one application program of each icon correspondence.The operating instruction For the clicking operation that user is carried out on the icon;The lock instruction is the slip behaviour that user is carried out on the icon Make;The locking password is the sliding trace of slide in the lock instruction;And the slip rail in the lock instruction Mark is cipher graphic user preset or that system is prestored.
Further, the application program locking method also includes:Unlocking program selects step, selects to be unlocked Application program;Unlock instruction obtaining step, obtains the unlock instruction of the application program to be unlocked;The unlock instruction Include unlocking pin;Password contrasts step, the unlocking pin in the contrast application program unlock instruction to be unlocked It is whether identical or corresponding to the locking password in application program locking instruction;If so, performing unlocked step;If it is not, returning to solution Lock instruction obtaining step;Unlocked step, the unblock application program to be unlocked, removes the mark of locked application program Know.
Further, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is The sliding trace of slide in the unlock instruction;Cunning in sliding trace in the unlock instruction and the lock instruction Dynamic rail mark is identical or corresponding;Sliding trace in the unlock instruction is password figure user preset or that system is prestored Shape.
It is an object of the invention to:A kind of application program locking system is provided, with solving existing mobile communication terminal Application software(APP)The technical problem that existing privacy of user data are easily revealed.
In order to solve the above technical problems, the present invention provides a kind of application program locking system including:Lock program selection is single Unit, for selecting application program to be locked;Password presets unit, for default at least one locking password, each locking password One application program to be locked of correspondence;Lock instruction acquiring unit, for obtaining lock instruction, the lock instruction includes locking Password;And lock cell, it is locked application journey by the application program identification to be locked for locking applications Sequence.
Further, the application program locking system also includes:Operating instruction acquiring unit, transports for obtaining at least one Row instruction;Object judging unit is performed, whether the execution object for judging the operating instruction is locked application program; If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.
Further, the application program is mounted in mobile communication terminals;The mobile communication terminal includes input Output interface;The I/O Interface includes an at least icon, one application program of each icon correspondence;The operating instruction For the clicking operation that user is carried out on the icon;The lock instruction is the slip behaviour that user is carried out on the icon Make;The locking password is the sliding trace of slide in the lock instruction;And the slip rail in the lock instruction Mark is cipher graphic user preset or that system is prestored.
Further, the application program locking system also includes:Unlocking program select unit, for selecting to wait to release lock Fixed application program;Unlock instruction acquiring unit, for obtaining unlock instruction, the unlock instruction includes unlocking pin;It is close Code comparison unit, for contrasting the locking during the unlocking pin in the application program unlock instruction is instructed with application program locking Whether password is identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;Unlocking unit, for unlocking The application program to be unlocked, removes the mark of locked application program.
Further, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is The sliding trace of slide in the unlock instruction;Cunning in sliding trace in the unlock instruction and the lock instruction Dynamic rail mark is identical or corresponding;Sliding trace in the unlock instruction is password figure user preset or that system is prestored Shape.
The advantage of the invention is that:User can directly in mobile communication terminals application software icon on slided Dynamic operation, to lock or unlock application software, prevents the individual privacy leaking data in application software.
Brief description of the drawings
Fig. 1 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 1;
Fig. 2 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 1;
Fig. 3 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 2;
Fig. 4 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 2;
Fig. 5 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 3;
Fig. 6 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 3.
Specific embodiment
The preferred embodiments of the present invention are introduced below with reference to Figure of description, can be complete to those of skill in the art The present invention is introduced, is made its technology contents more clear and is readily appreciated.The present invention can be by the embodiment of many multi-forms To emerge from, protection scope of the present invention is not limited only to the embodiment mentioned in text.
Embodiment 1
As shown in figure 1, embodiment 1 provides a kind of application program locking method, following steps are specifically included.
Step S11)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence, in non-locking state Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected. The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select Select the application program for needing locking.
Step S12)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The shape of the sliding trace Shape is cipher graphic user preset or that system is prestored, such as straight line, triangle, circle, square, etc..The cunning Dynamic rail mark has beginning and end, and the slide must be carried out according to certain orientation, can be defined as locking the slip of password Direction.In order to lock and convenient for unlocking, cipher graphic is typically designed as the simple graph drawn by.
Step S13)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S14)Locking applications, are locked application program by the application program identification to be locked.Mark Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP) Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
In embodiment 1, step S11)- step S14)Have technical effect that, user is needing the application program of locking A default cipher graphic is drawn on desktop icons, you can application program is locked.
As shown in Fig. 2 embodiment 1 also provides a kind of application program locking system 100, including:Lock program select unit 1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked Use program.
The function of each unit in application program locking system all with step S11)- step S14)It is corresponding, its technology Effect is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can correspondence Locked with program.
Embodiment 2
As shown in figure 3, embodiment 2 provides a kind of application program locking method, following steps are specifically included.
Step S21)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence.In non-locking state Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected. The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select Select the application program for needing locking.
Step S22)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The sliding trace is use The cipher graphic that family is default or system is prestored, such as straight line, triangle, circle, square, etc..The sliding trace There is beginning and end, the slide must be carried out according to certain orientation, can be defined as glide direction.
Step S23)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S24)Locking applications, are locked application program by the application program identification to be locked.Mark Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP) Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
Step S25)Obtain an at least operating instruction.User can be in the input and output of mobile communication terminal in the present embodiment Application software is clicked on interface(APP)Icon, to be input into program operating instruction.
Step S26)Whether the execution object for judging the operating instruction is locked application program;If so, performing step Rapid S27);If it is not, performing step S28).The I/O Interface of mobile communication terminal obtains an operating instruction, judges the operation The execution object of instruction(Point to object)Whether it is in step S21)- step S24)In the application program that has been locked.
Step S27)If the execution object of the operating instruction is locked application program, the operating instruction is intercepted and captured, Even if finger is clicked application software by user(APP)Icon on, the application software(APP)Startup.
Step S28)If the object that performs of the operating instruction is the application program of non-locking, the operating instruction is sent To the application program, start the application program.
In embodiment 2, step S21)- step S24)Have technical effect that, user is needing the application program of locking A default cipher graphic is drawn on desktop icons, you can application program is locked.And step S21)- step S24)'s Have technical effect that so that locked application program, even if receiving normal enabled instruction(User is on application software icon Click on), also will not startup optimization.
As shown in figure 4, embodiment 2 also provides a kind of application program locking system 200, including:Lock program select unit 1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked Use program.
In application program locking system the function of said units all with step S21)- step S24)It is corresponding, its technology effect Fruit is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can to application Program is locked.
As shown in figure 4, the application program locking system also includes:Operating instruction acquiring unit 5, for obtaining at least one Operating instruction;Object judging unit 6 is performed, whether the execution object for judging the operating instruction is locked application journey Sequence;If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.Operating instruction obtains single Unit 5 and the function and step S25 that perform object judging unit 6)- step S28)It is corresponding so that locked application program, i.e., Make to receive normal enabled instruction, also will not startup optimization.
In the application program locking system, the application program is mounted in mobile communication terminals;The movement Communication terminal includes I/O Interface;The I/O Interface includes an at least icon, each one application of icon correspondence Program;The operating instruction is the clicking operation that user is carried out on the icon;The lock instruction is user in the figure Put on the slide for carrying out;The locking password is the sliding trace of slide in the lock instruction;And the lock Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Embodiment 3
As shown in figure 5, embodiment 3 provides a kind of application program locking method, following steps are specifically included.
Step S31)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence, in non-locking state Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected. The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select Select the application program for needing locking.
Step S32)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The sliding trace is use The cipher graphic that family is default or system is prestored, such as straight line, triangle, circle, square, etc..The sliding trace There is beginning and end, the slide must be carried out according to certain orientation, can be defined as glide direction.In order to lock reconciliation Lock is convenient, and cipher graphic is typically designed as the simple graph drawn by.
Step S33)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S34)Locking applications, are locked application program by the application program identification to be locked.Mark Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP) Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
Step S35)Obtain the unlock instruction of the application program to be unlocked;The unlock instruction includes unblock Password;The unlock instruction is the slide that user is carried out on the icon;The unlocking pin is the unlock instruction The sliding trace of middle slide.The shape of the sliding trace of the unlocking pin also should be user preset or system it is advance The cipher graphic of storage, the sliding trace has beginning and end, and the slide must be carried out according to certain orientation, Ke Yiding Justice is the glide direction of unlocking pin.Correct unlocking pin, it should or phase identical with the locking password for locking the application program Should(Shape is identical, sliding trace is in opposite direction), specifically, in correct unlock instruction, the cipher graphic in unlocking pin With step S32)Cipher graphic in middle locking password is identical, the glide direction of unlocking pin and the glide direction phase of multi-win password It is same or opposite.
Step S36)Unlocking pin and the application program in the contrast application program unlock instruction to be unlocked Whether the locking password in lock instruction is identical or corresponding;If so, unlocking pin is correct, step S37 is performed);If it is not, unblock is close Wrong, the return to step S35 of code), wait the unlock instruction for reacquiring the application program to be unlocked.
Step S37)The unblock application program to be unlocked, removes the mark of locked application program.Removal Identification procedure is the process of icon brightening;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted It is dead color;After unlocking, application software can start at any time, the application software on mobile communication terminal(APP)Icon becomes It is light tone.
In embodiment 3, step S31)- step S34)Have technical effect that, user is needing the application program of locking A default cipher graphic is drawn on desktop icons, you can application program is locked.Step S35)- step S37)Skill Art effect is that user draws one with cipher graphic identical decryption figure on the desktop icons of locked application program Shape, you can release the locking of application program.During decrypted graphics are drawn, in the sliding trace and locking password of user's finger The direction of sliding trace is identical or opposite.
As shown in fig. 6, embodiment 3 also provides a kind of application program locking system 300, including:Lock program select unit 1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked Use program.
In application program locking system the function of said units all with step S31)- step S34)It is corresponding, its technology effect Fruit is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can to application Program is locked.
As shown in fig. 6, the application program locking system also includes:Operating instruction acquiring unit 5, for obtaining at least one Operating instruction;Object judging unit 6 is performed, whether the execution object for judging the operating instruction is locked application journey Sequence;If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.Operating instruction obtains single Unit 5 causes locked application program with object judging unit 6 is performed, even if receiving normal enabled instruction, will not also start Operation.
In the application program locking system, the application program is mounted in mobile communication terminals;The movement Communication terminal includes I/O Interface;The I/O Interface includes an at least icon, each one application of icon correspondence Program;The operating instruction is the clicking operation that user is carried out on the icon;The lock instruction is user in the figure Put on the slide for carrying out;The locking password is the sliding trace of slide in the lock instruction;And the lock Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
As shown in fig. 6, the application program locking system also includes:Unlocking program select unit 7, for selecting to wait to release The application program of locking;Unlock instruction acquiring unit 8, for obtaining unlock instruction, the unlock instruction includes unlocking pin; Password comparison unit 9, locks in instructing for contrasting the unlocking pin in the application program unlock instruction and the application program Whether locking password is identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;Unlocking unit 10, uses In the unblock application program to be unlocked, the mark of locked application program is removed.
Unlocking program select unit 7, unlock instruction acquiring unit 8, password comparison unit 9, the function of unlocking unit 10 with The step S35)- step S37)Corresponding, it has technical effect that, user is on the desktop icons of locked application program One is drawn with cipher graphic identical decrypted graphics, you can release the locking of application program.During decrypted graphics are drawn, The sliding trace of user's finger is identical or opposite with the direction of sliding trace in locking password.
Wherein, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is described The sliding trace of slide in unlock instruction;Slip rail in sliding trace in the unlock instruction and the lock instruction Mark is identical or corresponding;Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
The advantage of embodiment of the present invention 1-3 is:User can directly in mobile communication terminals application software figure Putting on carries out slide, to lock or unlock application software.Do not know unlocking pin anyone can not all start it is locked Application software, to prevent the individual privacy leaking data in application software.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art Member, under the premise without departing from the principles of the invention, can also make some improvements and modifications, and these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of application program locks method, it is characterised in that including:
Lock program selects step, selects application program to be locked;
Password presets step, presets at least one locking password, one application program to be locked of each locking password correspondence;
Lock instruction obtaining step, obtains lock instruction, and the lock instruction includes locking password;And
Lock step, the application program identification to be locked is locked application program by locking applications.
2. application program according to claim 1 locks method, it is characterised in that also include:
Operating instruction obtaining step, obtains an at least operating instruction;
Object judging step is performed, whether the execution object for judging the operating instruction is locked application program;If so, cutting Obtain the operating instruction;If it is not, the operating instruction is sent to the application program.
3. application program according to claim 2 locks method, it is characterised in that
The application program is mounted in mobile communication terminals;
The mobile communication terminal includes I/O Interface;
The I/O Interface includes an at least icon, one application program of each icon correspondence;
The operating instruction is the clicking operation that user is carried out on the icon;
The lock instruction is the slide that user is carried out on the icon;
The locking password is the sliding trace of slide in the lock instruction;And
Sliding trace in the lock instruction is cipher graphic user preset or that system is prestored.
4. application program according to claim 1 and 2 locks method, it is characterised in that also include:
Unlocking program selects step, selects application program to be unlocked;
Unlock instruction obtaining step, obtains the unlock instruction of the application program to be unlocked;Wrapped in the unlock instruction Include unlocking pin;
Password contrasts step, unlocking pin and the application program in the contrast application program unlock instruction to be unlocked Whether the locking password in lock instruction is identical or corresponding;If so, performing unlocked step;If it is not, returning to unlock instruction obtains step Suddenly;
Unlocked step, the unblock application program to be unlocked, removes the mark of locked application program.
5. application program according to claim 4 locks method, it is characterised in that
The unlock instruction is the slide that user is carried out on the icon;
The unlocking pin is the sliding trace of slide in the unlock instruction;
Sliding trace in the unlock instruction is identical or corresponding with the sliding trace in the lock instruction;
Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
6. a kind of application program locks system, it is characterised in that including:
Lock program select unit, for selecting application program to be locked;
Password presets unit, for default at least one locking password, one application program to be locked of each locking password correspondence;
Lock instruction acquiring unit, for obtaining lock instruction, the lock instruction includes locking password;And
Lock cell, is locked application program by the application program identification to be locked for locking applications.
7. application program according to claim 6 locks system, it is characterised in that also include:
Operating instruction acquiring unit, for obtaining an at least operating instruction;
Object judging unit is performed, whether the execution object for judging the operating instruction is locked application program;If It is to intercept and capture the operating instruction;If it is not, the operating instruction is sent to the application program.
8. application program according to claim 7 locks system, it is characterised in that
The application program is mounted in mobile communication terminals;
The mobile communication terminal includes I/O Interface;
The I/O Interface includes an at least icon, one application program of each icon correspondence;
The operating instruction is the clicking operation that user is carried out on the icon;
The lock instruction is the slide that user is carried out on the icon;
The locking password is the sliding trace of slide in the lock instruction;And
Sliding trace in the lock instruction is cipher graphic user preset or that system is prestored.
9. the application program according to claim 6 or 7 locks system, it is characterised in that also include:
Unlocking program select unit, for selecting application program to be unlocked;
Unlock instruction acquiring unit, for obtaining unlock instruction, the unlock instruction includes unlocking pin;
Password comparison unit, locks in instructing for contrasting the unlocking pin in the application program unlock instruction and the application program Locking password it is whether identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;
Unlocking unit, for unlocking the application program to be unlocked, removes the mark of locked application program.
10. application program according to claim 9 locks system, it is characterised in that
The unlock instruction is the slide that user is carried out on the icon;
The unlocking pin is the sliding trace of slide in the unlock instruction;
Sliding trace in the unlock instruction is identical or corresponding with the sliding trace in the lock instruction;
Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
CN201611010035.9A 2016-11-17 2016-11-17 A kind of application program locks method and locking system Pending CN106775189A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611010035.9A CN106775189A (en) 2016-11-17 2016-11-17 A kind of application program locks method and locking system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611010035.9A CN106775189A (en) 2016-11-17 2016-11-17 A kind of application program locks method and locking system

Publications (1)

Publication Number Publication Date
CN106775189A true CN106775189A (en) 2017-05-31

Family

ID=58968705

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611010035.9A Pending CN106775189A (en) 2016-11-17 2016-11-17 A kind of application program locks method and locking system

Country Status (1)

Country Link
CN (1) CN106775189A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020011071A1 (en) * 2018-07-09 2020-01-16 维沃移动通信有限公司 Locking method and unlocking method for application program, and terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs
CN105843483A (en) * 2016-04-06 2016-08-10 上海斐讯数据通信技术有限公司 Method for managing APP icons and mobile terminal
CN105892819A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 Method and device for locking application program

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101604223A (en) * 2009-04-20 2009-12-16 宇龙计算机通信科技(深圳)有限公司 A kind of unlock method of touch-screen, system and touch panel device
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs
CN105892819A (en) * 2016-04-01 2016-08-24 乐视控股(北京)有限公司 Method and device for locking application program
CN105843483A (en) * 2016-04-06 2016-08-10 上海斐讯数据通信技术有限公司 Method for managing APP icons and mobile terminal

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020011071A1 (en) * 2018-07-09 2020-01-16 维沃移动通信有限公司 Locking method and unlocking method for application program, and terminal device

Similar Documents

Publication Publication Date Title
US8364952B2 (en) Methods and system for a key recovery plan
US20130185772A1 (en) Dynamically updating a session based on location data from an authentication device
CN103886242B (en) Control system, information processor, terminal installation and control method
CN103377332A (en) Application program accessing method and device
CN103425914A (en) Login method of application program and communication terminal
CN105549826B (en) Mobile terminal and its locking means for sliding the page
CN103336924A (en) Starting lock for mobile terminal application program
CN106936999A (en) Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN106484231A (en) A kind of method and device of application hides
CN106203011A (en) The method and apparatus entering operating system desktop
EP2835754B1 (en) Information input method, device, terminal and storage medium
CN108460259A (en) A kind of information processing method, device and terminal
CN108460256A (en) Data guard method, mobile terminal and device
CN105227579B (en) Access rights setting method, device and storage medium
CN106506443A (en) A kind of information inspection method and device
WO2016119341A1 (en) Method and device for implementing multi-user login mode, and computer storage medium
CN105426746A (en) Password setting apparatus and method
CN103780756B (en) The method of client identification card data secrecy and mobile terminal thereof
CN106775326A (en) A kind of screen control method and device for mobile terminal
CN106775189A (en) A kind of application program locks method and locking system
CN106778344B (en) A kind of data permission control method and terminal
JP2014056546A (en) Information sharing system, sharing terminal, and sharing control program
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN106203014B (en) A kind of unlocking method and tripper of mobile terminal
CN104715172B (en) A kind of application program launching method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170531

RJ01 Rejection of invention patent application after publication