CN106775189A - A kind of application program locks method and locking system - Google Patents
A kind of application program locks method and locking system Download PDFInfo
- Publication number
- CN106775189A CN106775189A CN201611010035.9A CN201611010035A CN106775189A CN 106775189 A CN106775189 A CN 106775189A CN 201611010035 A CN201611010035 A CN 201611010035A CN 106775189 A CN106775189 A CN 106775189A
- Authority
- CN
- China
- Prior art keywords
- application program
- instruction
- lock
- locked
- locking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The present invention relates to a kind of application program locking method and locking system, the enterprising line slip operation of icon of the application software that user can directly in mobile communication terminals, to lock or unlock application software, prevents the individual privacy leaking data in application software.
Description
Technical field
The present invention relates to a kind of application program locking method and locking system.
Background technology
Application program, refers to complete one or more computer program of particular job, is generally basede on computer, intelligent hand
The hardware platforms such as machine, panel computer.Application program can be interacted with user, in starting state, be shown on the desktop of platform
Show visual exercisable user interface, in closing or resting state, an icon is shown as on the table.
In mobile communication terminals, input equipment and output equipment it is general all it is integrated on a touch screen so that user
Can on the touchscreen be entered the operating instructions using finger, man-machine interaction is realized using touch-screen.
With the development of the communication technology and data technique, communication terminal (such as smart mobile phone, panel computer) to data at
Reason ability more and more higher, the application program run on communication terminals(APP)Also more and more, common application program includes logical
Letter software, office software, video software, etc..Allow that mobile device is widely used in the aspects such as study, amusement, work,
More and more important role is play in daily life.
Mobile device is frequently used for the instrument for being exchanged or being kept record as modern, because mobile device is private thing
Product, it is general to be used while only having a user, furthermore, the frequent mobile device of user is carried, it is not easy to be missed, therefore mobile
Device interior often stores substantial amounts of individual privacy information and capsule information document, and such as secret photo, private video is related to
The information of privacy, such as company's bill, competitive bidding book, electronic contract are related to the data of business secret.
User causes that user is unwilling storage individual privacy information and capsule information text for the dependence of mobile device
Shelves cannot be transferred to and be managed elsewhere, but manage on the mobile apparatus.And in these privacy informations and capsule information
Document there is a problem that maliciously being obtained by other people, particularly when user loses mobile device, as long as normal open mobile setting
The standby individual privacy information and capsule information document that just very can easily obtain its storage, security is very poor.
During using application program, it is no lack of many private datas in the user data of application program, for example, contacts
The data such as people's information and chat record.Therefore, thing followed Privacy Protection is also more and more important.Such as user is using
During mobile phone, if the mobile phone screen of user is seen by people(Such case often occurs), or mobile phone lost, or
Mobile phone needs to lend others and uses, then can cause the leakage of the privacy of user data of application program in mobile phone.
Prior art provides a kind of guard method of the privacy of user data of application program, is that application program sets password
Lock defencive function, if a certain application program is locked, that is, is provided with and accesses password, then when user accesses the application journey of the locking
During sequence, an interface for password input can be ejected, user needs to input correct password in the cryptographic interface and could start and should answer
With program, and access the user data in the application program.
Above-mentioned technical proposal is disadvantageous in that:The method directly limit the right of user's access application, though
So other people cannot learn the privacy of user data of application program in the very first time, but the method clearly points out other people:" this application
Have secret in program, however it is necessary that password could be accessed ", this clearly prompting can cause other people to produce the dynamic of decryption
Machine, decryption can be easy to using existing code-breaking techniques, so as to cause the privacy of user data of application program
Leakage.
The content of the invention
It is an object of the invention to:A kind of application program locking method is provided, with solving existing mobile communication terminal
Application software(APP)The technical problem that existing privacy of user data are easily revealed.
In order to solve the above technical problems, the present invention provides a kind of application program locking method, including:Lock program selection step
Suddenly, application program to be locked is selected;Password presets step, presets at least one locking password, and each locking password correspondence one is treated
The application program of locking;Lock instruction obtaining step, obtains lock instruction, and the lock instruction includes locking password;And lock
Determine step, the application program identification to be locked is locked application program by locking applications.
Further, the application program locking method, also includes:Operating instruction obtaining step, obtains at least one and runs
Instruction;Object judging step is performed, whether the execution object for judging the operating instruction is locked application program;If so,
Intercept and capture the operating instruction;If it is not, the operating instruction is sent to the application program.
Further, the application program is mounted in mobile communication terminals;The mobile communication terminal includes input
Output interface;The I/O Interface includes an at least icon, one application program of each icon correspondence.The operating instruction
For the clicking operation that user is carried out on the icon;The lock instruction is the slip behaviour that user is carried out on the icon
Make;The locking password is the sliding trace of slide in the lock instruction;And the slip rail in the lock instruction
Mark is cipher graphic user preset or that system is prestored.
Further, the application program locking method also includes:Unlocking program selects step, selects to be unlocked
Application program;Unlock instruction obtaining step, obtains the unlock instruction of the application program to be unlocked;The unlock instruction
Include unlocking pin;Password contrasts step, the unlocking pin in the contrast application program unlock instruction to be unlocked
It is whether identical or corresponding to the locking password in application program locking instruction;If so, performing unlocked step;If it is not, returning to solution
Lock instruction obtaining step;Unlocked step, the unblock application program to be unlocked, removes the mark of locked application program
Know.
Further, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is
The sliding trace of slide in the unlock instruction;Cunning in sliding trace in the unlock instruction and the lock instruction
Dynamic rail mark is identical or corresponding;Sliding trace in the unlock instruction is password figure user preset or that system is prestored
Shape.
It is an object of the invention to:A kind of application program locking system is provided, with solving existing mobile communication terminal
Application software(APP)The technical problem that existing privacy of user data are easily revealed.
In order to solve the above technical problems, the present invention provides a kind of application program locking system including:Lock program selection is single
Unit, for selecting application program to be locked;Password presets unit, for default at least one locking password, each locking password
One application program to be locked of correspondence;Lock instruction acquiring unit, for obtaining lock instruction, the lock instruction includes locking
Password;And lock cell, it is locked application journey by the application program identification to be locked for locking applications
Sequence.
Further, the application program locking system also includes:Operating instruction acquiring unit, transports for obtaining at least one
Row instruction;Object judging unit is performed, whether the execution object for judging the operating instruction is locked application program;
If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.
Further, the application program is mounted in mobile communication terminals;The mobile communication terminal includes input
Output interface;The I/O Interface includes an at least icon, one application program of each icon correspondence;The operating instruction
For the clicking operation that user is carried out on the icon;The lock instruction is the slip behaviour that user is carried out on the icon
Make;The locking password is the sliding trace of slide in the lock instruction;And the slip rail in the lock instruction
Mark is cipher graphic user preset or that system is prestored.
Further, the application program locking system also includes:Unlocking program select unit, for selecting to wait to release lock
Fixed application program;Unlock instruction acquiring unit, for obtaining unlock instruction, the unlock instruction includes unlocking pin;It is close
Code comparison unit, for contrasting the locking during the unlocking pin in the application program unlock instruction is instructed with application program locking
Whether password is identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;Unlocking unit, for unlocking
The application program to be unlocked, removes the mark of locked application program.
Further, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is
The sliding trace of slide in the unlock instruction;Cunning in sliding trace in the unlock instruction and the lock instruction
Dynamic rail mark is identical or corresponding;Sliding trace in the unlock instruction is password figure user preset or that system is prestored
Shape.
The advantage of the invention is that:User can directly in mobile communication terminals application software icon on slided
Dynamic operation, to lock or unlock application software, prevents the individual privacy leaking data in application software.
Brief description of the drawings
Fig. 1 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 1;
Fig. 2 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 1;
Fig. 3 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 2;
Fig. 4 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 2;
Fig. 5 is a kind of FB(flow block) of application program locking method in the embodiment of the present invention 3;
Fig. 6 is a kind of structured flowchart of application program locking system in the embodiment of the present invention 3.
Specific embodiment
The preferred embodiments of the present invention are introduced below with reference to Figure of description, can be complete to those of skill in the art
The present invention is introduced, is made its technology contents more clear and is readily appreciated.The present invention can be by the embodiment of many multi-forms
To emerge from, protection scope of the present invention is not limited only to the embodiment mentioned in text.
Embodiment 1
As shown in figure 1, embodiment 1 provides a kind of application program locking method, following steps are specifically included.
Step S11)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described
Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated
Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end
Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence, in non-locking state
Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously
Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected.
The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment
Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select
Select the application program for needing locking.
Step S12)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock
It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The shape of the sliding trace
Shape is cipher graphic user preset or that system is prestored, such as straight line, triangle, circle, square, etc..The cunning
Dynamic rail mark has beginning and end, and the slide must be carried out according to certain orientation, can be defined as locking the slip of password
Direction.In order to lock and convenient for unlocking, cipher graphic is typically designed as the simple graph drawn by.
Step S13)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute
Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock
Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S14)Locking applications, are locked application program by the application program identification to be locked.Mark
Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP)
Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
In embodiment 1, step S11)- step S14)Have technical effect that, user is needing the application program of locking
A default cipher graphic is drawn on desktop icons, you can application program is locked.
As shown in Fig. 2 embodiment 1 also provides a kind of application program locking system 100, including:Lock program select unit
1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password
One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock
Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked
Use program.
The function of each unit in application program locking system all with step S11)- step S14)It is corresponding, its technology
Effect is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can correspondence
Locked with program.
Embodiment 2
As shown in figure 3, embodiment 2 provides a kind of application program locking method, following steps are specifically included.
Step S21)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described
Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated
Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end
Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence.In non-locking state
Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously
Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected.
The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment
Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select
Select the application program for needing locking.
Step S22)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock
It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The sliding trace is use
The cipher graphic that family is default or system is prestored, such as straight line, triangle, circle, square, etc..The sliding trace
There is beginning and end, the slide must be carried out according to certain orientation, can be defined as glide direction.
Step S23)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute
Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock
Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S24)Locking applications, are locked application program by the application program identification to be locked.Mark
Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP)
Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
Step S25)Obtain an at least operating instruction.User can be in the input and output of mobile communication terminal in the present embodiment
Application software is clicked on interface(APP)Icon, to be input into program operating instruction.
Step S26)Whether the execution object for judging the operating instruction is locked application program;If so, performing step
Rapid S27);If it is not, performing step S28).The I/O Interface of mobile communication terminal obtains an operating instruction, judges the operation
The execution object of instruction(Point to object)Whether it is in step S21)- step S24)In the application program that has been locked.
Step S27)If the execution object of the operating instruction is locked application program, the operating instruction is intercepted and captured,
Even if finger is clicked application software by user(APP)Icon on, the application software(APP)Startup.
Step S28)If the object that performs of the operating instruction is the application program of non-locking, the operating instruction is sent
To the application program, start the application program.
In embodiment 2, step S21)- step S24)Have technical effect that, user is needing the application program of locking
A default cipher graphic is drawn on desktop icons, you can application program is locked.And step S21)- step S24)'s
Have technical effect that so that locked application program, even if receiving normal enabled instruction(User is on application software icon
Click on), also will not startup optimization.
As shown in figure 4, embodiment 2 also provides a kind of application program locking system 200, including:Lock program select unit
1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password
One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock
Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked
Use program.
In application program locking system the function of said units all with step S21)- step S24)It is corresponding, its technology effect
Fruit is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can to application
Program is locked.
As shown in figure 4, the application program locking system also includes:Operating instruction acquiring unit 5, for obtaining at least one
Operating instruction;Object judging unit 6 is performed, whether the execution object for judging the operating instruction is locked application journey
Sequence;If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.Operating instruction obtains single
Unit 5 and the function and step S25 that perform object judging unit 6)- step S28)It is corresponding so that locked application program, i.e.,
Make to receive normal enabled instruction, also will not startup optimization.
In the application program locking system, the application program is mounted in mobile communication terminals;The movement
Communication terminal includes I/O Interface;The I/O Interface includes an at least icon, each one application of icon correspondence
Program;The operating instruction is the clicking operation that user is carried out on the icon;The lock instruction is user in the figure
Put on the slide for carrying out;The locking password is the sliding trace of slide in the lock instruction;And the lock
Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Embodiment 3
As shown in figure 5, embodiment 3 provides a kind of application program locking method, following steps are specifically included.
Step S31)Selection application program to be locked.The application program is mounted in mobile communication terminals;It is described
Mobile communication terminal includes but is not limited to smart mobile phone, panel computer, notebook computer etc..The mobile communication terminal includes defeated
Enter output interface, as touch-screen;The I/O Interface includes an at least icon, specifically, the mobile communication end
Desktop in the operating system of end is provided with one or more icons, one application program of each icon correspondence, in non-locking state
Under, user directly clicks on the icon of application program, equivalent to input selection instruction and program operating instruction two simultaneously
Individual instruction.User can use existing operator scheme in the present embodiment, only be selected without clicking on application program in step is selected.
The startup of application program can also be set to two single instructions, preceding one click by user in an operating system in the present embodiment
Input selection instruction, rear one click is input into program operating instruction, the one click input selection instruction in step is selected, to select
Select the application program for needing locking.
Step S32)Default at least one locking password, one application program to be locked of each locking password correspondence, the lock
It is I/O Interface of the user in mobile communication terminal to determine password(Touch-screen)On sliding trace;The sliding trace is use
The cipher graphic that family is default or system is prestored, such as straight line, triangle, circle, square, etc..The sliding trace
There is beginning and end, the slide must be carried out according to certain orientation, can be defined as glide direction.In order to lock reconciliation
Lock is convenient, and cipher graphic is typically designed as the simple graph drawn by.
Step S33)Obtain lock instruction;The lock instruction is the slide that user is carried out on the icon;Institute
Stating lock instruction includes locking password, and the locking password is the sliding trace of slide in the lock instruction;The lock
Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
Step S34)Locking applications, are locked application program by the application program identification to be locked.Mark
Knowledge process is the process for darkening icon;Under application software upstate, the application software on mobile communication terminal(APP)
Icon is light tone;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted to dark-coloured.
Step S35)Obtain the unlock instruction of the application program to be unlocked;The unlock instruction includes unblock
Password;The unlock instruction is the slide that user is carried out on the icon;The unlocking pin is the unlock instruction
The sliding trace of middle slide.The shape of the sliding trace of the unlocking pin also should be user preset or system it is advance
The cipher graphic of storage, the sliding trace has beginning and end, and the slide must be carried out according to certain orientation, Ke Yiding
Justice is the glide direction of unlocking pin.Correct unlocking pin, it should or phase identical with the locking password for locking the application program
Should(Shape is identical, sliding trace is in opposite direction), specifically, in correct unlock instruction, the cipher graphic in unlocking pin
With step S32)Cipher graphic in middle locking password is identical, the glide direction of unlocking pin and the glide direction phase of multi-win password
It is same or opposite.
Step S36)Unlocking pin and the application program in the contrast application program unlock instruction to be unlocked
Whether the locking password in lock instruction is identical or corresponding;If so, unlocking pin is correct, step S37 is performed);If it is not, unblock is close
Wrong, the return to step S35 of code), wait the unlock instruction for reacquiring the application program to be unlocked.
Step S37)The unblock application program to be unlocked, removes the mark of locked application program.Removal
Identification procedure is the process of icon brightening;After locking, the application software on mobile communication terminal(APP)Icon can be adjusted
It is dead color;After unlocking, application software can start at any time, the application software on mobile communication terminal(APP)Icon becomes
It is light tone.
In embodiment 3, step S31)- step S34)Have technical effect that, user is needing the application program of locking
A default cipher graphic is drawn on desktop icons, you can application program is locked.Step S35)- step S37)Skill
Art effect is that user draws one with cipher graphic identical decryption figure on the desktop icons of locked application program
Shape, you can release the locking of application program.During decrypted graphics are drawn, in the sliding trace and locking password of user's finger
The direction of sliding trace is identical or opposite.
As shown in fig. 6, embodiment 3 also provides a kind of application program locking system 300, including:Lock program select unit
1, for selecting application program to be locked;Password presets unit 2, for default at least one locking password, each locking password
One application program to be locked of correspondence;Lock instruction acquiring unit 3, for obtaining lock instruction, the lock instruction includes lock
Determine password;And lock cell 4, for locking applications, the application program identification to be locked is answered for locked
Use program.
In application program locking system the function of said units all with step S31)- step S34)It is corresponding, its technology effect
Fruit is that user draws a default cipher graphic on the desktop icons of application program for needing locking, you can to application
Program is locked.
As shown in fig. 6, the application program locking system also includes:Operating instruction acquiring unit 5, for obtaining at least one
Operating instruction;Object judging unit 6 is performed, whether the execution object for judging the operating instruction is locked application journey
Sequence;If so, intercepting and capturing the operating instruction;If it is not, the operating instruction is sent to the application program.Operating instruction obtains single
Unit 5 causes locked application program with object judging unit 6 is performed, even if receiving normal enabled instruction, will not also start
Operation.
In the application program locking system, the application program is mounted in mobile communication terminals;The movement
Communication terminal includes I/O Interface;The I/O Interface includes an at least icon, each one application of icon correspondence
Program;The operating instruction is the clicking operation that user is carried out on the icon;The lock instruction is user in the figure
Put on the slide for carrying out;The locking password is the sliding trace of slide in the lock instruction;And the lock
Sliding trace in fixed instruction is cipher graphic user preset or that system is prestored.
As shown in fig. 6, the application program locking system also includes:Unlocking program select unit 7, for selecting to wait to release
The application program of locking;Unlock instruction acquiring unit 8, for obtaining unlock instruction, the unlock instruction includes unlocking pin;
Password comparison unit 9, locks in instructing for contrasting the unlocking pin in the application program unlock instruction and the application program
Whether locking password is identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;Unlocking unit 10, uses
In the unblock application program to be unlocked, the mark of locked application program is removed.
Unlocking program select unit 7, unlock instruction acquiring unit 8, password comparison unit 9, the function of unlocking unit 10 with
The step S35)- step S37)Corresponding, it has technical effect that, user is on the desktop icons of locked application program
One is drawn with cipher graphic identical decrypted graphics, you can release the locking of application program.During decrypted graphics are drawn,
The sliding trace of user's finger is identical or opposite with the direction of sliding trace in locking password.
Wherein, the unlock instruction is the slide that user is carried out on the icon;The unlocking pin is described
The sliding trace of slide in unlock instruction;Slip rail in sliding trace in the unlock instruction and the lock instruction
Mark is identical or corresponding;Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
The advantage of embodiment of the present invention 1-3 is:User can directly in mobile communication terminals application software figure
Putting on carries out slide, to lock or unlock application software.Do not know unlocking pin anyone can not all start it is locked
Application software, to prevent the individual privacy leaking data in application software.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
Member, under the premise without departing from the principles of the invention, can also make some improvements and modifications, and these improvements and modifications also should be regarded as
Protection scope of the present invention.
Claims (10)
1. a kind of application program locks method, it is characterised in that including:
Lock program selects step, selects application program to be locked;
Password presets step, presets at least one locking password, one application program to be locked of each locking password correspondence;
Lock instruction obtaining step, obtains lock instruction, and the lock instruction includes locking password;And
Lock step, the application program identification to be locked is locked application program by locking applications.
2. application program according to claim 1 locks method, it is characterised in that also include:
Operating instruction obtaining step, obtains an at least operating instruction;
Object judging step is performed, whether the execution object for judging the operating instruction is locked application program;If so, cutting
Obtain the operating instruction;If it is not, the operating instruction is sent to the application program.
3. application program according to claim 2 locks method, it is characterised in that
The application program is mounted in mobile communication terminals;
The mobile communication terminal includes I/O Interface;
The I/O Interface includes an at least icon, one application program of each icon correspondence;
The operating instruction is the clicking operation that user is carried out on the icon;
The lock instruction is the slide that user is carried out on the icon;
The locking password is the sliding trace of slide in the lock instruction;And
Sliding trace in the lock instruction is cipher graphic user preset or that system is prestored.
4. application program according to claim 1 and 2 locks method, it is characterised in that also include:
Unlocking program selects step, selects application program to be unlocked;
Unlock instruction obtaining step, obtains the unlock instruction of the application program to be unlocked;Wrapped in the unlock instruction
Include unlocking pin;
Password contrasts step, unlocking pin and the application program in the contrast application program unlock instruction to be unlocked
Whether the locking password in lock instruction is identical or corresponding;If so, performing unlocked step;If it is not, returning to unlock instruction obtains step
Suddenly;
Unlocked step, the unblock application program to be unlocked, removes the mark of locked application program.
5. application program according to claim 4 locks method, it is characterised in that
The unlock instruction is the slide that user is carried out on the icon;
The unlocking pin is the sliding trace of slide in the unlock instruction;
Sliding trace in the unlock instruction is identical or corresponding with the sliding trace in the lock instruction;
Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
6. a kind of application program locks system, it is characterised in that including:
Lock program select unit, for selecting application program to be locked;
Password presets unit, for default at least one locking password, one application program to be locked of each locking password correspondence;
Lock instruction acquiring unit, for obtaining lock instruction, the lock instruction includes locking password;And
Lock cell, is locked application program by the application program identification to be locked for locking applications.
7. application program according to claim 6 locks system, it is characterised in that also include:
Operating instruction acquiring unit, for obtaining an at least operating instruction;
Object judging unit is performed, whether the execution object for judging the operating instruction is locked application program;If
It is to intercept and capture the operating instruction;If it is not, the operating instruction is sent to the application program.
8. application program according to claim 7 locks system, it is characterised in that
The application program is mounted in mobile communication terminals;
The mobile communication terminal includes I/O Interface;
The I/O Interface includes an at least icon, one application program of each icon correspondence;
The operating instruction is the clicking operation that user is carried out on the icon;
The lock instruction is the slide that user is carried out on the icon;
The locking password is the sliding trace of slide in the lock instruction;And
Sliding trace in the lock instruction is cipher graphic user preset or that system is prestored.
9. the application program according to claim 6 or 7 locks system, it is characterised in that also include:
Unlocking program select unit, for selecting application program to be unlocked;
Unlock instruction acquiring unit, for obtaining unlock instruction, the unlock instruction includes unlocking pin;
Password comparison unit, locks in instructing for contrasting the unlocking pin in the application program unlock instruction and the application program
Locking password it is whether identical or corresponding;If so, starting unlocking unit;If it is not, reacquiring unlock instruction;
Unlocking unit, for unlocking the application program to be unlocked, removes the mark of locked application program.
10. application program according to claim 9 locks system, it is characterised in that
The unlock instruction is the slide that user is carried out on the icon;
The unlocking pin is the sliding trace of slide in the unlock instruction;
Sliding trace in the unlock instruction is identical or corresponding with the sliding trace in the lock instruction;
Sliding trace in the unlock instruction is cipher graphic user preset or that system is prestored.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611010035.9A CN106775189A (en) | 2016-11-17 | 2016-11-17 | A kind of application program locks method and locking system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611010035.9A CN106775189A (en) | 2016-11-17 | 2016-11-17 | A kind of application program locks method and locking system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106775189A true CN106775189A (en) | 2017-05-31 |
Family
ID=58968705
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611010035.9A Pending CN106775189A (en) | 2016-11-17 | 2016-11-17 | A kind of application program locks method and locking system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106775189A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020011071A1 (en) * | 2018-07-09 | 2020-01-16 | 维沃移动通信有限公司 | Locking method and unlocking method for application program, and terminal device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604223A (en) * | 2009-04-20 | 2009-12-16 | 宇龙计算机通信科技(深圳)有限公司 | A kind of unlock method of touch-screen, system and touch panel device |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission controlling method and device for application programs |
CN105843483A (en) * | 2016-04-06 | 2016-08-10 | 上海斐讯数据通信技术有限公司 | Method for managing APP icons and mobile terminal |
CN105892819A (en) * | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | Method and device for locking application program |
-
2016
- 2016-11-17 CN CN201611010035.9A patent/CN106775189A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101604223A (en) * | 2009-04-20 | 2009-12-16 | 宇龙计算机通信科技(深圳)有限公司 | A kind of unlock method of touch-screen, system and touch panel device |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission controlling method and device for application programs |
CN105892819A (en) * | 2016-04-01 | 2016-08-24 | 乐视控股(北京)有限公司 | Method and device for locking application program |
CN105843483A (en) * | 2016-04-06 | 2016-08-10 | 上海斐讯数据通信技术有限公司 | Method for managing APP icons and mobile terminal |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020011071A1 (en) * | 2018-07-09 | 2020-01-16 | 维沃移动通信有限公司 | Locking method and unlocking method for application program, and terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8364952B2 (en) | Methods and system for a key recovery plan | |
US20130185772A1 (en) | Dynamically updating a session based on location data from an authentication device | |
CN103886242B (en) | Control system, information processor, terminal installation and control method | |
CN103377332A (en) | Application program accessing method and device | |
CN103425914A (en) | Login method of application program and communication terminal | |
CN105549826B (en) | Mobile terminal and its locking means for sliding the page | |
CN103336924A (en) | Starting lock for mobile terminal application program | |
CN106936999A (en) | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently | |
CN106484231A (en) | A kind of method and device of application hides | |
CN106203011A (en) | The method and apparatus entering operating system desktop | |
EP2835754B1 (en) | Information input method, device, terminal and storage medium | |
CN108460259A (en) | A kind of information processing method, device and terminal | |
CN108460256A (en) | Data guard method, mobile terminal and device | |
CN105227579B (en) | Access rights setting method, device and storage medium | |
CN106506443A (en) | A kind of information inspection method and device | |
WO2016119341A1 (en) | Method and device for implementing multi-user login mode, and computer storage medium | |
CN105426746A (en) | Password setting apparatus and method | |
CN103780756B (en) | The method of client identification card data secrecy and mobile terminal thereof | |
CN106775326A (en) | A kind of screen control method and device for mobile terminal | |
CN106775189A (en) | A kind of application program locks method and locking system | |
CN106778344B (en) | A kind of data permission control method and terminal | |
JP2014056546A (en) | Information sharing system, sharing terminal, and sharing control program | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN106203014B (en) | A kind of unlocking method and tripper of mobile terminal | |
CN104715172B (en) | A kind of application program launching method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170531 |
|
RJ01 | Rejection of invention patent application after publication |