CN106778175B - Interface locking method and device and terminal equipment - Google Patents

Interface locking method and device and terminal equipment Download PDF

Info

Publication number
CN106778175B
CN106778175B CN201611218415.1A CN201611218415A CN106778175B CN 106778175 B CN106778175 B CN 106778175B CN 201611218415 A CN201611218415 A CN 201611218415A CN 106778175 B CN106778175 B CN 106778175B
Authority
CN
China
Prior art keywords
interface
application program
locking
module
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611218415.1A
Other languages
Chinese (zh)
Other versions
CN106778175A (en
Inventor
张晓璇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611218415.1A priority Critical patent/CN106778175B/en
Publication of CN106778175A publication Critical patent/CN106778175A/en
Application granted granted Critical
Publication of CN106778175B publication Critical patent/CN106778175B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses an interface locking method, an interface locking device and terminal equipment; the method comprises the following steps: receiving an interface locking request, determining an application program needing to lock an interface according to the interface locking request, acquiring identity authentication information when the application program is a preset application program, verifying the identity authentication information, and locking the corresponding interface of the application program if the verification is passed. The method and the device can lock the display interface corresponding to the preset application program when the user uses the application program, so as to avoid the leakage of user data, for example, when the user displays the contents in the terminal to other people or uses the terminal to other people, other information is forced to be displayed in front of other people due to misoperation. Therefore, the invention can improve the data security.

Description

Interface locking method and device and terminal equipment
Technical Field
The invention relates to the field of mobile communication, in particular to an interface locking method, an interface locking device and terminal equipment.
Background
With the development of terminal technology, mobile terminals have begun to change from simply providing telephony devices to a platform for running general-purpose software. The platform does not provide call management as a main purpose, but provides an operating environment including various application software such as call management, game and entertainment, office events, mobile payment and the like, meanwhile, the mobile intelligent terminal inevitably relates to a large amount of important information such as personal privacy, office data, mobile bank account numbers and the like, and the application security problem of the mobile terminal is increasingly prominent.
At present, a mobile terminal can store a large number of application programs, and a part of the stored contents also relate to personal privacy of a user, such as photos, short messages and the like, when the terminal contents are displayed or used by others, other information is forced to be displayed in front of others due to misoperation, such as mistakenly turning over an album due to hand sliding, and the like, which may cause poor data security of the user.
Disclosure of Invention
The embodiment of the invention provides an interface locking method, an interface locking device and terminal equipment, which can improve data security.
In a first aspect, an embodiment of the present invention provides an interface locking method, including the following steps:
receiving an interface locking request;
determining an application program needing to lock an interface according to the interface locking request;
when the application program is a preset application program, acquiring identity authentication information;
verifying the identity verification information;
and if the verification is passed, locking the corresponding interface of the application program.
In a second aspect, an embodiment of the present invention further provides an interface locking device, including: the device comprises a first receiving module, a determining module, a first information acquiring module, a first verifying module and a locking module;
the first receiving module is used for receiving an interface locking request;
the determining module is used for determining the application program needing to lock the interface according to the interface locking request;
the first information acquisition module is used for acquiring identity authentication information when the application program is a preset application program;
the first verification module is used for verifying the identity verification information;
and the locking module is used for locking the corresponding interface of the application program when the first verification module passes the verification.
In a third aspect, the present invention further provides a terminal device, which includes:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the interface locking method provided by the first aspect.
The method comprises the steps of firstly receiving an interface locking request, determining an application program needing to lock an interface according to the interface locking request, acquiring identity authentication information when the application program is a preset application program, verifying the identity authentication information, and locking the corresponding interface of the application program if the authentication is passed. The method and the device can lock the display interface corresponding to the preset application program when the user uses the application program, so as to avoid the leakage of user data, for example, when the user displays the contents in the terminal to other people or uses the terminal to other people, other information is forced to be displayed in front of other people due to misoperation. The invention can improve the safety of user data.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an interface locking method according to an embodiment of the present invention.
Fig. 2 is a schematic flow chart of another interface locking method according to an embodiment of the present invention.
Fig. 3 is a scene schematic diagram of interface locking according to an embodiment of the present invention.
Fig. 4 is a schematic view of another scenario of interface locking according to an embodiment of the present invention.
Fig. 5 is a scene schematic diagram of interface unlocking according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of an interface locking device according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram of another interface locking device according to an embodiment of the present invention.
FIG. 8 is a schematic structural diagram of another interface locking device according to an embodiment of the present invention
Fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first", "second", "third" and "fourth", etc. in the present invention are used for distinguishing different objects, not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The execution main body of the interface locking method provided by the embodiment of the invention can be the interface locking device provided by the embodiment of the invention or a terminal integrated with the interface locking device, and the interface locking device can be realized in a hardware or software mode; the terminal described in the embodiment of the present invention may be a smart Phone (such as an IOS Phone, an Android Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a mobile internet device (MID, mobile internet Devices), or a wearable device, and the terminal is merely an example, but not an exhaustive list, and includes but is not limited to the terminal.
The embodiment will be described in terms of an apparatus for restricting the locking of a terminal, which may be integrated in a terminal, such as an electronic device such as a mobile interconnection network device (e.g., a smart phone or a tablet computer).
Referring to fig. 1, fig. 1 is a schematic flow chart of an interface locking method according to an embodiment of the present invention, where the interface locking method according to the embodiment includes:
step S101, an interface locking request is received.
The interface locking request is used for locking an interface of an application program, so that the application program can be fixed on a certain interface.
In the embodiment of the present invention, the interface lock request may be generated in a plurality of ways, for example, the interface lock request may be triggered by a user operating the terminal, where the operation may be a touch screen operation, a key operation, a voice operation, or the like. In the prior art, when the terminal content is displayed or used by others, other information may be forced to be displayed in front of others due to misoperation, for example, the photo album is turned over by mistake due to the slippery hand. In the embodiment of the present invention, for example, when a photo application is used, a lock request for the current interface (i.e., the current photo) may be generated according to a user operation when a photo is switched to, so as to lock the current interface (i.e., the current photo).
Optionally, the interface locking request may also be automatically generated by the terminal system, for example, a user may preset an application program that needs to lock the interface in advance, and when the system detects that the currently running application program is the preset application program, the interface locking request may be automatically generated. In other embodiments, when the system detects that the currently running application is the preset application, a prompt message may be generated and displayed on the terminal screen, for example, "whether to generate an interface lock request", and if the user selects "yes", the interface lock request may be generated.
Preferably, in an embodiment of the present invention, before the step of receiving the interface lock request, the method may further include:
judging whether the terminal is in a screen locking state at present;
if not, executing the step of receiving the interface locking request.
And step S102, determining the application program needing to lock the interface according to the interface locking request.
The interface locking request may carry application identification information, and after receiving the request, the terminal may determine an application program that needs to lock the interface according to the application identification information carried by the terminal.
In a specific implementation process, taking a terminal of an Android system as an example, Activity is an application component and provides a screen, and a user can interact with the application component to complete a certain task. In an Android application, an Activity is usually a separate screen on which some controls can be displayed and which can also monitor and process events of the user in response. Activity communicates with each other through Intent. In the Android mechanism, activities for starting an application program have a uniform entrance: the startActivity function, therefore, the application identification (such as package name information) can be obtained through the startActivity function. In addition, by acquiring other types of parameters in the startActivity function, such as callingPackage, the target application information pointed by the interface locking request can be acquired, so as to determine the application program needing to lock the interface.
In other embodiments, after determining the application that needs to be locked, it may also be determined whether the application is currently running in the foreground of the terminal. The method for judging whether the application program is currently running in the foreground of the terminal may be multiple, for example, an application identifier of the application program currently running in the foreground may be obtained, then the obtained application identifier is compared with the application identifier, whether the obtained application identifier is the same or not is judged, and if yes, the application program is judged to be the application program currently running in the foreground and the next step is continuously executed.
And step S103, acquiring identity authentication information when the application program is a preset application program.
In the embodiment of the invention, a user can preset an application program list of an interface to be locked in advance, after the application program to be locked is determined, whether the application program is the preset application program is judged according to the list, if not, the process is ended, and if yes, identity authentication information is further acquired.
In the embodiment of the invention, in order to further improve the security of the scheme, the user identity can be verified according to the identity verification information before the application program interface is locked. Wherein, the authentication information may include: user fingerprint information, face information, iris information, voice information, and the like. The identity authentication information may be one or more.
For example, the identification information is user fingerprint information, and the fingerprint information obtained by the identification information may be acquired by a fingerprint reading device, such as an optical fingerprint acquirer, a thermal sensor, a radio frequency sensor, a capacitive sensor, and the like. This fingerprint reading equipment can set up in the fingerprint identification area at the terminal, and this fingerprint identification area can set up on the terminal, specifically can set up the optional position at the touch-sensitive screen at the terminal, also can set up the optional position on the backshell at the terminal, can also set up upside, downside, left side or right side at the terminal main part, and above-mentioned fingerprint identification area can also set up on other terminal equipment that bind with this terminal, and above-mentioned other terminal equipment are for example: cell phones, smartwatches, fingerprint collectors, and the like. The invention is not further limited in this regard.
And step S104, verifying the identity verification information, if the identity verification information passes the verification, executing the step S105, and if the identity verification information does not pass the verification, ending the process.
In the embodiment of the present invention, the terminal may set preset information in advance, such as preset fingerprint information, preset iris information, and the like. Specifically, whether the identity authentication information is matched with the preset information or not is judged, if yes, the authentication is determined to be successful, and if not, the authentication is failed. The preset information may be one or more. For example, when the fingerprint information of the user fails to be matched, the iris information of the user can be continuously acquired for matching verification, and if the iris information is successfully matched, the verification is determined to be successful.
And step S105, locking the corresponding interface of the application program.
For example, when a photo application is used, the current interface may be locked after switching to a photo, so that the user cannot look over other photos or exit the current application.
Optionally, the invention can also set a preset time length for the application program, and automatically unlock the corresponding interface after the locking time length of the application program interface meets the preset time length, thereby facilitating the use of the user. That is, after the step of locking the corresponding interface of the application program, the method may further include:
acquiring the locking duration of the locked corresponding interface of the application program;
judging whether the locking duration meets a preset duration or not;
and if so, unlocking the corresponding interface of the application program.
The method and the device can respectively set the preset duration corresponding to each preset application program in a preset application program list needing to lock the interface, and the mapping relation between the preset application program and the preset duration is established. Therefore, the step of determining whether the locking duration meets the preset duration may specifically include:
determining a preset time length corresponding to a preset application program according to a mapping relation between the preset application program and the preset time length;
judging whether the locking duration is greater than or equal to a preset duration;
if yes, determining that the locking duration meets the preset duration.
As can be seen from the above, the interface locking method provided in the embodiment of the present invention may receive an interface locking request, determine an application program that needs to lock an interface according to the interface locking request, acquire authentication information when the application program is a preset application program, verify the authentication information, and lock a corresponding interface of the application program if the authentication passes. The method and the device can lock the display interface corresponding to the preset application program when the user uses the application program, so as to avoid the leakage of user data, for example, when the user displays the contents in the terminal to other people or uses the terminal to other people, other information is forced to be displayed in front of other people due to misoperation. Therefore, the invention can protect the user data, prevent the privacy of the user from being revealed and improve the safety.
Referring to fig. 2, fig. 2 is a schematic flow chart of another interface locking method according to an embodiment of the present invention, which is described by taking a smart phone as an example, and includes:
step S201, the smart phone receives an interface locking request.
For example, when the user uses a photo application, the user may click a "lock" button in the function options when switching to a photo, so as to generate a lock request for the current interface to lock the current interface (i.e., the current photo).
Step S202, the smart phone determines the application program needing to lock the interface according to the interface locking request.
For example, the calling application identifier (e.g., packet name information) of the Activity caller can be obtained by obtaining the caller parameter in the startActivity function. The target application information pointed by the interface locking request can also be obtained by obtaining other types of parameters in the startActivity function, such as a callingPackage, so as to determine the application needing to lock the interface.
Step S203, when the application program is a preset application program, the smart phone obtains the authentication information.
The smart phone can preset an application program list needing to lock the interface, after the application program needing to be locked is determined, whether the application program is a preset application program is judged according to the list, and if yes, identity authentication information is further acquired.
Further, the authentication information may include: user fingerprint information, face information, iris information, voice information, and the like. The identity authentication information may be one or more.
Specifically, referring to fig. 3, fig. 3 is a schematic view of a scene of interface locking according to an embodiment of the present invention. In fig. 3, 11 is the fingerprint identification area where the fingerprint sensor is normally located. 12 is a screen of a mobile phone, and the embodiment takes the authentication information as the user fingerprint information for example. When the user uses the photo application, the current interface may be locked, so that the display content of the mobile phone screen 12 is fixed on the current interface, such as the photo 13, so that the photo 13 cannot slide or exit. Specifically, the "lock" button 14 may be clicked on the current page, so as to generate an interface lock request, determine that the application program to be locked is a photo application, and after determining that the photo application is a preset application program, obtain the user fingerprint information through the fingerprint identification area 11.
Specifically, the smart phone may acquire fingerprint information of the user through a fingerprint sensor in the fingerprint identification area 11, where the fingerprint sensor may be an optical fingerprint acquirer, a thermal sensor, a radio frequency sensor, a capacitive sensor, or the like.
In other embodiments, the authentication information may further include other user characteristic information or user behavior operations, and taking a sliding track as the authentication information, as shown in fig. 4, after determining the preset application program, the sliding track may be input on the screen. Correspondingly, the mobile phone also needs to pre-store a corresponding preset sliding track for matching with the sliding track.
And step S204, the smart phone verifies the identity verification information, if the verification passes, step S205 is executed, and if the verification does not pass, the process is ended.
In the embodiment of the present invention, the smart phone may set preset information in advance, such as preset fingerprint information, preset iris information, and the like. Specifically, whether the identity authentication information is matched with the preset information or not is judged, if yes, the authentication is determined to be successful, and if not, the authentication is failed. The preset information may be one or more. For example, when the fingerprint information of the user fails to be matched, the iris information of the user can be continuously acquired for matching verification, and if the iris information is successfully matched, the verification is determined to be successful.
Step S205, the smartphone locks the corresponding interface of the application program.
In step S206, the smart phone receives an interface unlocking request for the application program.
In practical application, it is considered that a user usually takes the mobile phone back after using the mobile phone for a period of time, and at this time, the locked application program interface needs to be unlocked for normal use. Therefore, after the corresponding interface is locked, the smart phone can also receive an interface unlocking request.
As shown in fig. 5, if the interface corresponding to the currently running application of the smartphone is in the locked state, an interface unlocking request may be generated for the application, for example, by clicking an "unlock" button 16 in the screen, so as to trigger the interface unlocking request.
Step S207, the smart phone obtains the authentication information according to the interface unlocking request.
In other embodiments, after the application program is determined to be the preset application program, it may be further determined whether a corresponding interface of the application program is currently in a locked state, and if so, the authentication information is further obtained.
Specifically, the authentication information may be in various forms, such as obtaining fingerprint information of the user through the fingerprint identification area 11, or obtaining iris information of the user through the front camera 15 of the mobile phone, which is not limited in the present invention.
In step S208, the smart phone verifies the authentication information to determine whether the authentication passes, if so, step S209 is executed, and if not, the process is ended.
And step S209, the smart phone unlocks a corresponding interface of the application program.
As can be seen from the above, the interface locking method provided in the embodiment of the present invention may receive an interface locking request, determine an application program that needs to lock an interface according to the interface locking request, obtain authentication information when the application program is a preset application program, verify the authentication information, lock a corresponding interface of the application program if the authentication passes, receive an interface unlocking request of the interface for the application program after the interface of the application program is locked, obtain the authentication information according to the interface unlocking request, and unlock the corresponding interface of the application program if the authentication information is successfully verified. The method and the device can lock the display interface corresponding to the preset application program when the user uses the application program, and unlock the display interface after the display interface is locked. The leakage of user data is avoided, for example, when the user displays the content in the mobile phone to other people or uses the mobile phone for other people, other information is forced to be displayed in front of other people due to misoperation. Therefore, the invention can protect the user data, prevent the privacy of the user from being revealed, improve the safety and have better user experience.
In order to better implement the interface locking method provided by the embodiment of the invention, the embodiment of the invention also provides a device based on the interface locking method. The terms are the same as those in the above-mentioned interface locking method, and details of implementation can be referred to the description in the method embodiment.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an interface locking device according to an embodiment of the present invention, where the interface locking device 30 includes: a first receiving module 301, a determining module 302, a first information obtaining module 303, a first verifying module 304 and a locking module 305;
the first receiving module 301 is configured to receive an interface lock request.
The interface locking request may be generated in a plurality of ways, for example, the interface locking request may be triggered by a user operating the terminal, where the operation may be a touch screen operation, a key operation, a voice operation, or the like. Optionally, the interface locking request may also be automatically generated by the terminal system, for example, a user may preset an application program that needs to lock the interface in advance, and when the system detects that the currently running application program is the preset application program, the interface locking request may be automatically generated.
The determining module 302 is configured to determine, according to the interface lock request, an application that needs to lock the interface.
The interface locking request may carry application identification information, and after the terminal receives the request, the determining module 302 may determine the application program that needs to lock the interface according to the application identification information carried by the terminal.
The first information obtaining module 303 is configured to obtain the authentication information when the application is a preset application.
In the embodiment of the present invention, a user may preset an application list of an interface to be locked in advance, after determining an application to be locked, determine whether the application is a preset application according to the list, and if so, further acquire authentication information by the first information acquisition module 303. Wherein, the authentication information may include: user fingerprint information, face information, iris information, voice information, and the like.
The first verification module 304 is configured to verify the authentication information.
In the embodiment of the present invention, the terminal may set preset information in advance, such as preset fingerprint information, preset iris information, and the like. Specifically, the first verification module 304 determines whether the authentication information matches the preset information, if so, the verification is determined to be successful, and if not, the verification fails.
The locking module 305 is configured to lock the corresponding interface of the application when the first verification module 304 passes the verification.
Further, as shown in fig. 7, in the interface locking device, the device may further include: a second receiving module 306, a second information obtaining module 307, a second verifying module 308 and a first unlocking module 309;
the second receiving module 306 is configured to receive an interface unlocking request for the application after the locking module 305 locks the corresponding interface of the application;
the second information obtaining module 307 is configured to obtain authentication information according to the interface unlocking request;
the second verification module 308 is configured to verify the authentication information;
the first unlocking module 309 is configured to unlock the corresponding interface of the application program when the second verification module 308 passes the verification.
Further, as shown in fig. 8, in the interface locking device, the device may further include: a duration obtaining module 310, a determining module 311, and a second unlocking module 312;
the duration obtaining module 310 is configured to obtain a locking duration for the corresponding interface of the application program to be locked after the locking module 305 locks the corresponding interface of the application program;
the determining module 311 is configured to determine whether the locking duration meets a preset duration;
the second unlocking module 312 is configured to unlock the corresponding interface of the application program when the determining module 311 determines that the interface is yes.
Specifically, the determining module 311 may specifically include: determining a submodule and a judging submodule;
the determining submodule is used for determining the preset time length corresponding to the application program according to the mapping relation between the preset application program and the preset time length;
the judging submodule is used for judging whether the locking duration is greater than or equal to the preset duration, and if so, determining that the locking duration meets the preset duration.
As can be seen from the above, in the interface locking method provided in the embodiment of the present invention, the first receiving module 301 may receive the interface locking request, the determining module 302 determines the application program requiring interface locking according to the interface locking request, when the application program is the preset application program, the first information obtaining module 303 obtains the authentication information, and the first verifying module 304 verifies the authentication information, and if the verification is passed, the locking module 305 locks the corresponding interface of the application program. The method and the device can lock the display interface corresponding to the preset application program when the user uses the application program, so as to avoid the leakage of user data, for example, when the user displays the contents in the terminal to other people or uses the terminal to other people, other information is forced to be displayed in front of other people due to misoperation. Therefore, the invention can protect the user data, prevent the privacy of the user from being revealed and improve the safety.
The invention also provides terminal equipment, such as a tablet computer, a mobile phone and other mobile terminals. The terminal device includes:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program codes stored in the memory to execute the interface locking method provided by the embodiment of the method.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. The mobile terminal 500 may include Radio Frequency (RF) circuitry 501, memory 502 including one or more computer-readable storage media, input unit 503, display unit 504, sensor 504, audio circuitry 506, Wireless Fidelity (WiFi) module 507, processor 508 including one or more processing cores, and power supply 509. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 9 is not intended to be limiting of mobile terminals and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The rf circuit 501 may be used for receiving and transmitting information, or receiving and transmitting signals during a call, and in particular, receives downlink information of a base station and then sends the received downlink information to one or more processors 508 for processing; in addition, data relating to uplink is transmitted to the base station. In general, radio frequency circuit 501 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the radio frequency circuit 501 may also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 502 may be used to store applications and data. Memory 502 stores applications containing executable code. The application programs may constitute various functional modules. The processor 508 executes various functional applications and data processing by executing application programs stored in the memory 502. The memory 502 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the mobile terminal, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 502 may also include a memory controller to provide the processor 508 and the input unit 503 access to the memory 502.
The input unit 503 may be used to receive input numbers, character information, or user characteristic information (such as a fingerprint), and generate a keyboard, mouse, joystick, optical, or trackball signal input related to user setting and function control. In particular, in one particular embodiment, the input unit 503 may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 508, and can receive and execute commands sent by the processor 508. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 503 may include other input devices in addition to the touch-sensitive surface. In particular, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a fingerprint recognition module, a trackball, a mouse, a joystick, and the like.
The display unit 504 may be used to display information input by or provided to the user and various graphical user interfaces of the mobile terminal, which may be made up of graphics, text, icons, video, and any combination thereof. The display unit 504 may include a display panel. Alternatively, the display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch-sensitive surface may overlay the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor 508 to determine the type of touch event, and then the processor 508 provides a corresponding visual output on the display panel according to the type of touch event. Although in FIG. 5 the touch-sensitive surface and the display panel are two separate components to implement input and output functions, in some embodiments the touch-sensitive surface may be integrated with the display panel to implement input and output functions.
The mobile terminal may also include at least one sensor 505, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile terminal, further description is omitted here.
The audio circuit 506 may provide an audio interface between the user and the mobile terminal through a speaker, microphone. The audio circuit 506 can convert the received audio data into an electrical signal, transmit the electrical signal to a speaker, and convert the electrical signal into a sound signal to output; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit 506 and converted into audio data, which is then processed by the audio data output processor 508 and then sent to, for example, another mobile terminal via the rf circuit 501, or the audio data is output to the memory 502 for further processing. The audio circuit 506 may also include an earbud jack to provide communication of a peripheral headset with the mobile terminal.
Wireless fidelity (WiFi) belongs to short-distance wireless transmission technology, and the mobile terminal can help the user to receive and send e-mail, browse web pages, access streaming media and the like through the wireless fidelity module 507, and provides wireless broadband internet access for the user. Although fig. 5 shows the wireless fidelity module 507, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 508 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing an application program stored in the memory 502 and calling data stored in the memory 502, thereby integrally monitoring the mobile terminal. Optionally, processor 508 may include one or more processing cores; preferably, the processor 508 may integrate an application processor, which primarily handles operating systems, user interfaces, application programs, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 508.
The mobile terminal also includes a power supply 509 (such as a battery) for powering the various components. Preferably, the power source may be logically connected to the processor 508 through a power management system, so that the power management system may manage charging, discharging, and power consumption management functions. The power supply 509 may also include any component such as one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown in fig. 9, the mobile terminal may further include a camera, a bluetooth module, and the like, which are not described in detail herein.
The processor 508 is also configured to implement the following functions: receiving a time acquisition instruction, acquiring current time according to the time acquisition instruction, judging whether the current time is within a preset time range, if so, judging whether a wireless local area network of the terminal is in a closed state, and if not, switching the wireless local area network to the closed state.
In specific implementation, the above modules may be implemented as independent entities, or may be combined arbitrarily to be implemented as the same or several entities, and specific implementation of the above modules may refer to the foregoing method embodiments, which are not described herein again.
It should be noted that, those skilled in the art can understand that all or part of the steps in the various methods of the above embodiments can be implemented by relevant hardware instructed by a program, and the program can be stored in a computer readable storage medium, such as a memory of the terminal, and executed by at least one processor in the terminal, and during the execution, the flow of the embodiments, such as the interface locking method, can be included. Among others, the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The interface locking method, the interface locking device and the terminal device provided by the embodiment of the invention are described in detail above, and each functional module may be integrated in one processing chip, or each module may exist alone physically, or two or more modules are integrated in one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for those skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (11)

1. An interface locking method, comprising the steps of:
receiving an interface locking request when a terminal browses photos;
determining an application program needing interface locking according to the interface locking request, and judging whether the application program runs in the foreground of the terminal;
if yes, acquiring identity authentication information when the application program is a preset application program, wherein the identity authentication information comprises one or more of user fingerprint information, face information, iris information, voice information and sliding tracks;
verifying the identity verification information;
and if the verification is passed, locking a corresponding interface of the application program, wherein the corresponding interface of the application program is a currently browsed photo interface, so that the terminal cannot switch photos.
2. The interface locking method of claim 1, wherein after the step of locking the respective interface of the application, the method further comprises:
receiving an interface unlocking request aiming at the application program;
acquiring identity verification information according to the interface unlocking request;
verifying the identity verification information;
and if the verification is passed, unlocking the corresponding interface of the application program.
3. The interface locking method of claim 1, wherein prior to the step of receiving an interface lock request, the method further comprises:
judging whether the terminal is in a screen locking state at present;
if not, executing the step of receiving the interface locking request.
4. The interface locking method of claim 1, wherein after the step of locking the respective interface of the application, the method further comprises:
acquiring the locking duration of the locked corresponding interface of the application program;
judging whether the locking duration meets a preset duration or not;
and if so, unlocking the corresponding interface of the application program.
5. The interface locking method according to claim 4, wherein the step of determining whether the locking duration satisfies a preset duration specifically comprises:
determining a preset time length corresponding to the application program according to the mapping relation between the preset application program and the preset time length;
judging whether the locking time length is greater than or equal to the preset time length or not;
if yes, determining that the locking duration meets a preset duration.
6. An interface locking device, comprising: the device comprises a first receiving module, a determining module, a first information acquiring module, a first verifying module and a locking module;
the first receiving module is used for receiving an interface locking request when the terminal browses photos;
the determining module is used for determining an application program needing interface locking according to the interface locking request and judging whether the application program runs in the foreground of the terminal;
the first information acquisition module is used for acquiring identity authentication information when the application program is determined to run in the foreground of the terminal and is a preset application program, wherein the identity authentication information comprises one or more of user fingerprint information, face information, iris information, voice information and sliding tracks;
the first verification module is used for verifying the identity verification information;
the locking module is used for locking a corresponding interface of the application program when the first verification module passes the verification, wherein the corresponding interface of the application program is a currently browsed photo interface, so that the terminal cannot switch photos.
7. The interfacial locking device of claim 6, further comprising: the device comprises a second receiving module, a second information acquisition module, a second verification module and a first unlocking module;
the second receiving module is used for receiving an interface unlocking request aiming at the application program after the locking module locks the corresponding interface of the application program;
the second information acquisition module is used for acquiring identity authentication information according to the interface unlocking request;
the second verification module is used for verifying the identity verification information;
and the first unlocking module is used for unlocking the corresponding interface of the application program when the second verification module passes the verification.
8. The interfacial locking device of claim 6, further comprising: the device comprises a duration acquisition module, a judgment module and a second unlocking module;
the time length obtaining module is used for obtaining the locking time length of the corresponding interface of the application program after the corresponding interface of the application program is locked by the locking module;
the judging module is used for judging whether the locking duration meets a preset duration or not;
and the second unlocking module is used for unlocking the corresponding interface of the application program when the judgment module judges that the interface is positive.
9. The interface locking device according to claim 8, wherein the determining module specifically comprises: determining a submodule and a judging submodule;
the determining submodule is used for determining the preset time length corresponding to the application program according to the mapping relation between the preset application program and the preset time length;
the judging submodule is used for judging whether the locking duration is greater than or equal to the preset duration, and if so, determining that the locking duration meets the preset duration.
10. A terminal device, comprising:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute the interface locking method according to any one of claims 1 to 5.
11. A storage medium, characterized in that the storage medium stores instructions for execution by a processor for performing the steps of implementing the method according to any one of claims 1-5.
CN201611218415.1A 2016-12-26 2016-12-26 Interface locking method and device and terminal equipment Active CN106778175B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611218415.1A CN106778175B (en) 2016-12-26 2016-12-26 Interface locking method and device and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611218415.1A CN106778175B (en) 2016-12-26 2016-12-26 Interface locking method and device and terminal equipment

Publications (2)

Publication Number Publication Date
CN106778175A CN106778175A (en) 2017-05-31
CN106778175B true CN106778175B (en) 2020-07-07

Family

ID=58926206

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611218415.1A Active CN106778175B (en) 2016-12-26 2016-12-26 Interface locking method and device and terminal equipment

Country Status (1)

Country Link
CN (1) CN106778175B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107248218A (en) * 2017-07-28 2017-10-13 林琳 A kind of double wireless signal electronic lock and its method for unlocking
CN107562343B (en) * 2017-08-31 2020-10-09 努比亚技术有限公司 Interactive regulation and control method, equipment and computer readable storage medium
CN107563169A (en) * 2017-09-06 2018-01-09 深圳天珑无线科技有限公司 Verification method, checking system and electronic equipment
CN107679377A (en) * 2017-09-30 2018-02-09 广东欧珀移动通信有限公司 Application interface switching method, device, storage medium and electronic equipment
CN107704737A (en) * 2017-10-25 2018-02-16 维沃移动通信有限公司 Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN108009014B (en) * 2017-12-25 2021-03-12 广东小天才科技有限公司 Application use management method and mobile terminal
CN108108607A (en) * 2017-12-27 2018-06-01 深圳豪客互联网有限公司 A kind of application program locking function open method and device
CN108537013A (en) * 2017-12-29 2018-09-14 广东欧珀移动通信有限公司 Electronic device, screen locking control method and Related product
CN111027043B (en) * 2019-12-18 2022-07-01 明度智云(浙江)科技有限公司 Unlocking method and device of application program and storage medium
CN113158165B (en) * 2021-05-20 2023-05-02 读书郎教育科技有限公司 Method and device for rapidly locking application of Android terminal
CN113158164A (en) * 2021-05-20 2021-07-23 读书郎教育科技有限公司 Android student tablet management and control application method
CN114489858B (en) * 2022-02-11 2024-03-19 Tcl通讯科技(成都)有限公司 Application software information setting method and device, terminal equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN104714641A (en) * 2015-02-10 2015-06-17 广东欧珀移动通信有限公司 Locking and unlocking method and device for application program
CN104820564A (en) * 2015-05-07 2015-08-05 网易(杭州)网络有限公司 User terminal, status switching method thereof, status switching device, game control method and game control device
CN105573586A (en) * 2015-12-17 2016-05-11 昆山龙腾光电有限公司 Method and device for preventing misoperation for terminal equipment
CN106201678A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 application program freezing method and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101808625B1 (en) * 2010-11-23 2018-01-18 엘지전자 주식회사 Content control apparatus and method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN104714641A (en) * 2015-02-10 2015-06-17 广东欧珀移动通信有限公司 Locking and unlocking method and device for application program
CN104820564A (en) * 2015-05-07 2015-08-05 网易(杭州)网络有限公司 User terminal, status switching method thereof, status switching device, game control method and game control device
CN105573586A (en) * 2015-12-17 2016-05-11 昆山龙腾光电有限公司 Method and device for preventing misoperation for terminal equipment
CN106201678A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 application program freezing method and system

Also Published As

Publication number Publication date
CN106778175A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
CN106778175B (en) Interface locking method and device and terminal equipment
US11269981B2 (en) Information displaying method for terminal device and terminal device
RU2618932C2 (en) Method, installation and device of unblocking process for terminal
US11227042B2 (en) Screen unlocking method and apparatus, and storage medium
US10530921B2 (en) Method for unlocking terminal screen and terminal
CN106658489B (en) Terminal application processing method and device and mobile terminal
CN112560001B (en) Method for managing application program use time offline and terminal equipment
US9940448B2 (en) Unlock processing method and device
US10216915B2 (en) Authentication method and apparatus thereof
KR20200132942A (en) Method for quickly opening an application or application function, and a terminal
CN106445596B (en) Method and device for managing setting items
EP3499918A1 (en) Data sharing method and terminal
CN105653220B (en) Screen data display method and device in remote control
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN103279272B (en) A kind of method and device starting application program in an electronic
CN109062634B (en) Application starting method and mobile terminal
CN109714476B (en) Data processing method and device, mobile terminal and storage medium
CN108664818B (en) Unlocking control method and device
CN108632454B (en) Information processing method and device, computer readable storage medium and terminal
KR20200106550A (en) Authentication window display method and device
CN106447325B (en) NFC communication-based processing method and device and mobile terminal
CN104573437A (en) Information authentication method, device and terminal
CN109413256B (en) Contact person information processing method and device, storage medium and electronic equipment
CN110062929A (en) A kind of method, apparatus and terminal showing data
WO2019090702A1 (en) Terminal security protection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant