CN106845211A - Mobile terminal and its application start method and device - Google Patents
Mobile terminal and its application start method and device Download PDFInfo
- Publication number
- CN106845211A CN106845211A CN201611167532.XA CN201611167532A CN106845211A CN 106845211 A CN106845211 A CN 106845211A CN 201611167532 A CN201611167532 A CN 201611167532A CN 106845211 A CN106845211 A CN 106845211A
- Authority
- CN
- China
- Prior art keywords
- application
- opened
- authority
- locked
- locking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Stored Programmes (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Start method and device present invention is disclosed a kind of mobile terminal and its application, including:When receiving application startup order, judge whether application locks;When application is locked, the authority that application is opened is verified;When passing through using the Authority Verification opened, start application.The mobile terminal and its application provided in the present invention start method and device, when receiving using order is started, application are verified using before also not actuated, and application can be just started when being verified, from bottom to using protecting.
Description
Technical field
The present invention relates to terminal applies field, more particularly to a kind of mobile terminal and its application start method and device.
Background technology
At present, the protection for locking application is typically right to realize using one layer of checking interface of covering after starting
The protection of application is locked, can only be protected from application layer, it is impossible to protected from bottom;Doing so fundamentally to protect
Application is locked, because lock application having been started up;And delay phenomenon can be present in this protected mode:When locking using starting one section
Between after just occur checking interface, experience it is unfriendly.For example, starting the wechat application being locked, typically opened in wechat application
One layer of checking interface of covering after dynamic, but wechat application is actual to be had been started up, it is impossible to fundamentally protected.
The content of the invention
The main object of the present invention starts method and device to provide a kind of mobile terminal and its application, is receiving application
When starting order, application is verified before using also not actuated, application can be just started when being verified, from bottom correspondence
With being protected.
The present invention proposes a kind of application startup method, comprises the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
Further, it is described to receive during using starting order, judge to apply that whether the step of locking includes:
Receive using start order when, by apply bag name judge apply whether lock.
Further, it is described to receive during using starting order, judge also to include after applying the step of whether locking:
When application is not locked, start application.
Further, described to receive during using starting order, whether judge to apply also includes before the step of locking:
Application is locked, and is set using the authority opened.
Further, described pair of application is locked, and set using open authority the step of also include:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
Further, when the application is locked, to application open authority verify the step of include:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle
Face includes password and/or identifying code.
Further, when the application is locked, to application open authority verify the step of after also include:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
Further, when the Authority Verification that the application is opened passes through, starting the step of applying includes:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package
Move and open application.
Further, when the Authority Verification that the application is opened passes through, the step of start application after also include:
According to the use state of application, locking is reset to application.
Further, the use state according to application, to including using the step of resetting locking:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application
Into the duration threshold value on backstage.
Further, the use state according to application, to also including using the step of resetting locking:
After screen locking, application is locked.
Further, the use state according to application, to also including using the step of resetting locking:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
Present invention also offers one kind application starter, including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
Further, the judging unit specifically for:
Receive using start order when, by apply bag name judge apply whether lock.
Further, described device also includes:
Unlocked start unit, when application is not locked, starts application.
Further, described device also includes:
Unit is locked, for being locked to application, and is set using the authority opened.
Further, the locking unit is additionally operable to:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
Further, the authentication unit specifically for:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle
Face includes password and/or identifying code.
Further, described device also includes:
No starting unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
Further, the start unit specifically for:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package
Dynamic application.
Further, described device also includes:
Unit is relocked, according to the use state of application, locking is reset to application.
Further, the unit that relocks is additionally operable to:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application
Into the duration threshold value on backstage.
Further, the unit that relocks is additionally operable to:
After screen locking, application is locked.
Further, the unit that relocks is additionally operable to:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
The invention provides a kind of mobile terminal, including memory and processor;
The memory is used to store the application startup method of the above-mentioned application starter execution any of the above-described of support
Program;
The processor is configurable for performing the program stored in the memory.
The invention provides a kind of computer-readable storage medium, for saving as the computer used by above-mentioned application starter
Software instruction, it is using the program designed by starter that it is included for performing above-mentioned aspect.
The mobile terminal and its application provided in the present invention start method and device, have the advantages that:
The mobile terminal and its application provided in the present invention start method and device, are ordered using startup receiving, should
Application is verified before with also not actuated, application can be just started when passing through using the Authority Verification opened, verified obstructed
Then No starting application is crossed, the application for locking is protected from bottom, in time checking;After using unlatching, according to making for application
With state, application is relocked, the application to opening is protected, protect privacy of user.
Brief description of the drawings
Fig. 1 is using starting method and step schematic diagram in one embodiment of the invention;
Fig. 2 is using starting method and step schematic diagram in another embodiment of the present invention;
Fig. 3 is using starting method and step schematic diagram in further embodiment of this invention;
Fig. 4 is application starter structural representation in one embodiment of the invention;
Fig. 5 is application starter structural representation in another embodiment of the present invention;
Fig. 6 is the structured flowchart of mobile terminal in one embodiment of the invention.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one
It is individual ", " described " " above-mentioned " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that making in specification of the invention
Wording " including " refer to the presence of the feature, integer, step, operation, element, unit, module and/or component, but simultaneously
Do not preclude the presence or addition of one or more other features, integer, step, operation, element, unit, module, component and/or it
Group.It should be understood that when we claim element to be " connected " or during " coupled " to another element, it can be directly connected to or couple
To other elements, or can also there is intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting
Connect or wirelessly couple.Wording "and/or" used herein includes one or more associated listing the whole or any of item
Unit and all combination.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also
Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art
The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication
To explain.
The application provided in the embodiment of the present invention starts method and device and is mainly used on intelligent terminal to locking application
Protection, prevent from applying and be activated before unblock, application is protected from bottom;That improves locking application uses safety
Property.Intelligent terminal in the embodiment of the present invention terminal device such as including mobile phone, flat board, computer.Application locking in the present invention refers to
, the authority limitation of application is set using/starts, starting application must first verify that the authority for opening application is unlocked, and prevent
Only application is arbitrarily opened, so as to ensure the personal secrets for locking application content.
Reference picture 1, is using starting method and step schematic diagram in one embodiment of the invention.
One embodiment of the invention kind proposes a kind of application startup method, comprises the following steps:
Step S1, when receiving application startup order, judges whether application locks;
Step S2, when application is locked, verifies to the authority that application is opened;
Step S3, when passing through using the Authority Verification opened, starts application.
At present, the protection for locking application is typically one layer of checking interface of covering after application starts, and is verified
When just can using the application so that realize to lock application protection;This way can only be protected from application layer, it is impossible to
Protected from bottom, because lock application actually having been started up, user can view the partial content in application, cause
Privacy leakage;Can also there is delay phenomenon in this protected mode, lock after application starts a period of time and checking interface just occur,
Experience is unfriendly.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should
Bag name judges whether the application is to lock application, if the application is not locked, directly initiates application;If should
With to lock application, then opening/startup the authority applied is verified, that is, verify whether to open the authority of the application, should
Checking predominantly verifies and wants using the user right of the application that the mode of checking mainly includes ejection checking interface, fingerprint inspection
Card and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, authentication
Formula can be one of which, or various combinations;For example, checking interface requirements user input password can be ejected (should
Password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short-message verification
Code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris recognition
Deng.Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package
Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should
With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom
Protection, is different from existing activating to open and is just verified that personal secrets that can be preferably to user are carried out after
Protection.
Specifically, user needs to start certain application, such as wechat on the intelligent terminals such as mobile phone, flat board.User can be with
By the corresponding icon of wechat application in click or Touch screen, you can sent using the order for starting by touch-screen;Intelligence
Terminal receives the order, forbids opening wechat at once, but first pass through ActivityManagerService or
ApsManagerService judges whether the wechat is locked, if wechat is not locked, wechat, user is at once
Just wechat can normally be used;If wechat is locked, ejection verifies interface or requires that user carries out fingerprint recognition or iris
Identification, user carries out corresponding operating and is verified;When user does not carry out verification operation, or during checking fingerprint be not inconsistent, password
Not pair or the not reciprocity mistake of identifying code cause checking can not by when, then No starting wechat application;If being verified,
Then transmission Intent information starts and opens wechat application to wechat application installation package by application installation package, and user just can be with
Message content is checked into wechat.Protected from bottom to locking application in the present embodiment, it is ensured that privacy of user safety.
Reference picture 2, in another embodiment, above-mentioned steps S1, receive using start order when, judge using whether add
Also include before the step of lock:
Step S0, locks to application, and sets using the authority opened.
Various application software are installed, many application software are related to the privacy of user on intelligent terminal, for example wechat, short
Letter, picture library etc..User is often not intended to the privacy of oneself and is exposed, therefore can set to using locking, preventing privacy
It is exposed.Specifically, user can obtain System Privileges so as to be locked to application, or be set by 360 mobile phone assistant
The application of locking, should also be set using the authority opened when being locked to application, and the authority is mainly user when opening application
Authority.For example, be usually arranged as by verify user can just open application, the checking mainly include ejection verify interface,
Fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code,
Verification mode can be one of which, or various combinations;For example, it is close to eject checking interface requirements user input
Code (password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short message
Identifying code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris
Identification etc..
In the present embodiment, when being locked to application, locking mark is shown on the application icon for locking;Above-mentioned locking
Mark includes figure and/or word.
For the ease of the application that user's identification is locked, when being locked to application, locking is shown on the application icon for locking
Mark, the locking mark can be the combination of figure, word or both;The figure can be the figure of lock, and word can be
Chinese or English.
For example, the privacy content of wechat is more, user can select to lock wechat application, after locking, micro-
Locking mark is shown on letter icon.And can then select not lock for the application not high of other privacy, such as game,
Browser etc..
After above-mentioned steps S0, step S1, S2, S3 are carried out, step S1, S2, S3 are identical with a upper embodiment,
This is not repeated.
Reference picture 3, application startup method in another embodiment, comprises the following steps:
Step S1, when receiving application startup order, judges whether application locks;
Step S2, when application is locked, verifies to the authority that application is opened;
Step S3, when passing through using the Authority Verification opened, starts application;
Step S4, according to the use state of application, locking is reset to application.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should
Bag name judges whether the application is to lock application, if the application is not locked, directly initiates application;If should
With to lock application, then opening/startup the authority applied is verified, that is, verify whether to open the authority of the application, should
Checking predominantly verifies and wants using the user right of the application that the mode of checking mainly includes ejection checking interface, fingerprint inspection
Card and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, authentication
Formula can be one of which, or various combinations;For example, checking interface requirements user input password can be ejected (should
Password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short-message verification
Code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris recognition
Deng.Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package
Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should
With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom
Protection, is different from existing startup and is just verified that personal secrets that can be preferably to user are protected after.
The present embodiment can also include above-mentioned steps S0, after above-mentioned steps S3, i.e., when using the Authority Verification opened
By when, start application after, user just can check application message content, and now, other people can also use user's intelligence
Application that can be in terminal, in order to protect security now using upper privacy information, then can make using reentering locking shape
State, prevents other people from checking application.In the present embodiment, according to the use state of application, locking is reset to application.It is above-mentioned to answer
Use state mainly includes whether application is currently currently being used, applies in backstage use and intelligent terminal in screen locking
State etc..
Specifically, enter the duration on backstage by judging application, application is locked when reaching threshold value;Above-mentioned threshold value is
Default application enters the duration threshold value on backstage.In the present embodiment, the threshold value can also be 0 second, it is to be understood that work as threshold
When value is set to 0 second, then when judging that application enters backstage, then application is locked immediately, afterwards, to continue to check application
Content, then will re-start checking, and the personal secrets of application are protected with this.And in order to strengthen the ease of use of application,
The threshold value will not be generally set to 0 second, for example, can set a threshold to five minutes, i.e., enter backstage five minutes in application
Afterwards, just will be using relocking, in this way, user is just verified without opening application every time.
Specifically, after may be arranged as intelligent terminal screen locking, just application is relocked, when intelligent terminal screen locking
Afterwards, locking application, starts application after unlocking screen, application need to be unlocked again.
Preferably, above-mentioned steps S4, according to the use state of application, to also including using the step of resetting locking:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
In order to carry out different lock operations to different applications, an application list for relocking can be set, and
Locking condition is correspondingly arranged to the application in list.For example, in setting an application list for relocking on intelligent terminal
Including wechat, picture library, short message;Because the privacy content information of wechat is more, therefore could be arranged to be reached into backstage when wechat
To then entering lock-out state during threshold value, and then could be arranged to just enter when the intelligent terminal screen locking after for picture library, short message and lock
State.
In order to be further illustrated to the technical scheme in the present invention, dress is started present invention also offers one kind application
Put.
Reference picture 4, additionally provides one kind application starter in the embodiment of the present invention, including:
Judging unit 20, when receiving application startup order, judges whether application locks;
Authentication unit 30, when application is locked, verifies to the authority that application is opened;
Start unit 40, when passing through using the Authority Verification opened, starts application.
Said apparatus also include unlocked start unit, for when application is not locked, starting application;No starting list
Unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
At present, the protection for locking application is typically one layer of checking interface of covering after application starts, and is verified
When just can using the application so that realize to lock application protection;This way can only be protected from application layer, it is impossible to
Protected from bottom, because lock application actually having been started up, user can view the partial content in application, cause
Privacy leakage;Can also there is delay phenomenon in this protected mode, lock after application starts a period of time and checking interface just occur,
Experience is unfriendly.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should
Bag name judges whether the application is to lock application, straight by unlocked start unit if the application is not locked
Connect startup application;If the application is applied to lock, the opening/startup authority to applying is verified, that is, verified whether
The authority of the application is opened, the checking is mainly checking and wants using the user right of the application, and the mode of checking mainly includes
Ejection checking interface, fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password
And/or identifying code, verification mode can be one of which, or various combinations;For example, checking interface can be ejected will
(password can be identical with the unlocking pin of intelligent terminal, or be using locking especially setting to seek user input password
Password) or short message verification code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint
Identification or iris recognition etc..Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package
Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should
With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom
Protection, is different from existing startup and is just verified that personal secrets that can be preferably to user are protected after.
Specifically, user needs to start certain application, such as wechat on the intelligent terminals such as mobile phone, flat board.User can be with
By the corresponding icon of wechat application in click or Touch screen, you can sent using the order for starting by touch-screen;Intelligence
Terminal receives the order, forbids opening wechat at once, but first pass through ActivityManagerService or
ApsManagerService judges whether the wechat is locked, if wechat is not locked, wechat, user is at once
Just wechat can normally be used;If wechat is locked, ejection verifies interface or requires that user carries out fingerprint recognition or iris
Identification, user carries out corresponding operating and is verified;When user does not carry out verification operation, or during checking fingerprint be not inconsistent, password
Not pair or the not reciprocity mistake of identifying code cause checking can not by when, then No starting wechat application;If being verified,
Then transmission Intent information starts and opens wechat application to wechat application installation package by application installation package, and user just can be with
Message content is checked into wechat.Protected from bottom to locking application in the present embodiment, it is ensured that privacy of user safety.
Reference picture 5, in another embodiment, said apparatus also include:
Unit 10 is locked, for being locked to application, and is set using the authority opened.
Various application software are installed, many application software are related to the privacy of user on intelligent terminal, for example wechat, short
Letter, picture library etc..User is often not intended to the privacy of oneself and is exposed, therefore can set to using locking, preventing privacy
It is exposed.Specifically, user can obtain System Privileges so as to be locked to application, or be set by 360 mobile phone assistant
The application of locking, should also be set using the authority opened when being locked to application, and the authority is mainly user when opening application
Authority.For example, be usually arranged as by verify user can just open application, the checking mainly include ejection verify interface,
Fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code,
Verification mode can be one of which, or various combinations;For example, it is close to eject checking interface requirements user input
Code (password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short message
Identifying code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris
Identification etc..
In the present embodiment, when being locked to application, locking mark is shown on the application icon for locking;Above-mentioned locking
Mark includes figure and/or word.
For the ease of the application that user's identification is locked, when being locked to application, locking is shown on the application icon for locking
Mark, the locking mark can be the combination of figure, word or both;The figure can be the figure of lock, and word can be
Chinese or English.
For example, the privacy content of wechat is more, user can select to lock wechat application, after locking, micro-
Locking mark is shown on letter icon.And can then select not lock for the application not high of other privacy, such as game,
Browser etc..
Further, said apparatus also include:
Unit 50 is relocked, according to the use state of application, locking is reset to application.
When the Authority Verification that application is opened passes through, start and open after application, user just can check application message
Content, now, other people can also be using the application on user's intelligent terminal, in order to protect now using upper privacy information
Security, then can make, using lock-out state is reentered, to prevent other people from checking application.In the present embodiment, according to application
Use state, locking is reset to application.The use state of above-mentioned application mainly include application whether be currently currently being used,
Apply and be in screen lock state etc. in backstage use and intelligent terminal.
Specifically, enter the duration on backstage by judging application, application is locked when reaching threshold value;Above-mentioned threshold value is
Default application enters the duration threshold value on backstage.In the present embodiment, the threshold value can also be 0 second, it is to be understood that work as threshold
When value is set to 0 second, then when judging that application enters backstage, then application is locked immediately, afterwards, to continue to check application
Content, then will re-start checking, and the personal secrets of application are protected with this.And in order to strengthen the ease of use of application,
The threshold value will not be generally set to 0 second, for example, can set a threshold to five minutes, i.e., enter backstage five minutes in application
Afterwards, just will be using relocking, in this way, user is just verified without opening application every time.
Specifically, after may be arranged as intelligent terminal screen locking, just application is relocked, when intelligent terminal screen locking
Afterwards, locking application, starts application after unlocking screen, application need to be unlocked again.
Preferably, it is above-mentioned to relock unit 50, according to the use state of application, locking is reset to application and is also wrapped
Include:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
In order to carry out different lock operations to different applications, an application list for relocking can be set, and
Locking condition is correspondingly arranged to the application in list.For example, in setting an application list for relocking on intelligent terminal
Including wechat, picture library, short message;Because the privacy content information of wechat is more, therefore could be arranged to be reached into backstage when wechat
To then entering lock-out state during threshold value, and then could be arranged to just enter when the intelligent terminal screen locking after for picture library, short message and lock
State.
In sum, it is the application startup method and device of offer in the embodiment of the present invention, is receiving using startup life
Order, is verified to application before using also not actuated, and application can be just started when passing through using the Authority Verification opened, and is verified
Not by then No starting application, the application for locking is protected from bottom, in time checking;After using unlatching, according to application
Use state, to application relock, to open application protect, protect privacy of user.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in fig. 6, for convenience of description, illustrate only and this
The related part of inventive embodiments, particular technique details is not disclosed, and refer to present invention method part.The terminal can
Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point
Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 6 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 6 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 110, memory 120, input block 130, display unit
140th, sensor 150, voicefrequency circuit 160, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 170, processor 180,
And the grade part of power supply 190.It will be understood by those skilled in the art that the handset structure shown in Fig. 6 is not constituted to mobile phone
Limit, part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 110 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information is received, processed to processor 180;In addition, up data is activation will be designed to base station.Generally, RF circuits 110
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise
Amplifier, LNA), duplexer etc..Additionally, RF circuits 110 can also be communicated by radio communication with network and other equipment.
Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global
System of Mobile communication, GSM), general packet radio service (General Packet Radio
Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA
(Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution,
LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 120 can be used to store software program and module, and processor 180 is by running storage in memory 120
Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 120 can mainly include
Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone
Data (such as voice data, phone directory etc.) etc..Additionally, memory 120 can include high-speed random access memory, can be with
Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states
Part.
Input block 130 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with
And the relevant key signals input of function control.Specifically, input block 130 may include that contact panel 131 and other inputs set
Standby 132.Contact panel 131, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses
The operation of any suitable object such as finger, stylus or annex on contact panel 131 or near contact panel 131), and root
Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 131 may include touch detecting apparatus and touch
Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give processor 180, and the order sent of receiving processor 180 and can be performed.Furthermore, it is possible to using electricity
The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 131.Except contact panel 131, input
Unit 130 can also include other input equipments 132.Specifically, other input equipments 132 can include but is not limited to secondary or physical bond
One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 140 can be used for show by user input information or be supplied to user information and mobile phone it is various
Menu.Display unit 140 may include display panel 141, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Show panel 141.Further, contact panel 131 can cover display panel 141, when contact panel 131 detect it is thereon or attached
After near touch operation, processor 180 is sent to determine the type of touch event, with preprocessor 180 according to touch event
Type corresponding visual output is provided on display panel 141.Although in figure 6, contact panel 131 and display panel 141
It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control
Panel 131 and display panel 141 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 150, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 141, proximity transducer can close display panel 141 when mobile phone is moved in one's ear
And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor
Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and mobile phone.Audio-frequency electric
Electric signal after the voice data conversion that road 160 will can receive, is transferred to loudspeaker 161, and sound is converted to by loudspeaker 161
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, is turned after being received by voicefrequency circuit 160
It is changed to voice data, then after voice data output processor 180 is processed, through RF circuits 110 to be sent to such as another mobile phone,
Or export to memory 120 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 170
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows
WiFi module 170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to
Cross operation or perform software program of the storage in memory 120 and/or module, and call storage in memory 120
Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 180 can be wrapped
Include one or more processing units;Preferably, processor 180 can integrated application processor and modem processor, wherein, should
Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Mobile phone also includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe
Reason system is logically contiguous with processor 180, so as to realize management charging, electric discharge and power managed by power-supply management system
Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
Reference picture 6, in embodiments of the present invention, the processor 180 included by the mobile terminal also has following functions:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the terminal of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
It will be understood by those skilled in the art that the present invention includes being related to for performing in operation described herein
Or multinomial equipment.These equipment can be for needed for purpose and specially design and manufacture, or general-purpose computations can also be included
Known device in machine.These equipment have computer program of the storage in it, and these computer programs are optionally activated
Or reconstruct.Such computer program can be stored in equipment (for example, computer) computer-readable recording medium or store and be suitable to
Storage e-command is simultaneously coupled in any kind of medium of bus respectively, and the computer-readable medium is included but is not limited to
Any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, read-only storage
Device), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable Read-
Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable
Read-Only Memory, EEPROM), flash memory, magnetic card or light card.It is, readable
Medium include being stored in the form of it can read by equipment (for example, computer) or transmission information any medium.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or
The combination of the frame in each frame and these structure charts and/or block diagram and/or flow graph in block diagram and/or flow graph.This technology is led
Field technique personnel be appreciated that can by these computer program instructions be supplied to all-purpose computer, special purpose computer or other
The processor of programmable data processing method is realized, so that by the treatment of computer or other programmable data processing methods
Device is come the scheme specified in the frame or multiple frame that perform structure chart disclosed by the invention and/or block diagram and/or flow graph.
Those skilled in the art of the present technique are appreciated that in various operations, method, the flow discussed in the present invention
Step, measure, scheme can be replaced, changed, combined or deleted.Further, it is each with what is discussed in the present invention
Other steps, measure in kind operation, method, flow, scheme can also be replaced, changed, reset, decomposed, combined or deleted.
Further, it is of the prior art with various operations, method, the flow disclosed in the present invention in step, measure, scheme
Can also be replaced, changed, reset, decomposed, combined or deleted.
The preferred embodiments of the present invention are the foregoing is only, the scope of the claims of the invention, every utilization is not thereby limited
Equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations
Technical field, be included within the scope of the present invention.
The embodiment of the invention provides:
A1, a kind of application startup method, comprise the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
A2, the application startup method according to A1, it is described to receive during using starting order, judge whether application locks
The step of include:
Receive using start order when, by apply bag name judge apply whether lock.
A3, the application startup method according to A1 or A2, it is described to receive during using starting order, whether judge application
Also include after the step of locking:
When application is not locked, start application.
A4, the application startup method according to A1 or A2, it is described to receive during using starting order, whether judge application
Also include before the step of locking:
Application is locked, and is set using the authority opened.
A5, the application startup method according to A4, described pair of application are locked, and are set using the authority opened
Step also includes:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
A6, the application startup method according to A1, when the application is locked, verify to the authority that application is opened
The step of include:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle
Face includes password and/or identifying code.
A7, the application startup method according to A1 or A6, when the application is locked, are carried out to the authority that application is opened
Also include after the step of checking:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
A8, the application startup method according to A1, when the Authority Verification that the application is opened passes through, start the step of application
Suddenly include:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package
Dynamic application.
A9, the application startup method according to A1 or A8, when the Authority Verification that the application is opened passes through, start application
The step of after also include:
According to the use state of application, locking is reset to application.
A10, the application startup method according to A9, the use state according to application reset lock to application
Fixed step includes:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application
Into the duration threshold value on backstage.
A11, the application startup method according to A9, the use state according to application reset lock to application
Fixed step also includes:
After screen locking, application is locked.
A12, the application startup method according to A9, the use state according to application reset lock to application
Fixed step also includes:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
B1, one kind application starter, including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
B2, the application starter according to B1, the judging unit specifically for:
Receive using start order when, by apply bag name judge apply whether lock.
B3, the application starter according to B1 or B2, described device also include:
Unlocked start unit, when application is not locked, starts application.
B4, the application starter according to B1 or B2, described device also include:
Unit is locked, for being locked to application, and is set using the authority opened.
B5, the application starter according to B4, the locking unit are additionally operable to:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
B6, the application starter according to B1, the authentication unit specifically for:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle
Face includes password and/or identifying code.
B7, the application starter according to B1 or B6, described device also include:
No starting unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
B8, the application starter according to B1, the start unit specifically for:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package
Dynamic application.
B9, the application starter according to B1 or B8, described device also include:
Unit is relocked, according to the use state of application, locking is reset to application.
B10, the application starter according to B9, the unit that relocks are additionally operable to:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application
Into the duration threshold value on backstage.
B11, the application starter according to B9, the unit that relocks are additionally operable to:
After screen locking, application is locked.
B12, the application starter according to B9, the unit that relocks are additionally operable to:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
C1, a kind of mobile terminal, including memory and processor;
The memory is used to store supports that application of the application starter execution as any one of A1 to A12 starts
The program of method;
The processor is configurable for performing the program stored in the memory.
Claims (10)
1. it is a kind of to apply startup method, it is characterised in that to comprise the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
2. application according to claim 1 starts method, it is characterised in that described to receive during using starting order, sentences
The step of whether disconnected application locks includes:
Receive using start order when, by apply bag name judge apply whether lock.
3. application according to claim 1 and 2 starts method, it is characterised in that described to receive during using starting order,
Judge also to include after applying the step of whether locking:
When application is not locked, start application.
4. application according to claim 1 and 2 starts method, it is characterised in that described to receive during using starting order,
Whether judge to apply also includes before the step of locking:
Application is locked, and is set using the authority opened.
5. application according to claim 4 starts method, it is characterised in that described pair of application is locked, and setting should
The step of with the authority opened, also includes:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
6. application according to claim 1 starts method, it is characterised in that when the application is locked, and application is opened
Authority include the step of verified:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;The checking interface bag
Include password and/or identifying code.
7. the application startup method according to claim 1 or 6, it is characterised in that when the application is locked, beats application
Also include after the step of authority opened is verified:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
8. application according to claim 1 starts method, it is characterised in that the Authority Verification that the application is opened passes through
When, starting the step of applying includes:
When passing through using the Authority Verification opened, transmission Intent information to application installation package, being started by application installation package should
With.
9. one kind application starter, it is characterised in that including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
10. a kind of mobile terminal, it is characterised in that including memory and processor;
The memory is used to store supports that the application performed as any one of claim 1 to 8 using starter is opened
The program of dynamic method;
The processor is configurable for performing the program stored in the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611167532.XA CN106845211A (en) | 2016-12-16 | 2016-12-16 | Mobile terminal and its application start method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611167532.XA CN106845211A (en) | 2016-12-16 | 2016-12-16 | Mobile terminal and its application start method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106845211A true CN106845211A (en) | 2017-06-13 |
Family
ID=59140374
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611167532.XA Pending CN106845211A (en) | 2016-12-16 | 2016-12-16 | Mobile terminal and its application start method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106845211A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169337A (en) * | 2017-06-27 | 2017-09-15 | 上海传英信息技术有限公司 | management method, device and terminal |
CN107846509A (en) * | 2017-10-31 | 2018-03-27 | 努比亚技术有限公司 | A kind of application display method, terminal device and storage medium |
CN108737638A (en) * | 2018-04-08 | 2018-11-02 | Oppo广东移动通信有限公司 | Application control method, apparatus, mobile terminal and computer-readable medium |
CN109062634A (en) * | 2018-10-30 | 2018-12-21 | 维沃移动通信有限公司 | A kind of application starting method and mobile terminal |
CN109240560A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
CN110262813A (en) * | 2019-06-25 | 2019-09-20 | 上海连尚网络科技有限公司 | Method and apparatus for installing application |
CN111279339A (en) * | 2017-08-29 | 2020-06-12 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN112905258A (en) * | 2021-02-05 | 2021-06-04 | 杭州天宽科技有限公司 | Mobile terminal application safety starting method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286190A (en) * | 2007-04-13 | 2008-10-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and its fingerprint verification protecting method |
CN103336924A (en) * | 2013-07-03 | 2013-10-02 | 上海斐讯数据通信技术有限公司 | Starting lock for mobile terminal application program |
CN104331648A (en) * | 2014-11-24 | 2015-02-04 | 上海斐讯数据通信技术有限公司 | Locking system, locking method, unlocking system and unlocking method for application |
CN104573485A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for starting terminal application |
US20150178517A1 (en) * | 2010-06-25 | 2015-06-25 | Blackberry Limited | Security mechanism for increased personal data protection |
CN105095746A (en) * | 2015-07-02 | 2015-11-25 | 北京奇虎科技有限公司 | Method and device for application program starting authentication |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission control method and device for application program |
CN105472147A (en) * | 2015-11-23 | 2016-04-06 | 努比亚技术有限公司 | Application lock processing method based on eye print identification and apparatus thereof |
-
2016
- 2016-12-16 CN CN201611167532.XA patent/CN106845211A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101286190A (en) * | 2007-04-13 | 2008-10-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and its fingerprint verification protecting method |
US20150178517A1 (en) * | 2010-06-25 | 2015-06-25 | Blackberry Limited | Security mechanism for increased personal data protection |
CN103336924A (en) * | 2013-07-03 | 2013-10-02 | 上海斐讯数据通信技术有限公司 | Starting lock for mobile terminal application program |
CN104331648A (en) * | 2014-11-24 | 2015-02-04 | 上海斐讯数据通信技术有限公司 | Locking system, locking method, unlocking system and unlocking method for application |
CN104573485A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for starting terminal application |
CN105095746A (en) * | 2015-07-02 | 2015-11-25 | 北京奇虎科技有限公司 | Method and device for application program starting authentication |
CN105472147A (en) * | 2015-11-23 | 2016-04-06 | 努比亚技术有限公司 | Application lock processing method based on eye print identification and apparatus thereof |
CN105389484A (en) * | 2015-12-23 | 2016-03-09 | 珠海格力电器股份有限公司 | Permission control method and device for application program |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169337A (en) * | 2017-06-27 | 2017-09-15 | 上海传英信息技术有限公司 | management method, device and terminal |
CN111279339A (en) * | 2017-08-29 | 2020-06-12 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN111279339B (en) * | 2017-08-29 | 2023-07-21 | 深圳传音通讯有限公司 | Application locking method, terminal equipment and computer readable medium |
CN107846509A (en) * | 2017-10-31 | 2018-03-27 | 努比亚技术有限公司 | A kind of application display method, terminal device and storage medium |
CN108737638A (en) * | 2018-04-08 | 2018-11-02 | Oppo广东移动通信有限公司 | Application control method, apparatus, mobile terminal and computer-readable medium |
CN109240560A (en) * | 2018-08-01 | 2019-01-18 | Oppo广东移动通信有限公司 | Application control method and electronic device |
CN109062634A (en) * | 2018-10-30 | 2018-12-21 | 维沃移动通信有限公司 | A kind of application starting method and mobile terminal |
CN109062634B (en) * | 2018-10-30 | 2022-09-13 | 维沃移动通信有限公司 | Application starting method and mobile terminal |
CN110262813A (en) * | 2019-06-25 | 2019-09-20 | 上海连尚网络科技有限公司 | Method and apparatus for installing application |
CN110262813B (en) * | 2019-06-25 | 2020-11-17 | 上海连尚网络科技有限公司 | Method and apparatus for installing applications |
CN112905258A (en) * | 2021-02-05 | 2021-06-04 | 杭州天宽科技有限公司 | Mobile terminal application safety starting method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106845211A (en) | Mobile terminal and its application start method and device | |
CN106293751B (en) | Method for displaying information on terminal equipment and terminal equipment | |
CN104966005B (en) | A kind of access control method, and terminal device | |
CN104767863B (en) | The unlocking method and terminal of terminal screen | |
CN106803027A (en) | Application function entrance starts method, device and mobile terminal | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106327193B (en) | A kind of system unlocking method and equipment | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
US9940448B2 (en) | Unlock processing method and device | |
CN108604265A (en) | The method and terminal device of outline management application program usage time | |
CN107480518A (en) | A kind of white list updating method and device | |
CN108781234B (en) | Function control method and terminal | |
CN107025395A (en) | A kind of fingerprint identification method and mobile terminal | |
CN103366104A (en) | Method and device for controlling accessing of application | |
CN107679410A (en) | Possess the mobile terminal and Related product of certain privacy protection function | |
CN109151150A (en) | Mobile terminal and unlocking screen method, apparatus | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN106407771A (en) | Message management method and device | |
CN107423598A (en) | One kind solution lock control method and mobile terminal | |
CN109309659A (en) | Mobile terminal and its method and apparatus for logging in application | |
WO2019090702A1 (en) | Terminal security protection method and device | |
CN106407779A (en) | Information acquisition method and apparatus, and terminal | |
CN106970761A (en) | Control method and device for the electronic installation with full frame fingerprint recognition | |
CN106503512A (en) | Mobile terminal and its plus/unlocking method and a device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20170803 Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801 Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD. Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park) Applicant before: Beijing Qihu Technology Co., Ltd. |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |
|
RJ01 | Rejection of invention patent application after publication |