CN106845211A - Mobile terminal and its application start method and device - Google Patents

Mobile terminal and its application start method and device Download PDF

Info

Publication number
CN106845211A
CN106845211A CN201611167532.XA CN201611167532A CN106845211A CN 106845211 A CN106845211 A CN 106845211A CN 201611167532 A CN201611167532 A CN 201611167532A CN 106845211 A CN106845211 A CN 106845211A
Authority
CN
China
Prior art keywords
application
opened
authority
locked
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611167532.XA
Other languages
Chinese (zh)
Inventor
申书润
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Anyun Century Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611167532.XA priority Critical patent/CN106845211A/en
Publication of CN106845211A publication Critical patent/CN106845211A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

Start method and device present invention is disclosed a kind of mobile terminal and its application, including:When receiving application startup order, judge whether application locks;When application is locked, the authority that application is opened is verified;When passing through using the Authority Verification opened, start application.The mobile terminal and its application provided in the present invention start method and device, when receiving using order is started, application are verified using before also not actuated, and application can be just started when being verified, from bottom to using protecting.

Description

Mobile terminal and its application start method and device
Technical field
The present invention relates to terminal applies field, more particularly to a kind of mobile terminal and its application start method and device.
Background technology
At present, the protection for locking application is typically right to realize using one layer of checking interface of covering after starting The protection of application is locked, can only be protected from application layer, it is impossible to protected from bottom;Doing so fundamentally to protect Application is locked, because lock application having been started up;And delay phenomenon can be present in this protected mode:When locking using starting one section Between after just occur checking interface, experience it is unfriendly.For example, starting the wechat application being locked, typically opened in wechat application One layer of checking interface of covering after dynamic, but wechat application is actual to be had been started up, it is impossible to fundamentally protected.
The content of the invention
The main object of the present invention starts method and device to provide a kind of mobile terminal and its application, is receiving application When starting order, application is verified before using also not actuated, application can be just started when being verified, from bottom correspondence With being protected.
The present invention proposes a kind of application startup method, comprises the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
Further, it is described to receive during using starting order, judge to apply that whether the step of locking includes:
Receive using start order when, by apply bag name judge apply whether lock.
Further, it is described to receive during using starting order, judge also to include after applying the step of whether locking:
When application is not locked, start application.
Further, described to receive during using starting order, whether judge to apply also includes before the step of locking:
Application is locked, and is set using the authority opened.
Further, described pair of application is locked, and set using open authority the step of also include:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
Further, when the application is locked, to application open authority verify the step of include:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle Face includes password and/or identifying code.
Further, when the application is locked, to application open authority verify the step of after also include:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
Further, when the Authority Verification that the application is opened passes through, starting the step of applying includes:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package Move and open application.
Further, when the Authority Verification that the application is opened passes through, the step of start application after also include:
According to the use state of application, locking is reset to application.
Further, the use state according to application, to including using the step of resetting locking:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application Into the duration threshold value on backstage.
Further, the use state according to application, to also including using the step of resetting locking:
After screen locking, application is locked.
Further, the use state according to application, to also including using the step of resetting locking:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
Present invention also offers one kind application starter, including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
Further, the judging unit specifically for:
Receive using start order when, by apply bag name judge apply whether lock.
Further, described device also includes:
Unlocked start unit, when application is not locked, starts application.
Further, described device also includes:
Unit is locked, for being locked to application, and is set using the authority opened.
Further, the locking unit is additionally operable to:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
Further, the authentication unit specifically for:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle Face includes password and/or identifying code.
Further, described device also includes:
No starting unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
Further, the start unit specifically for:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package Dynamic application.
Further, described device also includes:
Unit is relocked, according to the use state of application, locking is reset to application.
Further, the unit that relocks is additionally operable to:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application Into the duration threshold value on backstage.
Further, the unit that relocks is additionally operable to:
After screen locking, application is locked.
Further, the unit that relocks is additionally operable to:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
The invention provides a kind of mobile terminal, including memory and processor;
The memory is used to store the application startup method of the above-mentioned application starter execution any of the above-described of support Program;
The processor is configurable for performing the program stored in the memory.
The invention provides a kind of computer-readable storage medium, for saving as the computer used by above-mentioned application starter Software instruction, it is using the program designed by starter that it is included for performing above-mentioned aspect.
The mobile terminal and its application provided in the present invention start method and device, have the advantages that:
The mobile terminal and its application provided in the present invention start method and device, are ordered using startup receiving, should Application is verified before with also not actuated, application can be just started when passing through using the Authority Verification opened, verified obstructed Then No starting application is crossed, the application for locking is protected from bottom, in time checking;After using unlatching, according to making for application With state, application is relocked, the application to opening is protected, protect privacy of user.
Brief description of the drawings
Fig. 1 is using starting method and step schematic diagram in one embodiment of the invention;
Fig. 2 is using starting method and step schematic diagram in another embodiment of the present invention;
Fig. 3 is using starting method and step schematic diagram in further embodiment of this invention;
Fig. 4 is application starter structural representation in one embodiment of the invention;
Fig. 5 is application starter structural representation in another embodiment of the present invention;
Fig. 6 is the structured flowchart of mobile terminal in one embodiment of the invention.
The realization of the object of the invention, functional characteristics and advantage will be described further referring to the drawings in conjunction with the embodiments.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " one It is individual ", " described " " above-mentioned " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that making in specification of the invention Wording " including " refer to the presence of the feature, integer, step, operation, element, unit, module and/or component, but simultaneously Do not preclude the presence or addition of one or more other features, integer, step, operation, element, unit, module, component and/or it Group.It should be understood that when we claim element to be " connected " or during " coupled " to another element, it can be directly connected to or couple To other elements, or can also there is intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting Connect or wirelessly couple.Wording "and/or" used herein includes one or more associated listing the whole or any of item Unit and all combination.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also Understand, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication To explain.
The application provided in the embodiment of the present invention starts method and device and is mainly used on intelligent terminal to locking application Protection, prevent from applying and be activated before unblock, application is protected from bottom;That improves locking application uses safety Property.Intelligent terminal in the embodiment of the present invention terminal device such as including mobile phone, flat board, computer.Application locking in the present invention refers to , the authority limitation of application is set using/starts, starting application must first verify that the authority for opening application is unlocked, and prevent Only application is arbitrarily opened, so as to ensure the personal secrets for locking application content.
Reference picture 1, is using starting method and step schematic diagram in one embodiment of the invention.
One embodiment of the invention kind proposes a kind of application startup method, comprises the following steps:
Step S1, when receiving application startup order, judges whether application locks;
Step S2, when application is locked, verifies to the authority that application is opened;
Step S3, when passing through using the Authority Verification opened, starts application.
At present, the protection for locking application is typically one layer of checking interface of covering after application starts, and is verified When just can using the application so that realize to lock application protection;This way can only be protected from application layer, it is impossible to Protected from bottom, because lock application actually having been started up, user can view the partial content in application, cause Privacy leakage;Can also there is delay phenomenon in this protected mode, lock after application starts a period of time and checking interface just occur, Experience is unfriendly.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should Bag name judges whether the application is to lock application, if the application is not locked, directly initiates application;If should With to lock application, then opening/startup the authority applied is verified, that is, verify whether to open the authority of the application, should Checking predominantly verifies and wants using the user right of the application that the mode of checking mainly includes ejection checking interface, fingerprint inspection Card and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, authentication Formula can be one of which, or various combinations;For example, checking interface requirements user input password can be ejected (should Password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short-message verification Code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris recognition Deng.Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom Protection, is different from existing activating to open and is just verified that personal secrets that can be preferably to user are carried out after Protection.
Specifically, user needs to start certain application, such as wechat on the intelligent terminals such as mobile phone, flat board.User can be with By the corresponding icon of wechat application in click or Touch screen, you can sent using the order for starting by touch-screen;Intelligence Terminal receives the order, forbids opening wechat at once, but first pass through ActivityManagerService or ApsManagerService judges whether the wechat is locked, if wechat is not locked, wechat, user is at once Just wechat can normally be used;If wechat is locked, ejection verifies interface or requires that user carries out fingerprint recognition or iris Identification, user carries out corresponding operating and is verified;When user does not carry out verification operation, or during checking fingerprint be not inconsistent, password Not pair or the not reciprocity mistake of identifying code cause checking can not by when, then No starting wechat application;If being verified, Then transmission Intent information starts and opens wechat application to wechat application installation package by application installation package, and user just can be with Message content is checked into wechat.Protected from bottom to locking application in the present embodiment, it is ensured that privacy of user safety.
Reference picture 2, in another embodiment, above-mentioned steps S1, receive using start order when, judge using whether add Also include before the step of lock:
Step S0, locks to application, and sets using the authority opened.
Various application software are installed, many application software are related to the privacy of user on intelligent terminal, for example wechat, short Letter, picture library etc..User is often not intended to the privacy of oneself and is exposed, therefore can set to using locking, preventing privacy It is exposed.Specifically, user can obtain System Privileges so as to be locked to application, or be set by 360 mobile phone assistant The application of locking, should also be set using the authority opened when being locked to application, and the authority is mainly user when opening application Authority.For example, be usually arranged as by verify user can just open application, the checking mainly include ejection verify interface, Fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, Verification mode can be one of which, or various combinations;For example, it is close to eject checking interface requirements user input Code (password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short message Identifying code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris Identification etc..
In the present embodiment, when being locked to application, locking mark is shown on the application icon for locking;Above-mentioned locking Mark includes figure and/or word.
For the ease of the application that user's identification is locked, when being locked to application, locking is shown on the application icon for locking Mark, the locking mark can be the combination of figure, word or both;The figure can be the figure of lock, and word can be Chinese or English.
For example, the privacy content of wechat is more, user can select to lock wechat application, after locking, micro- Locking mark is shown on letter icon.And can then select not lock for the application not high of other privacy, such as game, Browser etc..
After above-mentioned steps S0, step S1, S2, S3 are carried out, step S1, S2, S3 are identical with a upper embodiment, This is not repeated.
Reference picture 3, application startup method in another embodiment, comprises the following steps:
Step S1, when receiving application startup order, judges whether application locks;
Step S2, when application is locked, verifies to the authority that application is opened;
Step S3, when passing through using the Authority Verification opened, starts application;
Step S4, according to the use state of application, locking is reset to application.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should Bag name judges whether the application is to lock application, if the application is not locked, directly initiates application;If should With to lock application, then opening/startup the authority applied is verified, that is, verify whether to open the authority of the application, should Checking predominantly verifies and wants using the user right of the application that the mode of checking mainly includes ejection checking interface, fingerprint inspection Card and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, authentication Formula can be one of which, or various combinations;For example, checking interface requirements user input password can be ejected (should Password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short-message verification Code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris recognition Deng.Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom Protection, is different from existing startup and is just verified that personal secrets that can be preferably to user are protected after.
The present embodiment can also include above-mentioned steps S0, after above-mentioned steps S3, i.e., when using the Authority Verification opened By when, start application after, user just can check application message content, and now, other people can also use user's intelligence Application that can be in terminal, in order to protect security now using upper privacy information, then can make using reentering locking shape State, prevents other people from checking application.In the present embodiment, according to the use state of application, locking is reset to application.It is above-mentioned to answer Use state mainly includes whether application is currently currently being used, applies in backstage use and intelligent terminal in screen locking State etc..
Specifically, enter the duration on backstage by judging application, application is locked when reaching threshold value;Above-mentioned threshold value is Default application enters the duration threshold value on backstage.In the present embodiment, the threshold value can also be 0 second, it is to be understood that work as threshold When value is set to 0 second, then when judging that application enters backstage, then application is locked immediately, afterwards, to continue to check application Content, then will re-start checking, and the personal secrets of application are protected with this.And in order to strengthen the ease of use of application, The threshold value will not be generally set to 0 second, for example, can set a threshold to five minutes, i.e., enter backstage five minutes in application Afterwards, just will be using relocking, in this way, user is just verified without opening application every time.
Specifically, after may be arranged as intelligent terminal screen locking, just application is relocked, when intelligent terminal screen locking Afterwards, locking application, starts application after unlocking screen, application need to be unlocked again.
Preferably, above-mentioned steps S4, according to the use state of application, to also including using the step of resetting locking:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
In order to carry out different lock operations to different applications, an application list for relocking can be set, and Locking condition is correspondingly arranged to the application in list.For example, in setting an application list for relocking on intelligent terminal Including wechat, picture library, short message;Because the privacy content information of wechat is more, therefore could be arranged to be reached into backstage when wechat To then entering lock-out state during threshold value, and then could be arranged to just enter when the intelligent terminal screen locking after for picture library, short message and lock State.
In order to be further illustrated to the technical scheme in the present invention, dress is started present invention also offers one kind application Put.
Reference picture 4, additionally provides one kind application starter in the embodiment of the present invention, including:
Judging unit 20, when receiving application startup order, judges whether application locks;
Authentication unit 30, when application is locked, verifies to the authority that application is opened;
Start unit 40, when passing through using the Authority Verification opened, starts application.
Said apparatus also include unlocked start unit, for when application is not locked, starting application;No starting list Unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
At present, the protection for locking application is typically one layer of checking interface of covering after application starts, and is verified When just can using the application so that realize to lock application protection;This way can only be protected from application layer, it is impossible to Protected from bottom, because lock application actually having been started up, user can view the partial content in application, cause Privacy leakage;Can also there is delay phenomenon in this protected mode, lock after application starts a period of time and checking interface just occur, Experience is unfriendly.
In the present embodiment, using before also not actuated, when the order that certain application starts is received, first by should Bag name judges whether the application is to lock application, straight by unlocked start unit if the application is not locked Connect startup application;If the application is applied to lock, the opening/startup authority to applying is verified, that is, verified whether The authority of the application is opened, the checking is mainly checking and wants using the user right of the application, and the mode of checking mainly includes Ejection checking interface, fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password And/or identifying code, verification mode can be one of which, or various combinations;For example, checking interface can be ejected will (password can be identical with the unlocking pin of intelligent terminal, or be using locking especially setting to seek user input password Password) or short message verification code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint Identification or iris recognition etc..Verification mode cannot be exhaustive, can be selected according to user preferences, use habit etc..
Only when above-mentioned being verified, transmission Intent information to application installation package is started simultaneously by application installation package Open application;If checking cannot pass through, or do not carry out verification operation then forbid open the application, user just cannot start should With checking application content information.Method in the present embodiment can just be verified when application is also not actuated, carried out from bottom Protection, is different from existing startup and is just verified that personal secrets that can be preferably to user are protected after.
Specifically, user needs to start certain application, such as wechat on the intelligent terminals such as mobile phone, flat board.User can be with By the corresponding icon of wechat application in click or Touch screen, you can sent using the order for starting by touch-screen;Intelligence Terminal receives the order, forbids opening wechat at once, but first pass through ActivityManagerService or ApsManagerService judges whether the wechat is locked, if wechat is not locked, wechat, user is at once Just wechat can normally be used;If wechat is locked, ejection verifies interface or requires that user carries out fingerprint recognition or iris Identification, user carries out corresponding operating and is verified;When user does not carry out verification operation, or during checking fingerprint be not inconsistent, password Not pair or the not reciprocity mistake of identifying code cause checking can not by when, then No starting wechat application;If being verified, Then transmission Intent information starts and opens wechat application to wechat application installation package by application installation package, and user just can be with Message content is checked into wechat.Protected from bottom to locking application in the present embodiment, it is ensured that privacy of user safety.
Reference picture 5, in another embodiment, said apparatus also include:
Unit 10 is locked, for being locked to application, and is set using the authority opened.
Various application software are installed, many application software are related to the privacy of user on intelligent terminal, for example wechat, short Letter, picture library etc..User is often not intended to the privacy of oneself and is exposed, therefore can set to using locking, preventing privacy It is exposed.Specifically, user can obtain System Privileges so as to be locked to application, or be set by 360 mobile phone assistant The application of locking, should also be set using the authority opened when being locked to application, and the authority is mainly user when opening application Authority.For example, be usually arranged as by verify user can just open application, the checking mainly include ejection verify interface, Fingerprint authentication and/or iris verification are verified to the authority that application is opened;The checking interface includes password and/or identifying code, Verification mode can be one of which, or various combinations;For example, it is close to eject checking interface requirements user input Code (password can be identical with the unlocking pin of intelligent terminal, or be using the password for locking especially setting) or short message Identifying code, or require user input validation code and password simultaneously, it is also possible to it is required that user carries out fingerprint recognition or iris Identification etc..
In the present embodiment, when being locked to application, locking mark is shown on the application icon for locking;Above-mentioned locking Mark includes figure and/or word.
For the ease of the application that user's identification is locked, when being locked to application, locking is shown on the application icon for locking Mark, the locking mark can be the combination of figure, word or both;The figure can be the figure of lock, and word can be Chinese or English.
For example, the privacy content of wechat is more, user can select to lock wechat application, after locking, micro- Locking mark is shown on letter icon.And can then select not lock for the application not high of other privacy, such as game, Browser etc..
Further, said apparatus also include:
Unit 50 is relocked, according to the use state of application, locking is reset to application.
When the Authority Verification that application is opened passes through, start and open after application, user just can check application message Content, now, other people can also be using the application on user's intelligent terminal, in order to protect now using upper privacy information Security, then can make, using lock-out state is reentered, to prevent other people from checking application.In the present embodiment, according to application Use state, locking is reset to application.The use state of above-mentioned application mainly include application whether be currently currently being used, Apply and be in screen lock state etc. in backstage use and intelligent terminal.
Specifically, enter the duration on backstage by judging application, application is locked when reaching threshold value;Above-mentioned threshold value is Default application enters the duration threshold value on backstage.In the present embodiment, the threshold value can also be 0 second, it is to be understood that work as threshold When value is set to 0 second, then when judging that application enters backstage, then application is locked immediately, afterwards, to continue to check application Content, then will re-start checking, and the personal secrets of application are protected with this.And in order to strengthen the ease of use of application, The threshold value will not be generally set to 0 second, for example, can set a threshold to five minutes, i.e., enter backstage five minutes in application Afterwards, just will be using relocking, in this way, user is just verified without opening application every time.
Specifically, after may be arranged as intelligent terminal screen locking, just application is relocked, when intelligent terminal screen locking Afterwards, locking application, starts application after unlocking screen, application need to be unlocked again.
Preferably, it is above-mentioned to relock unit 50, according to the use state of application, locking is reset to application and is also wrapped Include:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
In order to carry out different lock operations to different applications, an application list for relocking can be set, and Locking condition is correspondingly arranged to the application in list.For example, in setting an application list for relocking on intelligent terminal Including wechat, picture library, short message;Because the privacy content information of wechat is more, therefore could be arranged to be reached into backstage when wechat To then entering lock-out state during threshold value, and then could be arranged to just enter when the intelligent terminal screen locking after for picture library, short message and lock State.
In sum, it is the application startup method and device of offer in the embodiment of the present invention, is receiving using startup life Order, is verified to application before using also not actuated, and application can be just started when passing through using the Authority Verification opened, and is verified Not by then No starting application, the application for locking is protected from bottom, in time checking;After using unlatching, according to application Use state, to application relock, to open application protect, protect privacy of user.
The embodiment of the present invention additionally provides a kind of mobile terminal, as shown in fig. 6, for convenience of description, illustrate only and this The related part of inventive embodiments, particular technique details is not disclosed, and refer to present invention method part.The terminal can Think including mobile phone, panel computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point Of Sales, point-of-sale terminal), any terminal device such as vehicle-mounted computer, so that terminal is as mobile phone as an example:
Fig. 6 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 6 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 110, memory 120, input block 130, display unit 140th, sensor 150, voicefrequency circuit 160, Wireless Fidelity (wireless-fidelity, Wi-Fi) module 170, processor 180, And the grade part of power supply 190.It will be understood by those skilled in the art that the handset structure shown in Fig. 6 is not constituted to mobile phone Limit, part more more or less than diagram can be included, or combine some parts, or different part arrangements.
Each component parts of mobile phone is specifically introduced with reference to Fig. 6:
RF circuits 110 can be used to receiving and sending messages or communication process in, the reception and transmission of signal, especially, by base station After downlink information is received, processed to processor 180;In addition, up data is activation will be designed to base station.Generally, RF circuits 110 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuits 110 can also be communicated by radio communication with network and other equipment. Above-mentioned radio communication can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 120 can be used to store software program and module, and processor 180 is by running storage in memory 120 Software program and module, so as to perform various function application and the data processing of mobile phone.Memory 120 can mainly include Storing program area and storage data field, wherein, the application journey that storing program area can be needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data field can be stored and use what is created according to mobile phone Data (such as voice data, phone directory etc.) etc..Additionally, memory 120 can include high-speed random access memory, can be with Including nonvolatile memory, for example, at least one disk memory, flush memory device or other volatile solid-states Part.
Input block 130 can be used to receive the numeral or character information of input, and produce with the user of mobile phone set with And the relevant key signals input of function control.Specifically, input block 130 may include that contact panel 131 and other inputs set Standby 132.Contact panel 131, also referred to as touch-screen, user can be collected thereon or neighbouring touch operation (such as user uses The operation of any suitable object such as finger, stylus or annex on contact panel 131 or near contact panel 131), and root Corresponding attachment means are driven according to formula set in advance.Optionally, contact panel 131 may include touch detecting apparatus and touch Two parts of controller.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give processor 180, and the order sent of receiving processor 180 and can be performed.Furthermore, it is possible to using electricity The polytypes such as resistive, condenser type, infrared ray and surface acoustic wave realize contact panel 131.Except contact panel 131, input Unit 130 can also include other input equipments 132.Specifically, other input equipments 132 can include but is not limited to secondary or physical bond One or more in disk, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Display unit 140 can be used for show by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 140 may include display panel 141, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 141.Further, contact panel 131 can cover display panel 141, when contact panel 131 detect it is thereon or attached After near touch operation, processor 180 is sent to determine the type of touch event, with preprocessor 180 according to touch event Type corresponding visual output is provided on display panel 141.Although in figure 6, contact panel 131 and display panel 141 It is input and the input function that mobile phone is realized as two independent parts, but in some embodiments it is possible to by touch-control Panel 131 and display panel 141 be integrated and input that realize mobile phone and output function.
Mobile phone may also include at least one sensor 150, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 141, proximity transducer can close display panel 141 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, (generally three axles) acceleration in the detectable all directions of accelerometer sensor Size, size and the direction of gravity are can detect that when static, can be used for recognize mobile phone attitude application (such as horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor of configuration, will not be repeated here.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data conversion that road 160 will can receive, is transferred to loudspeaker 161, and sound is converted to by loudspeaker 161 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, is turned after being received by voicefrequency circuit 160 It is changed to voice data, then after voice data output processor 180 is processed, through RF circuits 110 to be sent to such as another mobile phone, Or export to memory 120 so as to further treatment voice data.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 170 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Fig. 6 shows WiFi module 170, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 180 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform software program of the storage in memory 120 and/or module, and call storage in memory 120 Data, perform the various functions and processing data of mobile phone, so as to carry out integral monitoring to mobile phone.Optionally, processor 180 can be wrapped Include one or more processing units;Preferably, processor 180 can integrated application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly processed with processor, modem processor mainly processes radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Mobile phone also includes the power supply 190 (such as battery) powered to all parts, it is preferred that power supply can be by power supply pipe Reason system is logically contiguous with processor 180, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although not shown, mobile phone can also will not be repeated here including camera, bluetooth module etc..
Reference picture 6, in embodiments of the present invention, the processor 180 included by the mobile terminal also has following functions:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the terminal of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
It will be understood by those skilled in the art that the present invention includes being related to for performing in operation described herein Or multinomial equipment.These equipment can be for needed for purpose and specially design and manufacture, or general-purpose computations can also be included Known device in machine.These equipment have computer program of the storage in it, and these computer programs are optionally activated Or reconstruct.Such computer program can be stored in equipment (for example, computer) computer-readable recording medium or store and be suitable to Storage e-command is simultaneously coupled in any kind of medium of bus respectively, and the computer-readable medium is included but is not limited to Any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, read-only storage Device), RAM (Random Access Memory, immediately memory), EPROM (Erasable Programmable Read- Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash memory, magnetic card or light card.It is, readable Medium include being stored in the form of it can read by equipment (for example, computer) or transmission information any medium.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or The combination of the frame in each frame and these structure charts and/or block diagram and/or flow graph in block diagram and/or flow graph.This technology is led Field technique personnel be appreciated that can by these computer program instructions be supplied to all-purpose computer, special purpose computer or other The processor of programmable data processing method is realized, so that by the treatment of computer or other programmable data processing methods Device is come the scheme specified in the frame or multiple frame that perform structure chart disclosed by the invention and/or block diagram and/or flow graph.
Those skilled in the art of the present technique are appreciated that in various operations, method, the flow discussed in the present invention Step, measure, scheme can be replaced, changed, combined or deleted.Further, it is each with what is discussed in the present invention Other steps, measure in kind operation, method, flow, scheme can also be replaced, changed, reset, decomposed, combined or deleted. Further, it is of the prior art with various operations, method, the flow disclosed in the present invention in step, measure, scheme Can also be replaced, changed, reset, decomposed, combined or deleted.
The preferred embodiments of the present invention are the foregoing is only, the scope of the claims of the invention, every utilization is not thereby limited Equivalent structure or equivalent flow conversion that description of the invention and accompanying drawing content are made, or directly or indirectly it is used in other correlations Technical field, be included within the scope of the present invention.
The embodiment of the invention provides:
A1, a kind of application startup method, comprise the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
A2, the application startup method according to A1, it is described to receive during using starting order, judge whether application locks The step of include:
Receive using start order when, by apply bag name judge apply whether lock.
A3, the application startup method according to A1 or A2, it is described to receive during using starting order, whether judge application Also include after the step of locking:
When application is not locked, start application.
A4, the application startup method according to A1 or A2, it is described to receive during using starting order, whether judge application Also include before the step of locking:
Application is locked, and is set using the authority opened.
A5, the application startup method according to A4, described pair of application are locked, and are set using the authority opened Step also includes:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
A6, the application startup method according to A1, when the application is locked, verify to the authority that application is opened The step of include:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle Face includes password and/or identifying code.
A7, the application startup method according to A1 or A6, when the application is locked, are carried out to the authority that application is opened Also include after the step of checking:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
A8, the application startup method according to A1, when the Authority Verification that the application is opened passes through, start the step of application Suddenly include:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package Dynamic application.
A9, the application startup method according to A1 or A8, when the Authority Verification that the application is opened passes through, start application The step of after also include:
According to the use state of application, locking is reset to application.
A10, the application startup method according to A9, the use state according to application reset lock to application Fixed step includes:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application Into the duration threshold value on backstage.
A11, the application startup method according to A9, the use state according to application reset lock to application Fixed step also includes:
After screen locking, application is locked.
A12, the application startup method according to A9, the use state according to application reset lock to application Fixed step also includes:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
B1, one kind application starter, including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
B2, the application starter according to B1, the judging unit specifically for:
Receive using start order when, by apply bag name judge apply whether lock.
B3, the application starter according to B1 or B2, described device also include:
Unlocked start unit, when application is not locked, starts application.
B4, the application starter according to B1 or B2, described device also include:
Unit is locked, for being locked to application, and is set using the authority opened.
B5, the application starter according to B4, the locking unit are additionally operable to:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
B6, the application starter according to B1, the authentication unit specifically for:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;Checking circle Face includes password and/or identifying code.
B7, the application starter according to B1 or B6, described device also include:
No starting unit, the Authority Verification opened for application is obstructed out-of-date, No starting application.
B8, the application starter according to B1, the start unit specifically for:
When passing through using the Authority Verification opened, transmission Intent information is opened to application installation package by application installation package Dynamic application.
B9, the application starter according to B1 or B8, described device also include:
Unit is relocked, according to the use state of application, locking is reset to application.
B10, the application starter according to B9, the unit that relocks are additionally operable to:
Judge that application enters the duration on backstage, application is locked when reaching threshold value;The threshold value is default application Into the duration threshold value on backstage.
B11, the application starter according to B9, the unit that relocks are additionally operable to:
After screen locking, application is locked.
B12, the application starter according to B9, the unit that relocks are additionally operable to:
The application list that setting is relocked, and locking condition is correspondingly arranged to the application in list.
C1, a kind of mobile terminal, including memory and processor;
The memory is used to store supports that application of the application starter execution as any one of A1 to A12 starts The program of method;
The processor is configurable for performing the program stored in the memory.

Claims (10)

1. it is a kind of to apply startup method, it is characterised in that to comprise the following steps:
When receiving application startup order, judge whether application locks;
When application is locked, the authority that application is opened is verified;
When passing through using the Authority Verification opened, start application.
2. application according to claim 1 starts method, it is characterised in that described to receive during using starting order, sentences The step of whether disconnected application locks includes:
Receive using start order when, by apply bag name judge apply whether lock.
3. application according to claim 1 and 2 starts method, it is characterised in that described to receive during using starting order, Judge also to include after applying the step of whether locking:
When application is not locked, start application.
4. application according to claim 1 and 2 starts method, it is characterised in that described to receive during using starting order, Whether judge to apply also includes before the step of locking:
Application is locked, and is set using the authority opened.
5. application according to claim 4 starts method, it is characterised in that described pair of application is locked, and setting should The step of with the authority opened, also includes:
Locking mark is shown on the application icon for locking;The mark that locks includes figure and/or word.
6. application according to claim 1 starts method, it is characterised in that when the application is locked, and application is opened Authority include the step of verified:
Start checking interface, fingerprint authentication and/or iris verification to verify the authority that application is opened;The checking interface bag Include password and/or identifying code.
7. the application startup method according to claim 1 or 6, it is characterised in that when the application is locked, beats application Also include after the step of authority opened is verified:
Obstructed out-of-date, the No starting application using the Authority Verification opened.
8. application according to claim 1 starts method, it is characterised in that the Authority Verification that the application is opened passes through When, starting the step of applying includes:
When passing through using the Authority Verification opened, transmission Intent information to application installation package, being started by application installation package should With.
9. one kind application starter, it is characterised in that including:
Judging unit, when receiving application startup order, judges whether application locks;
Authentication unit, when application is locked, verifies to the authority that application is opened;
Start unit, when passing through using the Authority Verification opened, starts application.
10. a kind of mobile terminal, it is characterised in that including memory and processor;
The memory is used to store supports that the application performed as any one of claim 1 to 8 using starter is opened The program of dynamic method;
The processor is configurable for performing the program stored in the memory.
CN201611167532.XA 2016-12-16 2016-12-16 Mobile terminal and its application start method and device Pending CN106845211A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611167532.XA CN106845211A (en) 2016-12-16 2016-12-16 Mobile terminal and its application start method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611167532.XA CN106845211A (en) 2016-12-16 2016-12-16 Mobile terminal and its application start method and device

Publications (1)

Publication Number Publication Date
CN106845211A true CN106845211A (en) 2017-06-13

Family

ID=59140374

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611167532.XA Pending CN106845211A (en) 2016-12-16 2016-12-16 Mobile terminal and its application start method and device

Country Status (1)

Country Link
CN (1) CN106845211A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169337A (en) * 2017-06-27 2017-09-15 上海传英信息技术有限公司 management method, device and terminal
CN107846509A (en) * 2017-10-31 2018-03-27 努比亚技术有限公司 A kind of application display method, terminal device and storage medium
CN108737638A (en) * 2018-04-08 2018-11-02 Oppo广东移动通信有限公司 Application control method, apparatus, mobile terminal and computer-readable medium
CN109062634A (en) * 2018-10-30 2018-12-21 维沃移动通信有限公司 A kind of application starting method and mobile terminal
CN109240560A (en) * 2018-08-01 2019-01-18 Oppo广东移动通信有限公司 Application control method and electronic device
CN110262813A (en) * 2019-06-25 2019-09-20 上海连尚网络科技有限公司 Method and apparatus for installing application

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286190A (en) * 2007-04-13 2008-10-15 鸿富锦精密工业(深圳)有限公司 Electronic device and its fingerprint verification protecting method
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN104331648A (en) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 Locking system, locking method, unlocking system and unlocking method for application
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application
US20150178517A1 (en) * 2010-06-25 2015-06-25 Blackberry Limited Security mechanism for increased personal data protection
CN105095746A (en) * 2015-07-02 2015-11-25 北京奇虎科技有限公司 Method and device for application program starting authentication
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs
CN105472147A (en) * 2015-11-23 2016-04-06 努比亚技术有限公司 Application lock processing method based on eye print identification and apparatus thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286190A (en) * 2007-04-13 2008-10-15 鸿富锦精密工业(深圳)有限公司 Electronic device and its fingerprint verification protecting method
US20150178517A1 (en) * 2010-06-25 2015-06-25 Blackberry Limited Security mechanism for increased personal data protection
CN103336924A (en) * 2013-07-03 2013-10-02 上海斐讯数据通信技术有限公司 Starting lock for mobile terminal application program
CN104331648A (en) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 Locking system, locking method, unlocking system and unlocking method for application
CN104573485A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Method and device for starting terminal application
CN105095746A (en) * 2015-07-02 2015-11-25 北京奇虎科技有限公司 Method and device for application program starting authentication
CN105472147A (en) * 2015-11-23 2016-04-06 努比亚技术有限公司 Application lock processing method based on eye print identification and apparatus thereof
CN105389484A (en) * 2015-12-23 2016-03-09 珠海格力电器股份有限公司 Permission controlling method and device for application programs

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169337A (en) * 2017-06-27 2017-09-15 上海传英信息技术有限公司 management method, device and terminal
CN107846509A (en) * 2017-10-31 2018-03-27 努比亚技术有限公司 A kind of application display method, terminal device and storage medium
CN108737638A (en) * 2018-04-08 2018-11-02 Oppo广东移动通信有限公司 Application control method, apparatus, mobile terminal and computer-readable medium
CN109240560A (en) * 2018-08-01 2019-01-18 Oppo广东移动通信有限公司 Application control method and electronic device
CN109062634A (en) * 2018-10-30 2018-12-21 维沃移动通信有限公司 A kind of application starting method and mobile terminal
CN110262813A (en) * 2019-06-25 2019-09-20 上海连尚网络科技有限公司 Method and apparatus for installing application
CN110262813B (en) * 2019-06-25 2020-11-17 上海连尚网络科技有限公司 Method and apparatus for installing applications

Similar Documents

Publication Publication Date Title
CN106845211A (en) Mobile terminal and its application start method and device
CN104966005B (en) A kind of access control method, and terminal device
CN106293751B (en) Method for displaying information on terminal equipment and terminal equipment
CN106327193B (en) A kind of system unlocking method and equipment
CN105912905A (en) Fingerprint unlocking method and terminal
CN104767863B (en) The unlocking method and terminal of terminal screen
US9940448B2 (en) Unlock processing method and device
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN106778175A (en) A kind of interface locking means, device and terminal device
CN107609407A (en) The guard method of information security and device in a kind of user terminal
CN106803027A (en) Application function entrance starts method, device and mobile terminal
CN106407771A (en) Message management method and device
CN103366104A (en) Method and device for controlling accessing of application
CN105262909B (en) Mobile terminal using method, mobile terminal and storage medium
CN107423598A (en) One kind solution lock control method and mobile terminal
CN106407779A (en) Information acquisition method and apparatus, and terminal
CN109151150A (en) Mobile terminal and unlocking screen method, apparatus
CN107679410A (en) Possess the mobile terminal and Related product of certain privacy protection function
CN107317908A (en) A kind of method of user's identification, terminal and storage medium
CN107707736A (en) Mobile terminal and relevant device with stolen safeguard function
CN106529335A (en) Method and device for restraining screenshot, and portable mobile terminal
CN106503512A (en) Mobile terminal and its plus/unlocking method and a device
CN108781234B (en) Function control method and terminal
CN109309659A (en) Mobile terminal and its method and apparatus for logging in application
CN109327597A (en) The method, apparatus of the entrance of mobile terminal and secret system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20170803

Address after: 100102, 18 floor, building 2, Wangjing street, Beijing, Chaoyang District, 1801

Applicant after: BEIJING ANYUN SHIJI SCIENCE AND TECHNOLOGY CO., LTD.

Address before: 100088 Beijing city Xicheng District xinjiekouwai Street 28, block D room 112 (Desheng Park)

Applicant before: Beijing Qihu Technology Co., Ltd.

TA01 Transfer of patent application right
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication