CN107506111A - The encryption and decryption method and terminal of a kind of terminal applies - Google Patents

The encryption and decryption method and terminal of a kind of terminal applies Download PDF

Info

Publication number
CN107506111A
CN107506111A CN201710762790.0A CN201710762790A CN107506111A CN 107506111 A CN107506111 A CN 107506111A CN 201710762790 A CN201710762790 A CN 201710762790A CN 107506111 A CN107506111 A CN 107506111A
Authority
CN
China
Prior art keywords
terminal
display screen
application icon
icon
application
Prior art date
Application number
CN201710762790.0A
Other languages
Chinese (zh)
Inventor
叶金山
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Priority to CN201710762790.0A priority Critical patent/CN107506111A/en
Publication of CN107506111A publication Critical patent/CN107506111A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object or an image, setting a parameter value or selecting a range
    • G06F3/0485Scrolling or panning
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/66Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72563Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
    • H04M1/72577Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances to restrict the functionality or the communication capability of the terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
    • H04M1/72Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
    • H04M1/725Cordless telephones
    • H04M1/72519Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
    • H04M1/72583Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status for operating the terminal by selecting telephonic functions from a plurality of displayed items, e.g. menus, icons

Abstract

The invention provides a kind of encryption and decryption method of terminal applies and terminal, solves the problems, such as in the prior art for how the application in terminal to be encrypted or be decrypted not relevant programme by fingerprint identification technology.The encryption method of the terminal applies of the embodiment of the present invention includes:When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints information is obtained;If the finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, first object application corresponding to first object application icon is encrypted.The embodiment of the present invention realizes the encryption of intended application, and simple operation, adds technology sense and interest, improve the usage experience of user by the way that matching is identified to the user fingerprints information of collection.

Description

The encryption and decryption method and terminal of a kind of terminal applies

Technical field

The present invention relates to the technical field of communications applications, more particularly to a kind of encryption and decryption method of terminal applies and end End.

Background technology

Use of the fingerprint function on mobile phone at present is more and more common, such as mobile phone unblock, pays function, screen regional refers to Line identification technology allows user directly can be achieved with fingerprint recognition by touching some viewing area of screen, for example passes through light Fingerprint identification technology or ultrasonic fingerprint identification technology are learned, wherein, optical finger print identification is to utilize Organic Light Emitting Diode The light that the LED of (Organic Light-Emitting Diode, OLED) screen is sent, by finger print Wave crest and wave trough different-energy reflection after, then received by the fingerprint receiving module below screen and form fingerprint image, most Fingerprint identification function is realized by algorithm eventually.Ultrasonic fingerprint identification is to receive mould using the ultrasonic wave transmitting pasted below screen Group is realized, after the ultrasonic wave that ultrasonic wave emitting mould train is sent penetrates screen, by the difference of the Wave crest and wave trough of finger print After energy reflection, then by the ultrasonic wave module reception below screen so as to form fingerprint image, eventually through algorithm realization screen Curtain fingerprint identification function.

But in the prior art for how the application in terminal being encrypted or be decrypted not by fingerprint identification technology There is relevant programme.

The content of the invention

It is an object of the invention to provide a kind of encryption and decryption method of terminal applies and terminal, to solve existing skill Do not have the problem of relevant programme for how the application in terminal being encrypted or being decrypted by fingerprint identification technology in art.

To achieve these goals, the invention provides a kind of encryption method of terminal applies, including:

When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained Breath;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described First object application is encrypted corresponding to first object application icon.

To achieve these goals, the embodiment of the present invention additionally provides a kind of decryption method of terminal applies, including:

When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon The second intended application processing is decrypted.

To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:

First acquisition module, for detecting the cryptographic operation of first object application icon in the display screen for terminal When, obtain user fingerprints information;

Encrypting module, if for the fingerprint matched with the user fingerprints information in the fingerprint database of the terminal be present Data, then first object application corresponding to the first object application icon is encrypted.

To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:Memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, the computer program is by real during the computing device Now the step of encryption method of terminal applies as described above.

To achieve these goals, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the calculating Computer program is stored with machine readable storage medium storing program for executing, the computer program realizes terminal as described above when being executed by processor The step of encryption method of application.

To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:

Second acquisition module, for detecting the second scheduled operation of fingerprint identification region in the display screen for terminal When, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;

Deciphering module, if for the fingerprint matched with the user fingerprints information in the fingerprint database of the terminal be present Data, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to second mesh Processing is decrypted in second intended application corresponding to mark application icon.

To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:Memory, processor and deposit The computer program that can be run on a memory and on a processor is stored up, the computer program is by real during the computing device Now the step of decryption method of terminal applies as described above.

To achieve these goals, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the calculating Computer program is stored with machine readable storage medium storing program for executing, the computer program realizes terminal as described above when being executed by processor The step of decryption method of application.

The embodiment of the present invention has the advantages that:

The above-mentioned technical proposal of the embodiment of the present invention, detect first object application icon in the display screen for terminal Cryptographic operation when, obtain user fingerprints information;Matched if existing in the fingerprint database of terminal with the user fingerprints information Finger print data, then first object application corresponding to first object application icon is encrypted;Detect for terminal Display screen in fingerprint identification region the second scheduled operation when, the application icon encrypted is shown in terminal screen, and Obtain user fingerprints information;If the finger print data matched with user fingerprints information in the fingerprint database of terminal be present, and detect The decryption oprerations of the second intended application icon into the application icon for having encrypted, then to corresponding to the second intended application icon Processing is decrypted in second intended application.The embodiment of the present invention is real by the way that matching is identified to the user fingerprints information of collection Show the encryption and decryption of intended application, and simple operation, add technology sense with interesting, improve user uses body Test.

Brief description of the drawings

In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.

Fig. 1 is the workflow diagram of the encryption method of the terminal applies of the embodiment of the present invention;

Fig. 2 is the first display schematic diagram when being encrypted in the embodiment of the present invention to application;

Fig. 3 is the second display schematic diagram when being encrypted in the embodiment of the present invention to application;

Fig. 4 is the 3rd display schematic diagram when being encrypted in the embodiment of the present invention to application;

Fig. 5 is the 4th display schematic diagram when being encrypted in the embodiment of the present invention to application;

Fig. 6 is the workflow diagram of the decryption method of the terminal applies of the embodiment of the present invention;

Fig. 7 is the first display schematic diagram when being decrypted in the embodiment of the present invention to application;

Fig. 8 is the second display schematic diagram when being decrypted in the embodiment of the present invention to application;

Fig. 9 is the 3rd display schematic diagram when being decrypted in the embodiment of the present invention to application;

Figure 10 is the 4th display schematic diagram when being decrypted in the embodiment of the present invention to application;

Figure 11 is the first module diagram of the terminal of the embodiment of the present invention;

Figure 12 is the second module diagram of the terminal of the embodiment of the present invention;

Figure 13 is the first structure block diagram of the terminal of the embodiment of the present invention;

Figure 14 is the second structured flowchart of the terminal of the embodiment of the present invention.

Embodiment

Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.

How the embodiment of the present invention is in the prior art for carry out the application in terminal by fingerprint identification technology Encryption or decryption do not have the problem of relevant programme, and the embodiments of the invention provide a kind of encryption and decryption method of terminal applies And terminal, by the way that matching is identified to the user fingerprints information of collection, the encryption and decryption of intended application are realized, and operate It is convenient, technology sense and interest are added, improves the usage experience of user.

As shown in figure 1, the embodiments of the invention provide a kind of encryption method of terminal applies, including:

Step 101:When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain and use Family finger print information.

The first object application icon is specially the need that user chooses in the icon display area domain of the display screen of terminal The application icon to be encrypted.The cryptographic operation can be specially to move the first object application icon by icon display area domain Move the slide in fingerprint recognition region.Wherein, icon display area domain is located at the difference of terminal screen with fingerprint recognition region Position.

Step 102:It is right if the finger print data matched with user fingerprints information in the fingerprint database of above-mentioned terminal be present First object application corresponding to above-mentioned first object application icon is encrypted.

Here, the finger print data of multiple users can be obtained in advance and is saved in the fingerprint database, in the finger print data When the finger print data matched with the user fingerprints information of acquisition in storehouse be present, then to the first mesh corresponding to first object application icon Mark application is encrypted.

The encryption method of the terminal applies of the embodiment of the present invention, detect that first object should in the display screen for terminal During with the cryptographic operation of icon, user fingerprints information is obtained;Believe if existing in the fingerprint database of terminal with the user fingerprints The finger print data of matching is ceased, then first object application corresponding to first object application icon is encrypted, simple operation, Technology sense and interest are added, improves the usage experience of user.

Further, above-mentioned steps 101 include:

When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal Show the station location marker for indicating fingerprint recognition region;Detect first object application icon in the display screen for terminal Cryptographic operation when, obtain the user fingerprints information inputted according to the station location marker in the fingerprint recognition region.

Above-mentioned first scheduled operation can be specially long-press operation, and above-mentioned cryptographic operation is specially by the first object application Icon is moved to the slide in fingerprint recognition region by icon display area domain.Detecting for first object application icon When long-press operates, then a station location marker is shown in the display screen of terminal, indicate to the user that fingerprint is known by the station location marker The position in other region so that subsequent user can more accurately determine fingerprint recognition region, and it is determined that fingerprint know User fingerprints information is inputted in other region.

Further, above-mentioned acquisition user fingerprints information, including:

Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.

Further, after above-mentioned steps 102, in addition to:

Generate for prompting the first object application to encrypt successful first prompt message.

The encryption method of the terminal applies of the embodiment of the present invention, the encryption to terminal applies is realized by fingerprint identification technology Function, and simple operation.

The concrete application scene of the embodiment of the present invention is illustrated below below.

Application scenarios one

It is assumed that identifying module by optical finger print to obtain user fingerprints information, having three in the display screen of terminal should With icon, as shown in Fig. 2 when user needs that the application icon of Pentagram shape is encrypted, then length pins the five-pointed star The application icon of shape, now, as shown in figure 3, showing a station location marker in the display screen of terminal, the station location marker can have Body is the mark of a fingerprint form, prompts user can be to corresponding to the application icon of the Pentagram shape by the station location marker Using being encrypted.When user's length pins the application icon of the Pentagram shape, and it is dragged in place by icon display area domain When putting fingerprint recognition region corresponding to mark, as shown in figure 4, LED transmitting light in optical finger print identification module, starts collection and uses Family finger print information, a color block areas with the light emitted lines of LED with same color is now shown in terminal screen.It is if described The finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, then to the application of the Pentagram shape Application is encrypted corresponding to icon, and generates for prompting application encryption successful first corresponding to the application icon to carry Show information.It could be opened after subsequently opening when being applied corresponding to the application icon, it is necessary to which typing fingerprint matching is successful, realize and add Close function.

Application scenarios two

It is assumed that identifying module by ultrasonic fingerprint to obtain user fingerprints information, there are three in the display screen of terminal Application icon, as shown in Fig. 2 when user needs that the application icon of Pentagram shape is encrypted, then length pins this five jiaos The application icon of starriness, now, as shown in figure 3, showing a station location marker in the display screen of terminal, the station location marker can The specially mark of a fingerprint form, user is prompted to be corresponded to the application icon of the Pentagram shape by the station location marker Application be encrypted.When user's length pins the application icon of the Pentagram shape, and it is dragged to by icon display area domain Corresponding to station location marker during fingerprint recognition region, as shown in figure 5, above-mentioned station location marker starts to flash, ultrasonic fingerprint identification mould Group transmitting ultrasonic acquisition user fingerprints information.If exist and the user fingerprints information in the fingerprint database of the terminal The finger print data matched somebody with somebody, then it is encrypted, and is generated for prompting to being applied corresponding to the application icon of the Pentagram shape Successful first prompt message is encrypted in application corresponding to the application icon.When subsequently opening application corresponding to the application icon, need It could be opened after wanting typing fingerprint matching success, realize encryption function.

The encryption method of the terminal applies of the embodiment of the present invention, detect that first object should in the display screen for terminal During with the cryptographic operation of icon, user fingerprints information is obtained;Believe if existing in the fingerprint database of terminal with the user fingerprints The finger print data of matching is ceased, then first object application corresponding to first object application icon is encrypted, simple operation, Technology sense and interest are added, improves the usage experience of user.

As shown in fig. 6, embodiments of the invention additionally provide a kind of decryption method of terminal applies, including:

Step 601:When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, at the end The application icon encrypted is shown in the display screen at end, and obtains user fingerprints information.

Second scheduled operation can be specially long-press operation., can be in terminal when detecting above-mentioned second scheduled operation Show that an icon stores frame in display screen, icon storage inframe includes the application icon encrypted, icon storage frame It can be specially icon file folder.It can identify that module or ultrasonic fingerprint identify mould in the embodiment of the present invention especially by optical finger print Group obtains user fingerprints information.

Step 602:If the finger print data matched with user fingerprints information in the fingerprint database of above-mentioned terminal be present, and examine The decryption oprerations for the second intended application icon in the application icon encrypted are measured, then to the second intended application icon pair Processing is decrypted in the second intended application answered.

The decryption oprerations can be specially that the second intended application icon is removed to the operation of the icon storage frame.Stating The finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, and detect and answered for what is encrypted With the decryption oprerations of the second intended application icon in icon, then to the second intended application corresponding to the second intended application icon Processing is decrypted, realizes the purpose that application is decrypted by fingerprint identification technology.

Further, above-mentioned steps 601 include:

When detecting three scheduled operation for the display screen of the terminal, show in the display screen of the terminal Show the station location marker for indicating fingerprint recognition region;Detect fingerprint identification region in the display screen for the terminal During the second scheduled operation, the application icon encrypted is shown in the display screen of the terminal, and obtain according to the position Identify the user fingerprints information in fingerprint recognition region input.

3rd scheduled operation can be specially long-press operation, when detecting the long-press operation for the display screen of terminal, A station location marker is then shown in the display screen of terminal, the position in fingerprint recognition region is indicated to the user that by the station location marker Put so that subsequent user can more accurately determine fingerprint recognition region, and it is determined that fingerprint recognition region in it is defeated Access customer finger print information.

Further, the decryption method of the terminal applies of the embodiment of the present invention, in addition to:

Generate the second prompt message for prompting the second intended application successful decryption.

The decryption method of the terminal applies of the embodiment of the present invention, detect fingerprint identification area in the display screen for terminal During second scheduled operation in domain, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints Information;If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect pair The decryption oprerations of the second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon Processing is decrypted in second intended application, simple operation, adds technology sense and interest, improves the usage experience of user.

The concrete application scene of the embodiment of the present invention is illustrated below below.

Application scenarios three

It is assumed that identifying module by optical finger print to obtain user fingerprints information, having three in the display screen of terminal should With icon, as shown in fig. 7, user's long-press fingerprint recognition region, now, as shown in figure 8, LED is sent out in optical finger print identification module Light is penetrated, starts to gather user fingerprints information, shows that one has identical face with the light emitted lines of LED in the display screen of terminal The color block areas of color, and a storage frame occurs in fingerprint recognition region, wherein showing each application icon encrypted, such as Shown in Fig. 9, when fingerprint matching success, and detect Pentagram shape application icon be removed storage frame when, then to this five jiaos Processing is decrypted in the application icon of starriness, and produces the second prompting letter of application successful decryption corresponding to the application icon Breath, when subsequently opening application corresponding to the application icon, typing fingerprint is no longer required for, realizes decryption function.

Application scenarios four

It is assumed that identifying module by ultrasonic fingerprint to obtain user fingerprints information, there are three in the display screen of terminal Application icon, user can first long-press terminal screen, a station location marker can be now shown in screen.As shown in Figure 10, user according to Station location marker, long-press fingerprint recognition region, now, ultrasonic fingerprint identification module transmitting ultrasonic acquisition user fingerprints information, And a storage frame occurs in fingerprint recognition region, wherein each application icon encrypted is shown, as shown in figure 9, when finger The match is successful for line, and detect Pentagram shape application icon be removed storage frame when, then to the application of the Pentagram shape Processing is decrypted in icon, and produces the second prompt message of application successful decryption corresponding to the application icon, and follow-up open should When being applied corresponding to application icon, typing fingerprint is no longer required for, realizes decryption function.

The decryption method of the terminal applies of the embodiment of the present invention, detect fingerprint identification area in the display screen for terminal During second scheduled operation in domain, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints Information;If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect pair The decryption oprerations of the second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon Processing is decrypted in second intended application, simple operation, adds technology sense and interest, improves the usage experience of user.

As shown in figure 11, the embodiment of the present invention additionally provides a kind of terminal, including:

First acquisition module 1101, for detecting the encryption of first object application icon in the display screen for terminal During operation, user fingerprints information is obtained;

Encrypting module 1102, if for having what is matched with the user fingerprints information in the fingerprint database of the terminal Finger print data, then first object application corresponding to the first object application icon is encrypted.

The terminal of the embodiment of the present invention, first acquisition module 1101 include:

First display sub-module, during for detecting the first scheduled operation for the first object application icon, The station location marker for indicating fingerprint recognition region is shown in the display screen of the terminal;

First acquisition submodule, for detecting that the encryption of first object application icon in the display screen for terminal is grasped When making, the user fingerprints information inputted according to the station location marker in the fingerprint recognition region is obtained.

The terminal of the embodiment of the present invention, the cryptographic operation are included the first object application icon by icon display area Domain is moved to the slide in fingerprint recognition region.

The terminal of the embodiment of the present invention, first acquisition module 1101 are used to identify module or ultrasound by optical finger print Ripple fingerprint recognition module obtains user fingerprints information.

The terminal of the embodiment of the present invention, in addition to:

First reminding module, it is used to prompt the first object application to encrypt successful first prompt message for generating.

The terminal of the embodiment of the present invention, detect the encryption behaviour of first object application icon in the display screen for terminal When making, user fingerprints information is obtained;If the fingerprint number matched with the user fingerprints information in the fingerprint database of terminal be present According to, then first object application corresponding to first object application icon is encrypted, simple operation, add technology sense with Interest, improve the usage experience of user.

It should be noted that the terminal is terminal corresponding with the encryption method embodiment of above-mentioned terminal applies, above-mentioned end All implementations in the encryption method embodiment of application are held suitable for the embodiment of the terminal, can also to reach identical skill Art effect.

Embodiments of the invention additionally provide a kind of terminal, including:Memory, processor and storage are on a memory and can The computer program run on a processor, above-mentioned terminal applies are realized when the computer program is by the computing device Each process in encryption method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.

Embodiments of the invention additionally provide a kind of computer-readable recording medium, on the computer-readable recording medium Computer program is stored with, the computer program realizes the encryption method embodiment of above-mentioned terminal applies when being executed by processor In each process, and identical technique effect can be reached, to avoid repeating, repeated no more here.Wherein, described computer Readable storage medium storing program for executing, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..

As shown in figure 12, embodiments of the invention additionally provide a kind of terminal, including:

Second acquisition module 1201, for detecting that second of fingerprint identification region in the display screen for terminal is predetermined During operation, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;

Deciphering module 1202, if for having what is matched with the user fingerprints information in the fingerprint database of the terminal Finger print data, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to described Processing is decrypted in second intended application corresponding to two intended application icons.

The terminal of the embodiment of the present invention, second acquisition module include:

Second display sub-module, during for detecting three scheduled operation for the display screen of the terminal, in institute State the station location marker shown in the display screen of terminal for indicating fingerprint recognition region;

Second acquisition submodule, for detecting that second of fingerprint identification region in the display screen for the terminal is pre- When operating surely, the application icon encrypted is shown in the display screen of the terminal, and obtain and exist according to the station location marker The user fingerprints information of the fingerprint recognition region input.

The terminal of the embodiment of the present invention, second acquisition module include:

Display sub-module, for showing that an icon stores frame in the display screen of the terminal, the icon stores frame Inside include the application icon encrypted.

The terminal of the embodiment of the present invention, the decryption oprerations include the second intended application icon removing the icon Store the operation of frame.

The terminal of the embodiment of the present invention, in addition to:

Second reminding module, for generating the second prompt message for being used for prompting the second intended application successful decryption.

The terminal of the embodiment of the present invention, detect the second predetermined behaviour of fingerprint identification region in the display screen for terminal When making, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;If the terminal Fingerprint database in the finger print data that is matched with the user fingerprints information be present, and detect the application drawing for having encrypted The decryption oprerations of second intended application icon in mark, then the second intended application corresponding to the second intended application icon is carried out Decryption processing, simple operation, technology sense and interest are added, improve the usage experience of user.

It should be noted that the terminal is terminal corresponding with the decryption method embodiment of above-mentioned terminal applies, above-mentioned end All implementations in the decryption method embodiment of application are held suitable for the embodiment of the terminal, can also to reach identical skill Art effect.

Embodiments of the invention additionally provide a kind of terminal, including:Memory, processor and storage are on a memory and can The computer program run on a processor, above-mentioned terminal applies are realized when the computer program is by the computing device Each process in decryption method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.

Embodiments of the invention additionally provide a kind of computer-readable recording medium, on the computer-readable recording medium Computer program is stored with, the computer program realizes the decryption method embodiment of above-mentioned terminal applies when being executed by processor In each process, and identical technique effect can be reached, to avoid repeating, repeated no more here.Wherein, described computer Readable storage medium storing program for executing, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..

As shown in figure 13, embodiments of the invention additionally provide a kind of terminal, and the terminal 1300 shown in Figure 13 includes:At least One processor 1301, memory 1302, at least one network interface 1304 and other users interface 1303.In terminal 1300 Each component is coupled by bus system 1305.It is understood that bus system 1305 is used to realize between these components Connection communication.Bus system 1305 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal are total Line.But for the sake of clear explanation, various buses are all designated as bus system 1305 in fig. 13.

Wherein, user interface 1303 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..

It is appreciated that the memory 1302 in the embodiment of the present invention can be volatile memory or non-volatile memories Device, or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only Read memory (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, ) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static random-access Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous Connect dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 1302 of system and method described herein be intended to including but not limited to this A little and any other suitable type memory.

In some embodiments, memory 1302 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 13021 and application program 13022.

Wherein, operating system 13021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., it is used for Realize various basic businesses and the hardware based task of processing.Application program 13022, include various application programs, such as matchmaker Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented The program of example method may be embodied in application program 13022.

In one embodiment of this invention, by calling program or the instruction of the storage of memory 1302, can be specifically The program stored in application program 13022 or instruction, computer program realize following steps when being performed by processor 1301:

When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained Breath;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described First object application is encrypted corresponding to first object application icon.

Optionally, following steps are realized when computer program is performed by processor 1301:

When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal Show the station location marker for indicating fingerprint recognition region;

When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain according to institute's rheme Put user fingerprints information of the mark in fingerprint recognition region input.

Optionally, the cryptographic operation includes the first object application icon being moved to fingerprint by icon display area domain The slide of identification region.

Optionally, following steps are realized when computer program is performed by processor 1301:

Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.

Optionally, following steps are realized when computer program is performed by processor 1301:

Generate for prompting the first object application to encrypt successful first prompt message.

In one embodiment of this invention, by calling program or the instruction of the storage of memory 1302, can be specifically The program stored in application program 13022 or instruction, computer program realize following steps when being performed by processor 1301:

When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon The second intended application processing is decrypted.

Optionally, following steps are realized when computer program is performed by processor 1301:

When detecting three scheduled operation for the display screen of the terminal, show in the display screen of the terminal Show the station location marker for indicating fingerprint recognition region;

When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the terminal Display screen in show the application icon encrypted, and obtain and inputted according to the station location marker in the fingerprint recognition region User fingerprints information.

Optionally, following steps are realized when computer program is performed by processor 1301:

Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes what is encrypted Application icon.

Optionally, the decryption oprerations include the behaviour for removing the icon and store frame the second intended application icon Make.

Optionally, following steps are realized when computer program is performed by processor 1301:

Generate the second prompt message for prompting the second intended application successful decryption.

The terminal of the present invention such as can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.

Terminal 1300 can realize each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating State.

The method that the embodiments of the present invention disclose can apply in processor 1301, or real by processor 1301 It is existing.Processor 1301 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1301 or software form.Above-mentioned Processor 1301 can be general processor, digital signal processor (Digital Signal Processor, DSP), special Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, flash memory, read-only storage, may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 1302, processor 1301 read the information in memory 1302, with reference to the step of its hardware completion above method.

It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.

Realize, can be realized herein by performing the module (such as process, function etc.) of function described herein for software Described technology.Software code is storable in memory and passes through computing device.Memory can within a processor or Realized outside processor.

As shown in figure 14, embodiments of the invention additionally provide a kind of terminal, and the terminal 1400 shown in Figure 14 includes radio frequency (Radio Frequency, RF) circuit 1410, memory 1420, input block 1430, display unit 1440, processor 1460, Voicefrequency circuit 1470, WiFi (Wireless Fidelity) modules 1480 and power supply 1490.

Wherein, input block 1430 can be used for the numeral or character information for receiving user's input, and generation and terminal The signal input that 1400 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 1430 Contact panel 1431 can be included.Contact panel 1431, also referred to as touch-screen, collect touch behaviour of the user on or near it Make (for example user uses the operations of any suitable object or annex on contact panel 1431 such as finger, stylus), and according to Formula set in advance drives corresponding attachment means.Optionally, contact panel 1431 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinates, then give the processor 1460, and the order sent of reception processing device 1460 and can be performed.Furthermore, it is possible to adopt Contact panel 1431 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1431, input block 1430 can also include other input equipments 1432, and other input equipments 1432 can include but is not limited to One kind or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. Kind.

Wherein, display unit 1440 can be used for display by the information of user's input or be supplied to the information and terminal of user 1400 various menu interfaces.Display unit 1440 may include display panel 1441, optionally, can use LCD or organic hairs The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 1441.

It should be noted that contact panel 1431 can cover display panel 1441, touch display screen is formed, when the touch display screen After detecting the touch operation on or near it, processor 1460 is sent to determine the type of touch event, is followed by subsequent processing Device 1460 provides corresponding visual output according to the type of touch event in touch display screen.

Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And arrangement mode of the conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..

Wherein processor 1460 is the control centre of terminal 1400, utilizes each of various interfaces and connection whole mobile phone Individual part, by running or performing the software program and/or module that are stored in first memory 1421, and call and be stored in Data in second memory 1422, the various functions and processing data of terminal 1400 are performed, it is whole so as to be carried out to terminal 1400 Body monitors.Optionally, processor 1460 may include one or more processing units.

In one embodiment of this invention, by calling the software program and/or mould that store in the first memory 1421 Data in block and/or the second memory 1422, computer program realize following steps when being performed by processor 1460:

When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained Breath;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described First object application is encrypted corresponding to first object application icon.

Optionally, following steps are realized when computer program is performed by processor 1460:

When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal Show the station location marker for indicating fingerprint recognition region;

When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain according to institute's rheme Put user fingerprints information of the mark in fingerprint recognition region input.

Optionally, the cryptographic operation includes the first object application icon being moved to fingerprint by icon display area domain The slide of identification region.

Optionally, following steps are realized when computer program is performed by processor 1460:

Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.

Optionally, following steps are realized when computer program is performed by processor 1460:

Generate for prompting the first object application to encrypt successful first prompt message.

In one embodiment of this invention, by calling the software program and/or mould that store in the first memory 1421 Data in block and/or the second memory 1422, computer program realize following steps when being performed by processor 1460:

When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;

If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon The second intended application processing is decrypted.

Optionally, following steps are realized when computer program is performed by processor 1460:

When detecting three scheduled operation for the display screen of the terminal, show and be used in the terminal screen Indicate the station location marker in fingerprint recognition region;

When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the terminal Display screen in show the application icon encrypted, and obtain and inputted according to the station location marker in the fingerprint recognition region User fingerprints information.

Optionally, following steps are realized when computer program is performed by processor 1460:

Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes what is encrypted Application icon.

Optionally, the decryption oprerations include the behaviour for removing the icon and store frame the second intended application icon Make.

Optionally, following steps are realized when computer program is performed by processor 1460:

Generate the second prompt message for prompting the second intended application successful decryption.

The terminal of the present invention such as can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.

Terminal 1400 can realize each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating State.

Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, application-specific and design constraint depending on technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.

It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.

In embodiment provided herein, it should be understood that disclosed apparatus and method, others can be passed through Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical, mechanical or other forms.

The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.

In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.

If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention. And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.

One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is controlled to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..

The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention God any modification, equivalent substitution and improvements made etc., should be included in the scope of the protection with principle.

Claims (24)

  1. A kind of 1. encryption method of terminal applies, it is characterised in that including:
    When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints information is obtained;
    If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described first First object application is encrypted corresponding to intended application icon.
  2. 2. the encryption method of terminal applies according to claim 1, it is characterised in that described to detect for the aobvious of terminal In display screen curtain during the cryptographic operation of first object application icon, obtain user fingerprints information the step of, including:
    When detecting the first scheduled operation for the first object application icon, shown in the display screen of the terminal For indicating the station location marker in fingerprint recognition region;
    When detecting the cryptographic operation of first object application icon in the display screen for the terminal, obtain according to institute's rheme Put user fingerprints information of the mark in fingerprint recognition region input.
  3. 3. the encryption method of terminal applies according to claim 1, it is characterised in that the cryptographic operation is included by described in First object application icon is moved to the slide in fingerprint recognition region by icon display area domain.
  4. 4. the encryption method of terminal applies according to claim 1, it is characterised in that the acquisition user fingerprints information Step, including:
    Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.
  5. 5. the encryption method of terminal applies according to claim 1, it is characterised in that if the fingerprint database of the terminal It is middle the finger print data matched with the user fingerprints information to be present, then to first object corresponding to the first object application icon After the step of being encrypted, methods described also includes:
    Generate for prompting the first object application to encrypt successful first prompt message.
  6. A kind of 6. decryption method of terminal applies, it is characterised in that including:
    When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the display screen of the terminal The application icon encrypted is shown in curtain, and obtains user fingerprints information;
    If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect for The decryption oprerations of second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon Processing is decrypted in two intended applications.
  7. 7. the decryption method of terminal applies according to claim 6, it is characterised in that described to detect for the aobvious of terminal In display screen curtain during the second scheduled operation of fingerprint identification region, the application drawing encrypted is shown in the display screen of the terminal The step of marking, and gathering user fingerprints information, including:
    When detecting three scheduled operation for the display screen of the terminal, use is shown in the display screen of the terminal Station location marker in instruction fingerprint recognition region;
    When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the aobvious of the terminal The application icon encrypted is shown in display screen curtain, and obtains the use inputted according to the station location marker in the fingerprint recognition region Family finger print information.
  8. 8. the decryption method of terminal applies according to claim 6, it is characterised in that the display screen in the terminal The step of application icon encrypted being shown in curtain, including:
    Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes the application encrypted Icon.
  9. 9. the decryption method of terminal applies according to claim 8, it is characterised in that the decryption oprerations are included by described in Second intended application icon removes the operation of the icon storage frame.
  10. 10. the decryption method of terminal applies according to claim 6, it is characterised in that described to answer second target After the step of processing is decrypted in the second intended application corresponding to icon, methods described also includes:
    Generate the second prompt message for prompting the second intended application successful decryption.
  11. A kind of 11. terminal, it is characterised in that including:
    First acquisition module, during for detecting the cryptographic operation of first object application icon in the display screen for terminal, Obtain user fingerprints information;
    Encrypting module, if for the fingerprint number matched with the user fingerprints information in the fingerprint database of the terminal be present According to then first object application corresponding to the first object application icon is encrypted.
  12. 12. terminal according to claim 11, it is characterised in that first acquisition module includes:
    First display sub-module, during for detecting the first scheduled operation for the first object application icon, described The station location marker for indicating fingerprint recognition region is shown in the display screen of terminal;
    First acquisition submodule, for detecting that the encryption of first object application icon in the display screen for the terminal is grasped When making, the user fingerprints information inputted according to the station location marker in the fingerprint recognition region is obtained.
  13. 13. terminal according to claim 11, it is characterised in that the cryptographic operation is included the first object application Icon is moved to the slide in fingerprint recognition region by icon display area domain.
  14. 14. terminal according to claim 11, it is characterised in that first acquisition module is used to know by optical finger print Other module or ultrasonic fingerprint identification module obtains user fingerprints information.
  15. 15. terminal according to claim 11, it is characterised in that also include:
    First reminding module, it is used to prompt the first object application to encrypt successful first prompt message for generating.
  16. A kind of 16. terminal, it is characterised in that including:Memory, processor and storage can transport on a memory and on a processor Capable computer program, the computer program are realized as any one of claim 1 to 5 during the computing device The step of encryption method of terminal applies.
  17. 17. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the encryption of the terminal applies as any one of claim 1 to 5 is realized when the computer program is executed by processor The step of method.
  18. A kind of 18. terminal, it is characterised in that including:
    Second acquisition module, during for detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, The application icon encrypted is shown in the display screen of the terminal, and obtains user fingerprints information;
    Deciphering module, if for the fingerprint number matched with the user fingerprints information in the fingerprint database of the terminal be present According to, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to second target Processing is decrypted in the second intended application corresponding to application icon.
  19. 19. terminal according to claim 18, it is characterised in that second acquisition module includes:
    Second display sub-module, during for detecting three scheduled operation for the display screen of the terminal, at the end The station location marker for indicating fingerprint recognition region is shown in the display screen at end;
    Second acquisition submodule, the second predetermined behaviour for detecting fingerprint identification region in the display screen for the terminal When making, the application icon encrypted is shown in the display screen of the terminal, and obtain according to the station location marker described The user fingerprints information of fingerprint recognition region input.
  20. 20. terminal according to claim 18, it is characterised in that second acquisition module includes:
    Display sub-module, for showing that an icon stores frame in the display screen of the terminal, the icon stores inframe bag Contain the application icon encrypted.
  21. 21. terminal according to claim 20, it is characterised in that the decryption oprerations are included second intended application Icon removes the operation of the icon storage frame.
  22. 22. terminal according to claim 18, it is characterised in that also include:
    Second reminding module, for generating the second prompt message for being used for prompting the second intended application successful decryption.
  23. A kind of 23. terminal, it is characterised in that including:Memory, processor and storage can transport on a memory and on a processor Capable computer program, the computer program are realized such as any one of claim 6 to 10 institute during the computing device The step of stating the decryption method of terminal applies.
  24. 24. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the solution of the terminal applies as any one of claim 6 to 10 is realized when the computer program is executed by processor The step of decryption method.
CN201710762790.0A 2017-08-30 2017-08-30 The encryption and decryption method and terminal of a kind of terminal applies CN107506111A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710762790.0A CN107506111A (en) 2017-08-30 2017-08-30 The encryption and decryption method and terminal of a kind of terminal applies

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710762790.0A CN107506111A (en) 2017-08-30 2017-08-30 The encryption and decryption method and terminal of a kind of terminal applies

Publications (1)

Publication Number Publication Date
CN107506111A true CN107506111A (en) 2017-12-22

Family

ID=60694103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710762790.0A CN107506111A (en) 2017-08-30 2017-08-30 The encryption and decryption method and terminal of a kind of terminal applies

Country Status (1)

Country Link
CN (1) CN107506111A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108334789A (en) * 2018-01-16 2018-07-27 维沃移动通信有限公司 A kind of method and terminal of data transmission
CN108540645A (en) * 2018-03-12 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal
CN108664177A (en) * 2017-03-29 2018-10-16 上海耕岩智能科技有限公司 A kind of method and apparatus that application is opened based on fingerprint recognition

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN104915584A (en) * 2015-06-03 2015-09-16 深圳市沃特沃德科技有限公司 Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics
CN105205374A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Application program encrypting method and user terminal
CN105574387A (en) * 2015-06-16 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information security processing method and user terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104732121A (en) * 2015-03-24 2015-06-24 广东欧珀移动通信有限公司 Encryption setting method, decryption setting method and corresponding device of application program
CN104915584A (en) * 2015-06-03 2015-09-16 深圳市沃特沃德科技有限公司 Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics
CN105574387A (en) * 2015-06-16 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Information security processing method and user terminal
CN105205374A (en) * 2015-08-27 2015-12-30 广东欧珀移动通信有限公司 Application program encrypting method and user terminal

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108664177A (en) * 2017-03-29 2018-10-16 上海耕岩智能科技有限公司 A kind of method and apparatus that application is opened based on fingerprint recognition
CN108334789A (en) * 2018-01-16 2018-07-27 维沃移动通信有限公司 A kind of method and terminal of data transmission
CN108540645A (en) * 2018-03-12 2018-09-14 维沃移动通信有限公司 A kind of operating method and mobile terminal of mobile terminal

Similar Documents

Publication Publication Date Title
JP6632756B2 (en) Payment user interface
US10255474B2 (en) Enrollment using synthetic fingerprint image and fingerprint sensing systems
US10540657B2 (en) Secure passcode entry user interface
CN106101848B (en) A kind of barrage display methods and electronic equipment
CN106326710B (en) A kind of quickly starting payment interface method and mobile terminal
US10496808B2 (en) User interface for managing access to credentials for use in an operation
US20170315651A1 (en) Biometric Initiated Communication
CN103718187B (en) Input via the safety of touch screen
EP2506183B1 (en) Systems and methods for gesture lock obfuscation
CN106126077B (en) Display control method of application program icons and mobile terminal
CN103984885B (en) Application program hiding method applied to touch screen terminal and touch screen terminal
US9558491B2 (en) Scrambling passcode entry interface
AU2014281710B2 (en) Virtual key ring
CN103200011B (en) A kind of cipher authentication method and device
CN107402663A (en) Fingerprint authentication method and the electronic equipment for performing this method
US9767338B2 (en) Method for identifying fingerprint and electronic device thereof
CN104639758B (en) Alarm clock control method and alarm clock control device applied to intelligent terminal
US20130207905A1 (en) Input Lock For Touch-Screen Device
CN106020613B (en) A kind of operating method and mobile terminal of unread message
CN107194331A (en) A kind of fingerprint identification method and mobile terminal
WO2014004541A1 (en) Expedited biometric validation
CN105683880B (en) Touch scanning in portable computing device and radio scan
AU2020201306B2 (en) Implementation of biometric authentication
CN105593868A (en) Fingerprint identification method and apparatus, and mobile terminal
US9819676B2 (en) Biometric capture for unauthorized user identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination