CN107506111A - The encryption and decryption method and terminal of a kind of terminal applies - Google Patents
The encryption and decryption method and terminal of a kind of terminal applies Download PDFInfo
- Publication number
- CN107506111A CN107506111A CN201710762790.0A CN201710762790A CN107506111A CN 107506111 A CN107506111 A CN 107506111A CN 201710762790 A CN201710762790 A CN 201710762790A CN 107506111 A CN107506111 A CN 107506111A
- Authority
- CN
- China
- Prior art keywords
- terminal
- display screen
- application icon
- icon
- user fingerprints
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0485—Scrolling or panning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72469—User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
Abstract
The invention provides a kind of encryption and decryption method of terminal applies and terminal, solves the problems, such as in the prior art for how the application in terminal to be encrypted or be decrypted not relevant programme by fingerprint identification technology.The encryption method of the terminal applies of the embodiment of the present invention includes:When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints information is obtained;If the finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, first object application corresponding to first object application icon is encrypted.The embodiment of the present invention realizes the encryption of intended application, and simple operation, adds technology sense and interest, improve the usage experience of user by the way that matching is identified to the user fingerprints information of collection.
Description
Technical field
The present invention relates to the technical field of communications applications, more particularly to a kind of encryption and decryption method of terminal applies and end
End.
Background technology
Use of the fingerprint function on mobile phone at present is more and more common, such as mobile phone unblock, pays function, screen regional refers to
Line identification technology allows user directly can be achieved with fingerprint recognition by touching some viewing area of screen, for example passes through light
Fingerprint identification technology or ultrasonic fingerprint identification technology are learned, wherein, optical finger print identification is to utilize Organic Light Emitting Diode
The light that the LED of (Organic Light-Emitting Diode, OLED) screen is sent, by finger print
Wave crest and wave trough different-energy reflection after, then received by the fingerprint receiving module below screen and form fingerprint image, most
Fingerprint identification function is realized by algorithm eventually.Ultrasonic fingerprint identification is to receive mould using the ultrasonic wave transmitting pasted below screen
Group is realized, after the ultrasonic wave that ultrasonic wave emitting mould train is sent penetrates screen, by the difference of the Wave crest and wave trough of finger print
After energy reflection, then by the ultrasonic wave module reception below screen so as to form fingerprint image, eventually through algorithm realization screen
Curtain fingerprint identification function.
But in the prior art for how the application in terminal being encrypted or be decrypted not by fingerprint identification technology
There is relevant programme.
The content of the invention
It is an object of the invention to provide a kind of encryption and decryption method of terminal applies and terminal, to solve existing skill
Do not have the problem of relevant programme for how the application in terminal being encrypted or being decrypted by fingerprint identification technology in art.
To achieve these goals, the invention provides a kind of encryption method of terminal applies, including:
When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained
Breath;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described
First object application is encrypted corresponding to first object application icon.
To achieve these goals, the embodiment of the present invention additionally provides a kind of decryption method of terminal applies, including:
When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal
The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect
Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon
The second intended application processing is decrypted.
To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:
First acquisition module, for detecting the cryptographic operation of first object application icon in the display screen for terminal
When, obtain user fingerprints information;
Encrypting module, if for the fingerprint matched with the user fingerprints information in the fingerprint database of the terminal be present
Data, then first object application corresponding to the first object application icon is encrypted.
To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:Memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, the computer program is by real during the computing device
Now the step of encryption method of terminal applies as described above.
To achieve these goals, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the calculating
Computer program is stored with machine readable storage medium storing program for executing, the computer program realizes terminal as described above when being executed by processor
The step of encryption method of application.
To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:
Second acquisition module, for detecting the second scheduled operation of fingerprint identification region in the display screen for terminal
When, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;
Deciphering module, if for the fingerprint matched with the user fingerprints information in the fingerprint database of the terminal be present
Data, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to second mesh
Processing is decrypted in second intended application corresponding to mark application icon.
To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:Memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, the computer program is by real during the computing device
Now the step of decryption method of terminal applies as described above.
To achieve these goals, the embodiment of the present invention additionally provides a kind of computer-readable recording medium, the calculating
Computer program is stored with machine readable storage medium storing program for executing, the computer program realizes terminal as described above when being executed by processor
The step of decryption method of application.
The embodiment of the present invention has the advantages that:
The above-mentioned technical proposal of the embodiment of the present invention, detect first object application icon in the display screen for terminal
Cryptographic operation when, obtain user fingerprints information;Matched if existing in the fingerprint database of terminal with the user fingerprints information
Finger print data, then first object application corresponding to first object application icon is encrypted;Detect for terminal
Display screen in fingerprint identification region the second scheduled operation when, the application icon encrypted is shown in terminal screen, and
Obtain user fingerprints information;If the finger print data matched with user fingerprints information in the fingerprint database of terminal be present, and detect
The decryption oprerations of the second intended application icon into the application icon for having encrypted, then to corresponding to the second intended application icon
Processing is decrypted in second intended application.The embodiment of the present invention is real by the way that matching is identified to the user fingerprints information of collection
Show the encryption and decryption of intended application, and simple operation, add technology sense with interesting, improve user uses body
Test.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention
Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is the workflow diagram of the encryption method of the terminal applies of the embodiment of the present invention;
Fig. 2 is the first display schematic diagram when being encrypted in the embodiment of the present invention to application;
Fig. 3 is the second display schematic diagram when being encrypted in the embodiment of the present invention to application;
Fig. 4 is the 3rd display schematic diagram when being encrypted in the embodiment of the present invention to application;
Fig. 5 is the 4th display schematic diagram when being encrypted in the embodiment of the present invention to application;
Fig. 6 is the workflow diagram of the decryption method of the terminal applies of the embodiment of the present invention;
Fig. 7 is the first display schematic diagram when being decrypted in the embodiment of the present invention to application;
Fig. 8 is the second display schematic diagram when being decrypted in the embodiment of the present invention to application;
Fig. 9 is the 3rd display schematic diagram when being decrypted in the embodiment of the present invention to application;
Figure 10 is the 4th display schematic diagram when being decrypted in the embodiment of the present invention to application;
Figure 11 is the first module diagram of the terminal of the embodiment of the present invention;
Figure 12 is the second module diagram of the terminal of the embodiment of the present invention;
Figure 13 is the first structure block diagram of the terminal of the embodiment of the present invention;
Figure 14 is the second structured flowchart of the terminal of the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
How the embodiment of the present invention is in the prior art for carry out the application in terminal by fingerprint identification technology
Encryption or decryption do not have the problem of relevant programme, and the embodiments of the invention provide a kind of encryption and decryption method of terminal applies
And terminal, by the way that matching is identified to the user fingerprints information of collection, the encryption and decryption of intended application are realized, and operate
It is convenient, technology sense and interest are added, improves the usage experience of user.
As shown in figure 1, the embodiments of the invention provide a kind of encryption method of terminal applies, including:
Step 101:When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain and use
Family finger print information.
The first object application icon is specially the need that user chooses in the icon display area domain of the display screen of terminal
The application icon to be encrypted.The cryptographic operation can be specially to move the first object application icon by icon display area domain
Move the slide in fingerprint recognition region.Wherein, icon display area domain is located at the difference of terminal screen with fingerprint recognition region
Position.
Step 102:It is right if the finger print data matched with user fingerprints information in the fingerprint database of above-mentioned terminal be present
First object application corresponding to above-mentioned first object application icon is encrypted.
Here, the finger print data of multiple users can be obtained in advance and is saved in the fingerprint database, in the finger print data
When the finger print data matched with the user fingerprints information of acquisition in storehouse be present, then to the first mesh corresponding to first object application icon
Mark application is encrypted.
The encryption method of the terminal applies of the embodiment of the present invention, detect that first object should in the display screen for terminal
During with the cryptographic operation of icon, user fingerprints information is obtained;Believe if existing in the fingerprint database of terminal with the user fingerprints
The finger print data of matching is ceased, then first object application corresponding to first object application icon is encrypted, simple operation,
Technology sense and interest are added, improves the usage experience of user.
Further, above-mentioned steps 101 include:
When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal
Show the station location marker for indicating fingerprint recognition region;Detect first object application icon in the display screen for terminal
Cryptographic operation when, obtain the user fingerprints information inputted according to the station location marker in the fingerprint recognition region.
Above-mentioned first scheduled operation can be specially long-press operation, and above-mentioned cryptographic operation is specially by the first object application
Icon is moved to the slide in fingerprint recognition region by icon display area domain.Detecting for first object application icon
When long-press operates, then a station location marker is shown in the display screen of terminal, indicate to the user that fingerprint is known by the station location marker
The position in other region so that subsequent user can more accurately determine fingerprint recognition region, and it is determined that fingerprint know
User fingerprints information is inputted in other region.
Further, above-mentioned acquisition user fingerprints information, including:
Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.
Further, after above-mentioned steps 102, in addition to:
Generate for prompting the first object application to encrypt successful first prompt message.
The encryption method of the terminal applies of the embodiment of the present invention, the encryption to terminal applies is realized by fingerprint identification technology
Function, and simple operation.
The concrete application scene of the embodiment of the present invention is illustrated below below.
Application scenarios one
It is assumed that identifying module by optical finger print to obtain user fingerprints information, having three in the display screen of terminal should
With icon, as shown in Fig. 2 when user needs that the application icon of Pentagram shape is encrypted, then length pins the five-pointed star
The application icon of shape, now, as shown in figure 3, showing a station location marker in the display screen of terminal, the station location marker can have
Body is the mark of a fingerprint form, prompts user can be to corresponding to the application icon of the Pentagram shape by the station location marker
Using being encrypted.When user's length pins the application icon of the Pentagram shape, and it is dragged in place by icon display area domain
When putting fingerprint recognition region corresponding to mark, as shown in figure 4, LED transmitting light in optical finger print identification module, starts collection and uses
Family finger print information, a color block areas with the light emitted lines of LED with same color is now shown in terminal screen.It is if described
The finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, then to the application of the Pentagram shape
Application is encrypted corresponding to icon, and generates for prompting application encryption successful first corresponding to the application icon to carry
Show information.It could be opened after subsequently opening when being applied corresponding to the application icon, it is necessary to which typing fingerprint matching is successful, realize and add
Close function.
Application scenarios two
It is assumed that identifying module by ultrasonic fingerprint to obtain user fingerprints information, there are three in the display screen of terminal
Application icon, as shown in Fig. 2 when user needs that the application icon of Pentagram shape is encrypted, then length pins this five jiaos
The application icon of starriness, now, as shown in figure 3, showing a station location marker in the display screen of terminal, the station location marker can
The specially mark of a fingerprint form, user is prompted to be corresponded to the application icon of the Pentagram shape by the station location marker
Application be encrypted.When user's length pins the application icon of the Pentagram shape, and it is dragged to by icon display area domain
Corresponding to station location marker during fingerprint recognition region, as shown in figure 5, above-mentioned station location marker starts to flash, ultrasonic fingerprint identification mould
Group transmitting ultrasonic acquisition user fingerprints information.If exist and the user fingerprints information in the fingerprint database of the terminal
The finger print data matched somebody with somebody, then it is encrypted, and is generated for prompting to being applied corresponding to the application icon of the Pentagram shape
Successful first prompt message is encrypted in application corresponding to the application icon.When subsequently opening application corresponding to the application icon, need
It could be opened after wanting typing fingerprint matching success, realize encryption function.
The encryption method of the terminal applies of the embodiment of the present invention, detect that first object should in the display screen for terminal
During with the cryptographic operation of icon, user fingerprints information is obtained;Believe if existing in the fingerprint database of terminal with the user fingerprints
The finger print data of matching is ceased, then first object application corresponding to first object application icon is encrypted, simple operation,
Technology sense and interest are added, improves the usage experience of user.
As shown in fig. 6, embodiments of the invention additionally provide a kind of decryption method of terminal applies, including:
Step 601:When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, at the end
The application icon encrypted is shown in the display screen at end, and obtains user fingerprints information.
Second scheduled operation can be specially long-press operation., can be in terminal when detecting above-mentioned second scheduled operation
Show that an icon stores frame in display screen, icon storage inframe includes the application icon encrypted, icon storage frame
It can be specially icon file folder.It can identify that module or ultrasonic fingerprint identify mould in the embodiment of the present invention especially by optical finger print
Group obtains user fingerprints information.
Step 602:If the finger print data matched with user fingerprints information in the fingerprint database of above-mentioned terminal be present, and examine
The decryption oprerations for the second intended application icon in the application icon encrypted are measured, then to the second intended application icon pair
Processing is decrypted in the second intended application answered.
The decryption oprerations can be specially that the second intended application icon is removed to the operation of the icon storage frame.Stating
The finger print data matched with the user fingerprints information in the fingerprint database of terminal be present, and detect and answered for what is encrypted
With the decryption oprerations of the second intended application icon in icon, then to the second intended application corresponding to the second intended application icon
Processing is decrypted, realizes the purpose that application is decrypted by fingerprint identification technology.
Further, above-mentioned steps 601 include:
When detecting three scheduled operation for the display screen of the terminal, show in the display screen of the terminal
Show the station location marker for indicating fingerprint recognition region;Detect fingerprint identification region in the display screen for the terminal
During the second scheduled operation, the application icon encrypted is shown in the display screen of the terminal, and obtain according to the position
Identify the user fingerprints information in fingerprint recognition region input.
3rd scheduled operation can be specially long-press operation, when detecting the long-press operation for the display screen of terminal,
A station location marker is then shown in the display screen of terminal, the position in fingerprint recognition region is indicated to the user that by the station location marker
Put so that subsequent user can more accurately determine fingerprint recognition region, and it is determined that fingerprint recognition region in it is defeated
Access customer finger print information.
Further, the decryption method of the terminal applies of the embodiment of the present invention, in addition to:
Generate the second prompt message for prompting the second intended application successful decryption.
The decryption method of the terminal applies of the embodiment of the present invention, detect fingerprint identification area in the display screen for terminal
During second scheduled operation in domain, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints
Information;If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect pair
The decryption oprerations of the second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon
Processing is decrypted in second intended application, simple operation, adds technology sense and interest, improves the usage experience of user.
The concrete application scene of the embodiment of the present invention is illustrated below below.
Application scenarios three
It is assumed that identifying module by optical finger print to obtain user fingerprints information, having three in the display screen of terminal should
With icon, as shown in fig. 7, user's long-press fingerprint recognition region, now, as shown in figure 8, LED is sent out in optical finger print identification module
Light is penetrated, starts to gather user fingerprints information, shows that one has identical face with the light emitted lines of LED in the display screen of terminal
The color block areas of color, and a storage frame occurs in fingerprint recognition region, wherein showing each application icon encrypted, such as
Shown in Fig. 9, when fingerprint matching success, and detect Pentagram shape application icon be removed storage frame when, then to this five jiaos
Processing is decrypted in the application icon of starriness, and produces the second prompting letter of application successful decryption corresponding to the application icon
Breath, when subsequently opening application corresponding to the application icon, typing fingerprint is no longer required for, realizes decryption function.
Application scenarios four
It is assumed that identifying module by ultrasonic fingerprint to obtain user fingerprints information, there are three in the display screen of terminal
Application icon, user can first long-press terminal screen, a station location marker can be now shown in screen.As shown in Figure 10, user according to
Station location marker, long-press fingerprint recognition region, now, ultrasonic fingerprint identification module transmitting ultrasonic acquisition user fingerprints information,
And a storage frame occurs in fingerprint recognition region, wherein each application icon encrypted is shown, as shown in figure 9, when finger
The match is successful for line, and detect Pentagram shape application icon be removed storage frame when, then to the application of the Pentagram shape
Processing is decrypted in icon, and produces the second prompt message of application successful decryption corresponding to the application icon, and follow-up open should
When being applied corresponding to application icon, typing fingerprint is no longer required for, realizes decryption function.
The decryption method of the terminal applies of the embodiment of the present invention, detect fingerprint identification area in the display screen for terminal
During second scheduled operation in domain, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints
Information;If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect pair
The decryption oprerations of the second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon
Processing is decrypted in second intended application, simple operation, adds technology sense and interest, improves the usage experience of user.
As shown in figure 11, the embodiment of the present invention additionally provides a kind of terminal, including:
First acquisition module 1101, for detecting the encryption of first object application icon in the display screen for terminal
During operation, user fingerprints information is obtained;
Encrypting module 1102, if for having what is matched with the user fingerprints information in the fingerprint database of the terminal
Finger print data, then first object application corresponding to the first object application icon is encrypted.
The terminal of the embodiment of the present invention, first acquisition module 1101 include:
First display sub-module, during for detecting the first scheduled operation for the first object application icon,
The station location marker for indicating fingerprint recognition region is shown in the display screen of the terminal;
First acquisition submodule, for detecting that the encryption of first object application icon in the display screen for terminal is grasped
When making, the user fingerprints information inputted according to the station location marker in the fingerprint recognition region is obtained.
The terminal of the embodiment of the present invention, the cryptographic operation are included the first object application icon by icon display area
Domain is moved to the slide in fingerprint recognition region.
The terminal of the embodiment of the present invention, first acquisition module 1101 are used to identify module or ultrasound by optical finger print
Ripple fingerprint recognition module obtains user fingerprints information.
The terminal of the embodiment of the present invention, in addition to:
First reminding module, it is used to prompt the first object application to encrypt successful first prompt message for generating.
The terminal of the embodiment of the present invention, detect the encryption behaviour of first object application icon in the display screen for terminal
When making, user fingerprints information is obtained;If the fingerprint number matched with the user fingerprints information in the fingerprint database of terminal be present
According to, then first object application corresponding to first object application icon is encrypted, simple operation, add technology sense with
Interest, improve the usage experience of user.
It should be noted that the terminal is terminal corresponding with the encryption method embodiment of above-mentioned terminal applies, above-mentioned end
All implementations in the encryption method embodiment of application are held suitable for the embodiment of the terminal, can also to reach identical skill
Art effect.
Embodiments of the invention additionally provide a kind of terminal, including:Memory, processor and storage are on a memory and can
The computer program run on a processor, above-mentioned terminal applies are realized when the computer program is by the computing device
Each process in encryption method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.
Embodiments of the invention additionally provide a kind of computer-readable recording medium, on the computer-readable recording medium
Computer program is stored with, the computer program realizes the encryption method embodiment of above-mentioned terminal applies when being executed by processor
In each process, and identical technique effect can be reached, to avoid repeating, repeated no more here.Wherein, described computer
Readable storage medium storing program for executing, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random
Access Memory, abbreviation RAM), magnetic disc or CD etc..
As shown in figure 12, embodiments of the invention additionally provide a kind of terminal, including:
Second acquisition module 1201, for detecting that second of fingerprint identification region in the display screen for terminal is predetermined
During operation, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;
Deciphering module 1202, if for having what is matched with the user fingerprints information in the fingerprint database of the terminal
Finger print data, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to described
Processing is decrypted in second intended application corresponding to two intended application icons.
The terminal of the embodiment of the present invention, second acquisition module include:
Second display sub-module, during for detecting three scheduled operation for the display screen of the terminal, in institute
State the station location marker shown in the display screen of terminal for indicating fingerprint recognition region;
Second acquisition submodule, for detecting that second of fingerprint identification region in the display screen for the terminal is pre-
When operating surely, the application icon encrypted is shown in the display screen of the terminal, and obtain and exist according to the station location marker
The user fingerprints information of the fingerprint recognition region input.
The terminal of the embodiment of the present invention, second acquisition module include:
Display sub-module, for showing that an icon stores frame in the display screen of the terminal, the icon stores frame
Inside include the application icon encrypted.
The terminal of the embodiment of the present invention, the decryption oprerations include the second intended application icon removing the icon
Store the operation of frame.
The terminal of the embodiment of the present invention, in addition to:
Second reminding module, for generating the second prompt message for being used for prompting the second intended application successful decryption.
The terminal of the embodiment of the present invention, detect the second predetermined behaviour of fingerprint identification region in the display screen for terminal
When making, the application icon encrypted is shown in the display screen of the terminal, and obtain user fingerprints information;If the terminal
Fingerprint database in the finger print data that is matched with the user fingerprints information be present, and detect the application drawing for having encrypted
The decryption oprerations of second intended application icon in mark, then the second intended application corresponding to the second intended application icon is carried out
Decryption processing, simple operation, technology sense and interest are added, improve the usage experience of user.
It should be noted that the terminal is terminal corresponding with the decryption method embodiment of above-mentioned terminal applies, above-mentioned end
All implementations in the decryption method embodiment of application are held suitable for the embodiment of the terminal, can also to reach identical skill
Art effect.
Embodiments of the invention additionally provide a kind of terminal, including:Memory, processor and storage are on a memory and can
The computer program run on a processor, above-mentioned terminal applies are realized when the computer program is by the computing device
Each process in decryption method embodiment, and identical technique effect can be reached, to avoid repeating, repeat no more here.
Embodiments of the invention additionally provide a kind of computer-readable recording medium, on the computer-readable recording medium
Computer program is stored with, the computer program realizes the decryption method embodiment of above-mentioned terminal applies when being executed by processor
In each process, and identical technique effect can be reached, to avoid repeating, repeated no more here.Wherein, described computer
Readable storage medium storing program for executing, such as read-only storage (Read-Only Memory, abbreviation ROM), random access memory (Random
Access Memory, abbreviation RAM), magnetic disc or CD etc..
As shown in figure 13, embodiments of the invention additionally provide a kind of terminal, and the terminal 1300 shown in Figure 13 includes:At least
One processor 1301, memory 1302, at least one network interface 1304 and other users interface 1303.In terminal 1300
Each component is coupled by bus system 1305.It is understood that bus system 1305 is used to realize between these components
Connection communication.Bus system 1305 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal are total
Line.But for the sake of clear explanation, various buses are all designated as bus system 1305 in fig. 13.
Wherein, user interface 1303 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 1302 in the embodiment of the present invention can be volatile memory or non-volatile memories
Device, or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage
(Read-Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), erasable programmable are only
Read memory (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM,
) or flash memory EEPROM.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used
Make External Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static random-access
Memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random-access
Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data
Rate SDRAM, DDRSDRAM), it is enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronous
Connect dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory
(Direct Rambus RAM, DRRAM).The memory 1302 of system and method described herein be intended to including but not limited to this
A little and any other suitable type memory.
In some embodiments, memory 1302 stores following element, can perform module or data structure, or
Their subset of person, or their superset:Operating system 13021 and application program 13022.
Wherein, operating system 13021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., it is used for
Realize various basic businesses and the hardware based task of processing.Application program 13022, include various application programs, such as matchmaker
Body player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that the present invention is implemented
The program of example method may be embodied in application program 13022.
In one embodiment of this invention, by calling program or the instruction of the storage of memory 1302, can be specifically
The program stored in application program 13022 or instruction, computer program realize following steps when being performed by processor 1301:
When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained
Breath;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described
First object application is encrypted corresponding to first object application icon.
Optionally, following steps are realized when computer program is performed by processor 1301:
When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal
Show the station location marker for indicating fingerprint recognition region;
When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain according to institute's rheme
Put user fingerprints information of the mark in fingerprint recognition region input.
Optionally, the cryptographic operation includes the first object application icon being moved to fingerprint by icon display area domain
The slide of identification region.
Optionally, following steps are realized when computer program is performed by processor 1301:
Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.
Optionally, following steps are realized when computer program is performed by processor 1301:
Generate for prompting the first object application to encrypt successful first prompt message.
In one embodiment of this invention, by calling program or the instruction of the storage of memory 1302, can be specifically
The program stored in application program 13022 or instruction, computer program realize following steps when being performed by processor 1301:
When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal
The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect
Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon
The second intended application processing is decrypted.
Optionally, following steps are realized when computer program is performed by processor 1301:
When detecting three scheduled operation for the display screen of the terminal, show in the display screen of the terminal
Show the station location marker for indicating fingerprint recognition region;
When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the terminal
Display screen in show the application icon encrypted, and obtain and inputted according to the station location marker in the fingerprint recognition region
User fingerprints information.
Optionally, following steps are realized when computer program is performed by processor 1301:
Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes what is encrypted
Application icon.
Optionally, the decryption oprerations include the behaviour for removing the icon and store frame the second intended application icon
Make.
Optionally, following steps are realized when computer program is performed by processor 1301:
Generate the second prompt message for prompting the second intended application successful decryption.
The terminal of the present invention such as can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital
Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 1300 can realize each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating
State.
The method that the embodiments of the present invention disclose can apply in processor 1301, or real by processor 1301
It is existing.Processor 1301 is probably a kind of IC chip, has the disposal ability of signal.In implementation process, the above method
Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 1301 or software form.Above-mentioned
Processor 1301 can be general processor, digital signal processor (Digital Signal Processor, DSP), special
Integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) either other PLDs, discrete gate or transistor logic,
Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor
And software module combination performs completion.Software module can be located at random access memory, flash memory, read-only storage, may be programmed read-only
In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at
Memory 1302, processor 1301 read the information in memory 1302, with reference to the step of its hardware completion above method.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its
Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized herein by performing the module (such as process, function etc.) of function described herein for software
Described technology.Software code is storable in memory and passes through computing device.Memory can within a processor or
Realized outside processor.
As shown in figure 14, embodiments of the invention additionally provide a kind of terminal, and the terminal 1400 shown in Figure 14 includes radio frequency
(Radio Frequency, RF) circuit 1410, memory 1420, input block 1430, display unit 1440, processor 1460,
Voicefrequency circuit 1470, WiFi (Wireless Fidelity) modules 1480 and power supply 1490.
Wherein, input block 1430 can be used for the numeral or character information for receiving user's input, and generation and terminal
The signal input that 1400 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 1430
Contact panel 1431 can be included.Contact panel 1431, also referred to as touch-screen, collect touch behaviour of the user on or near it
Make (for example user uses the operations of any suitable object or annex on contact panel 1431 such as finger, stylus), and according to
Formula set in advance drives corresponding attachment means.Optionally, contact panel 1431 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinates, then give the processor 1460, and the order sent of reception processing device 1460 and can be performed.Furthermore, it is possible to adopt
Contact panel 1431 is realized with polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1431, input block 1430 can also include other input equipments 1432, and other input equipments 1432 can include but is not limited to
One kind or more in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Kind.
Wherein, display unit 1440 can be used for display by the information of user's input or be supplied to the information and terminal of user
1400 various menu interfaces.Display unit 1440 may include display panel 1441, optionally, can use LCD or organic hairs
The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 1441.
It should be noted that contact panel 1431 can cover display panel 1441, touch display screen is formed, when the touch display screen
After detecting the touch operation on or near it, processor 1460 is sent to determine the type of touch event, is followed by subsequent processing
Device 1460 provides corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And arrangement mode of the conventional control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 1460 is the control centre of terminal 1400, utilizes each of various interfaces and connection whole mobile phone
Individual part, by running or performing the software program and/or module that are stored in first memory 1421, and call and be stored in
Data in second memory 1422, the various functions and processing data of terminal 1400 are performed, it is whole so as to be carried out to terminal 1400
Body monitors.Optionally, processor 1460 may include one or more processing units.
In one embodiment of this invention, by calling the software program and/or mould that store in the first memory 1421
Data in block and/or the second memory 1422, computer program realize following steps when being performed by processor 1460:
When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints letter is obtained
Breath;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described
First object application is encrypted corresponding to first object application icon.
Optionally, following steps are realized when computer program is performed by processor 1460:
When detecting the first scheduled operation for the first object application icon, in the display screen of the terminal
Show the station location marker for indicating fingerprint recognition region;
When detecting the cryptographic operation of first object application icon in the display screen for terminal, obtain according to institute's rheme
Put user fingerprints information of the mark in fingerprint recognition region input.
Optionally, the cryptographic operation includes the first object application icon being moved to fingerprint by icon display area domain
The slide of identification region.
Optionally, following steps are realized when computer program is performed by processor 1460:
Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.
Optionally, following steps are realized when computer program is performed by processor 1460:
Generate for prompting the first object application to encrypt successful first prompt message.
In one embodiment of this invention, by calling the software program and/or mould that store in the first memory 1421
Data in block and/or the second memory 1422, computer program realize following steps when being performed by processor 1460:
When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the aobvious of the terminal
The application icon encrypted is shown in display screen curtain, and obtains user fingerprints information;
If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect
Decryption oprerations for the second intended application icon in the application icon encrypted, then it is corresponding to the second intended application icon
The second intended application processing is decrypted.
Optionally, following steps are realized when computer program is performed by processor 1460:
When detecting three scheduled operation for the display screen of the terminal, show and be used in the terminal screen
Indicate the station location marker in fingerprint recognition region;
When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the terminal
Display screen in show the application icon encrypted, and obtain and inputted according to the station location marker in the fingerprint recognition region
User fingerprints information.
Optionally, following steps are realized when computer program is performed by processor 1460:
Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes what is encrypted
Application icon.
Optionally, the decryption oprerations include the behaviour for removing the icon and store frame the second intended application icon
Make.
Optionally, following steps are realized when computer program is performed by processor 1460:
Generate the second prompt message for prompting the second intended application successful decryption.
The terminal of the present invention such as can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital
Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 1400 can realize each process that terminal is realized in previous embodiment, no longer superfluous here to avoid repeating
State.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, it can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, application-specific and design constraint depending on technical scheme.Professional and technical personnel
Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, others can be passed through
Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only
A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention.
And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is controlled to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
God any modification, equivalent substitution and improvements made etc., should be included in the scope of the protection with principle.
Claims (24)
- A kind of 1. encryption method of terminal applies, it is characterised in that including:When detecting the cryptographic operation of first object application icon in the display screen for terminal, user fingerprints information is obtained;If the finger print data matched with the user fingerprints information in the fingerprint database of the terminal be present, to described first First object application is encrypted corresponding to intended application icon.
- 2. the encryption method of terminal applies according to claim 1, it is characterised in that described to detect for the aobvious of terminal In display screen curtain during the cryptographic operation of first object application icon, obtain user fingerprints information the step of, including:When detecting the first scheduled operation for the first object application icon, shown in the display screen of the terminal For indicating the station location marker in fingerprint recognition region;When detecting the cryptographic operation of first object application icon in the display screen for the terminal, obtain according to institute's rheme Put user fingerprints information of the mark in fingerprint recognition region input.
- 3. the encryption method of terminal applies according to claim 1, it is characterised in that the cryptographic operation is included by described in First object application icon is moved to the slide in fingerprint recognition region by icon display area domain.
- 4. the encryption method of terminal applies according to claim 1, it is characterised in that the acquisition user fingerprints information Step, including:Identify that module or ultrasonic fingerprint identify that module obtains user fingerprints information by optical finger print.
- 5. the encryption method of terminal applies according to claim 1, it is characterised in that if the fingerprint database of the terminal It is middle the finger print data matched with the user fingerprints information to be present, then to first object corresponding to the first object application icon After the step of being encrypted, methods described also includes:Generate for prompting the first object application to encrypt successful first prompt message.
- A kind of 6. decryption method of terminal applies, it is characterised in that including:When detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, in the display screen of the terminal The application icon encrypted is shown in curtain, and obtains user fingerprints information;If the finger print data that is matched with the user fingerprints information in the fingerprint database of the terminal be present, and detect for The decryption oprerations of second intended application icon in the application icon encrypted, then to corresponding to the second intended application icon Processing is decrypted in two intended applications.
- 7. the decryption method of terminal applies according to claim 6, it is characterised in that described to detect for the aobvious of terminal In display screen curtain during the second scheduled operation of fingerprint identification region, the application drawing encrypted is shown in the display screen of the terminal The step of marking, and gathering user fingerprints information, including:When detecting three scheduled operation for the display screen of the terminal, use is shown in the display screen of the terminal Station location marker in instruction fingerprint recognition region;When detecting the second scheduled operation of fingerprint identification region in the display screen for the terminal, in the aobvious of the terminal The application icon encrypted is shown in display screen curtain, and obtains the use inputted according to the station location marker in the fingerprint recognition region Family finger print information.
- 8. the decryption method of terminal applies according to claim 6, it is characterised in that the display screen in the terminal The step of application icon encrypted being shown in curtain, including:Show that an icon stores frame in the display screen of the terminal, the icon storage inframe includes the application encrypted Icon.
- 9. the decryption method of terminal applies according to claim 8, it is characterised in that the decryption oprerations are included by described in Second intended application icon removes the operation of the icon storage frame.
- 10. the decryption method of terminal applies according to claim 6, it is characterised in that described to answer second target After the step of processing is decrypted in the second intended application corresponding to icon, methods described also includes:Generate the second prompt message for prompting the second intended application successful decryption.
- A kind of 11. terminal, it is characterised in that including:First acquisition module, during for detecting the cryptographic operation of first object application icon in the display screen for terminal, Obtain user fingerprints information;Encrypting module, if for the fingerprint number matched with the user fingerprints information in the fingerprint database of the terminal be present According to then first object application corresponding to the first object application icon is encrypted.
- 12. terminal according to claim 11, it is characterised in that first acquisition module includes:First display sub-module, during for detecting the first scheduled operation for the first object application icon, described The station location marker for indicating fingerprint recognition region is shown in the display screen of terminal;First acquisition submodule, for detecting that the encryption of first object application icon in the display screen for the terminal is grasped When making, the user fingerprints information inputted according to the station location marker in the fingerprint recognition region is obtained.
- 13. terminal according to claim 11, it is characterised in that the cryptographic operation is included the first object application Icon is moved to the slide in fingerprint recognition region by icon display area domain.
- 14. terminal according to claim 11, it is characterised in that first acquisition module is used to know by optical finger print Other module or ultrasonic fingerprint identification module obtains user fingerprints information.
- 15. terminal according to claim 11, it is characterised in that also include:First reminding module, it is used to prompt the first object application to encrypt successful first prompt message for generating.
- A kind of 16. terminal, it is characterised in that including:Memory, processor and storage can transport on a memory and on a processor Capable computer program, the computer program are realized as any one of claim 1 to 5 during the computing device The step of encryption method of terminal applies.
- 17. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the encryption of the terminal applies as any one of claim 1 to 5 is realized when the computer program is executed by processor The step of method.
- A kind of 18. terminal, it is characterised in that including:Second acquisition module, during for detecting the second scheduled operation of fingerprint identification region in the display screen for terminal, The application icon encrypted is shown in the display screen of the terminal, and obtains user fingerprints information;Deciphering module, if for the fingerprint number matched with the user fingerprints information in the fingerprint database of the terminal be present According to, and detect the decryption oprerations for the second intended application icon in the application icon encrypted, then to second target Processing is decrypted in the second intended application corresponding to application icon.
- 19. terminal according to claim 18, it is characterised in that second acquisition module includes:Second display sub-module, during for detecting three scheduled operation for the display screen of the terminal, at the end The station location marker for indicating fingerprint recognition region is shown in the display screen at end;Second acquisition submodule, the second predetermined behaviour for detecting fingerprint identification region in the display screen for the terminal When making, the application icon encrypted is shown in the display screen of the terminal, and obtain according to the station location marker described The user fingerprints information of fingerprint recognition region input.
- 20. terminal according to claim 18, it is characterised in that second acquisition module includes:Display sub-module, for showing that an icon stores frame in the display screen of the terminal, the icon stores inframe bag Contain the application icon encrypted.
- 21. terminal according to claim 20, it is characterised in that the decryption oprerations are included second intended application Icon removes the operation of the icon storage frame.
- 22. terminal according to claim 18, it is characterised in that also include:Second reminding module, for generating the second prompt message for being used for prompting the second intended application successful decryption.
- A kind of 23. terminal, it is characterised in that including:Memory, processor and storage can transport on a memory and on a processor Capable computer program, the computer program are realized such as any one of claim 6 to 10 institute during the computing device The step of stating the decryption method of terminal applies.
- 24. a kind of computer-readable recording medium, it is characterised in that be stored with computer on the computer-readable recording medium Program, the solution of the terminal applies as any one of claim 6 to 10 is realized when the computer program is executed by processor The step of decryption method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710762790.0A CN107506111A (en) | 2017-08-30 | 2017-08-30 | The encryption and decryption method and terminal of a kind of terminal applies |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710762790.0A CN107506111A (en) | 2017-08-30 | 2017-08-30 | The encryption and decryption method and terminal of a kind of terminal applies |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107506111A true CN107506111A (en) | 2017-12-22 |
Family
ID=60694103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710762790.0A Pending CN107506111A (en) | 2017-08-30 | 2017-08-30 | The encryption and decryption method and terminal of a kind of terminal applies |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107506111A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108334789A (en) * | 2018-01-16 | 2018-07-27 | 维沃移动通信有限公司 | A kind of method and terminal of data transmission |
CN108540645A (en) * | 2018-03-12 | 2018-09-14 | 维沃移动通信有限公司 | A kind of operating method and mobile terminal of mobile terminal |
CN108664177A (en) * | 2017-03-29 | 2018-10-16 | 上海耕岩智能科技有限公司 | A kind of method and apparatus that application is opened based on fingerprint recognition |
CN109117619A (en) * | 2018-08-15 | 2019-01-01 | Oppo广东移动通信有限公司 | Unlocked by fingerprint method and Related product |
CN109191138A (en) * | 2018-09-24 | 2019-01-11 | 刘兴丹 | A kind of method, apparatus that screen fingerprint recognition is combined with icon |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN110110514A (en) * | 2019-05-13 | 2019-08-09 | Oppo广东移动通信有限公司 | Using encryption method and relevant apparatus |
CN111240699A (en) * | 2020-01-22 | 2020-06-05 | 上海商汤临港智能科技有限公司 | Software product processing method and device and source code interpreter |
CN111259357A (en) * | 2018-11-30 | 2020-06-09 | 北京小米移动软件有限公司 | Fingerprint encryption method and device and storage medium |
CN112149064A (en) * | 2019-06-28 | 2020-12-29 | Oppo广东移动通信有限公司 | Encryption and decryption method, electronic device and non-volatile computer-readable storage medium |
CN112699388A (en) * | 2020-12-28 | 2021-04-23 | 维沃移动通信有限公司 | Encryption method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
CN104915584A (en) * | 2015-06-03 | 2015-09-16 | 深圳市沃特沃德科技有限公司 | Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics |
CN105205374A (en) * | 2015-08-27 | 2015-12-30 | 广东欧珀移动通信有限公司 | Application program encrypting method and user terminal |
CN105574387A (en) * | 2015-06-16 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information security processing method and user terminal |
-
2017
- 2017-08-30 CN CN201710762790.0A patent/CN107506111A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104732121A (en) * | 2015-03-24 | 2015-06-24 | 广东欧珀移动通信有限公司 | Encryption setting method, decryption setting method and corresponding device of application program |
CN104915584A (en) * | 2015-06-03 | 2015-09-16 | 深圳市沃特沃德科技有限公司 | Intelligent mobile terminal random encryption and decryption system based on fingerprint characteristics |
CN105574387A (en) * | 2015-06-16 | 2016-05-11 | 宇龙计算机通信科技(深圳)有限公司 | Information security processing method and user terminal |
CN105205374A (en) * | 2015-08-27 | 2015-12-30 | 广东欧珀移动通信有限公司 | Application program encrypting method and user terminal |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108664177A (en) * | 2017-03-29 | 2018-10-16 | 上海耕岩智能科技有限公司 | A kind of method and apparatus that application is opened based on fingerprint recognition |
CN108334789A (en) * | 2018-01-16 | 2018-07-27 | 维沃移动通信有限公司 | A kind of method and terminal of data transmission |
CN108540645A (en) * | 2018-03-12 | 2018-09-14 | 维沃移动通信有限公司 | A kind of operating method and mobile terminal of mobile terminal |
CN109117619A (en) * | 2018-08-15 | 2019-01-01 | Oppo广东移动通信有限公司 | Unlocked by fingerprint method and Related product |
CN109117619B (en) * | 2018-08-15 | 2022-01-28 | Oppo广东移动通信有限公司 | Fingerprint unlocking method and related product |
CN109191138B (en) * | 2018-09-24 | 2021-09-17 | 广东智芯光电科技有限公司 | Method and device for combining screen fingerprint identification and icon |
CN109191138A (en) * | 2018-09-24 | 2019-01-11 | 刘兴丹 | A kind of method, apparatus that screen fingerprint recognition is combined with icon |
CN111259357A (en) * | 2018-11-30 | 2020-06-09 | 北京小米移动软件有限公司 | Fingerprint encryption method and device and storage medium |
CN109886000A (en) * | 2019-02-01 | 2019-06-14 | 维沃移动通信有限公司 | A kind of image encryption method and mobile terminal |
CN109886000B (en) * | 2019-02-01 | 2024-03-01 | 维沃移动通信有限公司 | Image encryption method and mobile terminal |
CN110110514A (en) * | 2019-05-13 | 2019-08-09 | Oppo广东移动通信有限公司 | Using encryption method and relevant apparatus |
CN112149064A (en) * | 2019-06-28 | 2020-12-29 | Oppo广东移动通信有限公司 | Encryption and decryption method, electronic device and non-volatile computer-readable storage medium |
CN111240699A (en) * | 2020-01-22 | 2020-06-05 | 上海商汤临港智能科技有限公司 | Software product processing method and device and source code interpreter |
CN112699388A (en) * | 2020-12-28 | 2021-04-23 | 维沃移动通信有限公司 | Encryption method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN104834449B (en) | The icon management method and device of mobile terminal | |
CN105354466B (en) | A kind of fingerprint identification method and mobile terminal | |
CN106372470B (en) | A kind of method and mobile terminal for reminding input password | |
CN107678644A (en) | A kind of image processing method and mobile terminal | |
CN105867830B (en) | A kind of processing method and mobile terminal based on fingerprint recognition | |
CN105827816B (en) | A kind of the split screen method and mobile terminal of terminal screen | |
CN106484303A (en) | A kind of method preventing maloperation and electronic equipment | |
CN107390991B (en) | A kind of processing method and mobile terminal of screenshot | |
CN106250757B (en) | A kind of control method and mobile terminal of application program | |
CN107665434A (en) | A kind of method of payment and mobile terminal | |
CN107644170A (en) | A kind of image processing method and mobile terminal | |
CN107404577A (en) | A kind of image processing method, mobile terminal and computer-readable recording medium | |
CN106250026A (en) | The startup method of the application program of a kind of mobile terminal and mobile terminal | |
CN107632870A (en) | The startup method and terminal of a kind of application | |
CN106203061A (en) | The encryption method of a kind of application program and mobile terminal | |
CN106991311A (en) | A kind of information processing method and mobile terminal | |
CN106527802A (en) | Detection method and mobile terminal | |
CN106484301A (en) | A kind of method of hiden application and terminal | |
CN107103224A (en) | A kind of unlocking method and mobile terminal | |
CN106775378A (en) | A kind of method and mobile terminal for determining input method candidate word | |
CN107506198A (en) | The display methods and mobile terminal of a kind of mobile terminal | |
CN106803031A (en) | A kind of information protecting method and mobile terminal | |
CN106709320A (en) | Identity authentication method and mobile terminal | |
CN106778344B (en) | A kind of data permission control method and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171222 |
|
RJ01 | Rejection of invention patent application after publication |