CN107592409A - Application control method and device - Google Patents

Application control method and device Download PDF

Info

Publication number
CN107592409A
CN107592409A CN201710733207.3A CN201710733207A CN107592409A CN 107592409 A CN107592409 A CN 107592409A CN 201710733207 A CN201710733207 A CN 201710733207A CN 107592409 A CN107592409 A CN 107592409A
Authority
CN
China
Prior art keywords
destination application
password
mentioned
local file
typing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710733207.3A
Other languages
Chinese (zh)
Inventor
郑泽华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710733207.3A priority Critical patent/CN107592409A/en
Publication of CN107592409A publication Critical patent/CN107592409A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of application control method and device.Method includes:Acquisition for mobile terminal is directed to the encrypted instruction of destination application, and the encrypted instruction includes preset password;The destination application is encrypted according to the preset password;The local file of the destination application is determined, the local file is encrypted according to the preset password, the local file is used for the local data and/or temporary file for storing the destination application.The embodiment of the present invention is advantageous to improve the safety and reliability that application program for mobile terminal uses.

Description

Application control method and device
Technical field
The present invention relates to technical field of mobile terminals, and in particular to application control method and device.
Background technology
With the development of smart mobile phone, increasing application program is installed in the smart mobile phone of user, user's Clothing, food, lodging and transportion -- basic necessities of life are inseparable with smart mobile phone, and mobile payment can be realized by smart mobile phone, game is played, listens music, reads Etc..
In the prior art, local data and temporary file typically preserve caused by the application program in Android system mobile phone In local file, the safety in utilization of application program can be ensured by the way that application program is encrypted, but can still pass through The local file of application program gets the related data of application program.
The content of the invention
The embodiments of the invention provide application control method and device, can improve application program for mobile terminal Safety in utilization and reliability.
In a first aspect, the embodiment of the present invention provides a kind of application control method, including:
The encrypted instruction for destination application is obtained, above-mentioned encrypted instruction includes preset password;
Above-mentioned destination application is encrypted according to above-mentioned preset password;
The local file of above-mentioned destination application is determined, above-mentioned local file is added according to above-mentioned preset password Close, above-mentioned local file is used for the local data and/or temporary file for storing above-mentioned destination application.
Second aspect, the embodiments of the invention provide a kind of mobile terminal, the mobile terminal, which has, realizes that the above method is set The function of the behavior of mobile terminal in meter.Above-mentioned function can be realized by hardware, can also be performed by hardware corresponding soft Part is realized.Above-mentioned hardware or software include one or more modules corresponding with above-mentioned function phase.The mobile terminal includes:
Acquiring unit, for obtaining the encrypted instruction for destination application, above-mentioned encrypted instruction includes default close Code;
First ciphering unit, for above-mentioned destination application to be encrypted according to above-mentioned preset password;
Second ciphering unit, for determining the local file of above-mentioned destination application, according to above-mentioned preset password to upper State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text Part.
The third aspect, the embodiments of the invention provide a kind of mobile terminal, including:Processor, memory and one or Multiple programs, said one or multiple programs are stored in above-mentioned memory, and are configured to be held by above-mentioned processor OK, said procedure includes being used to perform such as the instruction of the step in first aspect either method of the embodiment of the present invention.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, wherein, above computer can Reading storage medium stores the computer program for electronic data interchange, wherein, above computer program causes computer to perform Such as the part or all of step described in first aspect either method of the embodiment of the present invention.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first, Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use Safety and reliability.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will to embodiment or The required accompanying drawing used is briefly described in description of the prior art, it should be apparent that, drawings in the following description are only Some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, also Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of application control method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another application control method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 4 a are a kind of structural representations of mobile terminal provided in an embodiment of the present invention;
Fig. 4 b are the structural representations of the first ciphering unit of the mobile terminal described by Fig. 4 a provided in an embodiment of the present invention Figure;
Fig. 4 c are the structural representations of another mobile terminal provided in an embodiment of the present invention;
Fig. 4 d are the structural representations of another mobile terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only It is part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are to be used for area Not different objects, rather than for describing particular order.In addition, term " comprising " and " having " and their any deformations, meaning Figure is to cover non-exclusive include.Such as contain process, method, system, product or the equipment of series of steps or unit The step of being not limited to list or unit, but alternatively also including the step of not listing or unit, or alternatively also Including for other intrinsic steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments In at least one embodiment of the present invention.The phrase, which occurs, in each position in the description might not each mean phase Same embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art are explicitly Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal involved by the embodiment of the present invention can have the hand-held of radio communication function to set including various Standby, mobile unit, wearable device, computing device or other processing equipments for being connected to radio modem, and it is various The user equipment (User Equipment, UE) of form, mobile station (Mobile Station, MS), terminal device (terminal device) etc..For convenience of description, apparatus mentioned above is referred to as mobile terminal.Below to of the invention real Example is applied to describe in detail.
Referring to Fig. 1, Fig. 1 is the embodiments of the invention provide a kind of schematic flow sheet of application control method, should For mobile terminal, as illustrated, application control method includes:
S101, acquisition for mobile terminal are directed to the encrypted instruction of destination application, and above-mentioned encrypted instruction includes default close Code.
Wherein, destination application may include but be not limited only to:Game class application (king's honor, World of Warcraft etc.), Social class application (wechat, QQ, microblogging etc.), office class application (word, PPT, excel etc.), (love is strange for video class application Skill, Tengxun's video etc.), audio class application (Netease's cloud music, QQ music etc.), pay class apply (Alipay, apple branch Pay etc.) etc..
Wherein, encrypted instruction includes preset password, and preset password includes following at least one:Numerical ciphers, fingerprint are close Code, face password, iris password.For example, preset password can be numerical ciphers or the good finger-print cipher of numerical ciphers Combination.
Above-mentioned destination application is encrypted according to above-mentioned preset password for S102, above-mentioned mobile terminal.
Wherein, mobile terminal is after the encrypted instruction for destination application is obtained, according in above-mentioned encrypted instruction Destination application is encrypted preset password.
S103, above-mentioned mobile terminal determine the local file of above-mentioned destination application, according to above-mentioned preset password to upper State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text Part.
Wherein, file management is a software systems fail-safe software for operating in Android platform, can identify text, music, The basic document such as video, PDF, basic copy can be carried out to mobile phone file and file by file management, paste, delete Remove, the operation such as mobile.
Wherein, local data caused by each application program and cache file are all stored in corresponding file, this article Part folder is independently of other files, while this document folder is located in file management, can file management the first level or Other levels, position can be fixed.Such as QQ application programs, if having download pictures or caching when user is using QQ Word file, it can correspond to and be stored in the QQ files in file management, can be obtained by checking in file management QQ files Take local data caused by QQ application programs.
Wherein, if the local file of application program is located at the first level of file management, mobile terminal is directed to detecting During the selection operation of file management virtual functional key, you can show the local file of each application program association, that is, entering After file management, it can be seen that the local file of multiple application program associations.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first, Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use Safety and reliability.
It is above-mentioned that above-mentioned destination application is encrypted according to above-mentioned preset password in a possible example, bag Include:The predetermined registration operation for identifying above-mentioned destination application is cryptographic operation;Establish the predetermined registration operation of above-mentioned destination application with Corresponding relation between above-mentioned preset password.
Wherein, when destination application being encrypted, the predetermined registration operation of destination application can be identified, is established pre- If operation and the corresponding relation of preset password support, i.e., when detecting the cryptographic operation of performance objective application program, it is necessary to enter Predetermined registration operation can be just performed after row decryption.
It can be seen that in this example, destination application is encrypted, actually the default behaviour to destination application It is encrypted, it is necessary to just can perform predetermined registration operation after being first decrypted, is advantageous to improve the safety that uses of destination application Property.
In a possible example, above-mentioned predetermined registration operation includes following at least one:Start-up operation, for above-mentioned mesh Mark operation, the deletion action at the default interface of application program.
Wherein, for destination application default interface operation, can be using during intended application, The selection operation of some virtual push buttons in interface is preset to destination application, for example, in the process applied using wechat In, the operation for circle of friends function interface is predetermined registration operation, if circle of friends virtual push button is clicked on, due to having been carried out Encryption is, it is necessary to can just enter circle of friends after decrypting.
It can be seen that in this example, the predetermined registration operation of destination application includes the start-up operation of destination application, for The operation at the default interface of destination application, the deletion action of destination application, being advantageous to raising destination application makes Security.
In a possible example, the above method also includes:The selection operation for above-mentioned local file is detected, Show the password typing guidance information of above-mentioned local file;The first typing encrypted message of above-mentioned local file is obtained, and is being examined When measuring above-mentioned first typing password with the success of above-mentioned preset password match, above-mentioned local file is opened.
Wherein, when detecting the selection operation for the local file of destination application, can show on touching display screen Show the password typing guidance information of local file, prompt user to input the first typing password.First typing password and preset password Unanimously, it can be at least one of numerical ciphers, finger-print cipher, face password, iris password.
Wherein, when preset password is numerical ciphers, corresponding password typing guidance information can be display Password Input Frame;When preset password is finger-print cipher, corresponding password typing guidance information can be the text of display " asking typing finger-print cipher " Word;When preset password is face password or iris password, corresponding password typing guidance information can be display face or iris Scan box.User's i.e. can be known after password typing guidance information is seen can just check mesh after encrypted message corresponding to typing Mark the local file of application program association.
Wherein, the first typing password of above-mentioned local file is obtained, and is detecting above-mentioned first typing password with presetting During password match success, you can open the local file of destination application, check local data caused by destination application And cache file.
It can be seen that in this example, when detecting the selection operation for local file, it is necessary to the typing of user's typing first Password, and the local file of destination application can be just opened in the first typing password and preset password match success, Be advantageous to improve the used security of intended application.
In a possible example, the above method also includes:The deletion action for institute's local file is detected, is shown Show the password typing guidance information of above-mentioned local file;The second typing encrypted message of above-mentioned local file is obtained, and is being detected During to above-mentioned second typing encrypted message and the success of above-mentioned preset password match, above-mentioned local file is deleted.
It can be seen that in this example, when detecting the deletion action for local file, it is necessary to the typing of user's typing second Password, and the local file of destination application can be just opened in the second typing password and preset password match success, Be advantageous to improve the used security of intended application.
In a possible example, the above method also includes:Detect that the startup for above-mentioned destination application is grasped Make, it is cryptographic operation to determine above-mentioned start-up operation;Obtain the 3rd typing password of above-mentioned start-up operation;Detect the above-mentioned 3rd Typing password and the success of above-mentioned preset password match, start above-mentioned destination application, and to the upper of above-mentioned destination application Local file is stated synchronously to decrypt.
Wherein, when starting destination application, because start-up operation is predetermined registration operation, it is therefore desirable to first it is decrypted, After successful decryption, destination application can be used in user, meanwhile, mobile terminal also can be to destination application in file The local file associated in management is synchronously decrypted.
Wherein, it can be seen that, if user will check the local file of destination application association in file management, need Typing proper password is wanted or by the way that destination application is decrypted, in this way, can just check destination application association Local file.
It can be seen that in this example, when detecting the start-up operation for destination application, because start-up operation is pre- If operation, so the typing password of user's typing the 3rd is needed, and in the 3rd typing password and preset password match success Destination application can be started, after destination application decryption, its local file associated is also synchronously decrypted, in this way, can protect The safety and reliability that card destination application uses.
In a possible example, the above method also includes:Detect that the deletion for above-mentioned destination application is grasped Make, it is cryptographic operation to determine above-mentioned deletion action;Obtain the 4th typing password of above-mentioned deletion action;Detect the above-mentioned 4th Typing password and the success of above-mentioned preset password match, delete above-mentioned destination application, and delete above-mentioned destination application Above-mentioned local file.
Wherein, in user's delete target application program, mobile terminal can synchronously be decrypted to the local file that it is associated, In this way, user can select to delete data in the local file completely or number in the local file is deleted in part According to, in order to avoid cause the missing of data.Or mobile terminal can directly delete target application local file, specific embodiment party Formula can be set by user.
It can be seen that in this example, when detecting the deletion action for local file, it is necessary to the typing of user's typing the 4th Password, and just can be with delete target application program, in intended application in the 4th typing password and preset password match success After program is deleted, mobile terminal can synchronously decrypt the local file of destination application or directly delete this document folder, have Beneficial to the safety and reliability for ensureing destination application local data.
In a possible example, above-mentioned when detecting the selection operation for above-mentioned local file, display is above-mentioned The password typing guidance information of local file, including:The selection operation for above-mentioned local file is detected, judges above-mentioned Whether destination application corresponding to ground file is encryption destination application;Detecting that above-mentioned destination application is to add During close application program, the preset password of above-mentioned destination application is obtained, and above-mentioned target is shown on above-mentioned touching display screen The password typing guidance information of the local file of application program.
Wherein mobile terminal can first judge when detecting the selection operation for the local file of destination application Whether destination application is encryption application program, when destination application is encrypts application program, just in touching display screen Upper display password typing guidance information, for prompting user to need typing the first typing password just to open local file, in mesh When mark application program is not encryption application program, then local file can be directly opened.
It can be seen that in this example, when detecting the selection operation for the local file of destination application, first judge Whether destination application is encryption application program, when detecting destination application to encrypt application program, is obtained above-mentioned The preset password of destination application and on touching display screen the password typing of the local file of display target application program draw Lead information, be advantageous to be matched the first typing password and preset password after the first typing password is got, matching into Local file is opened after work(.
Consistent with the abovely, referring to Fig. 2, being another application control method provided in an embodiment of the present invention Schematic flow sheet.Application control method described in the present embodiment, comprises the following steps:
201st, acquisition for mobile terminal is directed to the encrypted instruction of destination application, and above-mentioned encrypted instruction includes preset password.
202nd, above-mentioned destination application is encrypted according to above-mentioned preset password for above-mentioned mobile terminal.
Wherein, above-mentioned steps 301- steps 302 refer to the step 201- of the application program method for down loading described by Fig. 2 Step 202.
203rd, above-mentioned mobile terminal determines the local file of above-mentioned destination application, according to above-mentioned preset password to upper State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text Part.
204th, above-mentioned mobile terminal detects the selection operation for above-mentioned local file, shows above-mentioned local file Password typing guidance information.
Wherein, when detecting the selection operation for the local file of destination application, can show on touching display screen Show the password typing guidance information of local file, prompt user to input the first typing password.First typing password and preset password Unanimously, it can be at least one of numerical ciphers, finger-print cipher, face password, iris password.
Wherein, when preset password is numerical ciphers, corresponding password typing guidance information can be display Password Input Frame;When preset password is finger-print cipher, corresponding password typing guidance information can be the text of display " asking typing finger-print cipher " Word;When preset password is face password or iris password, corresponding password typing guidance information can be display face or iris Scan box.User's i.e. can be known after password typing guidance information is seen can just check mesh after encrypted message corresponding to typing Mark the local file of application program association.
205th, the first typing password of the above-mentioned local file of above-mentioned acquisition for mobile terminal, and detecting above-mentioned first record When entering password with the success of above-mentioned preset password match, above-mentioned local file is opened.
Wherein, the first typing password of above-mentioned local file is obtained, and is detecting above-mentioned first typing password with presetting During password match success, you can open the local file of destination application, check local data caused by destination application And cache file.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first, Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use Safety and reliability.
Fig. 3 is a kind of mobile terminal provided in an embodiment of the present invention, including:Processor, memory and one or more Program, said one or multiple programs are stored in above-mentioned memory, and are configured to by above-mentioned computing device, on Stating program includes being used for the instruction for performing following steps;
The encrypted instruction for destination application is obtained, above-mentioned encrypted instruction includes preset password;
Above-mentioned destination application is encrypted according to above-mentioned preset password;
The local file of above-mentioned destination application is determined, above-mentioned local file is added according to above-mentioned preset password Close, above-mentioned local file is used for the local data and/or temporary file for storing above-mentioned destination application.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first, Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use Safety and reliability.
In a possible example, above-mentioned destination application is encrypted according to above-mentioned preset password above-mentioned Aspect, the instruction in said procedure are specifically used for:The predetermined registration operation for identifying above-mentioned destination application is cryptographic operation;Establish Corresponding relation between the predetermined registration operation of above-mentioned destination application and above-mentioned preset password.
In a possible example, above-mentioned predetermined registration operation includes following at least one:Start-up operation, for above-mentioned mesh Mark operation, the deletion action at the default interface of application program.
In a possible example, the instruction in said procedure is additionally operable to detect the choosing for above-mentioned local file Extract operation, show the password typing guidance information of above-mentioned local file;The first typing password of above-mentioned local file is obtained, and When detecting above-mentioned first typing password with the success of above-mentioned preset password match, above-mentioned local file is opened.
In a possible example, the instruction in said procedure is additionally operable to detecting deleting for institute's local file During division operation, the password typing guidance information of above-mentioned local file is shown;Obtain the second typing message in cipher of above-mentioned local file Breath, and when detecting above-mentioned second typing encrypted message with the success of above-mentioned preset password match, delete above-mentioned local file.
In a possible example, the instruction in said procedure is additionally operable to detect for above-mentioned destination application Start-up operation, it is cryptographic operation to determine above-mentioned start-up operation;Obtain the 3rd typing password of above-mentioned start-up operation;Detect Above-mentioned 3rd typing password and the success of above-mentioned preset password match, start above-mentioned destination application, and to above-mentioned intended application The above-mentioned local file of program is synchronously decrypted.
In a possible example, the instruction in said procedure is additionally operable to detect for above-mentioned destination application Deletion action, it is cryptographic operation to determine above-mentioned deletion action;Obtain the 4th typing password of above-mentioned deletion action;Detect Above-mentioned 4th typing password and the success of above-mentioned preset password match, delete above-mentioned destination application, and delete above-mentioned target and answer With the above-mentioned local file of program.
It is above-mentioned that mainly the scheme of the embodiment of the present invention is described from the angle of method side implementation procedure.It can manage Solution, for mobile terminal in order to realize above-mentioned function, it comprises perform the corresponding hardware configuration of each function and/or software Module.Those skilled in the art should be readily appreciated that, with reference to the list of each example of the embodiments described herein description Member and algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function is actually Performed in a manner of hardware or computer software driving hardware, application-specific and design constraint depending on technical scheme Condition.Professional and technical personnel can specifically realize described function to each using distinct methods, but this Realize it is not considered that beyond the scope of this invention.
Fig. 4 a are referred to, are a kind of example structure schematic diagram of mobile terminal provided in an embodiment of the present invention.This implementation Mobile terminal described in example, including:Acquiring unit 401, the first ciphering unit 402 and the second ciphering unit 403, specifically It is as follows:
Acquiring unit 401, for obtaining the encrypted instruction for destination application, above-mentioned encrypted instruction includes default Password;
First ciphering unit 402, for above-mentioned destination application to be encrypted according to above-mentioned preset password;
Second ciphering unit 403, for determining the local file of above-mentioned destination application, according to above-mentioned preset password Above-mentioned local file is encrypted, above-mentioned local file is used to store the local data of above-mentioned destination application and/or faced When file.
Alternatively, as shown in Figure 4 b, above-mentioned first ciphering unit 402 includes:Mark module 4021 and establish module 4022, it is specific as follows:
Mark module 4021, the predetermined registration operation for identifying above-mentioned destination application are cryptographic operation;
Module 4022 is established, for establishing between the predetermined registration operation of above-mentioned destination application and above-mentioned preset password Corresponding relation.
Alternatively, as illustrated in fig. 4 c, it is a kind of Fig. 4 a modification structures, Fig. 4 c are compared with Fig. 4 a, described by Fig. 4 a Mobile terminal may also include:First display unit 404, acquiring unit 405, it is specific as follows:
First display unit 404, the selection operation of above-mentioned local file is directed to for detecting, shows above-mentioned local text The password typing guidance information of part;
First acquisition unit 405, for obtaining the first typing password of above-mentioned local file, and detecting above-mentioned When one typing password is with the success of above-mentioned preset password match, above-mentioned local file is opened.
Alternatively, as shown in figure 4d, it is a kind of Fig. 4 a modification structures, Fig. 4 d are compared with Fig. 4 a, described by Fig. 4 a Mobile terminal may also include:Second display unit 406, second acquisition unit 407, it is specific as follows:
Second display unit 406, the deletion action of institute's local file is directed to for detecting, shows above-mentioned local file Password typing guidance information;
Second acquisition unit 407, for obtaining the second typing encrypted message of above-mentioned local file, and on detecting When stating the second typing encrypted message with the success of above-mentioned preset password match, above-mentioned local file is deleted.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first, Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use Safety and reliability.
The embodiment of the present invention additionally provides another mobile terminal, as shown in figure 5, for convenience of description, illustrate only with The related part of the embodiment of the present invention, particular technique details do not disclose, refer to present invention method part.The shifting Dynamic terminal can be include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant), Any terminal devices such as POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, so that mobile terminal is mobile phone as an example:
Fig. 5 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng Fig. 5 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input block 930, display are single Member 940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, WiFi) module 970, processor The part such as 980 and power supply 990.It will be understood by those skilled in the art that the handset structure shown in Fig. 5 does not form opponent The restriction of machine, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 5:
RF circuits 910 can be used for the reception and transmission of information.Generally, RF circuits 910 include but is not limited to antenna, at least One amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..This Outside, RF circuits 910 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any Communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division Multiple access (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 920 can be used for storage software program and module, and processor 980 is stored in memory 920 by operation Software program and module, so as to perform the various function application of mobile phone and data processing.Memory 920 can be wrapped mainly Include storing program area and storage data field, wherein, storing program area can storage program area, needed at least one function should With program etc.;Storage data field can store uses created data (such as fingerprint image etc.) etc. according to mobile phone.In addition, Memory 920 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic Disk storage device, flush memory device or other volatile solid-state parts.
Input block 930 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the key signals input that function control is relevant.Specifically, input block 930 may include fingerprint sensor 931 and other inputs Equipment 932.Fingerprint sensor 931, user can be gathered in finger print data thereon.Except fingerprint sensor 931, input block 930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to touch screen, thing Manage one kind or more in button, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. Kind.
Display unit 940 can be used for display by user input information or be supplied to user information and mobile phone it is each Kind menu.Display unit 940 may include display screen 941, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 941.Although in Figure 5, fingerprint sensor 931 and display screen 941 are the parts independent as two to realize mobile phone Input and input function, but in some embodiments it is possible to fingerprint sensor 931 and display screen 941 are integrated and realize hand The input of machine and playing function.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light The light and shade of line adjusts the brightness of display screen 941, and proximity transducer can close display screen 941 when mobile phone is moved in one's ear And/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and accelerate The size of degree, size and the direction of gravity are can detect that when static, application (such as the horizontal/vertical screen available for identification mobile phone posture Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 961, sound is converted to by loudspeaker 961 by road 960 Sound signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is received by voicefrequency circuit 960 After be converted to voice data, it is such as another to be sent to through RF circuits 910 then after voice data playback process device 980 is handled Mobile phone, or voice data is played to memory 920 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 970 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 5 is shown WiFi module 970, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 980 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, By running or performing the software program and/or module that are stored in memory 920, and call and be stored in memory 920 Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 980 It may include one or more processing units;Preferably, processor 980 can integrate application processor and modem processor, its In, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone also includes the power supply 990 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply Management system and processor 980 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1- Fig. 2, each step method flow can based on the mobile phone structure realize.
In embodiment shown in earlier figures 4a-4d, each unit function can based on the mobile phone structure realize.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey Sequence, the part or full when the program performs including any application control method described in above method embodiment Portion's step.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a system The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement, Because according to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art also should This knows that embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily originally Necessary to invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by others side Formula is realized.For example, device embodiment described above is only schematical, such as the division of said units, only one Kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or Another system is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed it is mutual it Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit Connect, can be electrical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be it is physically separate, as unit The part of display can be or may not be physical location, you can with positioned at a place, or can also be distributed to more On individual NE.Some or all of unit therein can be selected to realize this embodiment scheme according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer-readable access to memory.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a memory, including some instructions are causing a computer to set Standby (can be personal computer, server or network equipment etc.) perform each embodiment above method of the present invention whole or Part steps.And foregoing memory includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes Medium.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable memory, memory It can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English: Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present invention is described in detail above, principle of the specific case used herein to the present invention And embodiment is set forth, the explanation of above example is only intended to help method and its core think of for understanding the present invention Think;Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, in specific embodiments and applications There will be changes, in summary, this specification content should not be construed as limiting the invention.

Claims (12)

  1. A kind of 1. application control method, it is characterised in that including:
    The encrypted instruction for destination application is obtained, the encrypted instruction includes preset password;
    The destination application is encrypted according to the preset password;
    The local file of the destination application is determined, the local file is encrypted according to the preset password, institute State local data and/or temporary file that local file is used to store the destination application.
  2. 2. according to the method for claim 1, it is characterised in that it is described according to the preset password to the intended application journey Sequence is encrypted, including:
    The predetermined registration operation for identifying the destination application is cryptographic operation;
    The corresponding relation established between the predetermined registration operation of the destination application and the preset password.
  3. 3. method according to claim 1 or 2, it is characterised in that the predetermined registration operation includes following at least one:Start Operation, the operation at default interface for the destination application, deletion action.
  4. 4. according to the method described in claim any one of 1-3, it is characterised in that methods described also includes:
    The selection operation for the local file is detected, shows the password typing guidance information of the local file;
    The first typing password of the local file is obtained, and is detecting the first typing password and the preset password During with success, the local file is opened.
  5. 5. according to the method described in claim any one of 1-4, it is characterised in that methods described also includes:
    The deletion action for institute's local file is detected, shows the password typing guidance information of the local file;
    Obtain the second typing encrypted message of the local file, and detect the second typing encrypted message with it is described pre- If during password match success, the local file is deleted.
  6. 6. according to the method described in claim any one of 2-5, it is characterised in that methods described also includes:
    The start-up operation for the destination application is detected, it is the cryptographic operation to determine the start-up operation;
    Obtain the 3rd typing password of the start-up operation;
    The 3rd typing password and preset password match success are detected, starts the destination application, and to institute The local file for stating destination application is synchronously decrypted.
  7. 7. according to the method described in claim any one of 2-6, it is characterised in that methods described also includes:
    The deletion action for the destination application is detected, it is the cryptographic operation to determine the deletion action;
    Obtain the 4th typing password of the deletion action;
    The 4th typing password and preset password match success are detected, deletes the destination application, and delete The local file of the destination application.
  8. A kind of 8. mobile terminal, it is characterised in that including:
    Acquiring unit, for obtaining the encrypted instruction for destination application, the encrypted instruction includes preset password;
    First ciphering unit, for the destination application to be encrypted according to the preset password;
    Second ciphering unit, for determining the local file of the destination application, according to the preset password to described Ground file is encrypted, and the local file is used for the local data and/or temporary file for storing the destination application.
  9. 9. mobile terminal according to claim 8, it is characterised in that first ciphering unit includes:
    Mark module, the predetermined registration operation for identifying the destination application are cryptographic operation;
    Module is established, for establishing the corresponding relation between the predetermined registration operation of the destination application and the preset password.
  10. 10. mobile terminal according to claim 8 or claim 9, it is characterised in that the predetermined registration operation includes following at least one Kind:Start-up operation, the operation at default interface for the destination application, deletion action.
  11. A kind of 11. mobile terminal, it is characterised in that including processor, memory, communication interface and one or more programs, Wherein, one or more of programs are stored in the memory, and are configured by the computing device, the journey Sequence includes being used for the instruction that perform claim requires the step in any one of 1-7 method.
  12. A kind of 12. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes computer to perform the method as described in claim any one of 1-7, and the computer includes Mobile terminal.
CN201710733207.3A 2017-08-24 2017-08-24 Application control method and device Pending CN107592409A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710733207.3A CN107592409A (en) 2017-08-24 2017-08-24 Application control method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710733207.3A CN107592409A (en) 2017-08-24 2017-08-24 Application control method and device

Publications (1)

Publication Number Publication Date
CN107592409A true CN107592409A (en) 2018-01-16

Family

ID=61041620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710733207.3A Pending CN107592409A (en) 2017-08-24 2017-08-24 Application control method and device

Country Status (1)

Country Link
CN (1) CN107592409A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829272A (en) * 2019-01-18 2019-05-31 Oppo广东移动通信有限公司 Application control method and relevant apparatus
CN110110514A (en) * 2019-05-13 2019-08-09 Oppo广东移动通信有限公司 Using encryption method and relevant apparatus
CN111190671A (en) * 2019-12-20 2020-05-22 上海淇玥信息技术有限公司 Window display control method and device and electronic equipment
CN114489907A (en) * 2022-01-29 2022-05-13 国泰新点软件股份有限公司 System operation guiding method, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488954A (en) * 2013-10-16 2014-01-01 武汉理工大学 File encryption system
CN104504309A (en) * 2015-01-09 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and terminal for application program
CN106169052A (en) * 2016-07-19 2016-11-30 北京海泰方圆科技股份有限公司 The processing method of application program, device and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103488954A (en) * 2013-10-16 2014-01-01 武汉理工大学 File encryption system
CN104504309A (en) * 2015-01-09 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Data encryption method and terminal for application program
CN106169052A (en) * 2016-07-19 2016-11-30 北京海泰方圆科技股份有限公司 The processing method of application program, device and mobile terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109829272A (en) * 2019-01-18 2019-05-31 Oppo广东移动通信有限公司 Application control method and relevant apparatus
CN110110514A (en) * 2019-05-13 2019-08-09 Oppo广东移动通信有限公司 Using encryption method and relevant apparatus
CN111190671A (en) * 2019-12-20 2020-05-22 上海淇玥信息技术有限公司 Window display control method and device and electronic equipment
CN111190671B (en) * 2019-12-20 2023-07-28 上海淇玥信息技术有限公司 Window display control method and device and electronic equipment
CN114489907A (en) * 2022-01-29 2022-05-13 国泰新点软件股份有限公司 System operation guiding method, device and storage medium
CN114489907B (en) * 2022-01-29 2024-03-12 国泰新点软件股份有限公司 System operation guiding method, device and storage medium

Similar Documents

Publication Publication Date Title
CN103616981B (en) application processing method, device and mobile terminal
CN106331372B (en) Data transmission method and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104426963B (en) The method and terminal of associated terminal
CN105678553A (en) Method, device and system for processing order information
CN104901991B (en) Virtual resource transfer method, device and system
CN107103211B (en) SDK send, using publication, using operation method and device
CN104901806B (en) A kind of virtual resource processing method, device and system
CN110417543A (en) A kind of data ciphering method, device and storage medium
CN106598584A (en) Resource file processing method, apparatus and system
CN107592409A (en) Application control method and device
CN104967593A (en) Identity verification method, apparatus and system
CN106445743A (en) Data backup transmission method and mobile terminal
CN107145794A (en) A kind of data processing method and device and mobile terminal
CN107154935A (en) service request method and device
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN105246075B (en) access point connection method and device
CN107273766A (en) A kind of method and apparatus of data encryption and decryption
CN106569910A (en) Data backup and transmission method, and mobile terminal
CN106550361A (en) A kind of data transmission method and equipment
CN107911818A (en) The method, device and mobile terminal of data transfer between mobile terminal
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN104899488B (en) Numeric value transfer and device
CN106407771A (en) Message management method and device
CN108563754A (en) Document handling method, device, mobile terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180116

RJ01 Rejection of invention patent application after publication