CN107592409A - Application control method and device - Google Patents
Application control method and device Download PDFInfo
- Publication number
- CN107592409A CN107592409A CN201710733207.3A CN201710733207A CN107592409A CN 107592409 A CN107592409 A CN 107592409A CN 201710733207 A CN201710733207 A CN 201710733207A CN 107592409 A CN107592409 A CN 107592409A
- Authority
- CN
- China
- Prior art keywords
- destination application
- password
- mentioned
- local file
- typing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of application control method and device.Method includes:Acquisition for mobile terminal is directed to the encrypted instruction of destination application, and the encrypted instruction includes preset password;The destination application is encrypted according to the preset password;The local file of the destination application is determined, the local file is encrypted according to the preset password, the local file is used for the local data and/or temporary file for storing the destination application.The embodiment of the present invention is advantageous to improve the safety and reliability that application program for mobile terminal uses.
Description
Technical field
The present invention relates to technical field of mobile terminals, and in particular to application control method and device.
Background technology
With the development of smart mobile phone, increasing application program is installed in the smart mobile phone of user, user's
Clothing, food, lodging and transportion -- basic necessities of life are inseparable with smart mobile phone, and mobile payment can be realized by smart mobile phone, game is played, listens music, reads
Etc..
In the prior art, local data and temporary file typically preserve caused by the application program in Android system mobile phone
In local file, the safety in utilization of application program can be ensured by the way that application program is encrypted, but can still pass through
The local file of application program gets the related data of application program.
The content of the invention
The embodiments of the invention provide application control method and device, can improve application program for mobile terminal
Safety in utilization and reliability.
In a first aspect, the embodiment of the present invention provides a kind of application control method, including:
The encrypted instruction for destination application is obtained, above-mentioned encrypted instruction includes preset password;
Above-mentioned destination application is encrypted according to above-mentioned preset password;
The local file of above-mentioned destination application is determined, above-mentioned local file is added according to above-mentioned preset password
Close, above-mentioned local file is used for the local data and/or temporary file for storing above-mentioned destination application.
Second aspect, the embodiments of the invention provide a kind of mobile terminal, the mobile terminal, which has, realizes that the above method is set
The function of the behavior of mobile terminal in meter.Above-mentioned function can be realized by hardware, can also be performed by hardware corresponding soft
Part is realized.Above-mentioned hardware or software include one or more modules corresponding with above-mentioned function phase.The mobile terminal includes:
Acquiring unit, for obtaining the encrypted instruction for destination application, above-mentioned encrypted instruction includes default close
Code;
First ciphering unit, for above-mentioned destination application to be encrypted according to above-mentioned preset password;
Second ciphering unit, for determining the local file of above-mentioned destination application, according to above-mentioned preset password to upper
State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text
Part.
The third aspect, the embodiments of the invention provide a kind of mobile terminal, including:Processor, memory and one or
Multiple programs, said one or multiple programs are stored in above-mentioned memory, and are configured to be held by above-mentioned processor
OK, said procedure includes being used to perform such as the instruction of the step in first aspect either method of the embodiment of the present invention.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, wherein, above computer can
Reading storage medium stores the computer program for electronic data interchange, wherein, above computer program causes computer to perform
Such as the part or all of step described in first aspect either method of the embodiment of the present invention.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first,
Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most
Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on
State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption
Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use
Safety and reliability.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will to embodiment or
The required accompanying drawing used is briefly described in description of the prior art, it should be apparent that, drawings in the following description are only
Some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, also
Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of application control method provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another application control method provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 4 a are a kind of structural representations of mobile terminal provided in an embodiment of the present invention;
Fig. 4 b are the structural representations of the first ciphering unit of the mobile terminal described by Fig. 4 a provided in an embodiment of the present invention
Figure;
Fig. 4 c are the structural representations of another mobile terminal provided in an embodiment of the present invention;
Fig. 4 d are the structural representations of another mobile terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention
Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only
It is part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill
The every other embodiment that personnel are obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing etc. are to be used for area
Not different objects, rather than for describing particular order.In addition, term " comprising " and " having " and their any deformations, meaning
Figure is to cover non-exclusive include.Such as contain process, method, system, product or the equipment of series of steps or unit
The step of being not limited to list or unit, but alternatively also including the step of not listing or unit, or alternatively also
Including for other intrinsic steps of these processes, method, product or equipment or unit.
Referenced herein " embodiment " is it is meant that the special characteristic, structure or the characteristic that describe can wrap in conjunction with the embodiments
In at least one embodiment of the present invention.The phrase, which occurs, in each position in the description might not each mean phase
Same embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art are explicitly
Implicitly understand, embodiment described herein can be combined with other embodiments.
Mobile terminal involved by the embodiment of the present invention can have the hand-held of radio communication function to set including various
Standby, mobile unit, wearable device, computing device or other processing equipments for being connected to radio modem, and it is various
The user equipment (User Equipment, UE) of form, mobile station (Mobile Station, MS), terminal device
(terminal device) etc..For convenience of description, apparatus mentioned above is referred to as mobile terminal.Below to of the invention real
Example is applied to describe in detail.
Referring to Fig. 1, Fig. 1 is the embodiments of the invention provide a kind of schematic flow sheet of application control method, should
For mobile terminal, as illustrated, application control method includes:
S101, acquisition for mobile terminal are directed to the encrypted instruction of destination application, and above-mentioned encrypted instruction includes default close
Code.
Wherein, destination application may include but be not limited only to:Game class application (king's honor, World of Warcraft etc.),
Social class application (wechat, QQ, microblogging etc.), office class application (word, PPT, excel etc.), (love is strange for video class application
Skill, Tengxun's video etc.), audio class application (Netease's cloud music, QQ music etc.), pay class apply (Alipay, apple branch
Pay etc.) etc..
Wherein, encrypted instruction includes preset password, and preset password includes following at least one:Numerical ciphers, fingerprint are close
Code, face password, iris password.For example, preset password can be numerical ciphers or the good finger-print cipher of numerical ciphers
Combination.
Above-mentioned destination application is encrypted according to above-mentioned preset password for S102, above-mentioned mobile terminal.
Wherein, mobile terminal is after the encrypted instruction for destination application is obtained, according in above-mentioned encrypted instruction
Destination application is encrypted preset password.
S103, above-mentioned mobile terminal determine the local file of above-mentioned destination application, according to above-mentioned preset password to upper
State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text
Part.
Wherein, file management is a software systems fail-safe software for operating in Android platform, can identify text, music,
The basic document such as video, PDF, basic copy can be carried out to mobile phone file and file by file management, paste, delete
Remove, the operation such as mobile.
Wherein, local data caused by each application program and cache file are all stored in corresponding file, this article
Part folder is independently of other files, while this document folder is located in file management, can file management the first level or
Other levels, position can be fixed.Such as QQ application programs, if having download pictures or caching when user is using QQ
Word file, it can correspond to and be stored in the QQ files in file management, can be obtained by checking in file management QQ files
Take local data caused by QQ application programs.
Wherein, if the local file of application program is located at the first level of file management, mobile terminal is directed to detecting
During the selection operation of file management virtual functional key, you can show the local file of each application program association, that is, entering
After file management, it can be seen that the local file of multiple application program associations.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first,
Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most
Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on
State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption
Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use
Safety and reliability.
It is above-mentioned that above-mentioned destination application is encrypted according to above-mentioned preset password in a possible example, bag
Include:The predetermined registration operation for identifying above-mentioned destination application is cryptographic operation;Establish the predetermined registration operation of above-mentioned destination application with
Corresponding relation between above-mentioned preset password.
Wherein, when destination application being encrypted, the predetermined registration operation of destination application can be identified, is established pre-
If operation and the corresponding relation of preset password support, i.e., when detecting the cryptographic operation of performance objective application program, it is necessary to enter
Predetermined registration operation can be just performed after row decryption.
It can be seen that in this example, destination application is encrypted, actually the default behaviour to destination application
It is encrypted, it is necessary to just can perform predetermined registration operation after being first decrypted, is advantageous to improve the safety that uses of destination application
Property.
In a possible example, above-mentioned predetermined registration operation includes following at least one:Start-up operation, for above-mentioned mesh
Mark operation, the deletion action at the default interface of application program.
Wherein, for destination application default interface operation, can be using during intended application,
The selection operation of some virtual push buttons in interface is preset to destination application, for example, in the process applied using wechat
In, the operation for circle of friends function interface is predetermined registration operation, if circle of friends virtual push button is clicked on, due to having been carried out
Encryption is, it is necessary to can just enter circle of friends after decrypting.
It can be seen that in this example, the predetermined registration operation of destination application includes the start-up operation of destination application, for
The operation at the default interface of destination application, the deletion action of destination application, being advantageous to raising destination application makes
Security.
In a possible example, the above method also includes:The selection operation for above-mentioned local file is detected,
Show the password typing guidance information of above-mentioned local file;The first typing encrypted message of above-mentioned local file is obtained, and is being examined
When measuring above-mentioned first typing password with the success of above-mentioned preset password match, above-mentioned local file is opened.
Wherein, when detecting the selection operation for the local file of destination application, can show on touching display screen
Show the password typing guidance information of local file, prompt user to input the first typing password.First typing password and preset password
Unanimously, it can be at least one of numerical ciphers, finger-print cipher, face password, iris password.
Wherein, when preset password is numerical ciphers, corresponding password typing guidance information can be display Password Input
Frame;When preset password is finger-print cipher, corresponding password typing guidance information can be the text of display " asking typing finger-print cipher "
Word;When preset password is face password or iris password, corresponding password typing guidance information can be display face or iris
Scan box.User's i.e. can be known after password typing guidance information is seen can just check mesh after encrypted message corresponding to typing
Mark the local file of application program association.
Wherein, the first typing password of above-mentioned local file is obtained, and is detecting above-mentioned first typing password with presetting
During password match success, you can open the local file of destination application, check local data caused by destination application
And cache file.
It can be seen that in this example, when detecting the selection operation for local file, it is necessary to the typing of user's typing first
Password, and the local file of destination application can be just opened in the first typing password and preset password match success,
Be advantageous to improve the used security of intended application.
In a possible example, the above method also includes:The deletion action for institute's local file is detected, is shown
Show the password typing guidance information of above-mentioned local file;The second typing encrypted message of above-mentioned local file is obtained, and is being detected
During to above-mentioned second typing encrypted message and the success of above-mentioned preset password match, above-mentioned local file is deleted.
It can be seen that in this example, when detecting the deletion action for local file, it is necessary to the typing of user's typing second
Password, and the local file of destination application can be just opened in the second typing password and preset password match success,
Be advantageous to improve the used security of intended application.
In a possible example, the above method also includes:Detect that the startup for above-mentioned destination application is grasped
Make, it is cryptographic operation to determine above-mentioned start-up operation;Obtain the 3rd typing password of above-mentioned start-up operation;Detect the above-mentioned 3rd
Typing password and the success of above-mentioned preset password match, start above-mentioned destination application, and to the upper of above-mentioned destination application
Local file is stated synchronously to decrypt.
Wherein, when starting destination application, because start-up operation is predetermined registration operation, it is therefore desirable to first it is decrypted,
After successful decryption, destination application can be used in user, meanwhile, mobile terminal also can be to destination application in file
The local file associated in management is synchronously decrypted.
Wherein, it can be seen that, if user will check the local file of destination application association in file management, need
Typing proper password is wanted or by the way that destination application is decrypted, in this way, can just check destination application association
Local file.
It can be seen that in this example, when detecting the start-up operation for destination application, because start-up operation is pre-
If operation, so the typing password of user's typing the 3rd is needed, and in the 3rd typing password and preset password match success
Destination application can be started, after destination application decryption, its local file associated is also synchronously decrypted, in this way, can protect
The safety and reliability that card destination application uses.
In a possible example, the above method also includes:Detect that the deletion for above-mentioned destination application is grasped
Make, it is cryptographic operation to determine above-mentioned deletion action;Obtain the 4th typing password of above-mentioned deletion action;Detect the above-mentioned 4th
Typing password and the success of above-mentioned preset password match, delete above-mentioned destination application, and delete above-mentioned destination application
Above-mentioned local file.
Wherein, in user's delete target application program, mobile terminal can synchronously be decrypted to the local file that it is associated,
In this way, user can select to delete data in the local file completely or number in the local file is deleted in part
According to, in order to avoid cause the missing of data.Or mobile terminal can directly delete target application local file, specific embodiment party
Formula can be set by user.
It can be seen that in this example, when detecting the deletion action for local file, it is necessary to the typing of user's typing the 4th
Password, and just can be with delete target application program, in intended application in the 4th typing password and preset password match success
After program is deleted, mobile terminal can synchronously decrypt the local file of destination application or directly delete this document folder, have
Beneficial to the safety and reliability for ensureing destination application local data.
In a possible example, above-mentioned when detecting the selection operation for above-mentioned local file, display is above-mentioned
The password typing guidance information of local file, including:The selection operation for above-mentioned local file is detected, judges above-mentioned
Whether destination application corresponding to ground file is encryption destination application;Detecting that above-mentioned destination application is to add
During close application program, the preset password of above-mentioned destination application is obtained, and above-mentioned target is shown on above-mentioned touching display screen
The password typing guidance information of the local file of application program.
Wherein mobile terminal can first judge when detecting the selection operation for the local file of destination application
Whether destination application is encryption application program, when destination application is encrypts application program, just in touching display screen
Upper display password typing guidance information, for prompting user to need typing the first typing password just to open local file, in mesh
When mark application program is not encryption application program, then local file can be directly opened.
It can be seen that in this example, when detecting the selection operation for the local file of destination application, first judge
Whether destination application is encryption application program, when detecting destination application to encrypt application program, is obtained above-mentioned
The preset password of destination application and on touching display screen the password typing of the local file of display target application program draw
Lead information, be advantageous to be matched the first typing password and preset password after the first typing password is got, matching into
Local file is opened after work(.
Consistent with the abovely, referring to Fig. 2, being another application control method provided in an embodiment of the present invention
Schematic flow sheet.Application control method described in the present embodiment, comprises the following steps:
201st, acquisition for mobile terminal is directed to the encrypted instruction of destination application, and above-mentioned encrypted instruction includes preset password.
202nd, above-mentioned destination application is encrypted according to above-mentioned preset password for above-mentioned mobile terminal.
Wherein, above-mentioned steps 301- steps 302 refer to the step 201- of the application program method for down loading described by Fig. 2
Step 202.
203rd, above-mentioned mobile terminal determines the local file of above-mentioned destination application, according to above-mentioned preset password to upper
State local file to be encrypted, above-mentioned local file is used for the local data for storing above-mentioned destination application and/or interim text
Part.
204th, above-mentioned mobile terminal detects the selection operation for above-mentioned local file, shows above-mentioned local file
Password typing guidance information.
Wherein, when detecting the selection operation for the local file of destination application, can show on touching display screen
Show the password typing guidance information of local file, prompt user to input the first typing password.First typing password and preset password
Unanimously, it can be at least one of numerical ciphers, finger-print cipher, face password, iris password.
Wherein, when preset password is numerical ciphers, corresponding password typing guidance information can be display Password Input
Frame;When preset password is finger-print cipher, corresponding password typing guidance information can be the text of display " asking typing finger-print cipher "
Word;When preset password is face password or iris password, corresponding password typing guidance information can be display face or iris
Scan box.User's i.e. can be known after password typing guidance information is seen can just check mesh after encrypted message corresponding to typing
Mark the local file of application program association.
205th, the first typing password of the above-mentioned local file of above-mentioned acquisition for mobile terminal, and detecting above-mentioned first record
When entering password with the success of above-mentioned preset password match, above-mentioned local file is opened.
Wherein, the first typing password of above-mentioned local file is obtained, and is detecting above-mentioned first typing password with presetting
During password match success, you can open the local file of destination application, check local data caused by destination application
And cache file.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first,
Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most
Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on
State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption
Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use
Safety and reliability.
Fig. 3 is a kind of mobile terminal provided in an embodiment of the present invention, including:Processor, memory and one or more
Program, said one or multiple programs are stored in above-mentioned memory, and are configured to by above-mentioned computing device, on
Stating program includes being used for the instruction for performing following steps;
The encrypted instruction for destination application is obtained, above-mentioned encrypted instruction includes preset password;
Above-mentioned destination application is encrypted according to above-mentioned preset password;
The local file of above-mentioned destination application is determined, above-mentioned local file is added according to above-mentioned preset password
Close, above-mentioned local file is used for the local data and/or temporary file for storing above-mentioned destination application.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first,
Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most
Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on
State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption
Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use
Safety and reliability.
In a possible example, above-mentioned destination application is encrypted according to above-mentioned preset password above-mentioned
Aspect, the instruction in said procedure are specifically used for:The predetermined registration operation for identifying above-mentioned destination application is cryptographic operation;Establish
Corresponding relation between the predetermined registration operation of above-mentioned destination application and above-mentioned preset password.
In a possible example, above-mentioned predetermined registration operation includes following at least one:Start-up operation, for above-mentioned mesh
Mark operation, the deletion action at the default interface of application program.
In a possible example, the instruction in said procedure is additionally operable to detect the choosing for above-mentioned local file
Extract operation, show the password typing guidance information of above-mentioned local file;The first typing password of above-mentioned local file is obtained, and
When detecting above-mentioned first typing password with the success of above-mentioned preset password match, above-mentioned local file is opened.
In a possible example, the instruction in said procedure is additionally operable to detecting deleting for institute's local file
During division operation, the password typing guidance information of above-mentioned local file is shown;Obtain the second typing message in cipher of above-mentioned local file
Breath, and when detecting above-mentioned second typing encrypted message with the success of above-mentioned preset password match, delete above-mentioned local file.
In a possible example, the instruction in said procedure is additionally operable to detect for above-mentioned destination application
Start-up operation, it is cryptographic operation to determine above-mentioned start-up operation;Obtain the 3rd typing password of above-mentioned start-up operation;Detect
Above-mentioned 3rd typing password and the success of above-mentioned preset password match, start above-mentioned destination application, and to above-mentioned intended application
The above-mentioned local file of program is synchronously decrypted.
In a possible example, the instruction in said procedure is additionally operable to detect for above-mentioned destination application
Deletion action, it is cryptographic operation to determine above-mentioned deletion action;Obtain the 4th typing password of above-mentioned deletion action;Detect
Above-mentioned 4th typing password and the success of above-mentioned preset password match, delete above-mentioned destination application, and delete above-mentioned target and answer
With the above-mentioned local file of program.
It is above-mentioned that mainly the scheme of the embodiment of the present invention is described from the angle of method side implementation procedure.It can manage
Solution, for mobile terminal in order to realize above-mentioned function, it comprises perform the corresponding hardware configuration of each function and/or software
Module.Those skilled in the art should be readily appreciated that, with reference to the list of each example of the embodiments described herein description
Member and algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function is actually
Performed in a manner of hardware or computer software driving hardware, application-specific and design constraint depending on technical scheme
Condition.Professional and technical personnel can specifically realize described function to each using distinct methods, but this
Realize it is not considered that beyond the scope of this invention.
Fig. 4 a are referred to, are a kind of example structure schematic diagram of mobile terminal provided in an embodiment of the present invention.This implementation
Mobile terminal described in example, including:Acquiring unit 401, the first ciphering unit 402 and the second ciphering unit 403, specifically
It is as follows:
Acquiring unit 401, for obtaining the encrypted instruction for destination application, above-mentioned encrypted instruction includes default
Password;
First ciphering unit 402, for above-mentioned destination application to be encrypted according to above-mentioned preset password;
Second ciphering unit 403, for determining the local file of above-mentioned destination application, according to above-mentioned preset password
Above-mentioned local file is encrypted, above-mentioned local file is used to store the local data of above-mentioned destination application and/or faced
When file.
Alternatively, as shown in Figure 4 b, above-mentioned first ciphering unit 402 includes:Mark module 4021 and establish module
4022, it is specific as follows:
Mark module 4021, the predetermined registration operation for identifying above-mentioned destination application are cryptographic operation;
Module 4022 is established, for establishing between the predetermined registration operation of above-mentioned destination application and above-mentioned preset password
Corresponding relation.
Alternatively, as illustrated in fig. 4 c, it is a kind of Fig. 4 a modification structures, Fig. 4 c are compared with Fig. 4 a, described by Fig. 4 a
Mobile terminal may also include:First display unit 404, acquiring unit 405, it is specific as follows:
First display unit 404, the selection operation of above-mentioned local file is directed to for detecting, shows above-mentioned local text
The password typing guidance information of part;
First acquisition unit 405, for obtaining the first typing password of above-mentioned local file, and detecting above-mentioned
When one typing password is with the success of above-mentioned preset password match, above-mentioned local file is opened.
Alternatively, as shown in figure 4d, it is a kind of Fig. 4 a modification structures, Fig. 4 d are compared with Fig. 4 a, described by Fig. 4 a
Mobile terminal may also include:Second display unit 406, second acquisition unit 407, it is specific as follows:
Second display unit 406, the deletion action of institute's local file is directed to for detecting, shows above-mentioned local file
Password typing guidance information;
Second acquisition unit 407, for obtaining the second typing encrypted message of above-mentioned local file, and on detecting
When stating the second typing encrypted message with the success of above-mentioned preset password match, above-mentioned local file is deleted.
As can be seen that in the embodiment of the present invention, mobile terminal obtains the encrypted instruction for destination application first,
Above-mentioned encrypted instruction includes preset password, secondly, above-mentioned destination application is encrypted according to above-mentioned preset password, most
Afterwards, the local file of above-mentioned destination application is determined, above-mentioned local file is encrypted according to above-mentioned preset password, on
State local data and/or temporary file that local file is used to store above-mentioned destination application.So as to realize to encryption
Local file of the destination application in file management also synchronizes encryption, is advantageous to improve destination application use
Safety and reliability.
The embodiment of the present invention additionally provides another mobile terminal, as shown in figure 5, for convenience of description, illustrate only with
The related part of the embodiment of the present invention, particular technique details do not disclose, refer to present invention method part.The shifting
Dynamic terminal can be include mobile phone, tablet personal computer, PDA (Personal Digital Assistant, personal digital assistant),
Any terminal devices such as POS (Point of Sales, point-of-sale terminal), vehicle-mounted computer, so that mobile terminal is mobile phone as an example:
Fig. 5 is illustrated that the block diagram of the part-structure of the mobile phone related to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 5 is examined, mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 910, memory 920, input block 930, display are single
Member 940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, WiFi) module 970, processor
The part such as 980 and power supply 990.It will be understood by those skilled in the art that the handset structure shown in Fig. 5 does not form opponent
The restriction of machine, can be included than illustrating more or less parts, either combine some parts or different parts arrangement.
Each component parts of mobile phone is specifically introduced with reference to Fig. 5:
RF circuits 910 can be used for the reception and transmission of information.Generally, RF circuits 910 include but is not limited to antenna, at least
One amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..This
Outside, RF circuits 910 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any
Communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division
Multiple access (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division
Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service
(Short Messaging Service, SMS) etc..
Memory 920 can be used for storage software program and module, and processor 980 is stored in memory 920 by operation
Software program and module, so as to perform the various function application of mobile phone and data processing.Memory 920 can be wrapped mainly
Include storing program area and storage data field, wherein, storing program area can storage program area, needed at least one function should
With program etc.;Storage data field can store uses created data (such as fingerprint image etc.) etc. according to mobile phone.In addition,
Memory 920 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic
Disk storage device, flush memory device or other volatile solid-state parts.
Input block 930 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with
And the key signals input that function control is relevant.Specifically, input block 930 may include fingerprint sensor 931 and other inputs
Equipment 932.Fingerprint sensor 931, user can be gathered in finger print data thereon.Except fingerprint sensor 931, input block
930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to touch screen, thing
Manage one kind or more in button, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
Kind.
Display unit 940 can be used for display by user input information or be supplied to user information and mobile phone it is each
Kind menu.Display unit 940 may include display screen 941, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 941.Although in Figure 5, fingerprint sensor 931 and display screen 941 are the parts independent as two to realize mobile phone
Input and input function, but in some embodiments it is possible to fingerprint sensor 931 and display screen 941 are integrated and realize hand
The input of machine and playing function.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
The light and shade of line adjusts the brightness of display screen 941, and proximity transducer can close display screen 941 when mobile phone is moved in one's ear
And/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axles) and accelerate
The size of degree, size and the direction of gravity are can detect that when static, application (such as the horizontal/vertical screen available for identification mobile phone posture
Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;As for mobile phone also
The other sensors such as configurable gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the COBBAIF between user and mobile phone.Audio-frequency electric
Electric signal after the voice data received conversion can be transferred to loudspeaker 961, sound is converted to by loudspeaker 961 by road 960
Sound signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is received by voicefrequency circuit 960
After be converted to voice data, it is such as another to be sent to through RF circuits 910 then after voice data playback process device 980 is handled
Mobile phone, or voice data is played to memory 920 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 970
Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 5 is shown
WiFi module 970, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely
Become in the essential scope of invention and omit.
Processor 980 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone,
By running or performing the software program and/or module that are stored in memory 920, and call and be stored in memory 920
Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 980
It may include one or more processing units;Preferably, processor 980 can integrate application processor and modem processor, its
In, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone also includes the power supply 990 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply
Management system and processor 980 are logically contiguous, so as to realize management charging, electric discharge and power consumption pipe by power-supply management system
The functions such as reason.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1- Fig. 2, each step method flow can based on the mobile phone structure realize.
In embodiment shown in earlier figures 4a-4d, each unit function can based on the mobile phone structure realize.
The embodiment of the present invention also provides a kind of computer-readable storage medium, wherein, the computer-readable storage medium can be stored with journey
Sequence, the part or full when the program performs including any application control method described in above method embodiment
Portion's step.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as to a system
The combination of actions of row, but those skilled in the art should know, the present invention is not limited by described sequence of movement,
Because according to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art also should
This knows that embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily originally
Necessary to invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not have the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed device, can be by others side
Formula is realized.For example, device embodiment described above is only schematical, such as the division of said units, only one
Kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or
Another system is desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or discussed it is mutual it
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical or other forms.
The above-mentioned unit illustrated as separating component can be or may not be it is physically separate, as unit
The part of display can be or may not be physical location, you can with positioned at a place, or can also be distributed to more
On individual NE.Some or all of unit therein can be selected to realize this embodiment scheme according to the actual needs
Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If above-mentioned integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer-readable access to memory.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a memory, including some instructions are causing a computer to set
Standby (can be personal computer, server or network equipment etc.) perform each embodiment above method of the present invention whole or
Part steps.And foregoing memory includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), mobile hard disk, magnetic disc or CD etc. are various can be with store program codes
Medium.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable memory, memory
It can include:Flash disk, read-only storage (English:Read-Only Memory, referred to as:ROM), random access device (English:
Random Access Memory, referred to as:RAM), disk or CD etc..
The embodiment of the present invention is described in detail above, principle of the specific case used herein to the present invention
And embodiment is set forth, the explanation of above example is only intended to help method and its core think of for understanding the present invention
Think;Meanwhile for those of ordinary skill in the art, according to the thought of the present invention, in specific embodiments and applications
There will be changes, in summary, this specification content should not be construed as limiting the invention.
Claims (12)
- A kind of 1. application control method, it is characterised in that including:The encrypted instruction for destination application is obtained, the encrypted instruction includes preset password;The destination application is encrypted according to the preset password;The local file of the destination application is determined, the local file is encrypted according to the preset password, institute State local data and/or temporary file that local file is used to store the destination application.
- 2. according to the method for claim 1, it is characterised in that it is described according to the preset password to the intended application journey Sequence is encrypted, including:The predetermined registration operation for identifying the destination application is cryptographic operation;The corresponding relation established between the predetermined registration operation of the destination application and the preset password.
- 3. method according to claim 1 or 2, it is characterised in that the predetermined registration operation includes following at least one:Start Operation, the operation at default interface for the destination application, deletion action.
- 4. according to the method described in claim any one of 1-3, it is characterised in that methods described also includes:The selection operation for the local file is detected, shows the password typing guidance information of the local file;The first typing password of the local file is obtained, and is detecting the first typing password and the preset password During with success, the local file is opened.
- 5. according to the method described in claim any one of 1-4, it is characterised in that methods described also includes:The deletion action for institute's local file is detected, shows the password typing guidance information of the local file;Obtain the second typing encrypted message of the local file, and detect the second typing encrypted message with it is described pre- If during password match success, the local file is deleted.
- 6. according to the method described in claim any one of 2-5, it is characterised in that methods described also includes:The start-up operation for the destination application is detected, it is the cryptographic operation to determine the start-up operation;Obtain the 3rd typing password of the start-up operation;The 3rd typing password and preset password match success are detected, starts the destination application, and to institute The local file for stating destination application is synchronously decrypted.
- 7. according to the method described in claim any one of 2-6, it is characterised in that methods described also includes:The deletion action for the destination application is detected, it is the cryptographic operation to determine the deletion action;Obtain the 4th typing password of the deletion action;The 4th typing password and preset password match success are detected, deletes the destination application, and delete The local file of the destination application.
- A kind of 8. mobile terminal, it is characterised in that including:Acquiring unit, for obtaining the encrypted instruction for destination application, the encrypted instruction includes preset password;First ciphering unit, for the destination application to be encrypted according to the preset password;Second ciphering unit, for determining the local file of the destination application, according to the preset password to described Ground file is encrypted, and the local file is used for the local data and/or temporary file for storing the destination application.
- 9. mobile terminal according to claim 8, it is characterised in that first ciphering unit includes:Mark module, the predetermined registration operation for identifying the destination application are cryptographic operation;Module is established, for establishing the corresponding relation between the predetermined registration operation of the destination application and the preset password.
- 10. mobile terminal according to claim 8 or claim 9, it is characterised in that the predetermined registration operation includes following at least one Kind:Start-up operation, the operation at default interface for the destination application, deletion action.
- A kind of 11. mobile terminal, it is characterised in that including processor, memory, communication interface and one or more programs, Wherein, one or more of programs are stored in the memory, and are configured by the computing device, the journey Sequence includes being used for the instruction that perform claim requires the step in any one of 1-7 method.
- A kind of 12. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes computer to perform the method as described in claim any one of 1-7, and the computer includes Mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710733207.3A CN107592409A (en) | 2017-08-24 | 2017-08-24 | Application control method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710733207.3A CN107592409A (en) | 2017-08-24 | 2017-08-24 | Application control method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107592409A true CN107592409A (en) | 2018-01-16 |
Family
ID=61041620
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710733207.3A Pending CN107592409A (en) | 2017-08-24 | 2017-08-24 | Application control method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107592409A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829272A (en) * | 2019-01-18 | 2019-05-31 | Oppo广东移动通信有限公司 | Application control method and relevant apparatus |
CN110110514A (en) * | 2019-05-13 | 2019-08-09 | Oppo广东移动通信有限公司 | Using encryption method and relevant apparatus |
CN111190671A (en) * | 2019-12-20 | 2020-05-22 | 上海淇玥信息技术有限公司 | Window display control method and device and electronic equipment |
CN114489907A (en) * | 2022-01-29 | 2022-05-13 | 国泰新点软件股份有限公司 | System operation guiding method, device and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488954A (en) * | 2013-10-16 | 2014-01-01 | 武汉理工大学 | File encryption system |
CN104504309A (en) * | 2015-01-09 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Data encryption method and terminal for application program |
CN106169052A (en) * | 2016-07-19 | 2016-11-30 | 北京海泰方圆科技股份有限公司 | The processing method of application program, device and mobile terminal |
-
2017
- 2017-08-24 CN CN201710733207.3A patent/CN107592409A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103488954A (en) * | 2013-10-16 | 2014-01-01 | 武汉理工大学 | File encryption system |
CN104504309A (en) * | 2015-01-09 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Data encryption method and terminal for application program |
CN106169052A (en) * | 2016-07-19 | 2016-11-30 | 北京海泰方圆科技股份有限公司 | The processing method of application program, device and mobile terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829272A (en) * | 2019-01-18 | 2019-05-31 | Oppo广东移动通信有限公司 | Application control method and relevant apparatus |
CN110110514A (en) * | 2019-05-13 | 2019-08-09 | Oppo广东移动通信有限公司 | Using encryption method and relevant apparatus |
CN111190671A (en) * | 2019-12-20 | 2020-05-22 | 上海淇玥信息技术有限公司 | Window display control method and device and electronic equipment |
CN111190671B (en) * | 2019-12-20 | 2023-07-28 | 上海淇玥信息技术有限公司 | Window display control method and device and electronic equipment |
CN114489907A (en) * | 2022-01-29 | 2022-05-13 | 国泰新点软件股份有限公司 | System operation guiding method, device and storage medium |
CN114489907B (en) * | 2022-01-29 | 2024-03-12 | 国泰新点软件股份有限公司 | System operation guiding method, device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103616981B (en) | application processing method, device and mobile terminal | |
CN106331372B (en) | Data transmission method and mobile terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN104426963B (en) | The method and terminal of associated terminal | |
CN105678553A (en) | Method, device and system for processing order information | |
CN104901991B (en) | Virtual resource transfer method, device and system | |
CN107103211B (en) | SDK send, using publication, using operation method and device | |
CN104901806B (en) | A kind of virtual resource processing method, device and system | |
CN110417543A (en) | A kind of data ciphering method, device and storage medium | |
CN106598584A (en) | Resource file processing method, apparatus and system | |
CN107592409A (en) | Application control method and device | |
CN104967593A (en) | Identity verification method, apparatus and system | |
CN106445743A (en) | Data backup transmission method and mobile terminal | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
CN107154935A (en) | service request method and device | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN105246075B (en) | access point connection method and device | |
CN107273766A (en) | A kind of method and apparatus of data encryption and decryption | |
CN106569910A (en) | Data backup and transmission method, and mobile terminal | |
CN106550361A (en) | A kind of data transmission method and equipment | |
CN107911818A (en) | The method, device and mobile terminal of data transfer between mobile terminal | |
CN107133507A (en) | A kind of privacy services system access method, device and mobile terminal | |
CN104899488B (en) | Numeric value transfer and device | |
CN106407771A (en) | Message management method and device | |
CN108563754A (en) | Document handling method, device, mobile terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180116 |
|
RJ01 | Rejection of invention patent application after publication |