CN107808080A - The management method and electric terminal of application program - Google Patents
The management method and electric terminal of application program Download PDFInfo
- Publication number
- CN107808080A CN107808080A CN201710887681.1A CN201710887681A CN107808080A CN 107808080 A CN107808080 A CN 107808080A CN 201710887681 A CN201710887681 A CN 201710887681A CN 107808080 A CN107808080 A CN 107808080A
- Authority
- CN
- China
- Prior art keywords
- application program
- account
- information
- authority
- icon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 15
- 238000000034 method Methods 0.000 claims abstract description 27
- 230000009471 action Effects 0.000 claims abstract description 9
- 238000005520 cutting process Methods 0.000 claims description 11
- 230000000694 effects Effects 0.000 abstract description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 238000003860 storage Methods 0.000 description 6
- 230000008859 change Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000010009 beating Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000005055 memory storage Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention provides a kind of management method of application program and electric terminal, described method, including:In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program, and the first icon of first application program is caused by the original image determined according to user;Trigger action according to user to first icon, the authority that first application program is exported in the main interface input instruction;Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;If the authority information is verified, first application program is run.The present invention realizes distinctly displaying for the first application program, can play hiding first application program, makes one to be not easy the effect for finding its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present invention also provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safeguard protection.
Description
Technical field
The present invention relates to the management method and electric terminal of electric terminal, more particularly to a kind of application program.
Background technology
Electric terminal, it can be understood as there is the terminal of processor and memory, processor reads the code in memory,
Corresponding function can be performed, various application program is realized wherein it is possible to run.With the variation of electric terminal function,
The information of each application program storage is also more and more diversified, to the demand of Information Security also more and more higher.
In existing correlation technique, system can be protected by the authority information of operating system, can also passed through
The setting of file password is protected to file data.
However, existing protected mode is only capable of being protected for system and file, application program lack of targeted is protected
Shield.
The content of the invention
The present invention provides a kind of management method and electric terminal of application program, to solve to application program lack of targeted
The problem of protection.
According to the first aspect of the invention, there is provided a kind of management method of application program, including:
In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program,
First icon of first application program is caused by the original image determined according to user;
Trigger action according to user to first icon, the power of first application program is exported in the main interface
Limit input instruction;
Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;
If the authority information is verified, first application program is run.
Optionally, the checking authority information, including:
Obtain the first account information of first application program;First account information is used to represent that described first should
Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed
Pass through.
Optionally, it is described before the icon of the multiple application programs of main interface output display, in addition to:Also include:
The reference information and program identification of user's input are received, described program is identified for indicating first application
Program;
Identified according to described program, determine the used K account of first application program,
Target account is determined in the K account, and establishes reference information pass corresponding with the target account
System;
Before the checking authority information, in addition to:
If it is determined that used account is the target account during the last operation, then according to the corresponding relation
With the target account, the reference information is determined.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described
Target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
Optionally, however, it is determined that used account non-target account during the last operation, then according to
First trigger request runs first application program, and the last operation is used during first application program operation
When used account.
Optionally, it is described before the icon of the multiple application programs of main interface output display, including:
Obtain the original image;
The original image is cut according to the first length-width ratio, with image after being cut;
It is first resolution by the resolution adjustment of image after the cutting, to obtain first figure of first resolution
Mark.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
According to the second aspect of the invention, there is provided a kind of electric terminal, including:
First output module, for the icon in the multiple application programs of main interface output display, the multiple application program
Including the first application program, the first icon of first application program is caused by the original image determined according to user;
Second output module, for the trigger action according to user to first icon, institute is exported in the main interface
State the authority input instruction of the first application program;
Authentication module, the authority information for indicating to input is inputted according to the authority for obtaining user, and verify the power
Limit information;
If the authority information is verified, first application program is run..
Optionally, the authentication module is specifically used for:
Obtain the first account information of first application program;First account information is used to represent that described first should
Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed
Pass through.
Optionally, described terminal, in addition to:
Receiving module, for receiving the reference information and program identification of user's input, described program is identified for referring to
Show first application program;
Determining module, for being identified according to described program, the used K account of first application program is determined,
Module is established, for determining target account in the K account, and establishes the reference information and the target
The corresponding relation of account;
The authentication module, is specifically used for, however, it is determined that used account is the target during the last operation
Account, then according to the corresponding relation and the target account, determine the reference information.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described
Target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
Described terminal, in addition to:
Module is run, for if it is determined that used account non-target account during the last operation, then root
First application program is run according to first trigger request, and described nearest one is used during first application program operation
Used account during secondary operation.
Optionally, described terminal, in addition to:
Acquisition module, for obtaining the original image;
Module is cut, for cutting the original image according to the first length-width ratio, with image after being cut;
Adjusting module, for being first resolution by the resolution adjustment of image after the cutting, to obtain the first resolution
First icon of rate.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
The management method and electric terminal of application program provided by the invention, by the multiple applications of main interface output display
The icon of program, the multiple application program include the first application program, according to the first icon of first application program
Caused by the original image that user determines, the present invention realizes distinctly displaying for the first application program, and can play hiding first should
With program, make one to be not easy the effect for finding its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.
The present invention also inputs instruction by exporting the authority of first application program in the main interface;And obtain and use
Family inputs the authority information of instruction input according to the authority, and verifies the authority information;If the authority information checking is logical
Cross, then run first application program, the present invention provides checking for the triggering operation of the first application program, so as to first
The operation of application program has carried out safeguard protection.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also
To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is an application scenarios schematic diagram of the invention;
Fig. 2 is the schematic flow sheet one of the management method of an application program of the invention;
Fig. 3 is the schematic flow sheet two of the management method of an application program of the invention;
Fig. 4 is the interface schematic diagram one of an electric terminal of the invention;
Fig. 5 is the interface schematic diagram two of an electric terminal of the invention;
Fig. 6 is the structural representation one of an electric terminal of the invention;
Fig. 7 is the structural representation two of an electric terminal of the invention;
Fig. 8 is the structural representation three of an electric terminal of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in description and claims of this specification and above-mentioned accompanying drawing
The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage
The data that solution so uses can exchange in the appropriate case, so as to embodiments of the invention described herein for example can with except
Order beyond those for illustrating or describing herein is implemented.In addition, term " comprising " and " having " and theirs is any
Deformation, it is intended that cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, production
Product or equipment are not necessarily limited to those steps clearly listed or unit, but may include not list clearly or for this
The intrinsic other steps of a little process, method, product or equipment or unit.
Technical scheme is described in detail with specifically embodiment below.These specific implementations below
Example can be combined with each other, and may be repeated no more for same or analogous concept or process in some embodiments.
Fig. 1 is an application scenarios schematic diagram of the invention.
Fig. 1 is refer to, management method and the electric terminal of application program provided by the invention can be applied to the field of Fig. 1 signals
Scape, wherein, the icon of the exportable display application program of main interface, user can be by clicking on icon, and triggering icon is corresponding to be applied
The operation of program, different icons can correspond to different application programs.
Embodiment 1
Fig. 2 is the schematic flow sheet one of the management method of an application program of the invention.
It refer to Fig. 2, described method, including:
S11:In the icon of the multiple application programs of main interface output display;The multiple application program applies journey including first
Sequence, the first icon of first application program is caused by the original image determined according to user.
First application program, it can be understood as icon is determined by user, and the operation of application program needs to input and verified
The application program of authority information.First icon, it is possible to understand that for the icon of the first application program determined by user.Pass through first
First icon of application program is preset, it is possible to achieve the first application program distinctly displays, and then plays hiding first application
Program, make one to be not easy the effect for finding its actual functional capability, the identification to the first application program has carried out safeguard protection.
S12:Trigger action according to user to first icon, first application program is exported in the main interface
Authority input instruction.
Authority input instruction, it can be understood as input the arbitrary shape of authority information by interactive operation available for guiding user
Any information of formula.
S13:Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information.
Authority information, it can be understood as verifying whether the information with the first application program authority of operation.It can be with
For the information of arbitrary form and arbitrary content.
S14:Judge whether the authority information is verified.
If the determination result is YES, then implementation steps S15:Run first application program.I.e.:If the authority information is tested
Card passes through, then runs first application program.
The management method for the application program that the present embodiment provides, passes through the figure in the multiple application programs of main interface output display
Mark, the multiple application program include the first application program, and the first icon of first application program is to be determined according to user
Original image caused by, the present invention realize distinctly displaying for the first application program, hiding first application program can be played, made
People is not easy to find the effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also
Instruction is inputted by the authority that first application program is exported in the main interface;And acquisition user is defeated according to the authority
Enter the authority information of instruction input, and verify the authority information;If the authority information is verified, described first is run
Application program, the present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program is entered
Safeguard protection is gone.
Embodiment 2
Fig. 3 is the schematic flow sheet two of the management method of an application program of the invention.
It refer to Fig. 3, described method, including:
S201:Receive the reference information and program identification of user's input.
Program identification, for indicating first application program.Program identification can be any form of data.It is specific real
During applying, at least one of can be included:Program name, program ID, the developer etc. of program.
S202:Identified according to described program, determine the used K account of first application program.
K account, it can be understood as used K account when the first application program is run.By K account really
It is fixed, different accounts can be distinguished and realize priority assignation, such as:Some accounts can set Authority Verification, that is, need to input authority
Information is simultaneously verified to it;Some accounts can be then not provided with;Different accounts can also correspond to different authority informations.By
Information after application program is entered is associated with account, and for partial account number, its information needs to protect, for other accounts of part
Number, in the case that information is without protection, Authority Verification can be not provided with;For the stronger account of relevance, can set identical
Reference information, to carry out Authority Verification.
S203:Target account is determined in the K account, and establishes pair of the reference information and the target account
It should be related to.
Target account, it can be understood as the account selected during implementation steps S203.It can be an account, can also
For multiple accounts, each implementation steps S203 can correspond to a reference information;Can by the way that implementation steps S203 is repeated several times
To set multiple reference informations.By step S203, account, which can be set, has targetedly reference information.
In addition, a target account can be corresponding with multiple reference informations, multiple target accounts can also be with a reference
Information is corresponding.As long as realizing the foundation of corresponding relation, the description of embodiment of above is not just departed from.
In one of which embodiment, the determination target account in the K account, including:According to it is following at least
One of, determine the target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
It can be seen that the determination of target account can automatically select, or user's selection.It enriches target account
Number determine diversity.
It can be reference information corresponding to the first application program and its account setting by step S201 to step S203, be
The checking of authority information provides judgement basis, realizes the operation to the first application program indirectly and carries out safeguard protection.
Meanwhile on the basis of with reference information, distinctly displaying for the first application program can be also realized, and then realize:
First icon of first application program is caused by the original image determined according to user.
Specifically, it can include:
S204:Obtain the original image.
It original image, can be the arbitrary image of user's selection, such as can be photo, screen interception that shooting obtains
Picture, online storage or photo of download etc..
S205:The original image is cut according to the first length-width ratio, with image after being cut.
First length-width ratio, can be the standard size of icon.
In addition, when cutting, position and the size of cutting can be by specific in the identification selection original image to image
Region, for example, facial contour region can be selected, human body contour outline region;The position of cutting can also be by using
The active at family is selected to realize, for example, user can drag pre-selection frame, the position of adjustment pre-selection frame and size, preselects the length of frame
Wide ratio is the first length-width ratio, after user determines, can cut to obtain the area image in pre-selection frame, in this, as the cutting
Image afterwards.
S206:It is first resolution by the resolution adjustment of image after the cutting, to obtain described in first resolution
First icon.
First resolution, can be the resolution ratio shown suitable for icon.
By the first length-width ratio and first resolution, the first icon that the present embodiment obtains can be more suitable for application program image
Target is shown.
Can be that distinctly displaying for the first application program provides basis by step S204 to step S206, so as to first
The identification of application program has carried out safeguard protection.
S207:In the icon of the multiple application programs of main interface output display;The multiple application program includes the first application
Program, the first icon of first application program is caused by the original image determined according to user.
First application program, it can be understood as icon is determined by user, and the operation of application program needs to input and verified
The application program of authority information.First icon, it is possible to understand that for the icon of the first application program determined by user.Pass through first
First icon of application program is preset, it is possible to achieve the first application program distinctly displays, and then plays hiding first application
Program, make one to be not easy the effect for finding its actual functional capability, the identification to the first application program has carried out safeguard protection.
Fig. 4 is the interface schematic diagram one of an electric terminal of the invention;Fig. 5 is the interface schematic diagram of an electric terminal of the invention
Two.
Fig. 4 and Fig. 5 are refer to, in order to make it easy to understand, the icon for wherein beating oblique line can be understood as the first application program,
In specific implementation process, it can be arbitrary display icon.In specific implementation process, other applications can also be used
Icon, for example, the icon that the icon of bank application can be by User Defined for computer, to realize to application program
Hide.
First icon of the first application program, do not lain in the difference of the icons of other applications be particularly shown why,
And be, the first icon is confirmed by user, and what nonsystematic automatically generated, it is seen then that it can be different from existing correlation technique
The automatic change for automatically generating icon when being converted with theme of middle icon.First icon of the present embodiment should for specific first
Specifically set with program.
In addition, in specific implementation process, first application program can correspond to first icon, can also correspond to
Multiple first icons, according to residing region, the time, period difference, the first icon can change, for example, for same
Individual first application program, its first icon can use a white icon on daytime, can automatically become turn to one at night
The icon of individual yellow.By the change of the first icon, the concealment effect of the first application program can also be further improved, improves peace
Quan Xing.
S208:Trigger action according to user to first icon, journey is applied in main interface output described first
The authority input instruction of sequence.
Authority input instruction, it can be understood as input the arbitrary shape of authority information by interactive operation available for guiding user
Any information of formula.
In the embodiment of Fig. 4 signals, it can be a dialog box for being used to guide input password, numeral is illustrated in figure
Keyboard, in other optional embodiments, any inputting interfaces such as alphabetic keypad, nine grids, the number that can be inputted can also be used
Can also be letter, word etc. according to the numeral for being also not necessarily limited to diagram.In the embodiment of Fig. 5 signals, or one is used for
The interface of guiding input fingerprint.Different with the form of reference information according to authority information, the way of output of instruction can also be various
Change.Indicated in addition, authority input instruction can also be voice, the mode without showing dialog box.
S209:Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information.
Authority information, it can be understood as verifying whether the information with the first application program authority of operation.It can be with
For the information of arbitrary form and arbitrary content.Authority information can include at least one of:Encrypted message;Finger print information;Language
Message ceases.In the embodiment of Fig. 4 signals, authority information is encrypted message;In the embodiment of Fig. 5 signals, authority information
For finger print information.
After step S209, it can include:Judge whether the authority information is verified.
If the determination result is YES, then implement:Run first application program.I.e.:If the authority information is verified,
Then run first application program.
Specifically, it can include:
S210:Judge whether used account is the target account during the last operation.
If so, then implementation steps S211:According to the corresponding relation and the target account, the reference information is determined.
I.e. if it is determined that used account is the target account during the last operation, then according to the corresponding relation and described
Target account, determine the reference information.
If it is not, then implementation steps S216:First application program is run according to first trigger request, and described the
Used account during the last operation is used when one application program is run.If it is determined that the last operation when institute
The non-target account of account used, then first application program is run according to first trigger request, and described the
Used account during the last operation is used when one application program is run.
Under the embodiment, it can be understood as:If not, then it is assumed that corresponding account is not for there is provided the mesh of reference information
Account is marked, i.e. its information need not be protected, and under which, can be directly entered the first application program.
Pass through step S210 judgement, it is possible to achieve the difference of target account and non-targeted account is implemented, and is ensureing mesh
In the case of marking account information safety, the checking of authority information can also be avoided also to make the normal use of the first application program
It must protect more targeted.
S212:Obtain the first account information of first application program.
First account information, used account when being run for representing that first application program is the last.First
Account information is specifically as follows account name, account mailbox, account cell-phone number etc..
S213:Reference information corresponding to the account information is compared with the authority information.
S214:Judge whether the authority information and the similarity of the reference information are more than preset value.
If so, then implementation steps S215:Confirm that the authority information is verified.
If it is not, can then confirm authentication failed, i.e., refusal runs the first application program.
If reference information and authority information are password, can be understood as:The preset value of similarity can be a hundred per cent,
If reference information and authority information are fingerprint or voice etc., the preset value of its similarity can the priori determination according to
Any number.
The management method of application program provided by the invention, pass through the figure in the multiple application programs of main interface output display
Mark, the multiple application program include the first application program, and the first icon of first application program is to be determined according to user
Original image caused by, the present invention realize distinctly displaying for the first application program, hiding first application program can be played, made
People is not easy to find the effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present invention is also logical
Cross the authority input instruction that first application program is exported in the main interface;And obtain user and inputted according to the authority
The authority information of input is indicated, and verifies the authority information;If the authority information is verified, running described first should
With program, the present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program is carried out
Safeguard protection.
Embodiment 3
Fig. 6 is the structural representation one of an electric terminal of the invention.
It refer to Fig. 6, described terminal, including:
First output module 31, it is the multiple to apply journey for the icon in the multiple application programs of main interface output display
Sequence includes the first application program, and the first icon of first application program is caused by the original image determined according to user.
Second output module 32, for the trigger action according to user to first icon, exported in the main interface
The authority input instruction of first application program.
Authentication module 33, the authority information for indicating to input is inputted according to the authority for obtaining user, and described in checking
Authority information;If the authority information is verified, first application program is run.
The electric terminal that the present embodiment provides is described more by the icon in the multiple application programs of main interface output display
Individual application program includes the first application program, and the first icon of first application program is the original image determined according to user
Caused, the present invention realizes distinctly displaying for the first application program, can play hiding first application program, make one to be not easy to find
The effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also by described
Main interface exports the authority input instruction of first application program;And obtain user and instruction input is inputted according to the authority
Authority information, and verify the authority information;If the authority information is verified, first application program is run,
The present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safe guarantor
Shield.
Fig. 7 is the structural representation two of an electric terminal of the invention.
It refer to Fig. 7, described terminal, including:
First output module 47, it is the multiple to apply journey for the icon in the multiple application programs of main interface output display
Sequence includes the first application program, and the first icon of first application program is caused by the original image determined according to user.
Second output module 48, for the trigger action according to user to first icon, exported in the main interface
The authority input instruction of first application program.
Authentication module 49, the authority information for indicating to input is inputted according to the authority for obtaining user, and described in checking
Authority information;If the authority information is verified, first application program is run.
Optionally, the authentication module 49 is specifically used for:
Obtain the first account information of first application program;First account information is used to represent that described first should
Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed
Pass through.
Optionally, described terminal, in addition to:
Receiving module 41, for receiving the reference information and program identification of user's input, described program, which identifies, to be used for
Indicate first application program.
Determining module 42, for being identified according to described program, determine the used K account of first application program.
Module 43 is established, for determining target account in the K account, and establishes the reference information and the mesh
Mark the corresponding relation of account.
The authentication module 49, is specifically used for, however, it is determined that used account is the mesh during the last operation
Account is marked, then according to the corresponding relation and the target account, determines the reference information.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described
Target account:First application program uses the accumulated time of each account;First application program uses the frequency of each account
Rate;First application program uses the nearest time of each account;The selection information of user's input, the selection information are used to refer to
Show the account that user determines.
Described terminal, in addition to:
Module is run, for if it is determined that used account non-target account during the last operation, then root
First application program is run according to first trigger request, and described nearest one is used during first application program operation
Used account during secondary operation.
Optionally, described terminal, in addition to:
Acquisition module 44, for obtaining the original image.
Module 45 is cut, for cutting the original image according to the first length-width ratio, with image after being cut.
Adjusting module 46, for being first resolution by the resolution adjustment of image after the cutting, to obtain first point
First icon of resolution.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
The electric terminal that the present embodiment provides is described more by the icon in the multiple application programs of main interface output display
Individual application program includes the first application program, and the first icon of first application program is the original image determined according to user
Caused, the present invention realizes distinctly displaying for the first application program, can play hiding first application program, make one to be not easy to find
The effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also by described
Main interface exports the authority input instruction of first application program;And obtain user and instruction input is inputted according to the authority
Authority information, and verify the authority information;If the authority information is verified, first application program is run,
The present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safe guarantor
Shield.
Embodiment 5
Fig. 8 is the structural representation three of an electric terminal of the invention.
Fig. 8 is refer to, electric terminal 50 includes:Processor 51 and memory 52;Wherein
Memory 52, for storing computer program, the memory can also be flash (flash memory).
Processor 51, for performing the execute instruction of memory storage, to realize each step in the above method.Specifically
It may refer to the associated description in previous methods embodiment.
Alternatively, memory 52 can also be integrated with processor 51.
When the memory 52 is independently of the device outside processor 51, the electric terminal 50 can also include:
Bus 53, for connecting the memory 52 and processor 51.
Embodiment 6
The present embodiment provides a kind of readable storage medium storing program for executing, is stored with execute instruction in readable storage medium storing program for executing, works as electric terminal
At least one computing device execute instruction when, electric terminal performs the method that above-mentioned various embodiments provide.
Embodiment 7
The present embodiment provides a kind of program product, and the program product includes execute instruction, and the execute instruction is stored in readable
In storage medium.At least one processor of electric terminal can read the execute instruction from readable storage medium storing program for executing, at least one
The computing device execute instruction causes electric terminal to implement the method that above-mentioned various embodiments provide.
In addition, the method shown in the present embodiment, accordingly can be used for the technical scheme for implementing Fig. 1 shown device embodiments,
The implication of its realization principle, technique effect and term is similar, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to
The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey
Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
- A kind of 1. management method of application program, it is characterised in that including:In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program, described First icon of the first application program is caused by the original image determined according to user;Trigger action according to user to first icon, the authority that first application program is exported in the main interface are defeated Enter instruction;Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;If the authority information is verified, first application program is run.
- 2. according to the method for claim 1, it is characterised in that the checking authority information, including:Obtain the first account information of first application program;First account information is used to represent that described first applies journey Used account during the operation of sequence the last time;Reference information corresponding to the account information is compared with the authority information;If the similarity of the authority information and the reference information is more than preset value, confirm that the authority information checking is logical Cross.
- 3. according to the method for claim 2, it is characterised in that the figure in the multiple application programs of main interface output display Before mark, in addition to:Also include:The reference information and program identification of user's input are received, described program is identified for indicating that described first applies journey Sequence;Identified according to described program, determine the used K account of first application program,Target account is determined in the K account, and establishes the corresponding relation of the reference information and the target account;Before the checking authority information, in addition to:If it is determined that used account is the target account during the last operation, then according to the corresponding relation and institute Target account is stated, determines the reference information.
- 4. according to the method for claim 3, it is characterised in that described that target account, bag are determined in the K account Include:According at least one of, the target account is determined:First application program uses the accumulated time of each account;First application program uses the frequency of each account;First application program uses the nearest time of each account;The selection information of user's input, the selection information are used for the account that instruction user determines.
- 5. according to the method for claim 3, it is characterised in that if it is determined that used account during the last operation The non-target account, then first application program, and first application program are run according to first trigger request Used account during the last operation is used during operation.
- 6. according to the method described in any one of claim 1 to 5, it is characterised in that it is described main interface output display it is multiple should Before the icon of program, including:Obtain the original image;The original image is cut according to the first length-width ratio, with image after being cut;It is first resolution by the resolution adjustment of image after the cutting, to obtain first icon of first resolution.
- 7. according to the method described in any one of claim 1 to 5, it is characterised in that the authority information include it is following at least it One:Encrypted message;Finger print information;Voice messaging.
- A kind of 8. electric terminal, it is characterised in that including:First output module, for the icon in the multiple application programs of main interface output display, the multiple application program includes First application program, the first icon of first application program is caused by the original image determined according to user;Second output module, for the trigger action according to user to first icon, in main interface output described the The authority input instruction of one application program;Authentication module, the authority information for indicating to input is inputted according to the authority for obtaining user, and verify the authority letter Breath;If the authority information is verified, first application program is run.
- 9. terminal according to claim 8, it is characterised in that the authentication module is specifically used for:Obtain the first account information of first application program;First account information is used to represent that described first applies journey Used account during the operation of sequence the last time;Reference information corresponding to the account information is compared with the authority information;If the similarity of the authority information and the reference information is more than preset value, confirm that the authority information checking is logical Cross.
- 10. terminal according to claim 9, it is characterised in that also include:Receiving module, for receiving the reference information and program identification of user's input, described program is identified for indicating institute State the first application program;Determining module, for being identified according to described program, the used K account of first application program is determined,Module is established, for determining target account in the K account, and establishes the reference information and the target account Corresponding relation;The authentication module, is specifically used for, however, it is determined that and used account is the target account during the last operation, Then according to the corresponding relation and the target account, the reference information is determined.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710887681.1A CN107808080A (en) | 2017-09-27 | 2017-09-27 | The management method and electric terminal of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710887681.1A CN107808080A (en) | 2017-09-27 | 2017-09-27 | The management method and electric terminal of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107808080A true CN107808080A (en) | 2018-03-16 |
Family
ID=61591764
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710887681.1A Pending CN107808080A (en) | 2017-09-27 | 2017-09-27 | The management method and electric terminal of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107808080A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109298910A (en) * | 2018-09-14 | 2019-02-01 | Oppo广东移动通信有限公司 | A kind of method, mobile terminal and the computer readable storage medium of window exhalation |
CN110457921A (en) * | 2019-08-01 | 2019-11-15 | 维沃移动通信有限公司 | Right management method and terminal device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102664991A (en) * | 2012-03-29 | 2012-09-12 | 上海华勤通讯技术有限公司 | Mobile terminal and function icon setting method thereof |
CN105303100A (en) * | 2015-09-30 | 2016-02-03 | 北京奇虎科技有限公司 | Verification method and device of application program startup |
CN105825382A (en) * | 2015-09-14 | 2016-08-03 | 维沃移动通信有限公司 | Mobile payment method and electronic device |
CN106203040A (en) * | 2016-06-30 | 2016-12-07 | 广州云移信息科技有限公司 | Application program launching method based on biological characteristic and system |
-
2017
- 2017-09-27 CN CN201710887681.1A patent/CN107808080A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102664991A (en) * | 2012-03-29 | 2012-09-12 | 上海华勤通讯技术有限公司 | Mobile terminal and function icon setting method thereof |
CN105825382A (en) * | 2015-09-14 | 2016-08-03 | 维沃移动通信有限公司 | Mobile payment method and electronic device |
CN105303100A (en) * | 2015-09-30 | 2016-02-03 | 北京奇虎科技有限公司 | Verification method and device of application program startup |
CN106203040A (en) * | 2016-06-30 | 2016-12-07 | 广州云移信息科技有限公司 | Application program launching method based on biological characteristic and system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109298910A (en) * | 2018-09-14 | 2019-02-01 | Oppo广东移动通信有限公司 | A kind of method, mobile terminal and the computer readable storage medium of window exhalation |
CN110457921A (en) * | 2019-08-01 | 2019-11-15 | 维沃移动通信有限公司 | Right management method and terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI684895B (en) | Business implementation method and device based on virtual reality scene | |
CN106302330B (en) | Identity verification method, device and system | |
Li et al. | Unobservable re-authentication for smartphones. | |
JP2019522278A (en) | Identification method and apparatus | |
CN104915832B (en) | Mobile payment, verification method and its device and system | |
CN105245489B (en) | Verification method and device | |
CN105929974B (en) | A kind of Password Input management method and mobile terminal | |
CN109670312A (en) | Method of controlling security and computer system | |
CN106098069B (en) | Identity authentication method and terminal equipment | |
CN109756458A (en) | Identity identifying method and system | |
CN106888204B (en) | Implicit identity authentication method based on natural interaction | |
CN110348193A (en) | Verification method, device, equipment and storage medium | |
WO2016045225A1 (en) | Password fault tolerance method based on mouse behaviour | |
CN109829277A (en) | Terminal unlock method, device, computer equipment and storage medium | |
CN108596752A (en) | Password remapping method, system, self-aided terminal and computer readable storage medium | |
CN107808080A (en) | The management method and electric terminal of application program | |
CN114004639B (en) | Method, device, computer equipment and storage medium for recommending preferential information | |
Berghoff et al. | The interplay of AI and biometrics: Challenges and opportunities | |
CN105160274A (en) | User data protection method and terminal | |
KR20130093757A (en) | User authetication method based on mission gesture recognition, and computer-readable recording medium with user authetication program based on mission gesture recognition | |
CN107633174A (en) | A kind of user inputs management method and device, terminal | |
CN110795706B (en) | Hash-based verification method, equipment, storage medium and device | |
CN106098070B (en) | identity authentication method and network system | |
CN108460269A (en) | Verification method and device, verification terminal device | |
US20140304789A1 (en) | Convenient one-time password |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180316 |
|
WD01 | Invention patent application deemed withdrawn after publication |