CN107808080A - The management method and electric terminal of application program - Google Patents

The management method and electric terminal of application program Download PDF

Info

Publication number
CN107808080A
CN107808080A CN201710887681.1A CN201710887681A CN107808080A CN 107808080 A CN107808080 A CN 107808080A CN 201710887681 A CN201710887681 A CN 201710887681A CN 107808080 A CN107808080 A CN 107808080A
Authority
CN
China
Prior art keywords
application program
account
information
authority
icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710887681.1A
Other languages
Chinese (zh)
Inventor
刘国政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Green Orange Industry Co Ltd
Original Assignee
Shanghai Green Orange Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Green Orange Industry Co Ltd filed Critical Shanghai Green Orange Industry Co Ltd
Priority to CN201710887681.1A priority Critical patent/CN107808080A/en
Publication of CN107808080A publication Critical patent/CN107808080A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a kind of management method of application program and electric terminal, described method, including:In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program, and the first icon of first application program is caused by the original image determined according to user;Trigger action according to user to first icon, the authority that first application program is exported in the main interface input instruction;Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;If the authority information is verified, first application program is run.The present invention realizes distinctly displaying for the first application program, can play hiding first application program, makes one to be not easy the effect for finding its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present invention also provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safeguard protection.

Description

The management method and electric terminal of application program
Technical field
The present invention relates to the management method and electric terminal of electric terminal, more particularly to a kind of application program.
Background technology
Electric terminal, it can be understood as there is the terminal of processor and memory, processor reads the code in memory, Corresponding function can be performed, various application program is realized wherein it is possible to run.With the variation of electric terminal function, The information of each application program storage is also more and more diversified, to the demand of Information Security also more and more higher.
In existing correlation technique, system can be protected by the authority information of operating system, can also passed through The setting of file password is protected to file data.
However, existing protected mode is only capable of being protected for system and file, application program lack of targeted is protected Shield.
The content of the invention
The present invention provides a kind of management method and electric terminal of application program, to solve to application program lack of targeted The problem of protection.
According to the first aspect of the invention, there is provided a kind of management method of application program, including:
In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program, First icon of first application program is caused by the original image determined according to user;
Trigger action according to user to first icon, the power of first application program is exported in the main interface Limit input instruction;
Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;
If the authority information is verified, first application program is run.
Optionally, the checking authority information, including:
Obtain the first account information of first application program;First account information is used to represent that described first should Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed Pass through.
Optionally, it is described before the icon of the multiple application programs of main interface output display, in addition to:Also include:
The reference information and program identification of user's input are received, described program is identified for indicating first application Program;
Identified according to described program, determine the used K account of first application program,
Target account is determined in the K account, and establishes reference information pass corresponding with the target account System;
Before the checking authority information, in addition to:
If it is determined that used account is the target account during the last operation, then according to the corresponding relation With the target account, the reference information is determined.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described Target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
Optionally, however, it is determined that used account non-target account during the last operation, then according to First trigger request runs first application program, and the last operation is used during first application program operation When used account.
Optionally, it is described before the icon of the multiple application programs of main interface output display, including:
Obtain the original image;
The original image is cut according to the first length-width ratio, with image after being cut;
It is first resolution by the resolution adjustment of image after the cutting, to obtain first figure of first resolution Mark.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
According to the second aspect of the invention, there is provided a kind of electric terminal, including:
First output module, for the icon in the multiple application programs of main interface output display, the multiple application program Including the first application program, the first icon of first application program is caused by the original image determined according to user;
Second output module, for the trigger action according to user to first icon, institute is exported in the main interface State the authority input instruction of the first application program;
Authentication module, the authority information for indicating to input is inputted according to the authority for obtaining user, and verify the power Limit information;
If the authority information is verified, first application program is run..
Optionally, the authentication module is specifically used for:
Obtain the first account information of first application program;First account information is used to represent that described first should Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed Pass through.
Optionally, described terminal, in addition to:
Receiving module, for receiving the reference information and program identification of user's input, described program is identified for referring to Show first application program;
Determining module, for being identified according to described program, the used K account of first application program is determined,
Module is established, for determining target account in the K account, and establishes the reference information and the target The corresponding relation of account;
The authentication module, is specifically used for, however, it is determined that used account is the target during the last operation Account, then according to the corresponding relation and the target account, determine the reference information.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described Target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
Described terminal, in addition to:
Module is run, for if it is determined that used account non-target account during the last operation, then root First application program is run according to first trigger request, and described nearest one is used during first application program operation Used account during secondary operation.
Optionally, described terminal, in addition to:
Acquisition module, for obtaining the original image;
Module is cut, for cutting the original image according to the first length-width ratio, with image after being cut;
Adjusting module, for being first resolution by the resolution adjustment of image after the cutting, to obtain the first resolution First icon of rate.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
The management method and electric terminal of application program provided by the invention, by the multiple applications of main interface output display The icon of program, the multiple application program include the first application program, according to the first icon of first application program Caused by the original image that user determines, the present invention realizes distinctly displaying for the first application program, and can play hiding first should With program, make one to be not easy the effect for finding its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.
The present invention also inputs instruction by exporting the authority of first application program in the main interface;And obtain and use Family inputs the authority information of instruction input according to the authority, and verifies the authority information;If the authority information checking is logical Cross, then run first application program, the present invention provides checking for the triggering operation of the first application program, so as to first The operation of application program has carried out safeguard protection.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is an application scenarios schematic diagram of the invention;
Fig. 2 is the schematic flow sheet one of the management method of an application program of the invention;
Fig. 3 is the schematic flow sheet two of the management method of an application program of the invention;
Fig. 4 is the interface schematic diagram one of an electric terminal of the invention;
Fig. 5 is the interface schematic diagram two of an electric terminal of the invention;
Fig. 6 is the structural representation one of an electric terminal of the invention;
Fig. 7 is the structural representation two of an electric terminal of the invention;
Fig. 8 is the structural representation three of an electric terminal of the invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Term " first ", " second ", " the 3rd " " in description and claims of this specification and above-mentioned accompanying drawing The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage The data that solution so uses can exchange in the appropriate case, so as to embodiments of the invention described herein for example can with except Order beyond those for illustrating or describing herein is implemented.In addition, term " comprising " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, production Product or equipment are not necessarily limited to those steps clearly listed or unit, but may include not list clearly or for this The intrinsic other steps of a little process, method, product or equipment or unit.
Technical scheme is described in detail with specifically embodiment below.These specific implementations below Example can be combined with each other, and may be repeated no more for same or analogous concept or process in some embodiments.
Fig. 1 is an application scenarios schematic diagram of the invention.
Fig. 1 is refer to, management method and the electric terminal of application program provided by the invention can be applied to the field of Fig. 1 signals Scape, wherein, the icon of the exportable display application program of main interface, user can be by clicking on icon, and triggering icon is corresponding to be applied The operation of program, different icons can correspond to different application programs.
Embodiment 1
Fig. 2 is the schematic flow sheet one of the management method of an application program of the invention.
It refer to Fig. 2, described method, including:
S11:In the icon of the multiple application programs of main interface output display;The multiple application program applies journey including first Sequence, the first icon of first application program is caused by the original image determined according to user.
First application program, it can be understood as icon is determined by user, and the operation of application program needs to input and verified The application program of authority information.First icon, it is possible to understand that for the icon of the first application program determined by user.Pass through first First icon of application program is preset, it is possible to achieve the first application program distinctly displays, and then plays hiding first application Program, make one to be not easy the effect for finding its actual functional capability, the identification to the first application program has carried out safeguard protection.
S12:Trigger action according to user to first icon, first application program is exported in the main interface Authority input instruction.
Authority input instruction, it can be understood as input the arbitrary shape of authority information by interactive operation available for guiding user Any information of formula.
S13:Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information.
Authority information, it can be understood as verifying whether the information with the first application program authority of operation.It can be with For the information of arbitrary form and arbitrary content.
S14:Judge whether the authority information is verified.
If the determination result is YES, then implementation steps S15:Run first application program.I.e.:If the authority information is tested Card passes through, then runs first application program.
The management method for the application program that the present embodiment provides, passes through the figure in the multiple application programs of main interface output display Mark, the multiple application program include the first application program, and the first icon of first application program is to be determined according to user Original image caused by, the present invention realize distinctly displaying for the first application program, hiding first application program can be played, made People is not easy to find the effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also Instruction is inputted by the authority that first application program is exported in the main interface;And acquisition user is defeated according to the authority Enter the authority information of instruction input, and verify the authority information;If the authority information is verified, described first is run Application program, the present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program is entered Safeguard protection is gone.
Embodiment 2
Fig. 3 is the schematic flow sheet two of the management method of an application program of the invention.
It refer to Fig. 3, described method, including:
S201:Receive the reference information and program identification of user's input.
Program identification, for indicating first application program.Program identification can be any form of data.It is specific real During applying, at least one of can be included:Program name, program ID, the developer etc. of program.
S202:Identified according to described program, determine the used K account of first application program.
K account, it can be understood as used K account when the first application program is run.By K account really It is fixed, different accounts can be distinguished and realize priority assignation, such as:Some accounts can set Authority Verification, that is, need to input authority Information is simultaneously verified to it;Some accounts can be then not provided with;Different accounts can also correspond to different authority informations.By Information after application program is entered is associated with account, and for partial account number, its information needs to protect, for other accounts of part Number, in the case that information is without protection, Authority Verification can be not provided with;For the stronger account of relevance, can set identical Reference information, to carry out Authority Verification.
S203:Target account is determined in the K account, and establishes pair of the reference information and the target account It should be related to.
Target account, it can be understood as the account selected during implementation steps S203.It can be an account, can also For multiple accounts, each implementation steps S203 can correspond to a reference information;Can by the way that implementation steps S203 is repeated several times To set multiple reference informations.By step S203, account, which can be set, has targetedly reference information.
In addition, a target account can be corresponding with multiple reference informations, multiple target accounts can also be with a reference Information is corresponding.As long as realizing the foundation of corresponding relation, the description of embodiment of above is not just departed from.
In one of which embodiment, the determination target account in the K account, including:According to it is following at least One of, determine the target account:
First application program uses the accumulated time of each account;
First application program uses the frequency of each account;
First application program uses the nearest time of each account;
The selection information of user's input, the selection information are used for the account that instruction user determines.
It can be seen that the determination of target account can automatically select, or user's selection.It enriches target account Number determine diversity.
It can be reference information corresponding to the first application program and its account setting by step S201 to step S203, be The checking of authority information provides judgement basis, realizes the operation to the first application program indirectly and carries out safeguard protection.
Meanwhile on the basis of with reference information, distinctly displaying for the first application program can be also realized, and then realize: First icon of first application program is caused by the original image determined according to user.
Specifically, it can include:
S204:Obtain the original image.
It original image, can be the arbitrary image of user's selection, such as can be photo, screen interception that shooting obtains Picture, online storage or photo of download etc..
S205:The original image is cut according to the first length-width ratio, with image after being cut.
First length-width ratio, can be the standard size of icon.
In addition, when cutting, position and the size of cutting can be by specific in the identification selection original image to image Region, for example, facial contour region can be selected, human body contour outline region;The position of cutting can also be by using The active at family is selected to realize, for example, user can drag pre-selection frame, the position of adjustment pre-selection frame and size, preselects the length of frame Wide ratio is the first length-width ratio, after user determines, can cut to obtain the area image in pre-selection frame, in this, as the cutting Image afterwards.
S206:It is first resolution by the resolution adjustment of image after the cutting, to obtain described in first resolution First icon.
First resolution, can be the resolution ratio shown suitable for icon.
By the first length-width ratio and first resolution, the first icon that the present embodiment obtains can be more suitable for application program image Target is shown.
Can be that distinctly displaying for the first application program provides basis by step S204 to step S206, so as to first The identification of application program has carried out safeguard protection.
S207:In the icon of the multiple application programs of main interface output display;The multiple application program includes the first application Program, the first icon of first application program is caused by the original image determined according to user.
First application program, it can be understood as icon is determined by user, and the operation of application program needs to input and verified The application program of authority information.First icon, it is possible to understand that for the icon of the first application program determined by user.Pass through first First icon of application program is preset, it is possible to achieve the first application program distinctly displays, and then plays hiding first application Program, make one to be not easy the effect for finding its actual functional capability, the identification to the first application program has carried out safeguard protection.
Fig. 4 is the interface schematic diagram one of an electric terminal of the invention;Fig. 5 is the interface schematic diagram of an electric terminal of the invention Two.
Fig. 4 and Fig. 5 are refer to, in order to make it easy to understand, the icon for wherein beating oblique line can be understood as the first application program, In specific implementation process, it can be arbitrary display icon.In specific implementation process, other applications can also be used Icon, for example, the icon that the icon of bank application can be by User Defined for computer, to realize to application program Hide.
First icon of the first application program, do not lain in the difference of the icons of other applications be particularly shown why, And be, the first icon is confirmed by user, and what nonsystematic automatically generated, it is seen then that it can be different from existing correlation technique The automatic change for automatically generating icon when being converted with theme of middle icon.First icon of the present embodiment should for specific first Specifically set with program.
In addition, in specific implementation process, first application program can correspond to first icon, can also correspond to Multiple first icons, according to residing region, the time, period difference, the first icon can change, for example, for same Individual first application program, its first icon can use a white icon on daytime, can automatically become turn to one at night The icon of individual yellow.By the change of the first icon, the concealment effect of the first application program can also be further improved, improves peace Quan Xing.
S208:Trigger action according to user to first icon, journey is applied in main interface output described first The authority input instruction of sequence.
Authority input instruction, it can be understood as input the arbitrary shape of authority information by interactive operation available for guiding user Any information of formula.
In the embodiment of Fig. 4 signals, it can be a dialog box for being used to guide input password, numeral is illustrated in figure Keyboard, in other optional embodiments, any inputting interfaces such as alphabetic keypad, nine grids, the number that can be inputted can also be used Can also be letter, word etc. according to the numeral for being also not necessarily limited to diagram.In the embodiment of Fig. 5 signals, or one is used for The interface of guiding input fingerprint.Different with the form of reference information according to authority information, the way of output of instruction can also be various Change.Indicated in addition, authority input instruction can also be voice, the mode without showing dialog box.
S209:Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information.
Authority information, it can be understood as verifying whether the information with the first application program authority of operation.It can be with For the information of arbitrary form and arbitrary content.Authority information can include at least one of:Encrypted message;Finger print information;Language Message ceases.In the embodiment of Fig. 4 signals, authority information is encrypted message;In the embodiment of Fig. 5 signals, authority information For finger print information.
After step S209, it can include:Judge whether the authority information is verified.
If the determination result is YES, then implement:Run first application program.I.e.:If the authority information is verified, Then run first application program.
Specifically, it can include:
S210:Judge whether used account is the target account during the last operation.
If so, then implementation steps S211:According to the corresponding relation and the target account, the reference information is determined. I.e. if it is determined that used account is the target account during the last operation, then according to the corresponding relation and described Target account, determine the reference information.
If it is not, then implementation steps S216:First application program is run according to first trigger request, and described the Used account during the last operation is used when one application program is run.If it is determined that the last operation when institute The non-target account of account used, then first application program is run according to first trigger request, and described the Used account during the last operation is used when one application program is run.
Under the embodiment, it can be understood as:If not, then it is assumed that corresponding account is not for there is provided the mesh of reference information Account is marked, i.e. its information need not be protected, and under which, can be directly entered the first application program.
Pass through step S210 judgement, it is possible to achieve the difference of target account and non-targeted account is implemented, and is ensureing mesh In the case of marking account information safety, the checking of authority information can also be avoided also to make the normal use of the first application program It must protect more targeted.
S212:Obtain the first account information of first application program.
First account information, used account when being run for representing that first application program is the last.First Account information is specifically as follows account name, account mailbox, account cell-phone number etc..
S213:Reference information corresponding to the account information is compared with the authority information.
S214:Judge whether the authority information and the similarity of the reference information are more than preset value.
If so, then implementation steps S215:Confirm that the authority information is verified.
If it is not, can then confirm authentication failed, i.e., refusal runs the first application program.
If reference information and authority information are password, can be understood as:The preset value of similarity can be a hundred per cent, If reference information and authority information are fingerprint or voice etc., the preset value of its similarity can the priori determination according to Any number.
The management method of application program provided by the invention, pass through the figure in the multiple application programs of main interface output display Mark, the multiple application program include the first application program, and the first icon of first application program is to be determined according to user Original image caused by, the present invention realize distinctly displaying for the first application program, hiding first application program can be played, made People is not easy to find the effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present invention is also logical Cross the authority input instruction that first application program is exported in the main interface;And obtain user and inputted according to the authority The authority information of input is indicated, and verifies the authority information;If the authority information is verified, running described first should With program, the present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program is carried out Safeguard protection.
Embodiment 3
Fig. 6 is the structural representation one of an electric terminal of the invention.
It refer to Fig. 6, described terminal, including:
First output module 31, it is the multiple to apply journey for the icon in the multiple application programs of main interface output display Sequence includes the first application program, and the first icon of first application program is caused by the original image determined according to user.
Second output module 32, for the trigger action according to user to first icon, exported in the main interface The authority input instruction of first application program.
Authentication module 33, the authority information for indicating to input is inputted according to the authority for obtaining user, and described in checking Authority information;If the authority information is verified, first application program is run.
The electric terminal that the present embodiment provides is described more by the icon in the multiple application programs of main interface output display Individual application program includes the first application program, and the first icon of first application program is the original image determined according to user Caused, the present invention realizes distinctly displaying for the first application program, can play hiding first application program, make one to be not easy to find The effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also by described Main interface exports the authority input instruction of first application program;And obtain user and instruction input is inputted according to the authority Authority information, and verify the authority information;If the authority information is verified, first application program is run, The present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safe guarantor Shield.
Fig. 7 is the structural representation two of an electric terminal of the invention.
It refer to Fig. 7, described terminal, including:
First output module 47, it is the multiple to apply journey for the icon in the multiple application programs of main interface output display Sequence includes the first application program, and the first icon of first application program is caused by the original image determined according to user.
Second output module 48, for the trigger action according to user to first icon, exported in the main interface The authority input instruction of first application program.
Authentication module 49, the authority information for indicating to input is inputted according to the authority for obtaining user, and described in checking Authority information;If the authority information is verified, first application program is run.
Optionally, the authentication module 49 is specifically used for:
Obtain the first account information of first application program;First account information is used to represent that described first should Used account when being run with program is the last;
Reference information corresponding to the account information is compared with the authority information;
If the similarity of the authority information and the reference information is more than preset value, the authority information checking is confirmed Pass through.
Optionally, described terminal, in addition to:
Receiving module 41, for receiving the reference information and program identification of user's input, described program, which identifies, to be used for Indicate first application program.
Determining module 42, for being identified according to described program, determine the used K account of first application program.
Module 43 is established, for determining target account in the K account, and establishes the reference information and the mesh Mark the corresponding relation of account.
The authentication module 49, is specifically used for, however, it is determined that used account is the mesh during the last operation Account is marked, then according to the corresponding relation and the target account, determines the reference information.
Optionally, the determination target account in the K account, including:According at least one of, it is determined that described Target account:First application program uses the accumulated time of each account;First application program uses the frequency of each account Rate;First application program uses the nearest time of each account;The selection information of user's input, the selection information are used to refer to Show the account that user determines.
Described terminal, in addition to:
Module is run, for if it is determined that used account non-target account during the last operation, then root First application program is run according to first trigger request, and described nearest one is used during first application program operation Used account during secondary operation.
Optionally, described terminal, in addition to:
Acquisition module 44, for obtaining the original image.
Module 45 is cut, for cutting the original image according to the first length-width ratio, with image after being cut.
Adjusting module 46, for being first resolution by the resolution adjustment of image after the cutting, to obtain first point First icon of resolution.
Optionally, the authority information includes at least one of:
Encrypted message;
Finger print information;
Voice messaging.
The electric terminal that the present embodiment provides is described more by the icon in the multiple application programs of main interface output display Individual application program includes the first application program, and the first icon of first application program is the original image determined according to user Caused, the present invention realizes distinctly displaying for the first application program, can play hiding first application program, make one to be not easy to find The effect of its actual functional capability, so as to which the identification to the first application program has carried out safeguard protection.The present embodiment is also by described Main interface exports the authority input instruction of first application program;And obtain user and instruction input is inputted according to the authority Authority information, and verify the authority information;If the authority information is verified, first application program is run, The present invention provides checking for the triggering operation of the first application program, so as to which the operation to the first application program has carried out safe guarantor Shield.
Embodiment 5
Fig. 8 is the structural representation three of an electric terminal of the invention.
Fig. 8 is refer to, electric terminal 50 includes:Processor 51 and memory 52;Wherein
Memory 52, for storing computer program, the memory can also be flash (flash memory).
Processor 51, for performing the execute instruction of memory storage, to realize each step in the above method.Specifically It may refer to the associated description in previous methods embodiment.
Alternatively, memory 52 can also be integrated with processor 51.
When the memory 52 is independently of the device outside processor 51, the electric terminal 50 can also include:
Bus 53, for connecting the memory 52 and processor 51.
Embodiment 6
The present embodiment provides a kind of readable storage medium storing program for executing, is stored with execute instruction in readable storage medium storing program for executing, works as electric terminal At least one computing device execute instruction when, electric terminal performs the method that above-mentioned various embodiments provide.
Embodiment 7
The present embodiment provides a kind of program product, and the program product includes execute instruction, and the execute instruction is stored in readable In storage medium.At least one processor of electric terminal can read the execute instruction from readable storage medium storing program for executing, at least one The computing device execute instruction causes electric terminal to implement the method that above-mentioned various embodiments provide.
In addition, the method shown in the present embodiment, accordingly can be used for the technical scheme for implementing Fig. 1 shown device embodiments, The implication of its realization principle, technique effect and term is similar, and here is omitted.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, execution the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, either which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

  1. A kind of 1. management method of application program, it is characterised in that including:
    In the icon of the multiple application programs of main interface output display, the multiple application program includes the first application program, described First icon of the first application program is caused by the original image determined according to user;
    Trigger action according to user to first icon, the authority that first application program is exported in the main interface are defeated Enter instruction;
    Obtain user and the authority information of instruction input is inputted according to the authority, and verify the authority information;
    If the authority information is verified, first application program is run.
  2. 2. according to the method for claim 1, it is characterised in that the checking authority information, including:
    Obtain the first account information of first application program;First account information is used to represent that described first applies journey Used account during the operation of sequence the last time;
    Reference information corresponding to the account information is compared with the authority information;
    If the similarity of the authority information and the reference information is more than preset value, confirm that the authority information checking is logical Cross.
  3. 3. according to the method for claim 2, it is characterised in that the figure in the multiple application programs of main interface output display Before mark, in addition to:Also include:
    The reference information and program identification of user's input are received, described program is identified for indicating that described first applies journey Sequence;
    Identified according to described program, determine the used K account of first application program,
    Target account is determined in the K account, and establishes the corresponding relation of the reference information and the target account;
    Before the checking authority information, in addition to:
    If it is determined that used account is the target account during the last operation, then according to the corresponding relation and institute Target account is stated, determines the reference information.
  4. 4. according to the method for claim 3, it is characterised in that described that target account, bag are determined in the K account Include:According at least one of, the target account is determined:
    First application program uses the accumulated time of each account;
    First application program uses the frequency of each account;
    First application program uses the nearest time of each account;
    The selection information of user's input, the selection information are used for the account that instruction user determines.
  5. 5. according to the method for claim 3, it is characterised in that if it is determined that used account during the last operation The non-target account, then first application program, and first application program are run according to first trigger request Used account during the last operation is used during operation.
  6. 6. according to the method described in any one of claim 1 to 5, it is characterised in that it is described main interface output display it is multiple should Before the icon of program, including:
    Obtain the original image;
    The original image is cut according to the first length-width ratio, with image after being cut;
    It is first resolution by the resolution adjustment of image after the cutting, to obtain first icon of first resolution.
  7. 7. according to the method described in any one of claim 1 to 5, it is characterised in that the authority information include it is following at least it One:
    Encrypted message;
    Finger print information;
    Voice messaging.
  8. A kind of 8. electric terminal, it is characterised in that including:
    First output module, for the icon in the multiple application programs of main interface output display, the multiple application program includes First application program, the first icon of first application program is caused by the original image determined according to user;
    Second output module, for the trigger action according to user to first icon, in main interface output described the The authority input instruction of one application program;
    Authentication module, the authority information for indicating to input is inputted according to the authority for obtaining user, and verify the authority letter Breath;
    If the authority information is verified, first application program is run.
  9. 9. terminal according to claim 8, it is characterised in that the authentication module is specifically used for:
    Obtain the first account information of first application program;First account information is used to represent that described first applies journey Used account during the operation of sequence the last time;
    Reference information corresponding to the account information is compared with the authority information;
    If the similarity of the authority information and the reference information is more than preset value, confirm that the authority information checking is logical Cross.
  10. 10. terminal according to claim 9, it is characterised in that also include:
    Receiving module, for receiving the reference information and program identification of user's input, described program is identified for indicating institute State the first application program;
    Determining module, for being identified according to described program, the used K account of first application program is determined,
    Module is established, for determining target account in the K account, and establishes the reference information and the target account Corresponding relation;
    The authentication module, is specifically used for, however, it is determined that and used account is the target account during the last operation, Then according to the corresponding relation and the target account, the reference information is determined.
CN201710887681.1A 2017-09-27 2017-09-27 The management method and electric terminal of application program Pending CN107808080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710887681.1A CN107808080A (en) 2017-09-27 2017-09-27 The management method and electric terminal of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710887681.1A CN107808080A (en) 2017-09-27 2017-09-27 The management method and electric terminal of application program

Publications (1)

Publication Number Publication Date
CN107808080A true CN107808080A (en) 2018-03-16

Family

ID=61591764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710887681.1A Pending CN107808080A (en) 2017-09-27 2017-09-27 The management method and electric terminal of application program

Country Status (1)

Country Link
CN (1) CN107808080A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109298910A (en) * 2018-09-14 2019-02-01 Oppo广东移动通信有限公司 A kind of method, mobile terminal and the computer readable storage medium of window exhalation
CN110457921A (en) * 2019-08-01 2019-11-15 维沃移动通信有限公司 Right management method and terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664991A (en) * 2012-03-29 2012-09-12 上海华勤通讯技术有限公司 Mobile terminal and function icon setting method thereof
CN105303100A (en) * 2015-09-30 2016-02-03 北京奇虎科技有限公司 Verification method and device of application program startup
CN105825382A (en) * 2015-09-14 2016-08-03 维沃移动通信有限公司 Mobile payment method and electronic device
CN106203040A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Application program launching method based on biological characteristic and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664991A (en) * 2012-03-29 2012-09-12 上海华勤通讯技术有限公司 Mobile terminal and function icon setting method thereof
CN105825382A (en) * 2015-09-14 2016-08-03 维沃移动通信有限公司 Mobile payment method and electronic device
CN105303100A (en) * 2015-09-30 2016-02-03 北京奇虎科技有限公司 Verification method and device of application program startup
CN106203040A (en) * 2016-06-30 2016-12-07 广州云移信息科技有限公司 Application program launching method based on biological characteristic and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109298910A (en) * 2018-09-14 2019-02-01 Oppo广东移动通信有限公司 A kind of method, mobile terminal and the computer readable storage medium of window exhalation
CN110457921A (en) * 2019-08-01 2019-11-15 维沃移动通信有限公司 Right management method and terminal device

Similar Documents

Publication Publication Date Title
TWI684895B (en) Business implementation method and device based on virtual reality scene
CN106302330B (en) Identity verification method, device and system
Li et al. Unobservable re-authentication for smartphones.
JP2019522278A (en) Identification method and apparatus
CN104915832B (en) Mobile payment, verification method and its device and system
CN105245489B (en) Verification method and device
CN105929974B (en) A kind of Password Input management method and mobile terminal
CN109670312A (en) Method of controlling security and computer system
CN106098069B (en) Identity authentication method and terminal equipment
CN109756458A (en) Identity identifying method and system
CN106888204B (en) Implicit identity authentication method based on natural interaction
CN110348193A (en) Verification method, device, equipment and storage medium
WO2016045225A1 (en) Password fault tolerance method based on mouse behaviour
CN109829277A (en) Terminal unlock method, device, computer equipment and storage medium
CN108596752A (en) Password remapping method, system, self-aided terminal and computer readable storage medium
CN107808080A (en) The management method and electric terminal of application program
CN114004639B (en) Method, device, computer equipment and storage medium for recommending preferential information
Berghoff et al. The interplay of AI and biometrics: Challenges and opportunities
CN105160274A (en) User data protection method and terminal
KR20130093757A (en) User authetication method based on mission gesture recognition, and computer-readable recording medium with user authetication program based on mission gesture recognition
CN107633174A (en) A kind of user inputs management method and device, terminal
CN110795706B (en) Hash-based verification method, equipment, storage medium and device
CN106098070B (en) identity authentication method and network system
CN108460269A (en) Verification method and device, verification terminal device
US20140304789A1 (en) Convenient one-time password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180316

WD01 Invention patent application deemed withdrawn after publication