CN108171065A - A kind of application encryption method and terminal device - Google Patents

A kind of application encryption method and terminal device Download PDF

Info

Publication number
CN108171065A
CN108171065A CN201711331944.7A CN201711331944A CN108171065A CN 108171065 A CN108171065 A CN 108171065A CN 201711331944 A CN201711331944 A CN 201711331944A CN 108171065 A CN108171065 A CN 108171065A
Authority
CN
China
Prior art keywords
rotation
application
application icon
rotation process
presumptive area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711331944.7A
Other languages
Chinese (zh)
Inventor
於智超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201711331944.7A priority Critical patent/CN108171065A/en
Publication of CN108171065A publication Critical patent/CN108171065A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application involves intelligent terminal technical field, more particularly to a kind of application encryption method and terminal device, wherein, it is applied to terminal device using encryption method, the method includes:Choose application icon;Obtain rotation instruction;Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;Judge whether the rotation process meets pre-defined rule;If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs cryptographic operation;Above-mentioned technical proposal is by choosing application icon; then rotation process is carried out according to pre-defined rule to the presumptive area of the application icon; can quick pair of corresponding with the application icon chosen intended application perform cryptographic operation; it is simple and fast; it is easy to operation; the safety of energy effective protection application, improves the intelligent level of terminal device and the usage experience of user.

Description

A kind of application encryption method and terminal device
Technical field
This application involves intelligent terminal technical field, more particularly to a kind of application encryption method and terminal device.
Background technology
With the continuous development of intelligent terminal technology, intelligent terminal becomes the indispensable communication tool of people's daily life With the conserving appliance of private data, therefore, safety and the usage experience of user are also increasingly focused in the design of intelligent terminal.
In general, user, which understands, installs multiple application programs in intelligent terminal, the use of application program can increase the experience of user Effect, but also bring along access safety problem;If the application on intelligent terminal is easily checked or is opened by other people, safety compared with Difference, user experience are poor.
At present, in order to ensure the access safety of application program, application program can be encrypted setting;It accesses encrypted During application program, only inputting correct password just allows to access to application program, so as to ensure that the visit of application program It pays one's respects complete.
But the prior art, when application program is encrypted, user needs progress multi-pass operation just can be from intelligence The display desktop of terminal enters in setting center and then application is encrypted, and cumbersome, user experience is poor.
Invention content
The purpose of the application is to provide a kind of application encryption method and terminal device, can realize and the quick of application is added It is close, it is safe and easy to operate, improve the intelligent level of terminal device and the usage experience of user.
To solve the above problems, the first aspect of the application provide it is a kind of using encryption method, applied to terminal device, The method includes:
Choose application icon;
Obtain rotation instruction;
Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs Cryptographic operation.
As an alternative embodiment, the method further includes:
The application icon is pre-seted, at least part region of the application icon is enable to be rotated;
At least part region for the application icon that will be rotated is set as the presumptive area.
As an alternative embodiment, the method for obtaining rotation instruction includes:
Detect touch action of the user on the application icon chosen;
Judge whether the touch action is deliberate action;
If the touch action is deliberate action, the rotation instruction for rotating the rotatable region is generated;
Obtain the rotation instruction of generation.
As an alternative embodiment, described instructed based on the rotation, to the presumptive area of the application icon The method for carrying out rotation process includes:
Using the central point of the application icon chosen as axis of rotation, the presumptive area is rotated.
As an alternative embodiment, the method packet for judging the rotation process and whether meeting pre-defined rule It includes:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, judge that the rotation process meets pre-defined rule.
As an alternative embodiment, the method packet for judging the rotation process and whether meeting pre-defined rule It includes:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, further detects the rotation process and rotate the presumptive area Rotation angle;
Judge whether the rotation angle reaches the first predetermined angular;
If the rotation angle reaches the first predetermined angular, judge that the rotation process meets pre-defined rule.
As an alternative embodiment, perform encryption in a pair intended application corresponding with the application icon chosen Before operation, the method further includes:
Obtain the history total degree for the rotation process for meeting pre-defined rule in history;
Judge the number of rotation process for currently meeting pre-defined rule as odd-times or idol based on the history total degree For several times;
If currently meeting the number of the rotation process of pre-defined rule for odd-times, perform described pair and described answered with what is chosen The step of cryptographic operation being performed with the corresponding intended application of icon.
As an alternative embodiment, described pair of intended application corresponding with the application icon chosen is performed and is added The method of close operation includes:
Hide the intended application;Or,
Close the intended application touch screen zone on the terminal device touch function;Or,
The intended application is locked or encrypted by preset password or the partial function to the intended application It is locked or is encrypted.
As an alternative embodiment, perform encryption in a pair intended application corresponding with the application icon chosen After operation, the method further includes:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the first predetermined angle to the second predetermined direction Degree so that the presumptive area of application icon corresponding with the intended application keeps the state not rotated normally.
As an alternative embodiment, if the number of the current rotation process for meeting pre-defined rule is even-times, Release the cryptographic operation of pair intended application corresponding with the application icon chosen.
As an alternative embodiment, perform encryption in a pair intended application corresponding with the application icon chosen After operation, the method further includes:
Detect the decryption oprerations of user;
The cryptographic operation of pair intended application corresponding with the application icon chosen is released based on the decryption oprerations;
Wherein, the decryption oprerations include:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the second predetermined angle to the second predetermined direction Degree.
According to the another aspect of the application, embodiments herein additionally provides a kind of terminal device, the terminal device It is configured as at least performing following operate:
Choose application icon;
Obtain rotation instruction;
Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs Cryptographic operation.
The above-mentioned technical proposal of the application by choosing application icon, then to the presumptive area of the application icon according to Pre-defined rule carries out rotation process, you can quick pair of intended application corresponding with the application icon chosen performs encryption behaviour Make, it is simple and fast, it is easy to operation, user can be helped quickly to encrypt application, and only user by way of Rotating icon Application (encrypted state for releasing application) can be unlocked in the secondary presumptive area side according to intended manner rotation application icon, it is hidden Secret property is strong, is not easy to be discovered by other people;It is capable of the safety of effective protection application;In addition, after operation is encrypted to application, also may be used To prevent user from accidentally touching operation, as described in closing intended application the touch function of touch screen zone on the terminal device etc. it is square Formula can effectively prevent user accidentally to touch operation;The above-mentioned technical solution that application is encrypted is simple and fast, convenient for the user to operate, Effectively improve the intelligent level of intelligent terminal and the usage experience of user.
Description of the drawings
Fig. 1 is the schematic flow chart using encryption method that embodiments herein provides;
Fig. 2 is the schematic flow of the method for the presumptive area with application icon is configured that embodiments herein provides Figure;
Fig. 3 is the schematic flow chart of the method for acquisition rotation instruction that embodiments herein provides;
Fig. 4 be embodiments herein provide judge whether the rotation process meets the signal of the method for pre-defined rule Property flow chart;
Fig. 5 is another method for judging the rotation process and whether meeting pre-defined rule that embodiments herein provides Schematic flow chart.
Specific embodiment
Purpose, technical scheme and advantage to make the application are of greater clarity, With reference to embodiment and join According to attached drawing, the application is further described.It should be understood that these descriptions are merely illustrative, and it is not intended to limit this Shen Range please.In addition, in the following description, the description to known features and technology is omitted, to avoid this is unnecessarily obscured The concept of application.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and consistently understand the application.Therefore, for those skilled in the art, it will be understood that provide the various implementations to the application It is the purpose rather than limitation appended claims and its application of Equivalent definitions illustrated that the description of example, which is only,.
Below in conjunction with the attached drawing in the application some embodiments, the technical solution in the embodiment of the present application is carried out clear Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments. Based on the embodiment in the application, what those of ordinary skill in the art were obtained without making creative work is all Other embodiment shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is only merely for the mesh of description specific embodiment , and it is not intended to be limiting the application." one " of the embodiment of the present application and singulative used in the attached claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other meanings.Also It should be appreciated that term "and/or" used herein refers to and list items purposes comprising one or more mutually bindings are any Or all possible combinations.Expression " first ", " second ", " first " and " second " be for modify respective element without Consideration sequence or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.Under in addition, Involved technical characteristic as long as they do not conflict with each other can phase in the described the application different embodiments in face Mutually combine.
For the clearer each attached drawing of description, in various figures, different labels is given for same step.
Terminal device according to the application some embodiments can be electronic equipment, which can include intelligent hand Machine, PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, electronics Book reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device (VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device It can include type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics Clothes), decorated type (such as pad skin, tatoo or built in electronic device) etc. or several combinations.In some realities of the application It applies in example, the electronic equipment can be flexible, be not limited to above equipment or can be one kind in above-mentioned various equipment Or several combination.In this application, term " user " can be indicated using the people of electronic equipment or setting using electronic equipment Standby (such as artificial intelligence electronic equipment).
Below in conjunction with attached drawing, it is described in detail according to the sequence of Fig. 1 to Fig. 5.
Fig. 1 (i.e. shown in attached drawing 100) is please referred to, Fig. 1 is the showing using encryption method that embodiments herein provides Meaning property flow chart;
As shown in Figure 1, embodiments herein provide it is a kind of using encryption method, applied to terminal device, the side Method includes:
Step S101:Choose application icon;
Step S102:Obtain rotation instruction;
Step S103:Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Step S104:Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, S105 is entered step:It is pair corresponding with the application icon chosen Intended application perform cryptographic operation;
If the rotation process does not meet pre-defined rule, S106 is entered step:The not pair application icon with choosing Corresponding intended application performs cryptographic operation.
Wherein, it should be noted that application drawing calibration method is chosen to include:User's finger or articulations digitorum manus are touched and placed Application icon can be chosen in application icon;Or long-press application icon chooses application icon;Or adopting consecutive click chemical reaction application icon Pre-determined number can choose application icon;Either dragging application icon marks pre- to predetermined direction slip or dragging application icon Fixed track can choose application icon;Or application icon is chosen by other means.
Wherein, when application icon is selected, the presumptive area on application icon is shown, it is predetermined on the application icon Region can be rotated.
By way of rotating application icon, can quick pair of intended application corresponding with the application icon chosen hold Row cryptographic operation, it is simple and fast, it is easy to operation.
Fig. 2 (i.e. shown in attached drawing 200) is please referred to, Fig. 2 is embodiments herein offer with application icon is configured The schematic flow chart of the method for presumptive area;As shown in Fig. 2, the method further includes:
Step S201:The application icon is pre-seted, enable at least part region of the application icon into Row rotation;
Step S202:At least part region for the application icon that will be rotated is set as the fate Domain.
Wherein, it should be noted that at least part region is:For identifying the picture identification of application on application icon, such as QQ applies upper penguin picture identification;Or the region with predetermined shape on application icon, predetermined shape can be system from Dynamic generation or user oneself definition;Or the whole region of application icon in itself.
Fig. 3 (i.e. shown in attached drawing 300) is please referred to, Fig. 3 is the side of acquisition rotation instruction that embodiments herein provides The schematic flow chart of method;As shown in figure 3, the method for obtaining rotation instruction includes:
Step S301:Detect touch action of the user on the application icon chosen;
Step S302:Judge whether the touch action is deliberate action;
If the touch action is deliberate action, S303 is entered step:It generates to rotate the rotatable region Rotation instruction;
Step S304:Obtain the rotation instruction of generation;
If if the touch action is not deliberate action, S305 is entered step:It does not generate described rotatable for rotating The rotation instruction in region.
Wherein, it should be noted that, the deliberate action is:It clicks or slides presumptive area pre-determined number or dragging is pre- Determine region to move to predetermined direction.
As an alternative embodiment, described instructed based on the rotation, to the presumptive area of the application icon The method for carrying out rotation process includes:
Using the central point of the application icon chosen as axis of rotation, the presumptive area is rotated.
Fig. 4 (i.e. shown in attached drawing 400) is please referred to, Fig. 4 is the judgement rotation process that embodiments herein provides Whether the schematic flow chart of the method for pre-defined rule is met;
Judge whether the rotation process meets the method for pre-defined rule and include as shown in figure 4, described:
Step S401:Detect the direction of rotation that the rotation process rotates the presumptive area;
Step S402:Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, S403 is entered step:It is predetermined to judge that the rotation process meets Rule;
If the direction of rotation is not the first predetermined direction, S404 is entered step:Judge that the rotation process is not met Pre-defined rule.
Fig. 5 (i.e. shown in attached drawing 500) is please referred to, Fig. 5 is another judgement rotation that embodiments herein provides Whether operation meets the schematic flow chart of the method for pre-defined rule.
Judge whether the rotation process meets the method for pre-defined rule and include as shown in figure 5, described:
Step S501:Detect the direction of rotation that the rotation process rotates the presumptive area;
Step S502:Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, S503 is entered step:Further detect the rotation process rotation Turn the rotation angle of the presumptive area;
Step S504:Judge whether the rotation angle reaches the first predetermined angular;
If the rotation angle reaches the first predetermined angular, S505 is entered step:It is pre- to judge that the rotation process meets Set pattern is then.
Wherein, if the direction of rotation is not up to the first predetermined angular for the first predetermined direction or the rotation angle, Then enter step S506:Judge that the rotation process does not meet pre-defined rule.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen Before work, the method further includes:
Obtain the history total degree for the rotation process for meeting pre-defined rule in history;
Judge the number of rotation process for currently meeting pre-defined rule as odd-times or idol based on the history total degree For several times;
If currently meeting the number of the rotation process of pre-defined rule for odd-times, perform described pair and described answered with what is chosen The step of cryptographic operation being performed with the corresponding intended application of icon.
As a kind of optional embodiment, described pair of intended application corresponding with the application icon chosen performs encryption The method of operation includes:
Hide the intended application;Or,
Close the intended application touch screen zone on the terminal device touch function;Or,
The intended application is locked or encrypted by preset password or the partial function to the intended application It is locked or is encrypted.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen After work, the method further includes:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the first predetermined angle to the second predetermined direction Degree so that the presumptive area of application icon corresponding with the intended application keeps the state not rotated normally.
As a kind of optional embodiment, if the number of the current rotation process for meeting pre-defined rule is even-times, solve Except a pair cryptographic operation for intended application corresponding with the application icon chosen.
Wherein, before the cryptographic operation for releasing pair intended application corresponding with the application icon chosen,
The method further includes:
In the decryption oprerations for detecting user, the authentication information of user is obtained;
Judge whether the authentication information is predetermined identity information;
If the authentication information is predetermined identity information, perform described based on decryption oprerations releasing pair and choosing In the corresponding intended application of the application icon cryptographic operation the step of.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen After work, the method further includes:
Detect the decryption oprerations of user;
The cryptographic operation of pair intended application corresponding with the application icon chosen is released based on the decryption oprerations;
Wherein, the decryption oprerations include:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the second predetermined angle to the second predetermined direction Degree.
Wherein, the encryption pair intended application corresponding with the application icon chosen is being released based on the decryption oprerations Before operation, the method further includes:
In the decryption oprerations for detecting user, the authentication information of user is obtained;
Judge whether the authentication information is predetermined identity information;
If the authentication information is predetermined identity information, perform described based on decryption oprerations releasing pair and choosing In the corresponding intended application of the application icon cryptographic operation the step of.
It should be noted that by before the cryptographic operation for releasing intended application, by identification, it can ensure only have Specific user or user oneself can perform decryption oprerations, further ensure the safety of application.
In order to which above-mentioned technical proposal is better achieved, embodiments herein additionally provides a kind of terminal device, the end End equipment is configured as at least performing following operate:
Choose application icon;
Obtain rotation instruction;
Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs Cryptographic operation.
As a kind of optional embodiment, the terminal device is additionally configured at least perform following operate:
The application icon is pre-seted, at least part region of the application icon is enable to be rotated;
At least part region for the application icon that will be rotated is set as the presumptive area.
As a kind of optional embodiment, when obtaining rotation instruction, the terminal device is additionally configured at least perform It operates below:
Detect touch action of the user on the application icon chosen;
Judge whether the touch action is deliberate action;
If the touch action is deliberate action, the rotation instruction for rotating the rotatable region is generated;
Obtain the rotation instruction of generation.
As a kind of optional embodiment, based on the rotation instruction, the presumptive area of the application icon is carried out During rotation process, the terminal device is additionally configured at least perform following operate:
Using the central point of the application icon chosen as axis of rotation, the presumptive area is rotated.
As a kind of optional embodiment, when judging whether the rotation process meets pre-defined rule, the terminal is set It is standby to be additionally configured at least perform following operate:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, judge that the rotation process meets pre-defined rule.
As an alternative embodiment, when judging whether the rotation process meets pre-defined rule, the terminal Equipment is additionally configured at least perform following operate:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, further detects the rotation process and rotate the presumptive area Rotation angle;
Judge whether the rotation angle reaches the first predetermined angular;
If the rotation angle reaches the first predetermined angular, judge that the rotation process meets pre-defined rule.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen Before work, the terminal device is additionally configured at least perform following operate:
Obtain the history total degree for the rotation process for meeting pre-defined rule in history;
Judge the number of rotation process for currently meeting pre-defined rule as odd-times or idol based on the history total degree For several times;
If currently meeting the number of the rotation process of pre-defined rule for odd-times, perform described pair and described answered with what is chosen The step of cryptographic operation being performed with the corresponding intended application of icon.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen When making, the terminal device is additionally configured at least perform following operate:
Hide the intended application;Or,
Close the intended application touch screen zone on the terminal device touch function;Or,
The intended application is locked or encrypted by preset password or the partial function to the intended application It is locked or is encrypted.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen After work, the terminal device is additionally configured at least perform following operate:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the first predetermined angle to the second predetermined direction Degree so that the presumptive area of application icon corresponding with the intended application keeps the state not rotated normally.
As a kind of optional embodiment, when currently meeting the number of rotation process of pre-defined rule for even-times, institute Terminal device is stated to be additionally configured at least perform following operate:
Release the cryptographic operation of pair intended application corresponding with the application icon chosen.
As a kind of optional embodiment, encryption behaviour is performed in a pair intended application corresponding with the application icon chosen After work, the terminal device is additionally configured at least perform following operate:
Detect the decryption oprerations of user;
The cryptographic operation of pair intended application corresponding with the application icon chosen is released based on the decryption oprerations;
Wherein, the decryption oprerations include:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the second predetermined angle to the second predetermined direction Degree.
Wherein, it should be noted that the operation that terminal device performs is corresponding with above method step, this is in terminal When equipment is described, part and the corresponding part of above method step is omitted, it should be understood that, it is omitted Part is also because being considered as the technology contents of terminal device.
The application is intended to protect a kind of application encryption method and terminal device, can be then right by choosing application icon The presumptive area of the application icon carries out rotation process according to pre-defined rule, you can quick pair with the application icon chosen Corresponding intended application performs cryptographic operation, simple and fast, easy to operation, user can be helped fast by way of Rotating icon Speed encryption application, and only user can unlock application in the secondary presumptive area side according to intended manner rotation application icon (encrypted state for releasing application), crypticity is strong, is not easy to be discovered by other people;It is capable of the safety of effective protection application;In addition, It after operation is encrypted to application, is also possible to prevent user and accidentally touches operation, intended application is on the terminal device as described in closing The modes such as the touch function of touch screen zone user can be effectively prevent accidentally to touch operation;The above-mentioned technology that application is encrypted Scheme is simple and fast, convenient for the user to operate, effectively improves the intelligent level of intelligent terminal and the usage experience of user.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in the present specification, term " comprising ", "comprising" or its any other variant are intended to Non-exclusive inclusion, so that process, method, article or equipment including a series of elements not only will including those Element, but also including other elements that are not explicitly listed or further include as this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that Also there are other identical elements in process, method, article or equipment including the element.Finally, it is also necessary to explanation That a series of above-mentioned processing not only include the processing that is performed in temporal sequence with sequence described here, and including parallel or The processing respectively rather than in chronological order performed.
One of ordinary skill in the art will appreciate that realizing all or part of flow in above-described embodiment method, being can be with It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium, The program is when being executed, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-OnlyMemory, ROM) or random access memory (RandomAccessMemory, RAM) etc..
It should be understood that the above-mentioned specific embodiment of the application is used only for exemplary illustration or explains the application's Principle, without forming the limitation to the application.Therefore, that is done in the case of without departing from spirit and scope is any Modification, equivalent replacement, improvement etc., should be included within the protection domain of the application.In addition, the application appended claims purport Covering the whole variations fallen into scope and boundary or this range and the equivalent form on boundary and repairing Change example.

Claims (12)

1. a kind of apply encryption method, which is characterized in that applied to terminal device, the method includes:
Choose application icon;
Obtain rotation instruction;
Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs encryption Operation.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
The application icon is pre-seted, at least part region of the application icon is enable to be rotated;
At least part region for the application icon that will be rotated is set as the presumptive area.
3. according to the method described in claim 1, it is characterized in that, the method for obtaining rotation instruction includes:
Detect touch action of the user on the application icon chosen;
Judge whether the touch action is deliberate action;
If the touch action is deliberate action, the rotation instruction for rotating the rotatable region is generated;
Obtain the rotation instruction of generation.
4. according to the method described in claim 1, it is characterized in that, described instructed based on the rotation, to the application icon Presumptive area carry out rotation process method include:
Using the central point of the application icon chosen as axis of rotation, the presumptive area is rotated.
5. according to the method described in claim 4, it is characterized in that, described judge whether the rotation process meets pre-defined rule Method include:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, judge that the rotation process meets pre-defined rule.
6. according to the method described in claim 4, it is characterized in that, described judge whether the rotation process meets pre-defined rule Method include:
Detect the direction of rotation that the rotation process rotates the presumptive area;
Judge whether the direction of rotation is the first predetermined direction;
If the direction of rotation is the first predetermined direction, the rotation that the rotation process rotates the presumptive area is further detected Gyration;
Judge whether the rotation angle reaches the first predetermined angular;
If the rotation angle reaches the first predetermined angular, judge that the rotation process meets pre-defined rule.
7. method according to claim 5 or 6, which is characterized in that in a pair mesh corresponding with the application icon chosen Before marking application execution cryptographic operation, the method further includes:
Obtain the history total degree for the rotation process for meeting pre-defined rule in history;
Judge the number of rotation process for currently meeting pre-defined rule as odd-times or even-times based on the history total degree;
If the number for currently meeting the rotation process of pre-defined rule is odd-times, described pair and the application drawing chosen are performed Mark the step of corresponding intended application performs cryptographic operation.
8. the method according to the description of claim 7 is characterized in that described pair of target corresponding with the application icon chosen The method of application execution cryptographic operation includes:
Hide the intended application;Or,
Close the intended application touch screen zone on the terminal device touch function;Or, by preset password to institute Intended application is stated to be locked or encrypted or the partial function of the intended application is locked or encrypted.
It 9. according to the method described in claim 8, it is characterized in that, should in pair target corresponding with the application icon chosen After cryptographic operation is performed, the method further includes:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the first predetermined angular to the second predetermined direction, So that the presumptive area of application icon corresponding with the intended application keeps the state not rotated normally.
10. if the method according to the description of claim 7 is characterized in that number of the current rotation process for meeting pre-defined rule For even-times, then the cryptographic operation of pair intended application corresponding with the application icon chosen is released.
11. according to claim 7 to 10 any one of them method, which is characterized in that pair with the application icon chosen After corresponding intended application performs cryptographic operation, the method further includes:
Detect the decryption oprerations of user;
The cryptographic operation of pair intended application corresponding with the application icon chosen is released based on the decryption oprerations;
Wherein, the decryption oprerations include:
Presumptive area to the second predetermined direction is rotated or presumptive area is rotated into the second predetermined angular to the second predetermined direction.
12. a kind of terminal device, which is characterized in that the terminal device is configured as at least performing following operate:
Choose application icon;
Obtain rotation instruction;
Based on the rotation instruction, rotation process is carried out to the presumptive area of the application icon;
Judge whether the rotation process meets pre-defined rule;
If the rotation process meets pre-defined rule, a pair intended application corresponding with the application icon chosen performs encryption Operation.
CN201711331944.7A 2017-12-13 2017-12-13 A kind of application encryption method and terminal device Pending CN108171065A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711331944.7A CN108171065A (en) 2017-12-13 2017-12-13 A kind of application encryption method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711331944.7A CN108171065A (en) 2017-12-13 2017-12-13 A kind of application encryption method and terminal device

Publications (1)

Publication Number Publication Date
CN108171065A true CN108171065A (en) 2018-06-15

Family

ID=62525937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711331944.7A Pending CN108171065A (en) 2017-12-13 2017-12-13 A kind of application encryption method and terminal device

Country Status (1)

Country Link
CN (1) CN108171065A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103076943A (en) * 2012-12-27 2013-05-01 北京小米科技有限责任公司 Icon conversion method and icon conversion device
US20140317572A1 (en) * 2013-04-19 2014-10-23 Lg Electronics Inc. Digital device and method of controlling therefor
CN105630278A (en) * 2015-06-19 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and system of application program and mobile terminal
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103076943A (en) * 2012-12-27 2013-05-01 北京小米科技有限责任公司 Icon conversion method and icon conversion device
US20140317572A1 (en) * 2013-04-19 2014-10-23 Lg Electronics Inc. Digital device and method of controlling therefor
CN105630278A (en) * 2015-06-19 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and system of application program and mobile terminal
CN106203061A (en) * 2016-06-27 2016-12-07 维沃移动通信有限公司 The encryption method of a kind of application program and mobile terminal

Similar Documents

Publication Publication Date Title
US9754095B2 (en) Unlocking electronic devices using touchscreen input gestures
CN104834449B (en) The icon management method and device of mobile terminal
CN104679387B (en) A kind of method for protecting privacy and terminal
US8638939B1 (en) User authentication on an electronic device
US9357391B1 (en) Unlocking electronic devices with touchscreen input gestures
CN105760737A (en) Control method for applications and terminal
CN102646047A (en) Method for starting application program and terminal device having touch display screen
KR20150068369A (en) Locking and unlocking of contactless gesture-based user interface of device having contactless gesture detection system
US20140366127A1 (en) Touchscreen security user input interface
US9443072B2 (en) Methods and devices for granting access to and enabling passcode protection for a file
US10203864B2 (en) Information processing method and electronic apparatus
CN104769601A (en) Method for recognition of user identity and electronic equipment
CN105183462B (en) A kind of object response method and electronic equipment
CN105786370B (en) The method and device of user interface unlock
Rey et al. Understanding and Adapting Bezel-to-Bezel Interactions for Circular Smartwatches in Mobile and Encumbered Scenarios
Tsandilas et al. Coordination of tilt and touch in one-and two-handed use
CN107807761A (en) The operating method and terminal of a kind of terminal
CN108171065A (en) A kind of application encryption method and terminal device
Ikematsu et al. Memory Stones: An intuitive information transfer technique between multi-touch computers
Schmidt et al. Personal clipboards for individual copy-and-paste on shared multi-user surfaces
CN104423819A (en) Screen locking and unlocking method and electronic equipment
CN107562314A (en) Scroll application icon display methods and system
KR102156291B1 (en) Method and device for encrypting some areas of electronic document
Liu et al. Implicit authentication for mobile device based on 3D magnetic finger motion pattern
Hakka et al. Bounded swipe: Swipe gesture inside a target

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180615