CN108540645A - A kind of operating method and mobile terminal of mobile terminal - Google Patents

A kind of operating method and mobile terminal of mobile terminal Download PDF

Info

Publication number
CN108540645A
CN108540645A CN201810200225.XA CN201810200225A CN108540645A CN 108540645 A CN108540645 A CN 108540645A CN 201810200225 A CN201810200225 A CN 201810200225A CN 108540645 A CN108540645 A CN 108540645A
Authority
CN
China
Prior art keywords
application
information
intended application
target information
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810200225.XA
Other languages
Chinese (zh)
Other versions
CN108540645B (en
Inventor
张森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201810200225.XA priority Critical patent/CN108540645B/en
Publication of CN108540645A publication Critical patent/CN108540645A/en
Application granted granted Critical
Publication of CN108540645B publication Critical patent/CN108540645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • H04M1/275Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips implemented by means of portable electronic directories
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/7243User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72451User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to schedules, e.g. using calendar applications

Abstract

The present invention provides a kind of operating method and mobile terminal of mobile terminal.This method includes:If receiving the predetermined operation for object contact person in address list, generates and show and the associated communication icon of object contact person;If receiving for the application icon of communication icon and intended application is associated operation associated, according to the application type of intended application, target information is obtained;Wherein, target information be object contact person user information in the associated information of application type;Invocation target is applied executes corresponding operation according to target information.In the embodiment of the present invention, user need to only execute input operation, intended application twice and can get target information and execute corresponding operating.Therefore, compared with prior art, in the embodiment of the present invention, the operation for carrying out user information interaction between different applications implements more convenient.

Description

A kind of operating method and mobile terminal of mobile terminal
Technical field
The present invention relates to the operating methods and mobile terminal of field of communication technology more particularly to a kind of mobile terminal.
Background technology
Currently, often there are a variety of user informations, such as hand in the address list (such as phone directory) of the mobile terminals such as mobile phone Machine number, E-mail address, home address etc..In general, when user uses the specific function of a certain application in mobile terminal When, if user needs that the user information in phone directory, user is used to need the operation for controlling mobile terminal execution often more Also relatively complicated.
For example, when user needs to converse using the application of phone type, user needs first to click on desktop The application icon of the phone type application of display, to start the application of phone type.Next, user needs to click answering for startup Contact people option in is to call phone directory, and later, user needs to carry out the selection of conversation object in phone directory, is selecting After good conversation object, user dials, and finally, user could be conversed by mobile terminal.
As it can be seen that in the prior art, the operation for carrying out user information interaction between different applications is very cumbersome.
Invention content
The embodiment of the present invention provides a kind of operating method and mobile terminal of mobile terminal, in the prior art with solution, The cumbersome problem of user information interaction is carried out between different application.
In order to solve the above-mentioned technical problem, the invention is realized in this way:
In a first aspect, the embodiment of the present invention provides a kind of operating method of mobile terminal, the method includes:
If receiving the predetermined operation for object contact person in address list, generates and show and closed with the object contact person The communication icon of connection;
If receiving for the application icon of described information icon and intended application is associated operation associated, according to described The application type of intended application obtains target information;Wherein, the target information is in the user information of the object contact person With the associated information of the application type;
The intended application is called to execute corresponding operation according to the target information.
Second aspect, the embodiment of the present invention provide a kind of mobile terminal, and the mobile terminal includes:
If display module is generated to generate and show for receiving the predetermined operation for object contact person in address list With the associated communication icon of the object contact person;
Acquisition module, if for receiving for by the associated association of the application icon of described information icon and intended application Operation obtains target information according to the application type of the intended application;Wherein, the target information contacts for the target In the user information of people with the associated information of the application type;
Calling module, for calling the intended application to execute corresponding operation according to the target information.
The third aspect, the embodiment of the present invention provide a kind of mobile terminal, including processor, memory, are stored in described deposit On reservoir and the computer program that can run on the processor, the computer program are realized when being executed by the processor The step of operating method of above-mentioned mobile terminal.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, the computer-readable storage medium Computer program is stored in matter, the computer program realizes the operating method of above-mentioned mobile terminal when being executed by processor The step of.
In the embodiment of the present invention, if user need address list is (such as logical in local address book or communication class application News record) in the user information of object contact person apply to intended application, user can first input to mobile terminal in address list The predetermined operation of object contact person.In this way, in the case where receiving the predetermined operation for object contact person, mobile terminal meeting It generates and shows and the associated communication icon of object contact person.Next, user can input to mobile terminal for by information Icon and the application icon of intended application are associated operation associated.In this way, receiving operation associated situation input by user Under, mobile terminal obtains target information, and automatic invocation target is applied according to target automatically according to the application type of intended application Information executes corresponding operation.
As can be seen that in the embodiment of the present invention, user, which need to only execute input operation, intended application twice, can get mesh Mark information simultaneously executes corresponding operating.Therefore, compared with prior art, in the embodiment of the present invention, used between different applications The operation of family information exchange implements more convenient.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without having to pay creative labor, it can also obtain according to these attached drawings Take other attached drawings.
Fig. 1 is one of the flow chart of operating method of mobile terminal provided in an embodiment of the present invention;
Fig. 2 is the two of the flow chart of the operating method of mobile terminal provided in an embodiment of the present invention;
Fig. 3 is the three of the flow chart of the operating method of mobile terminal provided in an embodiment of the present invention;
Fig. 4 is a kind of one of the structural schematic diagram of mobile terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of second structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 6 is a kind of third structural representation of mobile terminal provided in an embodiment of the present invention;
Fig. 7 is the four of the structural schematic diagram of a kind of mobile terminal provided in an embodiment of the present invention;
Fig. 8 is the five of the structural schematic diagram of a kind of mobile terminal provided in an embodiment of the present invention;
Fig. 9 is the six of the structural schematic diagram of a kind of mobile terminal provided in an embodiment of the present invention;
Figure 10 is the seven of the structural schematic diagram of a kind of mobile terminal provided in an embodiment of the present invention;
Figure 11 is the eight of the structural schematic diagram of a kind of mobile terminal provided in an embodiment of the present invention;
Figure 12 is the hardware schematic of another mobile terminal provided in an embodiment of the present invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, those of ordinary skill in the art's acquired every other implementation without creative efforts Example, shall fall within the protection scope of the present invention.
The operating method of mobile terminal provided in an embodiment of the present invention is illustrated first below.
It should be noted that in the operating method of mobile terminal provided in an embodiment of the present invention, mobile terminal can be tool There is any equipment of communication function, such as:Mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital assistant, abbreviation PDA), mobile Internet access electricity Sub- equipment (Mobile Internet Device, MID), wearable device (Wearable Device) etc..
Referring to Fig. 1, the flow chart of the operating method of mobile terminal provided in an embodiment of the present invention is shown in figure.Such as Fig. 1 Shown, this method comprises the following steps:
Step 101, it if receiving the predetermined operation for object contact person in address list, generates and shows and contacted with target The associated communication icon of people.
Wherein, the address list arrived involved in step 101 both can be the local address book (such as phone directory) of mobile terminal, Or the address list in mobile terminal in mounted communication class application (such as wechat, QQ etc.).
It is emphasized that object contact person can be the arbitrary contact person in address list, for the pre- of object contact person Fixed operation can be touch operation, long press operation or other are preset, for triggering communication icon (such as the icon that suspends) The operation for generating and showing.
In the embodiment of the present invention, mobile terminal can timing or sporadically detect whether to receive in address list The predetermined operation of arbitrary contact person.If mobile terminal receives the predetermined operation to object contact person, it is believed that target joins Be people user information at least part of the information needs be employed, at this moment, mobile terminal can generate and display target contact The associated communication icon of people.Later, mobile terminal can execute follow-up step 102 according to the communication icon for generating and showing.
Step 102, if receiving for the application icon of communication icon and intended application is associated operation associated, according to The application type of intended application obtains target information;Wherein, target information be object contact person user information in using class The associated information of type.
It is emphasized that intended application can be mounted any application in mobile terminal.For by communication icon With the application icon of intended application is associated operation associated may be considered:It is applied for selection target and is used as object contact person At least part of the information in the user information of (with the associated contact person of communication icon) needs the operation of the application applied to.
In the embodiment of the present invention, after generating and showing communication icon, mobile terminal can timing or sporadically It detects whether to receive for the application icon of communication icon and intended application is associated operation associated.If mobile terminal connects It receives for the application icon of communication icon and intended application is associated operation associated, mobile terminal can be according to intended application Application type, obtain target information, the target information of acquisition for mobile terminal may be considered the user information of object contact person The middle information for needing to be employed for intended application.
It is understood that the application type that application has been installed in mobile terminal is various, such as:Type of payment, map class Type, short message type, calendar type, search-type, email type, communication type, phone type etc..Specifically, it is answered in target In the case that application type is type of payment, target information can be bank's card number of object contact person;In intended application Application type be map style in the case of, target information can be object contact person home address;In intended application In the case that application type is short message type, target information can be the phone number of object contact person;In answering for intended application In the case of being calendar type with type, target information can be the date of birth of object contact person;In the application of intended application In the case that type is search-type, target information can be the name of object contact person;It is in the application type of intended application In the case of email type, target information can be the email address of object contact person;It is logical in the application type of intended application In the case of interrogating type, target information can be the communication account of object contact person;It is phone in the application type of intended application In the case of type, target information can be the telephone number of object contact person.
Step 103, invocation target is applied executes corresponding operation according to target information.
In the case of the application type difference of intended application, mobile terminal can obtain corresponding mesh according to application type Mark information.After getting corresponding target information, mobile terminal invocation target applies the operation executed according to target information There are certain difference.
Specifically, it is type of payment in the application type of intended application, target information is bank's card number of object contact person In the case of, when executing step 103, the function of transferring accounts that mobile terminal can be applied with invocation target is at this moment, in operating status Intended application can show beneficiary be object contact person bank's card number transfer page.
The case where the application type of intended application is map style, and target information is the home address of object contact person Under, when executing step 103, the navigation feature that mobile terminal can be applied with invocation target, at this moment, target in operating status Using can show navigation purpose address be object contact person home address navigation interface.
The case where the application type of intended application is short message type, and target information is the phone number of object contact person Under, when executing step 103, the short message sending function that mobile terminal can be applied with invocation target is at this moment, in operating status Intended application can show the short message editing page of the phone number of the artificial object contact person of addressee.
The case where the application type of intended application is calendar type, and target information is the date of birth of object contact person Under, when executing step 103, the calendar reminding function that mobile terminal can be applied with invocation target is at this moment, in operating status Birthday reminder events can be arranged in intended application according to the date of birth of object contact person, and remind thing to the birthday in setting time Part is reminded.
In the case where the application type of intended application is the name that search-type target information is object contact person, When executing step 103, the resource searching function that mobile terminal can be applied with invocation target, at this moment, target in operating status Using may search for the associated resource data of the name of object contact person, and the resource data searched is shown.
The case where the application type of intended application is email type, and target information is the email address of object contact person Under, when executing step 103, the e-mail transmitting function that mobile terminal can be applied with invocation target is at this moment, in operating status Intended application can show that address of the addressee is the mail edit page of the email address of object contact person.
The case where the application type of intended application is communication type, and target information is the communication account of object contact person Under, when executing step 103, the communication function that mobile terminal can be applied with invocation target, at this moment, target in operating status Using can show communication opposite end be object contact person communication account the communication page.
The case where the application type of intended application is phone type, and target information is the telephone number of object contact person Under, when executing step 103, the call function that mobile terminal can be applied with invocation target, at this moment, target in operating status Using that can show that call opposite end is the call page of the telephone number of object contact person, alternatively, target in operating status Using the call request that can directly transmit the telephone number that call opposite end is object contact person.
In the embodiment of the present invention, if user need address list is (such as logical in local address book or communication class application News record) in the user information of object contact person apply to intended application, user can first input to mobile terminal in address list The predetermined operation of object contact person.In this way, in the case where receiving the predetermined operation for object contact person, mobile terminal meeting It generates and shows and the associated communication icon of object contact person.Next, user can input to mobile terminal for by information Icon and the application icon of intended application are associated operation associated.In this way, receiving operation associated situation input by user Under, mobile terminal obtains target information, and automatic invocation target is applied according to target automatically according to the application type of intended application Information executes corresponding operation.
As can be seen that in the embodiment of the present invention, user, which need to only execute input operation, intended application twice, can get mesh Mark information simultaneously executes corresponding operating.Therefore, compared with prior art, in the embodiment of the present invention, used between different applications The operation of family information exchange implements more convenient.
Optionally, it if receiving the predetermined operation for object contact person in address list, generates and shows and contacted with target The associated communication icon of people, including:
It is raw according to the user information of object contact person if receiving the predetermined operation for object contact person in address list At and show communication icon.
It should be noted that according to the user information of object contact person, the specific implementation shape of communication icon is generated and shown Formula is various, carries out citing introduction to two kinds of ways of realization therein below.
In the first way of realization, the user information of object contact person can be shown in the information of generation by mobile terminal In icon, at this moment, communication icon may be considered the information carrier of the user information of object contact person.In this way, executing step When 102, mobile terminal directly can obtain target information from the user information shown in communication icon.
In second of way of realization, mobile terminal can be using communication icon as providing access target contact person's The icon of the interface of user information.In this way, when executing step 102, the interface that mobile terminal can be provided by communication icon, Target information is obtained in the address list being related to from step 101.
As can be seen that in both the above way of realization, after generating and showing communication icon, mobile terminal can Target information is conveniently and efficiently got, to according to the target information got, execute follow-up step 103.
Optionally, if receiving for the application icon of communication icon and intended application is associated operation associated, according to The application type of intended application obtains target information, including:
Receive the drag operation to communication icon;
If the overlapping area of the application icon of communication icon and intended application is more than default overlapping area, by communication icon with Application icon is associated with, and according to the application type of intended application, obtains target information.
It should be noted that the area that the application icon of application has been installed in mobile terminal can be identical, at this point, Default overlapping area can be 50%, 60% or the 70% of the area of any application icon, and certainly, default overlapping area takes Value is not limited thereto, and can specifically be determined according to actual conditions, the present embodiment does not do this any restriction.
In the present embodiment, in the case where receiving the drag operation to communication icon, mobile terminal can restore to show Desktop, mobile terminal timing or can also sporadically detect whether to exist and are more than default weight with the overlapping area of communication icon The application icon of folded area.If mobile terminal detects that the overlapping area of the application icon of communication icon and intended application is more than Default overlapping area, it is possible to think that user needs the user information of object contact person applying to intended application, therefore, Communication icon is associated with by mobile terminal with the application icon of intended application, and according to the application type of intended application, obtains target Information.
As can be seen that in the present embodiment, the associated association behaviour of application icon for triggering communication icon and intended application Make to be specially drag operation.User need to only input the drag operation to communication icon to mobile terminal, so that communication icon and mesh The overlapping area for marking the application icon of application is more than default overlapping area, and mobile terminal will automatically answer communication icon and target Application icon is associated with.As it can be seen that the present embodiment can easily realize the application icon of communication icon and intended application very much Association.
Certainly, for triggering, the application icon of communication icon and intended application is associated operation associated to be not limited to drag Operation, may be slide.Specifically, user can input the display that initial position is communication icon to mobile terminal Position, final position are the slide of the display location of the application icon of intended application;Mobile terminal can respond the sliding The application icon of communication icon and intended application, is associated, this is also feasible by operation automatically.
Optionally, invocation target is applied executes corresponding operation according to target information, including:
Judge whether target information meets preset encryption condition;
If target information meets preset encryption condition, target information is encrypted, encrypted processing is obtained Encrypted result be determined as handle information;If target information is unsatisfactory for preset encryption condition, target information is determined as handling Information;
The call instruction of the preset function for intended application is sent to intended application;Wherein, in call instruction at carrying Information is managed, intended application executes the corresponding operation of preset function according to the call instruction received, based on processing information.
It should be pointed out that mobile terminal target information is encrypted the Encryption Algorithm used can be according to reality Situation is selected, and the present embodiment does not do this any restriction.It can be used in addition, mobile terminal is encrypted every time Same key can also use different keys respectively.
It should be noted that mobile terminal can prestore the correspondence of application type and corresponding preset function.It lifts For example, the corresponding preset function of type of payment can be function of transferring accounts;The corresponding preset function of map style can be navigation Function;The corresponding preset function of search-type can be resource searching function;The corresponding preset function of communication type can be logical Communication function.After determining processing information, mobile terminal can determine the application class of intended application according to above-mentioned correspondence The corresponding preset function of type.Later, mobile terminal sends the call instruction to the preset function determined, target to intended application Using according to the call instruction received, the corresponding operation of the preset function determined is executed.
In the present embodiment, in the case where target information meets preset encryption condition, mobile terminal can be to target information It is encrypted, is determined as the encrypted obtained encrypted result that handles to handle information, intended application executes preset function pair Processing information is based on when the operation answered, without being based on directly on target information, therefore, intended application is difficult to steal target The target information of contact person can be effectively prevented from the leakage of the user information of object contact person in this way, to ensure that target joins It is the safety of the user information of people.
It should be noted that judge target information whether meet preset encryption condition specific implementation it is various informative, under Citing introduction is carried out in face of three kinds of ways of realization therein.
In the first way of realization, judge whether target information meets preset encryption condition, including:
Judge whether intended application is default application;Wherein, application is preset as system application or is located at preset application Application in list;
If intended application is default application, determine that target information is unsatisfactory for preset encryption condition.
Wherein, it can specifically include in preset list of application in mobile terminal in mounted each third-party application, Belong to each application of trusted application (application that security threat is not present).It is understood that system is applied for movement Trusted application is generally also belonged to for terminal, therefore, it is trusted application for mobile terminal to preset application.
In the first way of realization, after executing step 102 and getting target information, mobile terminal may determine that mesh Whether mark application is default application.If it is judged that being yes, this illustrates that intended application belongs to credible for mobile terminal Using, then, the leakage of the user information of object contact person will not be caused intended application gets target information, because This, for target information without being encrypted, mobile terminal can directly determine that target information is unsatisfactory for predetermined encryption condition.
As can be seen that in the first way of realization, mobile terminal can conveniently and efficiently determine that target information is discontented The case where foot preset encryption condition.
In second of way of realization, on the basis of the first way of realization, it is default to judge whether target information meets Encryption condition, further include:
After judging whether intended application is default application, if intended application is not default application, the first power of output Limit setting prompting message;
According to the selection instruction inputted based on the first priority assignation prompting message, determine intended application to the of target information One permission;
If the first permission is that intended application is allowed to use target information, it is determined that target information is unsatisfactory for preset encryption item Part;
If the first permission is limitation, intended application uses target information, it is determined that intended application meets preset encryption item Part.
In second of way of realization, if it is default application that mobile terminal, which judges intended application not, mobile terminal can To export the first priority assignation prompt message, whether to have the permission using target information by the application of user's selection target.Tool Body, the first priority assignation prompt message can be shown in a suspended window, and " YES " and " NO " can also be shown in the suspended window Two options.
If user allows intended application, using target information, (i.e. user gives the power that intended application uses target information Limit), user can input the selection instruction for selecting " YES ";If user's limited target (is used using target information The permission that intended application uses target information is not given in family), user can input the selection instruction for selecting " NO ".It is specific real Shi Shi, user can be instructed by clicking " YES " or " NO " in suspended window come input selection.
It is understood that in the case where user is instructed by clicking " YES " in suspended window come input selection, it is mobile Terminal determines that the first permission is that intended application is allowed to use target information, at this time it is considered that user determines intended application for moving Belong to trusted application for dynamic terminal, the user that object contact person will not be caused intended application gets target information believes The leakage of breath.Therefore, for target information without being encrypted, mobile terminal directly determines that target information is unsatisfactory for preset add Close condition.
In the case where user is instructed by clicking " NO " in suspended window come input selection, mobile terminal determines the first power Limited target is limited to using target information, at this time it is considered that user determines that intended application does not belong to for mobile terminal In trusted application, very likely results in the user information of object contact person if intended application is directly obtained target information and let out Dew.Therefore, target information needs are encrypted, and mobile terminal determines that target information meets preset encryption condition.
As can be seen that in second of way of realization, in the case where intended application is not default application, mobile terminal can Determine that it is preset whether target information meets with the selection instruction inputted based on the first priority assignation prompting message according to user Encryption condition, therefore, second of way of realization can conveniently and efficiently determine whether target information meets preset encryption item Part.
In the third way of realization, on the basis of the first way of realization, it is default to judge whether target information meets Encryption condition, further include:
After judging whether intended application is default application, if intended application is not default application, target information is determined Meet preset encryption condition.
In the third way of realization, mobile terminal can judge whether intended application is judgement after default application As a result in the case of being no, directly determine that intended application is not belonging to trusted application for mobile terminal.In this way, if target is answered The leakage for very likely resulting in the user information of object contact person with target information is directly obtained, therefore, target information need It is encrypted, mobile terminal determines that target information meets preset encryption condition.
As can be seen that in the third way of realization, mobile terminal can conveniently and efficiently determine that target information meets The case where preset encryption condition.
Optionally, processing information is the encrypted result that target information is encrypted;Invocation target application root Corresponding operation is executed according to target information, further includes:
It is to be sent to intended application after being sent to intended application for the call instruction of the preset function of intended application It is decrypted to the processing information in the application message of server, obtains target information;
After the target information for being by the processing information update in application message, updated answer is sent to server Use message.
It should be pointed out that when processing information is decrypted the decipherment algorithm that uses need with to target information into The Encryption Algorithm used when row encryption has correspondence, and specific Encryption Algorithm and specific decipherment algorithm can be according to practical feelings Condition determines that the present embodiment do not do this any restriction.
The specific implementation process of the present embodiment is illustrated with a specific example below.
Assuming that mobile terminal is received to the pre- of contact person R in local address book (being equivalent to object contact person above) Fixed operation, at this moment, mobile terminal is generated and is shown and the associated communication icons of contact person R.If mobile terminal is received to information The drag operation of icon, and detect that communication icon (is equivalent to intended application above, using the application type of Y with using Y For email type) the overlapping area of application icon be more than default overlapping area, mobile terminal can obtain the user of contact person R Email address X (being equivalent to target information above) in information.Later, mobile terminal judges whether email address X meets Preset encryption condition.
If it is judged that meet, email address X can be encrypted in mobile terminal, obtain processing information C.It moves Dynamic terminal sends the call instruction for e-mail transmitting function (being equivalent to preset function above), call instruction to application Y Middle carrying processing information C.At this moment, in operating status to show that addressee artificially handles the mail page of information C using Y Face, user can input the information such as message body, mail matter topics in mail edit page.After input operation is completed, user The mail send button of mail edit page can be clicked, at this moment, mobile terminal is able to detect that is sent to mailbox clothes using Y The email message (being equivalent to application message above) of business device (being equivalent to server above).Mobile terminal can be from waiting for Extraction process information C in the email message of transmission is decrypted processing information C, obtains email address X.Later, mobile Processing information C in email message to be sent can be updated to email address X by terminal, and be sent to mailbox server through more New email message.
It can easily be seen that in entire mail transmission flow, the email address of contact person R can not be known at all using Y, in this way The leakage of the user information of contact person R can be effectively prevented from.In addition, the email message that mailbox server receives includes just True email address, rather than encrypted email address, therefore mailbox server can be according to correct email address to receiving To email message handled.
As can be seen that the present embodiment not only can be to avoid the leakage of the user information of object contact person, it can also be ensured that clothes Business device is successfully handled application message.
Optionally, invocation target is applied executes corresponding operation according to target information, further includes:
Before processing information in the application message for being sent to server to intended application is decrypted, output Second priority assignation prompting message;
According to the selection instruction inputted based on the second priority assignation prompting message, determine intended application to the of target information Two permissions;
If the second permission is to allow intended application that target information, execution is used to solve the processing information in application message Close processing, the step of obtaining target information.
It should be pointed out that the present embodiment is particularly suitable for above-mentioned judging whether target information meets preset encryption condition The third way of realization, that is to say, that the present embodiment is suitable for mobile terminal and is determined when intended application is not default application Target information meets the case where preset encryption condition.
In the present embodiment, place is decrypted in the processing information in the application message for being sent to server to intended application Before reason, mobile terminal can export the second priority assignation prompt message, to be used by whether the application of user's selection target has The permission of target information.Specifically, the second priority assignation prompt message can be shown in a suspended window, may be used also in the suspended window With display " YES " and " NO " two options.
If user allows intended application, using target information, (i.e. user gives the power that intended application uses target information Limit), user can input the selection instruction for selecting " YES ";If user's limited target (is used using target information The permission that intended application uses target information is not given in family), user can input the selection instruction for selecting " NO ".It is specific real Shi Shi, user can be instructed by clicking " YES " or " NO " in suspended window come input selection.
It is understood that in the case where user is instructed by clicking " YES " in suspended window come input selection, it is mobile Terminal determines that the second permission is that intended application is allowed to use target information, and mobile terminal execution is to the processing information in application message The step of being decrypted, obtaining target information.It is instructed come input selection in user by clicking " NO " in suspended window In the case of, mobile terminal determines that the second permission is that limitation intended application uses target information, and mobile terminal, which does not execute, disappears to application The step of processing information in breath is decrypted, obtains target information, later, mobile terminal will not be executed to server The step of sending updated application message, can preferably avoid the leakage of target information in this way.
For the ease of those skilled in the art understand that this programme, with reference to Fig. 2 and Fig. 3, to the specific reality of the present embodiment The process of applying illustrates.
As shown in Figure 2 and Figure 3, mobile terminal can search the object contact person needed for user in local address book first. Next, mobile terminal receives the predetermined operation input by user to object contact person, such as long press operation.In this way, mobile whole End can generate and show and the associated communication icon of object contact person in the case where receiving long press operation.It needs to illustrate It is that communication icon can be dragged with the finger of user, in this way, user can input drag operation to mobile terminal, by hum pattern Mark is dragged to the position for being more than default overlapping area with the overlapping area of the intended application icon of intended application.At this moment, mobile whole Communication icon is associated with, and according to intended application by end according to drag operation input by user with the application icon of intended application Application type obtains target information.
After getting target information, mobile terminal judges whether intended application is default application.
If it is judged that being yes, mobile terminal determines that target information is unsatisfactory for preset encryption condition, at this point, mobile whole Target information is directly determined as handling information by end.
If it is judged that being no, mobile terminal can have two kinds of process flows in Fig. 2 and Fig. 3.
As shown in Fig. 2, if it is judged that being no, mobile terminal exports the first priority assignation prompting message.Next, moving The selection instruction that dynamic terminal can be inputted according to user based on the first priority assignation prompt message determines that intended application believes target First permission of breath.If the first permission is to allow intended application that target information, mobile terminal is used to determine that target information is discontented Target information is directly determined as handling information by the preset encryption condition of foot, mobile terminal;If the first permission is limited target Using target information, mobile terminal determines that target information meets preset encryption condition, and at this moment, mobile terminal can be to target Information is encrypted, and is determined as the encrypted obtained encrypted result that handles to handle information.
As shown in figure 3, if it is judged that being no, mobile terminal can directly determine that target information meets preset encryption Condition, and target information is encrypted, it is determined as the encrypted obtained encrypted result that handles to handle information.
No matter mobile terminal judging result be it is no in the case of execute be Fig. 2 or Fig. 3 in flow, determining After handling information, mobile terminal sends the call instruction of the preset function for intended application to intended application, and calling refers to Processing information is carried in order.After receiving call instruction, intended application is based on processing information and executes the corresponding behaviour of preset function Make.Specifically, intended application execute operation can be:It transfers accounts to the Bank Account Number of object contact person;Navigation goes target to contact The home address of people;Short message is sent to the phone number of object contact person;According to the date of birth of object contact person, the birthday is set Reminder events, and birthday reminder events are reminded;The associated resource data of name of search and object contact person;To target The email address of contact person sends mail;It is communicated with the communication account of object contact person;It is dialled to the telephone number of object contact person It makes a phone call.
After intended application is based on the corresponding operation of processing information execution preset function, mobile terminal can detect target Using the application message for being sent to server, processing information is carried in application message.
It should be noted that in flow shown in Fig. 2, after detecting application message, mobile terminal can be directly right Processing information in application message is decrypted, and obtains target information, and by the processing information update in application message For after obtained target information, updated application message is sent to server.
In flow shown in Fig. 3, after detecting application message, mobile terminal can export the prompt of the second priority assignation and disappear Breath.Next, mobile terminal determines intended application to mesh according to the selection instruction inputted based on the second priority assignation prompting message Mark the second permission of information.Only in the case where the second permission allows intended application to use target information, mobile terminal is just right Processing information in application message is decrypted, and obtains target information, and by the processing information update in application message For after obtained target information, updated application message is sent to server.The second permission limited target using In the case of target information, mobile terminal no longer executes subsequent step.
To sum up, in the present embodiment, user, which need to only execute input operation, intended application twice, can get target information simultaneously Execute corresponding operating.Therefore, compared with prior art, in the embodiment of the present invention, user information friendship is carried out between different applications Mutual operation implements more convenient.
Mobile terminal provided in an embodiment of the present invention is illustrated below.
Referring to Fig. 4, the structural representation of mobile terminal provided in an embodiment of the present invention (i.e. mobile terminal 400) is shown in figure Figure.As shown in figure 4, mobile terminal 400 includes:
If display module 401 is generated to generate and show for receiving the predetermined operation for object contact person in address list Show and the associated communication icon of object contact person;
Acquisition module 402, if for receiving for by the associated association of the application icon of communication icon and intended application Operation obtains target information according to the application type of intended application;Wherein, target information is the user information of object contact person In with the associated information of application type;
Calling module 403 is applied for invocation target and executes corresponding operation according to target information.
Optionally, display module 401 is generated, is specifically used for:
It is raw according to the user information of object contact person if receiving the predetermined operation for object contact person in address list At and show communication icon.
Optionally, on the basis of embodiment shown in Fig. 4, as shown in figure 5, acquisition module 402, including:
Receiving submodule 4021, for for receiving the drag operation to communication icon;
Acquisition submodule 4022, if the overlapping area of the application icon for communication icon and intended application is more than default weight Folded area, communication icon is associated with application icon, and according to the application type of intended application, obtains target information.
Optionally, on the basis of embodiment shown in Fig. 4, as shown in fig. 6, calling module 403, including:
Judging submodule 4031, for judging whether target information meets preset encryption condition;
Place is encrypted to target information if meeting preset encryption condition for target information in processing submodule 4032 Reason is determined as the encrypted obtained encrypted result that handles to handle information;It, will if target information is unsatisfactory for preset encryption condition Target information is determined as handling information;
First sending submodule 4033, the calling for sending the preset function for being directed to intended application to intended application refer to It enables;Wherein, processing information is carried in call instruction, intended application is executed according to the call instruction received based on processing information The corresponding operation of preset function.
Optionally, on the basis of embodiment shown in Fig. 6, as shown in fig. 7, judging submodule 4031, including:
Judging unit 40311, for judging whether intended application is default application;Wherein, it is system application to preset application Or the application in preset list of application;
First determination unit 40312 determines that target information is unsatisfactory for preset add if being default application for intended application Close condition.
Optionally, on the basis of embodiment shown in Fig. 7, as shown in figure 8, judging submodule 4031, further includes:
Output unit 40313, for after judging whether intended application is default application, if intended application is not default Using then exporting the first priority assignation prompting message;
Second determination unit 40314, for according to the selection instruction based on the input of the first priority assignation prompting message, determining First permission of the intended application to target information;
Third determination unit 40315, if being that intended application is allowed to use target information for the first permission, it is determined that target Information is unsatisfactory for preset encryption condition;
4th determination unit 40316, if being that limitation intended application uses target information for the first permission, it is determined that target Using meeting preset encryption condition;
Optionally, on the basis of embodiment shown in Fig. 7, as shown in figure 9, judging submodule 4031, further includes:
5th determination unit 40317, for after judging whether intended application is default application, if intended application is not Default application, determines that target information meets preset encryption condition.
Optionally, on the basis of embodiment shown in Fig. 6, as shown in Figure 10, processing information is to add to target information It is close to handle obtained encrypted result;Calling module 403 further includes:
Decrypt submodule 4034, for intended application send for intended application preset function call instruction it Afterwards, the processing information that intended application is sent in the application message of server is decrypted, obtains target information;
Second sending submodule 4035, target information for being by the processing information update in application message it Afterwards, updated application message is sent to server.
Optionally, on the basis of embodiment illustrated in fig. 10, as shown in figure 11, calling module 403 further includes:
Output sub-module 4036, for the processing information in the application message for being sent to server to intended application into Before row decryption processing, the second priority assignation prompting message is exported;
Determination sub-module 4037, for according to the selection instruction based on the input of the second priority assignation prompting message, determining mesh Second permission of the mark application to target information;If the second permission is that intended application is allowed to use target information, triggering decryption submodule Block 4034.
It should be noted that mobile terminal 400 provided in an embodiment of the present invention can be realized in above method embodiment and be moved Each process that dynamic terminal is realized, to avoid repeating, which is not described herein again.In the embodiment of the present invention, user need to only execute twice Input operation, intended application can get target information and execute corresponding operating.Therefore, compared with prior art, of the invention In embodiment, the operation for carrying out user information interaction between different applications implements more convenient.
Referring to Figure 12, a kind of mobile terminal (i.e. mobile terminal 1200) for realizing each embodiment of the present invention is shown in figure Hardware architecture diagram.As shown in figure 12, mobile terminal 1200 includes but not limited to:Radio frequency unit 1201, network module 1202, audio output unit 1203, input unit 1204, sensor 1205, display unit 1206, user input unit 1207, The components such as interface unit 1208, memory 1209, processor 1210 and power supply 1211.It will be understood by those skilled in the art that Mobile terminal structure shown in Figure 12 does not constitute the restriction to mobile terminal 1200, and mobile terminal 1200 may include than figure Show more or fewer components, either combines certain components or different components arrangement.In embodiments of the present invention, mobile Terminal 1200 includes but not limited to mobile phone, tablet computer, palm PC, car-mounted terminal, wearable device and pedometer etc..
Wherein, processor 1210 are used for:
If receiving the predetermined operation for object contact person in address list, generates and show associated with object contact person Communication icon;
If receiving for the application icon of communication icon and intended application is associated operation associated, according to intended application Application type, obtain target information;Wherein, target information is associated with application type in the user information of object contact person Information;
Invocation target is applied executes corresponding operation according to target information.
In the embodiment of the present invention, user, which need to only execute input operation, intended application twice, can get target information simultaneously Execute corresponding operating.Therefore, compared with prior art, in the embodiment of the present invention, user information friendship is carried out between different applications Mutual operation implements more convenient.
Optionally, processor 1210 are specifically used for:
It is raw according to the user information of object contact person if receiving the predetermined operation for object contact person in address list At and show communication icon.
Optionally, processor 1210 are specifically used for:
Receive the drag operation to communication icon;
If the overlapping area of the application icon of communication icon and intended application is more than default overlapping area, by communication icon with Application icon is associated with, and according to the application type of intended application, obtains target information.
Optionally, processor 1210 are specifically used for:
Judge whether target information meets preset encryption condition;
If target information meets preset encryption condition, target information is encrypted, encrypted processing is obtained Encrypted result be determined as handle information;If target information is unsatisfactory for preset encryption condition, target information is determined as handling Information;
The call instruction of the preset function for intended application is sent to intended application;Wherein, in call instruction at carrying Information is managed, intended application executes the corresponding operation of preset function according to the call instruction received, based on processing information.
Optionally, processor 1210 are specifically used for:
Judge whether intended application is default application;Wherein, application is preset as system application or is located at preset application Application in list;
If intended application is default application, determine that target information is unsatisfactory for preset encryption condition.
Optionally, processor 1210 are specifically used for:
After judging whether intended application is default application, if intended application is not default application, the first power of output Limit setting prompting message;
According to the selection instruction inputted based on the first priority assignation prompting message, determine intended application to the of target information One permission;
If the first permission is that intended application is allowed to use target information, it is determined that target information is unsatisfactory for preset encryption item Part;
If the first permission is limitation, intended application uses target information, it is determined that intended application meets preset encryption item Part.
Optionally, processor 1210 are specifically used for:
After judging whether intended application is default application, if intended application is not default application, target information is determined Meet preset encryption condition.
Optionally, processing information is the encrypted result that target information is encrypted;Processor 1210, specifically For:
It is to be sent to intended application after being sent to intended application for the call instruction of the preset function of intended application It is decrypted to the processing information in the application message of server, obtains target information;
After the target information for being by the processing information update in application message, updated answer is sent to server Use message.
Optionally, processor 1210 are specifically used for:
Before processing information in the application message for being sent to server to intended application is decrypted, output Second priority assignation prompting message;
According to the selection instruction inputted based on the second priority assignation prompting message, determine intended application to the of target information Two permissions;
If the second permission is to allow intended application that target information, execution is used to be sent to server to intended application and answer The step of being decrypted with the processing information in message.
It should be understood that the embodiment of the present invention in, radio frequency unit 1201 can be used for receiving and sending messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, to processor 1210 handle;In addition, by uplink Data are sent to base station.In general, radio frequency unit 1201 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 1201 can also by radio communication system and network and other Equipment communicates.
Mobile terminal has provided wireless broadband internet to the user by network module 1202 and has accessed, and such as user is helped to receive Send e-mails, browse webpage and access streaming video etc..
It is that audio output unit 1203 can receive radio frequency unit 1201 or network module 1202 or in memory The audio data stored in 1209 is converted into audio signal and exports to be sound.Moreover, audio output unit 1203 can be with The relevant audio output of specific function executed with mobile terminal 1200 is provided (for example, call signal receives sound, message sink Sound etc.).Audio output unit 1203 includes loud speaker, buzzer and receiver etc..
Input unit 1204 is for receiving audio or video signal.Input unit 1204 may include graphics processor (Graphics Processing Unit, GPU) 12041 and microphone 12042, graphics processor 12041 in video to capturing In pattern or image capture mode by image capture apparatus (such as camera) obtain static images or video image data into Row processing.Treated, and picture frame may be displayed on display unit 1206.Through treated the picture frame of graphics processor 12041 It can be stored in memory 1209 (or other storage mediums) or be carried out via radio frequency unit 1201 or network module 1202 It sends.Microphone 12042 can receive sound, and can be audio data by such acoustic processing.Audio that treated Data can be converted to the lattice that mobile communication base station can be sent to via radio frequency unit 1201 in the case of telephone calling model Formula exports.
Mobile terminal 1200 further includes at least one sensor 1205, for example, optical sensor, motion sensor and other Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ring The light and shade of border light adjusts the brightness of display panel 12061, proximity sensor can when mobile terminal 1200 is moved in one's ear, Close display panel 12061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions The size of (generally three axis) acceleration, can detect that size and the direction of gravity, can be used to identify mobile terminal appearance when static State (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) Deng;Sensor 1205 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, gas Meter, hygrometer, thermometer, infrared sensor etc. are pressed, details are not described herein.
Display unit 1206 is for showing information input by user or being supplied to the information of user.Display unit 1206 can Including display panel 12061, liquid crystal display (Liquid Crystal Display, LCD), organic light-emitting diodes may be used Forms such as (Organic Light-Emitting Diode, OLED) are managed to configure display panel 12061.
User input unit 1207 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family is arranged and the related key signals input of function control.Specifically, user input unit 1207 include touch panel 12071 with And other input equipments 12072.Touch panel 12071, also referred to as touch screen collect user on it or neighbouring touch are grasped Make (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 12071 or in touch panel Operation near 12071).Touch panel 12071 may include both touch detecting apparatus and touch controller.Wherein, it touches The touch orientation of detection device detection user is touched, and detects the signal that touch operation is brought, transmits a signal to touch controller; Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1210, It receives the order that processor 1210 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface The multiple types such as sound wave realize touch panel 12071.In addition to touch panel 12071, user input unit 1207 can also include Other input equipments 12072.Specifically, other input equipments 12072 can include but is not limited to physical keyboard, function key (ratio Such as volume control button, switch key), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 12071 can be covered on display panel 12061, when touch panel 12071 detects After touch operation on or near it, processor 1210 is sent to determine the type of touch event, is followed by subsequent processing device 1210 Corresponding visual output is provided on display panel 12061 according to the type of touch event.Although in fig. 12, touch panel 12071 with display panel 12061 be realize the function that outputs and inputs of mobile terminal as two independent components, but In some embodiments, touch panel 12071 can be integrated with display panel 12061 and realize outputting and inputting for mobile terminal Function does not limit specifically herein.
Interface unit 1208 is the interface that external device (ED) is connect with mobile terminal 1200.For example, external device (ED) may include Wired or wireless headphone port, external power supply (or battery charger) port, wired or wireless data port, storage card Port, the port for connecting the device with identification module, the port audio input/output (I/O), video i/o port, earphone Port etc..Interface unit 1208 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) simultaneously And by one or more elements that the input received is transferred in mobile terminal 1200 or it can be used in mobile terminal Transmission data between 1200 and external device (ED).
Memory 1209 can be used for storing software program and various data.Memory 1209 can include mainly storage program Area and storage data field, wherein storing program area can storage program area, needed at least one function application program (such as Sound-playing function, image player function etc.) etc.;Storage data field can be stored uses created data (ratio according to mobile phone Such as audio data, phone directory) etc..In addition, memory 1209 may include high-speed random access memory, can also include non- Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Processor 1210 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 1209, and calls and is stored in storage Data in device 1209 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Reason device 1210 may include one or more processing units;Preferably, processor 1210 can integrate application processor and modulation /demodulation Processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor master Handle wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1210.
Mobile terminal 1200 can also include the power supply 1211 (such as battery) powered to all parts, it is preferred that power supply 1211 can be logically contiguous by power-supply management system and processor 1210, to realize that management is filled by power-supply management system The functions such as electricity, electric discharge and power managed.
In addition, mobile terminal 1200 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of mobile terminal, including processor 1210, memory 1209, storage On memory 1209 and the computer program that can be run on the processor 1210, the computer program is by processor 1210 Each process of the operating method embodiment of above-mentioned mobile terminal is realized when execution, and can reach identical technique effect, to keep away Exempt to repeat, which is not described herein again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each mistake of the operating method embodiment of above-mentioned mobile terminal when being executed by processor Journey, and identical technique effect can be reached, to avoid repeating, which is not described herein again.Wherein, the computer-readable storage medium Matter, such as read-only memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation RAM), magnetic disc or CD etc..
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form belongs within the protection of the present invention.

Claims (14)

1. a kind of operating method of mobile terminal, which is characterized in that the method includes:
If receiving the predetermined operation for object contact person in address list, generates and show associated with the object contact person Communication icon;
If receiving for the application icon of described information icon and intended application is associated operation associated, according to the target The application type of application obtains target information;Wherein, the target information in the user information of the object contact person with institute State the associated information of application type;
The intended application is called to execute corresponding operation according to the target information.
2. according to the method described in claim 1, it is characterized in that, if described receive for by described information icon and target The application icon of application is associated operation associated, according to the application type of the intended application, obtains target information, including:
Receive the drag operation to described information icon;
If the overlapping area of described information icon and the application icon of the intended application is more than default overlapping area, by the letter Breath icon is associated with the application icon, and according to the application type of the intended application, obtains target information.
3. according to the method described in claim 1, it is characterized in that, described call the intended application according to the target information Corresponding operation is executed, including:
Judge whether the target information meets preset encryption condition;
If the target information meets preset encryption condition, the target information is encrypted, by encrypted processing Obtained encrypted result is determined as handling information;If the target information is unsatisfactory for preset encryption condition, the target is believed Breath is determined as handling information;
The call instruction of the preset function for the intended application is sent to the intended application;Wherein, the call instruction Middle to carry the processing information, the intended application is executed according to the call instruction received based on the processing information The corresponding operation of the preset function.
4. according to the method described in claim 3, it is characterized in that, described judge whether the target information meets preset add Close condition, including:
Judge whether the intended application is default application;Wherein, the default application is system application or is located at preset Application in list of application;
If the intended application is default application, determine that the target information is unsatisfactory for preset encryption condition.
5. according to the method described in claim 4, it is characterized in that, described judge whether the target information meets preset add Close condition further includes:
After judging whether the intended application is default application, if the intended application is not default application, the is exported One priority assignation prompting message;
According to the selection instruction inputted based on the first priority assignation prompting message, determine the intended application to the target First permission of information;
If first permission is that the intended application is allowed to use the target information, it is determined that the target information is unsatisfactory for Preset encryption condition;
If first permission is to limit the intended application to use the target information, it is determined that the intended application meets pre- If encryption condition.
6. according to the method described in claim 3, it is characterized in that, the processing information is that the target information is encrypted Handle obtained encrypted result;It is described that the intended application is called to execute corresponding operation according to the target information, further include:
After being sent to the intended application for the call instruction of the preset function of the intended application, the target is answered It is decrypted with the processing information being sent in the application message of server, obtains the target information;
After the target information for being by the processing information update in the application message, sent out to the server The newer application message of the warp let-off.
7. according to the method described in claim 6, it is characterized in that, described call the intended application according to the target information Corresponding operation is executed, further includes:
Before the processing information being sent to the intended application in the application message of server is decrypted, Export the second priority assignation prompting message;
According to the selection instruction inputted based on the second priority assignation prompting message, determine the intended application to the target Second permission of information;
If second permission is that the intended application is allowed to use the target information, execution is described to wait for the intended application The step of processing information being sent in the application message of server is decrypted.
8. a kind of mobile terminal, which is characterized in that the mobile terminal includes:
Display module is generated, if for receiving the predetermined operation for object contact person in address list, generates and shows and institute State the associated communication icon of object contact person;
Acquisition module, if for receiving for grasping the associated association of the application icon of described information icon and intended application Make, according to the application type of the intended application, obtains target information;Wherein, the target information is the object contact person User information in the associated information of the application type;
Calling module, for calling the intended application to execute corresponding operation according to the target information.
9. mobile terminal according to claim 8, which is characterized in that the acquisition module, including:
Receiving submodule, for receiving the drag operation to described information icon;
Acquisition submodule, if the overlapping area for described information icon and the application icon of the intended application is more than default weight Folded area, described information icon is associated with the application icon, and according to the application type of the intended application, obtains target Information.
10. mobile terminal according to claim 8, which is characterized in that the calling module, including:
Judging submodule, for judging whether the target information meets preset encryption condition;
Place is encrypted to the target information if meeting preset encryption condition for the target information in processing submodule Reason is determined as the encrypted obtained encrypted result that handles to handle information;If the target information is unsatisfactory for preset encryption item The target information is determined as handling information by part;
First sending submodule, the calling for sending the preset function for being directed to the intended application to the intended application refer to It enables;Wherein, carry the processing information in the call instruction, the intended application according to the call instruction received, The corresponding operation of the preset function is executed based on the processing information.
11. mobile terminal according to claim 10, which is characterized in that the judging submodule, including:
Judging unit, for judging whether the intended application is default application;Wherein, the default application be system apply or Person is located at the application in preset list of application;
First determination unit determines that the target information is unsatisfactory for preset add if being default application for the intended application Close condition.
12. mobile terminal according to claim 11, which is characterized in that the judging submodule further includes:
Output unit, for after judging whether the intended application is default application, if the intended application is not default Using then exporting the first priority assignation prompting message;
Second determination unit, described according to the selection instruction based on the first priority assignation prompting message input, determining First permission of the intended application to the target information;
Third determination unit, if being that the intended application is allowed to use the target information for first permission, it is determined that The target information is unsatisfactory for preset encryption condition;
4th determination unit, if being to limit the intended application to use the target information for first permission, it is determined that The intended application meets preset encryption condition.
13. mobile terminal according to claim 10, which is characterized in that the processing information be to the target information into The encrypted result that row encryption obtains;The calling module further includes:
Decrypt submodule, for the intended application send for the intended application preset function call instruction it Afterwards, it is sent to the processing information in the application message of server to the intended application to be decrypted, obtains institute State target information;
Second sending submodule, the target information for being by the processing information update in the application message Later, the updated application message is sent to the server.
14. mobile terminal according to claim 13, which is characterized in that the calling module further includes:
Output sub-module, for the intended application be sent to the processing information in the application message of server into Before row decryption processing, the second priority assignation prompting message is exported;
Determination sub-module, for according to the selection instruction based on the second priority assignation prompting message input, determining the mesh Second permission of the mark application to the target information;If second permission is that the intended application is allowed to believe using the target Breath, triggers the decryption submodule.
CN201810200225.XA 2018-03-12 2018-03-12 Mobile terminal operation method and mobile terminal Active CN108540645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810200225.XA CN108540645B (en) 2018-03-12 2018-03-12 Mobile terminal operation method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810200225.XA CN108540645B (en) 2018-03-12 2018-03-12 Mobile terminal operation method and mobile terminal

Publications (2)

Publication Number Publication Date
CN108540645A true CN108540645A (en) 2018-09-14
CN108540645B CN108540645B (en) 2021-01-08

Family

ID=63483615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810200225.XA Active CN108540645B (en) 2018-03-12 2018-03-12 Mobile terminal operation method and mobile terminal

Country Status (1)

Country Link
CN (1) CN108540645B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639909A (en) * 2019-02-12 2019-04-16 莆田市烛火信息技术有限公司 A kind of quick call-out method of instant messaging Video chat and device
CN109871164A (en) * 2019-01-25 2019-06-11 维沃移动通信有限公司 A kind of message method and terminal device
CN111258476A (en) * 2020-02-20 2020-06-09 维沃移动通信有限公司 Message processing method and electronic equipment

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050054329A1 (en) * 2003-09-10 2005-03-10 Nec Corporation Wireless network registration system and wireless network registration method thereof
CN102654814A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and device for calling functions in application as well as electronic equipment
CN102841902A (en) * 2011-06-23 2012-12-26 捷达世软件(深圳)有限公司 Database data management method and system
US20140040804A1 (en) * 2010-06-16 2014-02-06 Samsung Electronics Co., Ltd. Interface method for a portable terminal
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN106503580A (en) * 2016-10-13 2017-03-15 深圳市金立通信设备有限公司 A kind of guard method of private data and terminal
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device
CN106873854A (en) * 2017-01-20 2017-06-20 北京奇虎科技有限公司 Terminal and interface alternation control method, contact object creation method and device
CN107133498A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy application management method and device and mobile terminal
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN107562336A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of method, equipment and computer-readable recording medium for controlling suspension ball
CN107734178A (en) * 2017-10-27 2018-02-23 北京小米移动软件有限公司 Presentation of information processing method, device, equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050054329A1 (en) * 2003-09-10 2005-03-10 Nec Corporation Wireless network registration system and wireless network registration method thereof
US20140040804A1 (en) * 2010-06-16 2014-02-06 Samsung Electronics Co., Ltd. Interface method for a portable terminal
CN102654814A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and device for calling functions in application as well as electronic equipment
CN102841902A (en) * 2011-06-23 2012-12-26 捷达世软件(深圳)有限公司 Database data management method and system
CN104768148A (en) * 2015-03-11 2015-07-08 浙江翼信科技有限公司 Message encryption method and device
CN106503580A (en) * 2016-10-13 2017-03-15 深圳市金立通信设备有限公司 A kind of guard method of private data and terminal
CN106548082A (en) * 2016-11-08 2017-03-29 深圳市万普拉斯科技有限公司 Message treatment method and device
CN106873854A (en) * 2017-01-20 2017-06-20 北京奇虎科技有限公司 Terminal and interface alternation control method, contact object creation method and device
CN107133498A (en) * 2017-04-20 2017-09-05 北京安云世纪科技有限公司 A kind of privacy application management method and device and mobile terminal
CN107562336A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of method, equipment and computer-readable recording medium for controlling suspension ball
CN107506111A (en) * 2017-08-30 2017-12-22 维沃移动通信有限公司 The encryption and decryption method and terminal of a kind of terminal applies
CN107734178A (en) * 2017-10-27 2018-02-23 北京小米移动软件有限公司 Presentation of information processing method, device, equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871164A (en) * 2019-01-25 2019-06-11 维沃移动通信有限公司 A kind of message method and terminal device
US11658932B2 (en) 2019-01-25 2023-05-23 Vivo Mobile Communication Co., Ltd. Message sending method and terminal device
CN109639909A (en) * 2019-02-12 2019-04-16 莆田市烛火信息技术有限公司 A kind of quick call-out method of instant messaging Video chat and device
CN111258476A (en) * 2020-02-20 2020-06-09 维沃移动通信有限公司 Message processing method and electronic equipment
CN111258476B (en) * 2020-02-20 2021-07-27 维沃移动通信有限公司 Message processing method and electronic equipment

Also Published As

Publication number Publication date
CN108540645B (en) 2021-01-08

Similar Documents

Publication Publication Date Title
CN108469965A (en) A kind of setting method and mobile terminal of application program
CN108200289A (en) A kind of unread message processing method and mobile terminal
CN107977132A (en) A kind of method for information display and mobile terminal
CN109194818A (en) A kind of information processing method and terminal
CN108958865A (en) A kind of footmark management method and mobile terminal
CN109343755A (en) A kind of document handling method and terminal device
CN109407921A (en) A kind of processing method and terminal device of application program
CN108519850A (en) A kind of keyboard interface display methods and mobile terminal
CN109582475A (en) A kind of sharing method and terminal
CN110196667A (en) A kind of processing method and terminal of notification message
CN108646958A (en) A kind of application program launching method and terminal
CN108920226A (en) screen recording method and device
CN110209331A (en) Information cuing method and terminal
CN110308839A (en) A kind of file management method and terminal device
CN108345425A (en) A kind of management method and mobile terminal of application
CN109976606A (en) Information display method, mobile terminal
CN109639569A (en) A kind of social communication method and terminal
CN109508136A (en) A kind of display methods and mobile terminal of application program
CN108171034A (en) A kind of method and terminal for protecting privacy
CN108958841A (en) A kind of setting method and mobile terminal of desktop pendant
CN110049187A (en) A kind of display methods and terminal device
CN110457879A (en) Object displaying method and terminal device
CN110308838A (en) A kind of application interaction processing method and terminal device
CN108920040A (en) A kind of application icon method for sorting and mobile terminal
CN110147186A (en) A kind of control method and terminal device of application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant