CN108924350A - Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension - Google Patents

Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension Download PDF

Info

Publication number
CN108924350A
CN108924350A CN201810692662.8A CN201810692662A CN108924350A CN 108924350 A CN108924350 A CN 108924350A CN 201810692662 A CN201810692662 A CN 201810692662A CN 108924350 A CN108924350 A CN 108924350A
Authority
CN
China
Prior art keywords
application
lock
functional configuration
cipher
configuration option
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810692662.8A
Other languages
Chinese (zh)
Inventor
唐以森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810692662.8A priority Critical patent/CN108924350A/en
Publication of CN108924350A publication Critical patent/CN108924350A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Abstract

The present invention provides a kind of implementation method of application lock Function Extension, includes the following steps:The two or more application lock ciphers and corresponding functional configuration option that destination application is arranged based on preset application lock Function Extension pattern acquiring;Wherein, functional configuration option and the application lock cipher of setting correspond;Lock cipher and corresponding functional configuration option are applied according to acquired, the incidence relation of lock cipher and functional configuration option is applied in building;After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to the incidence relation using lock cipher and functional configuration constructed, function corresponding with functional configuration option is executed in destination application.The present invention also provides a kind of mobile terminal and readable storage medium storing program for executing.The present invention solves the technical issues of existing application lock has a single function, application program can not be made pointedly to execute different functions.

Description

Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension
Technical field
The present invention relates to technical field of mobile terminals more particularly to a kind of implementation methods of application lock Function Extension, movement Terminal and readable storage medium storing program for executing.
Background technique
It, can be by the way that application lock verification Application program be arranged when using mobile terminal (such as smart phone, tablet computer) Access right.Wherein, application lock generally refers to start for a certain application program setting selected by user or open this to answer With the password (such as numerical ciphers, finger-print cipher) of program.In this way, can start or open correspondence after only correctly entering password Application program.
However, functioning only as the existing way of a certain application program setting application lock using journey for different people The verification of sequence access right acts on, and application program can not be made pointedly to execute different functions, and then be unable to satisfy difference Demand.For example, can see the mode of writing to each other of secret when the owner of mobile terminal wishes oneself in open communication record, And other people cannot see that the mode of writing to each other of above-mentioned secret when open communication is recorded;And to address list setting application lock it Afterwards, as long as other people, which know and input correct application lock, opens address list, while seeing the communication connection of above-mentioned secret It is mode.Obviously, the same application lock is unable to satisfy the demand of owner.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of implementation method of application lock Function Extension, mobile terminal and readable deposit Storage media, it is intended to solve the verification effect that existing application lock had a single function, functioned only as application program access right, can not make Application program pointedly executes the technical issues of different functions.
To achieve the above object, the present invention provides a kind of implementation method of application lock Function Extension, the method includes with Lower step:
Destination application is arranged based on preset application lock Function Extension pattern acquiring two or more Using lock cipher and corresponding functional configuration option;Wherein, the application lock cipher one of the functional configuration option and setting One is corresponding;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is selected using lock cipher and functional configuration The incidence relation of item;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to structure The incidence relation using lock cipher and functional configuration built executes and the functional configuration option pair in destination application The function of answering.
Preferably, destination application is arranged based on preset application lock Function Extension pattern acquiring two or It the step of more than two application lock ciphers and corresponding functional configuration option, specifically includes:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
Preferably, if described detect when applying lock cipher of input, according to the application lock cipher and function constructed The incidence relation that can be configured, it is specific to wrap in the step of destination application executes function corresponding with the functional configuration option It includes:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether With pre-set application lock password match;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and obtain The functional configuration option of the application lock password match taken;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
Preferably, if described detect when applying lock cipher of input, according to the application lock cipher and function constructed The incidence relation that can be configured, it is specific to wrap in the step of destination application executes function corresponding with the functional configuration option It includes:
When destination application is in operating status, if getting the application lock cipher of input, the institute of acquisition is detected State using lock cipher whether with pre-set application lock password match;
If matching, according to the incidence relation constructed, find out and the application lock password match of acquisition Functional configuration option;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
Preferably, described to include using the type of lock cipher:Graphical passwords, numerical ciphers, text password, gesture password, Finger-print cipher, speech cipher are one such.
Preferably, described to include using the type of lock cipher:Graphical passwords, numerical ciphers, text password, gesture password, Finger-print cipher, speech cipher two or two therein or more any combination.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes:Memory, Processor and the realization program for being stored in the application lock Function Extension that can be run on the memory and on the processor, In:
The realization program of the application lock Function Extension realizes step when being executed by the processor:
Destination application is arranged based on preset application lock Function Extension pattern acquiring two or more Using lock cipher and corresponding functional configuration option;Wherein, the application lock cipher one of the functional configuration option and setting One is corresponding;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is selected using lock cipher and functional configuration The incidence relation of item;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to structure The incidence relation using lock cipher and functional configuration built executes and the functional configuration option pair in destination application The function of answering.
Preferably, step is also realized when the realization program of the application lock Function Extension is executed by the processor:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
Preferably, step is also realized when the realization program of the application lock Function Extension is executed by the processor:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether With pre-set application lock password match;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and obtain The functional configuration option of the application lock password match taken;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
In addition, to achieve the above object, the present invention also provides a kind of readable storage medium storing program for executing, being deposited on the readable storage medium storing program for executing The realization program of application lock Function Extension is contained, is realized such as when the realization program of the application lock Function Extension is executed by processor The step of implementation method of the upper application lock Function Extension.
The present invention proposes implementation method, mobile terminal and the readable storage medium storing program for executing of a kind of application lock Function Extension, by pre- Multiple application lock cipher and corresponding functional configuration options to destination application setting are first obtained, lock cipher is applied in building With the incidence relation of functional configuration option, and then realize in the starting of application program or operational process, according to the application of input Lock cipher executes function corresponding with the functional configuration option in destination application.In this way, meeting basic application journey Under the premise of the verifying function of sequence access right, so that application program pointedly executes different functions, application lock is enriched Applicable envelop of function, help to improve the safety of information.For a user, input it is different apply lock cipher, can be with The destination application for easily controlling mobile terminal executes correspondingly function, meets the different demands of user, helps to mention The usage experience of high user.
Detailed description of the invention
Fig. 1 is a kind of hardware structural diagram of mobile terminal of the present invention;
Fig. 2 is a kind of corresponding communications network system architecture diagram of mobile terminal of the present invention;
Fig. 3 is the flow diagram of the implementation method first embodiment of application lock Function Extension of the present invention;
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
The memory 109 of the mobile terminal 100 is stored with the realization program of application lock Function Extension, which can be in institute It states and is run on processor 110, and realize following steps:Based on preset application lock Function Extension pattern acquiring to target application journey The two or more application lock ciphers and corresponding functional configuration option of sequence setting;Wherein, the functional configuration option It is corresponded with the application lock cipher of setting;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is selected using lock cipher and functional configuration The incidence relation of item;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to structure The incidence relation using lock cipher and functional configuration built executes and the functional configuration option pair in destination application The function of answering.
In addition, the realization program of the application lock Function Extension also realizes step when being executed by the processor:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
In addition, the realization program of the application lock Function Extension also realizes step when being executed by the processor:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether With pre-set application lock password match;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and obtain The functional configuration option of the application lock password match taken;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
The implementation method that the specific implementation of above steps please read application lock Function Extension of the present invention hereinafter is respectively implemented The detailed description of example.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
The present invention provides a kind of implementation method of application lock Function Extension.
Referring to figure 3., Fig. 3 is the flow diagram of the implementation method first embodiment of application lock Function Extension of the present invention.
In the present embodiment, it the described method comprises the following steps:
Step S10, destination application is arranged based on preset application lock Function Extension pattern acquiring two or two Lock cipher and corresponding functional configuration option are applied more than a;Wherein, the application of the functional configuration option and setting Lock cipher corresponds;
It should be noted that the implementation method of application lock Function Extension provided by the invention is applied to movement as described above Terminal.It is unlimited that the timing node that application lock function mode of extension is arranged is carried out in advance, for example, when mobile terminal first powers on It can carry out that the setting of application lock function mode of extension can also be carried out to application lock by " setting " option of mobile terminal The setting of Function Extension mode.Destination application can be the application program run on mobile terminals, such as wechat, microblogging; It can also be that all kinds of software and hardware configurations based on mobile terminal realize plug-in unit/software program of operation function.
In the specific implementation, step S10 includes:When receiving application lock setting instruction, display and destination application Corresponding application lock cipher set interface;It obtains and applies lock cipher using the input of lock cipher set interface according to described;And Obtain the functional configuration option being arranged using lock cipher according to input.
User applies lock cipher in application lock cipher set interface input, and correspondingly acquisition for mobile terminal user is in application lock Lock cipher is applied in the input of password set interface.
It is acquired described to include using the type of lock cipher for the same destination application:Graphical passwords, Numerical ciphers, text password, gesture password, finger-print cipher, speech cipher are one such.I.e. each application lock cipher is same The password of one type.For example, the left-hand finger of the typing same person and the finger of right finger can be distinguished by taking finger-print cipher as an example Print image, perhaps the fingerprint image of the different fingers of typing same person the same hand or typing different people are respective respectively Fingerprint image;The fingerprint image of a certain individual of acceptable typing, and with the default image of non-typing (i.e. blank password) Lock cipher is applied as one.
Described further include using the type of lock cipher in addition, acquired:Graphical passwords, numerical ciphers, text password, hand Gesture password, finger-print cipher, speech cipher two or two therein or more any combination.That is the type of different application lock cipher It can be different.For example, one fingerprint image of typing, a numerical ciphers are as two using lock cipher respectively.It needs Bright, other than the above-mentioned type using lock cipher enumerated, other types of application lock cipher is equally in the present invention Within the protection scope of embodiment.
And the quantity using lock cipher obtained is two or more, such as three, four.Lock cipher is applied with any One-to-one functional configuration option refers to that permission executes several items in destination application start-up course or operational process The correspondence config option of function.That is, including the function choosing-item for allowing to execute corresponding with application lock cipher in config option.It lifts For example, different config option a, b are respectively corresponded using lock cipher A, B.
Situation one:Config option a includes the function choosing-item (S1, S2, S3) for allowing to execute corresponding with application lock cipher A; Config option b includes the function choosing-item (S1, S2) for allowing to execute corresponding with application lock cipher B.Correspondingly, close according to application lock Code B can not allow in destination application start-up course or operational process to execute function choosing-item S3.
Situation two:Config option a includes the function choosing-item S1 that allows execute corresponding with application lock cipher A;Config option b Include the function choosing-item S2 that allows execute corresponding with application lock cipher B.Correspondingly, destination application start-up course or fortune During row, according to allowing to execute function choosing-item S1 using lock cipher A, allow execution function choosing-item S2 according to using lock cipher B.
Step S20 applies lock cipher and corresponding functional configuration option according to acquired, and lock cipher and function are applied in building The incidence relation of energy config option;
The incidence relation using lock cipher and functional configuration option of building, specifically can be by creation allocation list or The mode of configuration file is constructed.It is acquired using lock cipher and corresponding functional configuration option, the pass constructed The related data and file of connection relationship can store in default storage region on mobile terminals, and pass through certain encryption hand Duan Jinhang encryption, to enhance protection, prevention is illegally stolen or is read.
Step S30, after entering preset application lock Function Extension mode, if detect the application lock cipher of input, According to the incidence relation using lock cipher and functional configuration constructed, executes in destination application and match with the function Set the corresponding function of option.
After step S20, user can voluntarily choose whether to enter preset application lock Function Extension mode.In the mould Under formula, mobile terminal applies lock cipher when starting or running a certain application program, according to user's input, answers in target Different functions is executed with program.
A kind of specific implementation includes:When detecting the starting run signal of destination application, displaying target application journey The unlock interface of sequence;Lock cipher is applied in unlock interface input if getting, the application lock for detecting acquisition is close Code whether with pre-set application lock password match;If matching, is unlocked destination application, and according to having constructed The incidence relation finds out the functional configuration option with the application lock password match obtained;According to the functional configuration Option executes function corresponding with the functional configuration option in destination application.
Another kind is embodied:When destination application is in operating status, if getting the application lock of input Password, then detect acquisition the application lock cipher whether with pre-set application lock password match;If matching, according to The incidence relation of building finds out the functional configuration option with the application lock password match obtained;According to the function Energy config option executes function corresponding with the functional configuration option in destination application.
Above two specific embodiment respectively represents destination application when starting, operating normally according to getting The application scenarios of corresponding function are executed using lock cipher.Wherein, the application lock cipher of acquisition and pre-set application lock The condition that password matches both refers to that identical, or both similarity is greater than preset threshold, specifically will acquire The application lock cipher is compared with pre-set each application lock cipher respectively, above-mentioned matched to judge whether to meet Condition.It should be noted that applying lock cipher according to what is got, function corresponding with functional configuration option is executed on backstage and is cut Change operation (such as account switching, database switching, image watermarking).Such as the logon account of current goal application program is A, and Lock cipher is applied according to a certain, destination application is by direct logon account B.At this point, mobile terminal backstage is detecting that this answers When with lock cipher, logon account A will be directly nullified, and the associated login information for extracting account B is logged in.
In the following, being illustrated in conjunction with different application implementation scenes.
(1) application implementation scene one:For needing to input and verify the application program of logon account and corresponding password (such as Wechat, microblogging).
Incidence relation, such as the left hand thumb of a certain user are established from different accounts using lock cipher by different in advance The corresponding account A for being associated with a certain application program of fingerprint image, the hand thumb fingerprint image of the user correspond to interlock account B.This When, functional configuration option corresponding with a certain application lock cipher is " Account Logon ".That is, after accomplishing the setting up, in user After the icon for clicking application program, mobile terminal starts application program;If detecting the left hand thumbprint image of the user, Logon account A;If detecting the hand thumb fingerprint image of the user, logon account B.
By taking logon account B as an example:In the prior art, if being needed in the application first with account A login before It first to be logged in account A, then nullify or exit account A, then again with account B login.And through this embodiment in application Lock function extension implementation method, user can by typing hand thumb fingerprint image, can in the application directly with Account B is logged in.That is, simplifying the operation of the account main body conversion of application program, the login efficiency of application program is improved.
(2) application implementation scene two:For being related to the application program (address list of such as mobile terminal of sensitive data:It is mobile The owner of terminal wishes that the communication mode of certain contact persons on address list is invisible to other people).
The left hand thumbprint image and hand thumb fingerprint image of the preparatory same user of typing (such as owner), using as into Two for entering the application program apply lock cipher.Wherein, the corresponding functional configuration option of left hand thumbprint image is to allow to read Take the private data library (non-private data library and private data library can be read simultaneously) in application program;Hand thumb fingerprint The corresponding functional configuration option of image is that the non-private data library read in application program is only allowed (can not to read private data Library).
It, can be in this way, when dependency information/data in the private data library that owner allows other people to check in application program Enter the application program using its left hand thumbprint image;When owner do not allow/be not intended to other people to check in application program Private data library in dependency information/data when, its hand thumb fingerprint image can be used into the application program.
For the prior art, in needing to check the private data library in application program when dependency information/data, need First to carry out the switching of user account or storage space of database.The handoff procedure needs multistep to carry out, and passes through this implementation Example in application lock Function Extension implementation method, only need to use specifically using lock cipher can be completed private data library or It any selection in non-private data library and checks, has both been able to achieve the secrecy of information, can also improve information database and select one and check and hold The concealment that action is made, the right of privacy for the user that adequately protects.
(3) application implementation scene three:For the application program for needing to carry out information/data protection, virtual data is constructed.
For example, one normal use lock cipher of typing in advance, and it is a certain as normal starting/operation using lock cipher using this The voucher of application program.In addition, also set up one it is virtual apply lock cipher, this can be to construct the side of pointer using lock cipher Formula is directed toward any using lock cipher using lock cipher or one in addition to above-mentioned normal use lock cipher of a blank.It moves The legitimate user (such as owner) of dynamic terminal can by typing this using lock cipher make mobile terminal normally starting/operation this answer Use program.When mobile terminal is stolen or is invaded, if detect input using the normal of lock cipher and preparatory typing When mismatching using lock cipher, the virtual data for presetting or generating at random is only presented in corresponding application program.This Crucial important information/data can be hidden, avoid information/data and illegally stolen, improve information/number by sample According to safety.
(4) application implementation scene four:For same application, different operations is customized.
For same application, preparatory typing it is different apply lock cipher, as owner left hand thumbprint image and Hand thumb fingerprint image.Wherein, the corresponding functional configuration option of left hand thumbprint image and hand thumb fingerprint image pair The functional configuration option answered is different.For example, the corresponding functional configuration option of left hand thumbprint image is unlocking screen, right hand thumb Refer to that the corresponding functional configuration option of fingerprint image is the current cache for removing mobile terminal.It is answered in this way, realizing based on different With the different function of lock cipher triggering mobile terminal execution, the application scenarios using lock cipher are enriched, it helps improve and use The manipulation at family is experienced.
In the present embodiment, by being obtained in advance to multiple application lock ciphers of destination application setting and corresponding Functional configuration option, the incidence relation of lock cipher and functional configuration option is applied in building, and then realizes the starting in application program Or in operational process, lock cipher is applied according to input, is executed in destination application corresponding with the functional configuration option Function.In this way, under the premise of meeting the verifying function of basic application program access right, so that application program is pointedly Different functions is executed, the applicable envelop of function of application lock is enriched, helps to improve the safety of information.For user Speech inputs different application lock ciphers, and the destination application that can easily control mobile terminal executes correspondingly function, full The foot different demands of user, help to improve the usage experience of user.
In addition, if module/unit that mobile terminal as described above integrates is realized in the form of SFU software functional unit simultaneously When sold or used as an independent product, it can store in a readable storage medium storing program for executing.The readable storage medium storing program for executing is specific It is computer-readable storage medium.Based on this understanding, the present invention realizes all or part in above-described embodiment method Process can also instruct relevant hardware to complete by the realization program of application lock Function Extension, described to apply lock function The realization program of extension can be stored in a computer readable storage medium, and the realization program of the application lock Function Extension is in quilt When processor executes, it can be achieved that the step of above-mentioned each embodiment of the method.Wherein, the realization program of the application lock Function Extension Including computer program code, the computer program code can be source code form, object identification code form, executable file Or certain intermediate forms etc..The readable storage medium storing program for executing may include:Any reality of the computer program code can be carried Body or device, recording medium, USB flash disk, mobile hard disk, magnetic disk, CD, computer storage, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and Software distribution medium etc..It should be noted that the content that the readable storage medium storing program for executing includes can be stood according in jurisdiction The requirement of method and patent practice carries out increase and decrease appropriate, such as in certain jurisdictions, readable according to legislation and patent practice Storage medium does not include electric carrier signal and telecommunication signal.
The realization program of application lock Function Extension is stored on the readable storage medium storing program for executing, the application lock Function Extension Realize the step of as above implementation method of described in any item application lock Function Extensions is realized when program is executed by processor.
Following operation is realized when the realization program of the application lock Function Extension is executed by processor:
Destination application is arranged based on preset application lock Function Extension pattern acquiring two or more Using lock cipher and corresponding functional configuration option;Wherein, the application lock cipher one of the functional configuration option and setting One is corresponding;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is selected using lock cipher and functional configuration The incidence relation of item;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to structure The incidence relation using lock cipher and functional configuration built executes and the functional configuration option pair in destination application The function of answering.
Further, following operation is also realized when the realization program of the application lock Function Extension is executed by processor:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
Further, following operation is also realized when the realization program of the application lock Function Extension is executed by processor:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether With pre-set application lock password match;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and obtain The functional configuration option of the application lock password match taken;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
Further, following operation is also realized when the realization program of the application lock Function Extension is executed by processor:
When destination application is in operating status, if getting the application lock cipher of input, the institute of acquisition is detected State using lock cipher whether with pre-set application lock password match;
If matching, according to the incidence relation constructed, find out and the application lock password match of acquisition Functional configuration option;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
The implementation method and movement of the specific embodiment of readable storage medium storing program for executing of the present invention and above-mentioned application lock Function Extension are eventually Hold each embodiment essentially identical, therefore not to repeat here.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of implementation method of application lock Function Extension, which is characterized in that the described method comprises the following steps:
Two or more applications that destination application is arranged based on preset application lock Function Extension pattern acquiring Lock cipher and corresponding functional configuration option;Wherein, the functional configuration option and the application lock cipher of setting are right one by one It answers;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is using lock cipher and functional configuration option Incidence relation;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to what is constructed The incidence relation using lock cipher and functional configuration executes corresponding with the functional configuration option in destination application Function.
2. the implementation method of application lock Function Extension as described in claim 1, which is characterized in that described to be based on preset application Lock function mode of extension obtains two or more application lock ciphers that destination application is arranged and corresponding function The step of config option, specifically includes:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
3. the implementation method of application lock Function Extension as described in claim 1, which is characterized in that if described detect input When using lock cipher, according to the incidence relation using lock cipher and functional configuration constructed, held in destination application It the step of row function corresponding with the functional configuration option, specifically includes:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether in advance The application lock password match being first arranged;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and acquisition The functional configuration option of the application lock password match;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
4. the implementation method of application lock Function Extension as described in claim 1, which is characterized in that if described detect input When using lock cipher, according to the incidence relation using lock cipher and functional configuration constructed, held in destination application It the step of row function corresponding with the functional configuration option, specifically includes:
When destination application is in operating status, if getting the application lock cipher of input, detects the described of acquisition and answer With lock cipher whether with pre-set application lock password match;
If matching, according to the incidence relation constructed, the function with the application lock password match obtained is found out Config option;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
5. the implementation method of application lock Function Extension as described in claim 1, which is characterized in that the class using lock cipher Type includes:Graphical passwords, numerical ciphers, text password, gesture password, finger-print cipher, speech cipher are one such.
6. the implementation method of application lock Function Extension as described in claim 1, which is characterized in that the class using lock cipher Type includes:Graphical passwords, numerical ciphers, text password, gesture password, finger-print cipher, speech cipher two or two therein Above any combination.
7. a kind of mobile terminal, which is characterized in that the mobile terminal includes:Memory, processor and it is stored in the storage On device and the realization program of application lock Function Extension that can run on the processor, wherein:
The realization program of the application lock Function Extension realizes step when being executed by the processor:
Two or more applications that destination application is arranged based on preset application lock Function Extension pattern acquiring Lock cipher and corresponding functional configuration option;Wherein, the functional configuration option and the application lock cipher of setting are right one by one It answers;
Lock cipher and corresponding functional configuration option are applied according to acquired, building is using lock cipher and functional configuration option Incidence relation;
After entering preset application lock Function Extension mode, if detect the application lock cipher of input, according to what is constructed The incidence relation using lock cipher and functional configuration executes corresponding with the functional configuration option in destination application Function.
8. mobile terminal as claimed in claim 7, which is characterized in that the realization program of the application lock Function Extension is described Processor also realizes step when executing:
When receiving application lock setting instruction, application lock cipher set interface corresponding with destination application is shown;
It obtains and applies lock cipher using the input of lock cipher set interface described;
And acquisition is according to the functional configuration option being arranged using lock cipher of input.
9. mobile terminal as claimed in claim 7, which is characterized in that the realization program of the application lock Function Extension is described Processor also realizes step when executing:
When detecting the starting run signal of destination application, the unlock interface of displaying target application program;
If get the unlock interface input apply lock cipher, detect acquisition the application lock cipher whether in advance The application lock password match being first arranged;
If matching, is unlocked destination application, and according to the incidence relation constructed, find out and acquisition The functional configuration option of the application lock password match;
According to the functional configuration option, function corresponding with the functional configuration option is executed in destination application.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with the reality of application lock Function Extension on the readable storage medium storing program for executing Existing program, is realized when the realization program of the application lock Function Extension is executed by processor such as any one of claim 1-6 institute The step of implementation method for the application lock Function Extension stated.
CN201810692662.8A 2018-06-28 2018-06-28 Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension Pending CN108924350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810692662.8A CN108924350A (en) 2018-06-28 2018-06-28 Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810692662.8A CN108924350A (en) 2018-06-28 2018-06-28 Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension

Publications (1)

Publication Number Publication Date
CN108924350A true CN108924350A (en) 2018-11-30

Family

ID=64422219

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810692662.8A Pending CN108924350A (en) 2018-06-28 2018-06-28 Implementation method, mobile terminal and the readable storage medium storing program for executing of application lock Function Extension

Country Status (1)

Country Link
CN (1) CN108924350A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113067934A (en) * 2021-03-15 2021-07-02 Oppo广东移动通信有限公司 Encrypted content decryption method and terminal equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105630318A (en) * 2014-11-05 2016-06-01 阿里巴巴集团控股有限公司 Operation interaction method and device
CN107395889A (en) * 2017-07-28 2017-11-24 广东欧珀移动通信有限公司 Reduce method, apparatus, storage medium and the mobile terminal of mobile terminal power consumption

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105630318A (en) * 2014-11-05 2016-06-01 阿里巴巴集团控股有限公司 Operation interaction method and device
CN107395889A (en) * 2017-07-28 2017-11-24 广东欧珀移动通信有限公司 Reduce method, apparatus, storage medium and the mobile terminal of mobile terminal power consumption

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113067934A (en) * 2021-03-15 2021-07-02 Oppo广东移动通信有限公司 Encrypted content decryption method and terminal equipment
CN113067934B (en) * 2021-03-15 2022-06-14 Oppo广东移动通信有限公司 Encrypted content decryption method, terminal equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN108289141A (en) A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN108171037A (en) Using startup method, terminal and computer storage media
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN107862196A (en) Fingerprint verification method, mobile terminal and computer-readable recording medium
CN108197441A (en) Flexible screen terminal and its solution lock control method, computer readable storage medium
CN109151169A (en) Camera right management method, mobile terminal and computer readable storage medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN109600740A (en) Document down loading method, device and computer readable storage medium
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN108989534A (en) Message prompt method, mobile terminal and computer readable storage medium
CN108459814A (en) Using startup method, mobile terminal and computer readable storage medium
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN108881594A (en) Safety identification control method, flexible screen terminal and computer readable storage medium
CN110187925A (en) A kind of desktop pretrigger control method, equipment and computer readable storage medium
CN109543474A (en) A kind of method for controlling mobile terminal and mobile terminal
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN107330313A (en) Application control method, mobile terminal and readable storage medium storing program for executing
CN110401806A (en) A kind of video call method of mobile terminal, mobile terminal and storage medium
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium
CN109063444A (en) Mobile terminal screen unlocking method, mobile terminal and computer readable storage medium
CN108712567A (en) Theft preventing method, mobile terminal and the computer readable storage medium of mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181130

RJ01 Rejection of invention patent application after publication