CN109543370A - A kind of application processing method, terminal and computer readable storage medium - Google Patents
A kind of application processing method, terminal and computer readable storage medium Download PDFInfo
- Publication number
- CN109543370A CN109543370A CN201710868280.1A CN201710868280A CN109543370A CN 109543370 A CN109543370 A CN 109543370A CN 201710868280 A CN201710868280 A CN 201710868280A CN 109543370 A CN109543370 A CN 109543370A
- Authority
- CN
- China
- Prior art keywords
- target application
- page
- application icon
- process container
- icon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 22
- 238000003860 storage Methods 0.000 title claims abstract description 20
- 238000000034 method Methods 0.000 claims abstract description 205
- 230000010365 information processing Effects 0.000 claims abstract description 13
- 230000006870 function Effects 0.000 claims description 23
- 238000010586 diagram Methods 0.000 description 93
- 238000012795 verification Methods 0.000 description 38
- 238000004590 computer program Methods 0.000 description 7
- 238000003491 array Methods 0.000 description 4
- 239000003550 marker Substances 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of application processing method, terminal and computer readable storage medium, the first operation to target application icon is received, the target application icon is moved to from the first process container by second processing container according to first operation;Obtain the information of target application icon described in the second processing container;According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes controlling the state of the corresponding target application of the target application icon.
Description
Technical field
The present invention relates to electronic technology field more particularly to a kind of application processing methods, terminal and computer-readable storage
Medium.
Background technique
In smart phone using more and more, many applications are related to individual subscriber privacy, but if once mobile phone quilt
Decryption, other users can be checked arbitrarily or be applied using these, will be consulted by other people using some interior perhaps privacies being related to,
Therefore, lock function is applied in order to give to increase using safety, it is ensured that being related to applying for privacy can not before no decryption
Normal use.
In the prior art, the method for using coded lock substantially using encryption, user can set using lock cipher, i.e., to wanting
The application setting coded lock of encryption needs to input setting code decryption ability when user needs the related application using encryption
Enough applications using encryption.But the decryption scheme of this input password is relatively obvious, user can decrypt after obtaining password
Encrypted multiple applications, security level is single and safety is relatively low.
Summary of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of application processing method, terminal and calculating
Machine readable storage medium storing program for executing can satisfy the demand of user's different scenes, improve Terminal security.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
A kind of application processing method, which comprises
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon
State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption
The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute
Stating second page is the pre-set encryption and decryption page in terminal.
Further, the corresponding target of target application icon according to the information processing of the target application icon
Using, comprising:
According to the information of the target application icon and default key information to the corresponding target of the target application icon
Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre-
If key information includes: predetermined encryption information and default solution confidential information.
Further, the information and default key information according to the target application icon is to the target application figure
Corresponding target application is marked to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, further includes:
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction
Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information
Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, further includes:
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical
When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is
Any one process container in the second page, the 5th process container are in the default key information with the described 5th
The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container
When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, first operation received to target application icon, operates according to described first by the target
Application icon is moved to second processing container from the first process container, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target
Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute
Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, first operation received to target application icon, operates according to described first by the target
Application icon is moved to second processing container from the first process container, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal
The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the present invention also provides a kind of terminal, and the terminal includes: processor and memory, and the processor is used for
The application processing function stored in memory is executed, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon
State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption
The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute
Stating second page is the pre-set encryption and decryption page in terminal.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
According to the information of the target application icon and default key information to the corresponding target of the target application icon
Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre-
If key information includes: predetermined encryption information and default solution confidential information.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, the processor is for executing
The application processing function stored in memory, to perform the steps of
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction
Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information
Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, the processor is for executing
The application processing function stored in memory, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical
When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is
Any one process container in the second page, the 5th process container are in the default key information with the described 5th
The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container
When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target
Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute
Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal
The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the present invention also provides a kind of terminal, and the terminal includes: receiver and processor, wherein
The receiver, for receiving the first operation to target application icon;
The processor, for being moved to the target application icon from the first process container according to first operation
Second processing container;It is also used to obtain the information of target application icon described in the second processing container;It is also used to according to institute
The corresponding target application of target application icon described in the information processing of target application icon is stated, the processing includes controlling the mesh
Mark the state of the corresponding target application of application icon.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has
One or more program, one or more of programs can be executed by one or more processor to realize following step
It is rapid:
The target application icon is moved to second processing container from the first process container according to first operation;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon
State including controlling the corresponding target application of the target application icon.
The embodiment of the invention provides a kind of application processing method, terminal and computer readable storage mediums, utilize setting
Safety label page, and application icon figure, sequence are arranged on the page, figure is finally arranged according to application icon and Gong Gezhong is answered
It is decrypted with placement location, while improving user security, also user is allowed voluntarily to select the corresponding solution of security level
Close scheme meets the needs of user's different scenes, improves user experience, further promotes Terminal security.
Detailed description of the invention
In attached drawing (it is not necessarily drawn to scale), similar appended drawing reference can describe phase in different views
As component.Similar reference numerals with different letter suffix can indicate the different examples of similar component.Attached drawing with example and
Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is application processing method flow diagram one provided in an embodiment of the present invention;
Fig. 2 is application processing method flow diagram two provided in an embodiment of the present invention;
Fig. 3 is application processing method flow diagram three provided in an embodiment of the present invention;
Fig. 4 is application processing method flow diagram four provided in an embodiment of the present invention;
Fig. 5 is application processing method flow diagram five provided in an embodiment of the present invention;
Fig. 6 is application processing method flow diagram six provided in an embodiment of the present invention;
Fig. 7 is application processing method flow diagram seven provided in an embodiment of the present invention;
Fig. 8 is terminal structure schematic diagram provided in an embodiment of the present invention;
Fig. 9 is the mobile exemplary diagram one of application icon provided in an embodiment of the present invention;
Figure 10 is the mobile exemplary diagram two of application icon provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description.
The embodiment of the present invention provides a kind of application processing method, as shown in Figure 1, this method may include:
The first operation of step 101, reception to target application icon, operates according to described first by the target application figure
Mark is moved to second processing container from the first process container.
The executing subject of application processing method provided in an embodiment of the present invention is terminal, i.e. terminal receives user and answers target
With the first operation of icon, the target application icon is moved to from second from the first process container according to first operation
Manage container.The terminal can be mobile phone, tablet computer etc., can also be the terminal device that can install application.
Here, the first process container, second processing container can be understood as the band of position where application icon, and one is answered
It can be understood as a process container with the band of position where icon, multiple application icons arrange the process container to be formed arrangement
Figure can be understood as palace trrellis diagram, be understood that for example, nine application icons arrange the process container arrangement figure that arrangement is formed with 3 rows 3
For nine grids figure.
In a kind of possible implementation, first process container is located at first page, second processing container position
In second page;Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not plus solves
The close page.Illustratively, as shown in Figure 10, application icon is moved to another page by the process container of a page
Manage container.
In a kind of possible implementation, first process container and the second processing container are respectively positioned on described second
The page;Wherein, the second page is the pre-set encryption and decryption page in terminal.Illustratively, as shown in figure 9, will apply
Icon is moved to another process container by the process container of a page.
Here, the page can be understood as the display interface of terminal.
Wherein, the pre-set encryption and decryption page is referred to as safety label page, which is the one of terminal
A display interface, the arrangement position and putting in order for being placed on the application icon of the display interface preset for user, when needing
Open it is in the safety label page in application, need arrange out user preset application icon arrangement position and arrange it is suitable
Sequence.
Wherein, the target application icon includes: at least one application icon.I.e. user can answer one or more
It is moved with icon.
In a kind of possible implementation, first operation received to target application icon, according to first behaviour
Make the target application icon being moved to second processing container from the first process container, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target
Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute
Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Specifically, scheme provided in an embodiment of the present invention can be by solving application icon removal safety label page
It is close.Concrete application removes that safety label page is decrypted can be with are as follows: the application icon that need to be decrypted is removed encryption safe Shipping Options Page;
User is prompted to input decryption applied cryptography;Whether correct judge password, if correctly, application can be moved out of encryption safe Shipping Options Page,
Using decrypted;If mistake, fails using decryption, safety label page can not be removed.
In a kind of possible implementation, first operation received to target application icon, according to first behaviour
Make the target application icon being moved to second processing container from the first process container, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal
The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Specifically, scheme provided in an embodiment of the present invention can be added by mobile application icon to safety label page
It is close.It may include: to add the safety of application encryption in safety label page setup module that specific setting safety label page, which encrypts application,
The safety label page application unlocking pin is arranged in Shipping Options Page, and the application for needing to encrypt is moved in encryption safe Shipping Options Page, is mentioned
Show using whether encrypting the application being added, user's selection is, using being added to safety label page, and encrypts success;With
Family selection is no, cancels application encryption.
Step 102, the information for obtaining target application icon described in the second processing container.
Here, the information of target application icon may include: the location information of process container where target application icon, the
Two process containers place the row value and train value of the palace lattice of application icon in the palace trrellis diagram that process container is formed, and can specifically pass through
Array is indicated with row and column value where process container.
Step 103, the corresponding target application of target application icon according to the information processing of the target application icon,
The processing includes controlling the state of the corresponding target application of the target application icon.
Wherein, the state includes enabled state or/and process status, and the process status includes end process or beginning
Process.
Specifically, terminal corresponding target of target application icon according to the information processing of the target application icon is answered
With may include: information and default key information according to the target application icon to the corresponding mesh of the target application icon
Mark application is encrypted or is decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described
Default key information includes: predetermined encryption information and default solution confidential information.
In method provided in an embodiment of the present invention, the realization of target application is locked or unlocked by application icon arrangement
Mode, it is described in detail below.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute
The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or failed encryption.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key
Figure is identical, just locks or unlock the corresponding target application of target application icon.
Here, mobile application icon is formed when the first decrypted graphics of process container arrangement can be understood as current decryption
The palace trrellis diagram that mobile application icon is formed when process container arrangement figure, i.e. current decryption, it is pre-set for presetting code key figure
The process container that application icon is formed arranges figure, i.e., default palace trrellis diagram.
Illustratively, for level-one security level, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit of palace trrellis diagram palace lattice is detected, placement in the lattice of palace is not matched using id, i.e., only detects the palace for placing application icon
The correctness for placing the Gong Gezhong application icon of application icon is not detected in the position of lattice and the palace lattice for not placing application icon;
Here, flag bit is used to indicate whether Gong Gezhong places application icon, and the flag bit that application icon is placed in the lattice of palace is 1, Gong Ge
In do not place application icon flag bit be Null;The palace case marker will position data and safety database Middle Palace lattice of current input display
The exact matching of flag bit data, then successful decryption, otherwise decrypts failure.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute
The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, the second operation is received, second operation is obtained and refers to
The application identities of third process container and target application where the target application icon shown, wherein the third process container
For the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information
Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container and the third process container difference, the target application decryption or failed encryption are prompted.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key
While figure is identical, target application icon must be put on target position, just to the corresponding target application of target icon into
Row locks or unlock.
Illustratively, for secondary safety rank, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit of palace trrellis diagram palace lattice is detected, if palace lattice flag bit successful match, read needs to be decrypted on current safety Shipping Options Page
Palace lattice in apply id value, matched with palace lattice location application id value is corresponded in the id value and safety database, if match
It is successful then decrypt the application, otherwise decryption failure.In the embodiment of the present invention, ID value is identical as id value meaning.
, specifically can be by Apply Names in the embodiment of the present invention by being matched using id to application, or application
Packet is matched, and specifically be can be used and is matched using packet name (package name);It can be from system using packet name
It is obtained in launcher database, will place in safety label page after allowing and (using the row, column of placement, answered using the data of palace lattice
With packet name) it is saved in safety database.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute
The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, when corresponding first application identities of fourth process container
When corresponding with the 5th process container the second application identities are identical, the corresponding application solution of the application icon of the second page is prompted
It is close or encrypt successfully, wherein the fourth process container is any one process container in the second page, at the described 5th
Managing container is process container identical with the 5th process container in the default key information;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container
When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key
While figure is identical, all application icons all be must be placed on scheduled position, just can unlock or lock target icon
Corresponding target application.
Illustratively, for three-level security level, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit for detecting palace trrellis diagram palace lattice reads if palace lattice flag bit successful match and applies id value in the palace lattice that need to be decrypted,
Read according to this it is each on safety label page place the id value applied in the lattice of application icon palace, and with palace lattice are corresponded in safety database
It is middle to be matched with id value, if applying id value successful match in all palace lattice, successful decryption is applied, is otherwise failed.
Application processing method provided in an embodiment of the present invention, including setting encryption and decryption application process, encrypt in setting
In the process, safety label page is arranged for placing the security application icon that need to be encrypted, specially in safety in user at the terminal
It application icon is set on the palace lattice of Shipping Options Page places and figure and put in order, which is put figure and suitable by terminal system
Sequence is stored in the database of safety zone.In decryption application process, the embodiment of the present invention provides three kinds of security levels for user
Setting, level-one security level be lowest level, specifically, only when the application icon on the safety label page of terminal put figure with
In safety database icon put figure it is consistent when, application can be decrypted;Secondary safety rank is need to be full when decrypting application
On the basis of sufficient level-one security level, the placement location in safety database need to be applied with this by being decrypted application icon placement location
This application can be just decrypted when matching;Three-level security level is, the position that each application icon is placed need completely with safe number
Application can just be decrypted by matching according to icon storage location each in library.
Illustratively, by the information of array representation application icon, multiple process containers arrange the figure to be formed and can manage
Solution is Gong Getu, and it may include: that the default page of terminal acquisition is currently shown that encryption specific implementation, which is decrypted, in the encryption page
Icon data information of the palace trrellis diagram for the application icon arrangement shown in the system database of terminal, believes according to the icon data
Breath the first array element of setting;Obtain the ciphertext data of the pre-set default page in the safety database of the terminal
The second array element is arranged according to the ciphertext data information in information;By successively by first array element and described
Two array elements match the application icon that the default page is decrypted.
Wherein, the default page is the pre-set encryption page in the terminal, and the icon data information includes:
The process container arranges the row value and train value that the palace lattice of application icon are placed in the palace trrellis diagram to be formed, first array element
For any one array element in the first array.
Specifically, the array element being arranged in the first array according to the icon data information, may include: terminal
First identifier is set by the row value and corresponding first array element of train value of placing the palace lattice of application icon in the palace trrellis diagram,
The second mark is set by the row value and corresponding first array element of train value of the palace lattice for not placing application icon in the palace trrellis diagram
Know.
Wherein, the ciphertext data information includes: the row value and train value and the capable value with the default palace lattice of default palace lattice
Third mark corresponding with train value, second array element are any one array element in the second array.
Specifically, the array element being arranged in the second array according to the ciphertext data information, may include: terminal
The row value and train value with the default palace lattice are set by the row value and corresponding second array element of train value of the default palace lattice
Corresponding third mark.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute
The train value for stating the corresponding default palace lattice of the second array element is identical.
Specifically, terminal successively matches first array element and second array element, when described
When one array element and the second array element successful match, i.e., described first array element and the second array element phase
Meanwhile the application icon successful decryption of the default page;When the first array element of at least one of first array with
Second array element shows that the application icon of the default page decrypts failure when it fails to match.
Illustratively, for level-one security level, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit of palace trrellis diagram palace lattice is detected, placement in the lattice of palace is not matched using id, i.e., only detects the palace for placing application icon
The correctness for placing the Gong Gezhong application icon of application icon is not detected in the position of lattice and the palace lattice for not placing application icon;
Here, flag bit is used to indicate whether Gong Gezhong places application icon, and the flag bit that application icon is placed in the lattice of palace is 1, Gong Ge
In do not place application icon flag bit be Null;The palace case marker will position data and safety database Middle Palace lattice of current input display
The exact matching of flag bit data, then successful decryption, otherwise decrypts failure.
Further, in the system for obtaining and presetting the palace trrellis diagram for the application icon arrangement that the page is currently shown in terminal
Before icon data information in database, further includes: obtain the palace trrellis diagram for the application icon arrangement that the default page is currently shown
Row data and column data, the row data be the palace trrellis diagram in any one temporary dwelling palace lattice number, the column data is described
The number of any one column palace lattice of palace trrellis diagram;Array is created according to the row data and column data, the array includes multiple arrays
Element, the row value and train value of the corresponding palace lattice of each array element, the array include: the first array, the second array, the
Three arrays and the 4th array.
Further, the icon data information further include: the row with the palace lattice for placing application icon in the palace trrellis diagram
It is worth the first application identities ID value corresponding with train value;In the palace lattice for obtaining the application icon arrangement that the default page is currently shown
Figure is after the icon data information in the system database of terminal, further includes:
It sets row value and the corresponding third array element of train value that the palace lattice of application icon are placed in the palace trrellis diagram to
First application ID value, the third array element are any one array element in third array.
Further, the ciphertext data information further include: with the row value and train value corresponding second of the default palace lattice
Application ID value, the ciphertext data information of the pre-set default page in the safety database for obtaining the terminal
Later, further includes: set the second application ID value, institute for the row value and corresponding 4th array element of train value of the default palace lattice
Stating the 4th array element is any one array element in the 4th array.
Further, it is also wrapped after first array element and the second array element successful match described
It includes: receiving the operational order of user, in the corresponding third array of application icon for obtaining the operational order instruction decryption
The 5th array element;When the 5th array element is identical as the 4th array element, the operation of the user is shown
The application icon successful decryption of instruction instruction decryption, wherein the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element
The capable value that row is worth the default palace lattice corresponding with the 4th array element is identical, and the corresponding institute of the 5th array element
It is identical to state the train value of the train value default palace lattice corresponding with the 4th array element of palace trrellis diagram Middle Palace lattice;When the described 5th
When array element and the 4th array element difference, the application icon decryption of the operational order instruction decryption of the user is shown
Failure.
Illustratively, for secondary safety rank, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit of palace trrellis diagram palace lattice is detected, if palace lattice flag bit successful match, read needs to be decrypted on current safety Shipping Options Page
Palace lattice in apply id value, matched with palace lattice location application id value is corresponded in the id value and safety database, if match
It is successful then decrypt the application, otherwise decryption failure.In the embodiment of the present invention, ID value is identical as id value meaning.
Further, it is also wrapped after first array element and the second array element successful match described
It includes:
Successively the third array element and the 4th array element are matched, wherein the third array element pair
The capable value of the row value default palace lattice corresponding with the 4th array element for the palace trrellis diagram Middle Palace lattice answered is identical, and institute
State the train value default palace corresponding with the 4th array element of the corresponding palace trrellis diagram Middle Palace lattice of third array element
The train value of lattice is identical;When the third array element and the 4th array element successful match, the default page is shown
Application icon successful decryption;When at least one third array element and the 4th array element in the third array
When with failure, show that the application icon of the default page decrypts failure.
Illustratively, for three-level security level, terminal reads the palace trrellis diagram of safety label page in system database
Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is
Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array
Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is
Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only
The flag bit for detecting palace trrellis diagram palace lattice reads if palace lattice flag bit successful match and applies id value in the palace lattice that need to be decrypted,
Read according to this it is each on safety label page place the id value applied in the lattice of application icon palace, and with palace lattice are corresponded in safety database
It is middle to be matched with id value, if applying id value successful match in all palace lattice, successful decryption is applied, is otherwise failed.
Application decryption method provided in an embodiment of the present invention can also include ciphering process, the specific following institute of ciphering process
It states.
Further, in the row data and column of the palace trrellis diagram for obtaining the application icon arrangement that the default page is currently shown
After data, further includes:
The second verification information of user's input is obtained, second verification information is setting circle into the default page
The input password in face;
When second verification information is identical as preset first verification information, receives user and answer to be encrypted
It is moved to the operational order of the default palace lattice of the default page with icon, obtains first that the default page presets palace lattice
Number obtains second number that user is moved to the application icon to be encrypted of the default page, when second number is equal to
Or be greater than described first it is severals when, prompt user remove default page application icon to be encrypted, until described second
Number is less than first number;
User is received to application icon moving operation to be encrypted in the default page, the moving operation is for being arranged
Placement position of the application icon to be encrypted on the default palace lattice of the default page and put sequence;
When not receiving operation of the user to the default page in preset time, prompt the user whether to complete described default
The setting of the page;
When receiving the operational order of user's instruction completion default page setup, the system data of the terminal is read
The row value and train value of the default palace lattice of the application icon to be encrypted is placed in library, in the system database for reading the terminal
With the second application ID value of the row value and train value of the default palace lattice of the application icon to be encrypted;
By the default palace lattice of the application icon to be encrypted row value and train value and with the application icon to be encrypted
Default palace lattice row value and the second application ID value of train value be stored in the tables of data created in the safety database of the terminal
In lattice, the data form after storage is the ciphertext data information;
User is received to indicate to complete the operational order of the default page setup.
Further, before the second verification information of the acquisition user input, further includes:
The third verification information of user's input is obtained, the third verification information is setting circle into the default page
The input password in face;
When the third verification information is identical as preset first verification information, the described pre- of user's input is obtained
If the row value and train value of the default palace lattice of the page, the secure data with train value in the terminal is worth according to the row of the default palace lattice
Data form is created in library, initializes the data form;
When the third verification information and preset first verification information difference, prompt to enter the default page
Set interface failure.
Further, after the reception user indicates the operational order of the completion default page setup, further includes:
The 4th verification information of user's input is obtained, the 4th verification information is setting circle into the default page
The input password in face;
When the 4th verification information is identical as preset first verification information, the described pre- of user's input is obtained
If the security level of the page, the decryption security level is set as the default page and decrypts rank.
Further, before the third verification information of the acquisition user input, further includes:
First verification information is set as into the default page by the first verification information for obtaining user's input
The verifying password of set interface.
Illustratively, application decryption method provided in an embodiment of the present invention is applied to terminal, which may include: safety
Shipping Options Page setup module decrypts security level setup module using decrypted graphics recording module, using decryption matching module, protects
The safety database of decrypted graphics and position is deposited,
Safety label page setup module, for safety label page to be arranged, safety label page is the palace lattice page, is needed for placing
Application icon to be encrypted;The interface will at least vacate a palace case and set and not place application icon when placing icon, and
And when only the safety label footers position is in setting state, this page can just be used to setting application lock figure.
Using decrypted graphics recording module, application icon puts whole figure and application on the good safety label page of user setting
Icon reads corresponding table in safety database after the lattice placement location of palace, relevant information of this page in system data
In, record security Shipping Options Page places the row and column of application icon palace lattice, and is 1 the mark position of placement application icon palace lattice,
Record this palace lattice simultaneously applies id;The palace lattice mark position for not placing application icon is Null, is Null using id value.
Security level setup module is decrypted, for decryption security level to be arranged, decryption security level is divided into 3 ranks,
One, two, three or 1,2,3 grade, 1 to 3 level decryptions require to step up, and 3 level decryption solution security highests, are here number
Word more high security level is higher, and it is higher to be optionally also possible to digital more low security level.
Using decryption matching module, corresponding different application decryption security level, using different matching schemes.
Safety database needs to be stored in the safety zone of terminal, is mainly used to save locked application icon in safety post
The palace lattice position coordinates placed on label page, i.e., it is locked in preset decryption palace trrellis diagram shape and palace lattice on preservation safety label page to answer
With the position of icon.
The embodiment of the invention provides a kind of application processing methods, using setting safety label page, and arrange on the page
Application icon figure, sequence are finally arranged figure according to application icon and Gong Gezhong application placement location are decrypted, improving
While user security, also user is allowed voluntarily to select the corresponding decryption scheme of security level, meet user's different scenes
Demand improves user experience, further promotes Terminal security.
The embodiment of the present invention also provides a kind of application processing method, and this method may include: setting ciphering process and decryption
Application process, wherein setting ciphering process may include: the setting of the default page, the setting of application icon palace lattice, security level
Setting;Decryption application process may include level-one security level application decryption, the decryption of secondary safety level applications, three-level peace
Full level applications decryption.
Specifically, as shown in Fig. 2, the setting of the default page, the i.e. setting up procedure of safety label page may include:
Step 201, terminal obtain the third verification information of user's input.
Wherein, the third verification information is the input password into the set interface of the default page.
Optionally, before the third verification information of the acquisition user input, further includes:
Terminal obtains the first verification information of user's input, and first verification information is set as to enter the default page
The verifying password of the set interface in face.
Specifically, user enters the password of the set interface of safety label page firstly the need of setting, need to enter peace in this way
It needs to carry out password authentification when the set interface of full Shipping Options Page, can prevent other users from entering the set interface of safety label page
It modifies the arrangement position of application icon in the safety label page of user setting and puts in order.
Step 202, when the third verification information is identical as preset first verification information, terminal obtain user
The row value and train value of the default palace lattice of the default page of input, according to the row value and train value of the default palace lattice at the end
Data form is created in the safety database at end, initializes the data form.
Step 203, when the third verification information and when preset first verification information difference, terminal notifying enters
The set interface of the default page fails.
Illustratively, safety label page setting method is specifically, user's opening mobile phone terminal is being set into the setting page
The setting of page selection safety label page is set, setting enters the verifying password of safety label page, after password is provided with, by close
Code verifying enters safety label page and is arranged, if Password Input mistake, safety label page setup failed can not carry out safety post
Sign the setting of page;If Password Input is correct, safety label page setting is carried out, user operates on mobile phone, addition peace
Full Shipping Options Page, the number of lines and columns of mobile phone terminal display setting safety label page Middle Palace lattice, respectively i and j, user are defeated on mobile phone
Enter the row and column numerical value of palace lattice, the number of lines and columns for the safety label page palace lattice that mobile phone terminal is inputted according to user, in safety number
According to creation data form corresponding with the safety label page in library, and row, column attribute value is initialized, the letter which includes
Breath is as shown in table 2.
For example, the setting of database table initial value is as shown in table 1 below by taking 2 rows, 2 column palace lattice as an example:
Table 1
Table 2
Specifically, application icon in safety label page can further be arranged and place after the setting up of safety label page
Palace trrellis diagram shape and sequence, as shown in figure 4, the setting of application icon palace lattice, i.e., application icon is placed in safety label page palace
Trrellis diagram shape and sequence Input Process may include:
Step 301, terminal obtain the second verification information of user's input.
Wherein, second verification information is the input password into the set interface of the default page.
Specifically, user inputs password, i.e. the second verification information judges whether there is permission and opens peace by password authentification
Full Shipping Options Page setting, if cryptographic check is correct, carries out step 302;If cryptographic check mistake terminates application icon and exists
The setting procedure of Shipping Options Page.
Step 302, when second verification information is identical as preset first verification information, terminal receive user
Application icon to be encrypted is moved to the operational order of the default palace lattice of the default page, it is default to obtain the default page
First number of palace lattice obtains second number that user is moved to the application icon to be encrypted of the default page, when described
When second number is several equal to or more than described first, user is prompted to remove default page application icon to be encrypted,
Until second number is less than first number.
Specifically, terminal, which opens safety label page, is arranged state, encrypted application icon will be needed to be moved to the safety
Indicate on page;Obtain safety sign page palace lattice number j;Judge whether application icon number i is less than page palace lattice number j, if
Be, user set application icon on the page placement position and put sequence;If not, prompt user removes more icons, so
After continue to obtain the safety label page palace lattice number.
Step 303 receives user to application icon moving operation to be encrypted in the default page, the moving operation
For placement position of the application icon to be encrypted on the default palace lattice of the default page to be arranged and puts sequence.
Step 304, when operation of the user to the default page is not received in preset time, prompt the user whether to complete
The setting of the default page.
Step 305, when receiving user and indicating to complete the operational order of the default page setup, read the terminal
The row value and train value of the default palace lattice of the application icon to be encrypted, the system for reading the terminal are placed in system database
In database with the default palace lattice of the application icon to be encrypted row value and train value the second application ID value.
Specifically, judge whether user completes to be arranged, if it is from table related in system launcher database,
Row, column value corresponding to all palace lattice for placing icon of the safety label page is found, and applies id value;Otherwise user's setting is answered
With icon on the page placement position and put sequence.
Specifically, in database purchase detailed storing process be the row that certain palace lattice is read from launcher database,
Column, using id after, in secure decrypted data library, find corresponding row, column value, then id value will be answered to be stored in correspondence
In the Appid attribute value of Index, while by palace lattice mark position 1.
As shown in table 3, if Gong Gezhong is placed with application icon, palace lattice flag bit is 1, and is recorded for each palace lattice data setting
Using id;If Gong Gezhong does not place application icon, palace lattice flag bit is Null, and id value is set to Null.
Table 3
Step 306, by the default palace lattice of the application icon to be encrypted row value and train value and with it is described to be encrypted
The row value of the default palace lattice of application icon and the second application ID value of train value are stored in the safety database of the terminal and create
Data form in, the data form after storage is the ciphertext data information.
Step 307 receives the operational order that user indicates the completion default page setup.
Specifically, the value that terminal will successively be read from system database, is stored in safety database according to row, column attribute
In table in;To the palace lattice for having icon, table Middle Palace case marker will bit attribute value is set to 1.Label is closed after the completion of setting
Page setting switch.When the palace trrellis diagram shape and sequence that the middle application icon of the complete default page of user setting is placed, answered what is set
The palace trrellis diagram shape and sequence placed with icon are upset, in this way, needing to rearrange and decryption verification when next time opens.
Specifically, after application icon is placed in safety label page palace trrellis diagram shape and sequence are set up, it can be further
Setting application decryption security level, as shown in figure 4, the setting up procedure of security level may include:
Step 401, terminal obtain the 4th verification information of user's input.
Wherein, the 4th verification information is the input password into the set interface of the default page.
Step 402, when the 4th verification information is identical as preset first verification information, terminal obtain user
The decryption security level is set as the default page and decrypts rank by the security level of the default page of input.
Specifically, user inputs password, i.e. the 4th verification information, terminal carries out password authentification to the password that user inputs,
It judges whether there is permission and opens safety label page setup module, if cryptographic check mistake, termination of security Shipping Options Page safety level
Other setting procedure;If cryptographic check is correct, it can be configured security level, here, user may be provided in terminal
Multiple safety label pages, when carrying out security level setting, user needs to select the safety label page of setting security level, such as
User selects the safety solution of the safety label page M for needing to set decryption security level, user's input or selection security level setting M
Level of confidentiality is other.
Specifically, after the setting of the default page, being all provided with of the setting of application icon palace lattice and security level, terminal
The ciphering process of the default page complete, when user needs to open the application icon in the default page, need to application icon
The default interface at place is decrypted, and the security level for presetting interface includes three kinds, for different security levels, decrypting process
It is different, wherein as shown in figure 5, level-one security level application decrypting process may include:
Step 501, terminal obtain the row data and columns of the palace trrellis diagram for the application icon arrangement that the default page is currently shown
According to.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice
Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure
Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 502 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value,
The array includes: the first array and the second array.
Specifically, terminal establishes array aij, bij according to safety label page palace lattice row, column, wherein i is palace table rows value, j
For palace lattice train value, and array is initially Null.
Illustratively, by taking the palace lattice safety sign page of 2 rows 2 column as an example, array a [2] [2] can be established, if current page palace
The 1st row of lattice, the 2nd column, the 2nd row, the 1st column are placed with icon, and other palace lattice are sky, then array element value are as follows:
A [1] [1]=Null;A [1] [2]=1;A [2] [1]=1;A [2] [2]=Null.
Step 503, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown
In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first
Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram
Element is set as second identifier.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described
The row value and train value of the palace lattice of application icon are placed in the trrellis diagram of palace, first array element is any one number in the first array
Group element.
Specifically, terminal reads icon data information of the safety label page in system database, system database is read
The middle row and column for placing application icon palace lattice, and according to the value of row and column, the value in array aij corresponding element is set to 1.
Step 504, the ciphertext data letter for obtaining the pre-set default page in the safety database of the terminal
The row value and corresponding second array element of train value of the default palace lattice are set the row value and column with the default palace lattice by breath
It is worth corresponding third mark.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange
It is worth corresponding third mark, second array element is any one array element in the second array.
Specifically, terminal reads the ciphertext data of corresponding safety label page from safety database, and with row, column value be according to
According to the data of database Middle Palace lattice flag bit are saved in array b ij corresponding element.
Step 505 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute
The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 506, when first array element and when the second array element successful match, show the default page
The application icon successful decryption in face.
Step 507 is matched with second array element when the first array element of at least one of first array
When failure, show that the application icon of the default page decrypts failure.
Specifically, terminal successively sequentially reads data aij and bij in two arrays;Aij value is carried out with this with bij value
Matching, if aij=bij, judges whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than or equal to Shipping Options Page palace
The columns of lattice carries out step 505 if two conditions all meet, if both greater than, Data Matching is completed, successful decryption can be with
Starting application;Otherwise decryption failure.
Specifically, as shown in fig. 6, secondary safety level applications decrypting process may include:
Step 601, the row data and column data for obtaining the palace trrellis diagram that the application icon that the default page is currently shown arranges.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice
Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure
Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 602 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value,
The array includes: the first array, the second array, third array and the 4th array.
Specifically, terminal establishes array aij, bij, mij, nij according to safety label page palace lattice row, column;I is Gong Gehang
Value, j is palace lattice train value, and array is initially Null.
Step 603, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown
In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first
Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram
Element is set as second identifier, and the row that the palace lattice of application icon are placed in the palace trrellis diagram is worth third array corresponding with train value
Element is set as the first application ID value.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described
The row value that the palace lattice of application icon are placed in the row value and train value, with the palace trrellis diagram of the palace lattice of application icon is placed in the trrellis diagram of palace
The first application identities ID value corresponding with train value, first array element are any one array element in the first array, institute
Stating third array element is any one array element in third array.
Specifically, terminal reads icon data information of the safety label page in system database, put in reading database
The row, column value of application icon palace lattice and the id value of application are set, and according to the value of row and column, by the value in array aij corresponding element
It is set to 1, while id value being placed into bij corresponding element.
Step 604, the ciphertext data letter for obtaining the pre-set default page in the safety database of the terminal
The row value and corresponding second array element of train value of the default palace lattice are set the row value and column with the default palace lattice by breath
It is worth corresponding third mark, sets the second application ID for the row value and corresponding 4th array element of train value of the default palace lattice
Value.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange
It is worth corresponding third mark, the second application ID value corresponding with the row value and train value of the default palace lattice, the second array member
Element is any one array element in the second array, and the 4th array element is any one array element in the 4th array.
Specifically, the ciphertext data of corresponding safety label page is read from safety database, and using row, column value as foundation,
The data of database Middle Palace lattice flag bit are saved in array mij corresponding element, nij is stored in using id value in the lattice of palace and corresponds to
Element in.
Step 605 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute
The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 606, when first array element and when the second array element successful match, show the default page
The application icon successful decryption in face.
Step 607 is matched with second array element when the first array element of at least one of first array
When failure, show that the application icon of the default page decrypts failure.
After step 606 further include:
Step 608, the operational order for receiving user obtain the corresponding institute of application icon of the operational order instruction decryption
State the 5th array element in third array.
Step 609, when the 5th array element is identical as the 4th array element, show the operation of the user
The application icon successful decryption of instruction instruction decryption.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element and the 4th array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element and institute
The train value for stating the corresponding default palace lattice of the 4th array element is identical;
Step 610, when the 5th array element and when the 4th array element difference, show the operation of the user
The application icon of instruction instruction decryption decrypts failure.
Specifically, terminal successively sequentially reads data aij and mij in two arrays;Aij value is matched with mij value,
If aij=mij, judge whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than or equal to Shipping Options Page palace lattice
Columns, the income step 605 if two conditions all meet, if both greater than, illustrate application icon setting Graphic Pattern Matching at
Function;Otherwise decryption failure.If Graphic Pattern Matching success is arranged in application icon, when opening certain Gong Gezhong application icon when the user clicks,
It reads the icon in array bij and corresponds to id value, and judge that this value is matched with respective value in array nij;If bij=nij,
It is then decrypted and applies successful decryption.;If it fails to match, it fails to match for the application.
Specifically, as shown in fig. 7, three-level security level application decrypting process may include:
Step 701, the row data and column data for obtaining the palace trrellis diagram that the application icon that the default page is currently shown arranges.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice
Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure
Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 702 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value,
The array includes: the first array, the second array, third array and the 4th array.
Specifically, terminal establishes array aij, bij, mij, nij according to safety label page palace lattice row, column;I is Gong Gehang
Value, j is palace lattice train value, and array is initially Null.
Step 703, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown
In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first
Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram
Element is set as second identifier, and the row that the palace lattice of application icon are placed in the palace trrellis diagram is worth third array corresponding with train value
Element is set as the first application ID value.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described
The row value and train value of the palace lattice of application icon are placed in the trrellis diagram of palace, first array element is any one number in the first array
Group element, the first application identities ID value corresponding with the row value of the palace lattice of placement application icon in the palace trrellis diagram and train value, institute
Stating third array element is any one array element in third array.
Specifically, terminal reads icon data information of the safety label page in system database, put in reading database
The row, column value of application icon palace lattice and the id value of application are set, and according to the value of row and column, by the value in array aij corresponding element
It is set to 1, while id value being placed into bij corresponding element.
Step 704, the ciphertext data information for obtaining the pre-set default page in the safety database of terminal, will
The row value and corresponding second array element of train value of the default palace lattice are set as row value and train value pair with the default palace lattice
The row value and corresponding 4th array element of train value of the default palace lattice are set the second application ID value by the third mark answered.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange
It is worth corresponding third mark, the second application ID value corresponding with the row value and train value of the default palace lattice, the second array member
Element is any one array element in the second array, and the 4th array element is any one array element in the 4th array.
Specifically, the ciphertext data of corresponding safety label page is read from safety database, and using row, column value as foundation,
The data of database Middle Palace lattice flag bit are saved in array mij corresponding element, nij is stored in using id value in the lattice of palace and corresponds to
Element in.
Step 705 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute
The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 706, when first array element and when the second array element successful match, show the default page
The application icon successful decryption in face.
Step 707, when it fails to match for the first array element of at least one of first array and the second array element, show
Show the application icon decryption failure of the default page.
After step 706 further include:
Step 708 successively matches the third array element and the 4th array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of the third array element and the 4th array element pair
The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of the third array element and institute
The train value for stating the corresponding default palace lattice of the 4th array element is identical;
Step 709, when the third array element and when the 4th array element successful match, show the default page
The application icon successful decryption in face.
Step 710 is matched with the 4th array element when at least one third array element in the third array
When failure, show that the application icon of the default page decrypts failure.
Specifically, terminal successively sequentially read array aij, bij value, and with array mij and nij respective value carry out
Match;If aij=mij and bij=nij, judge whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than
In the columns of Shipping Options Page palace lattice, step 705 is carried out if two conditions all meet;If both greater than, applying successful decryption;
Otherwise decryption failure.
The embodiment of the invention provides a kind of application processing methods, using setting safety label page, and arrange on the page
Application icon figure, sequence are finally arranged figure according to application icon and Gong Gezhong application placement location are decrypted, improving
While user security, also user is allowed voluntarily to select the corresponding decryption scheme of security level, meet user's different scenes
Demand improves user experience, further promotes Terminal security.
The embodiment of the invention provides terminal, using setting safety label page, and arrange on the page application icon figure,
Sequentially, figure is finally arranged according to application icon and Gong Gezhong application placement location is decrypted, improving user security
Meanwhile also user being allowed voluntarily to select the corresponding decryption scheme of security level, meet the needs of user's different scenes, improves user
Experience, further promotes Terminal security.
The embodiment of the present invention provides a kind of terminal 80, as shown in figure 8, the terminal 80 includes: processor 801 and memory
802, the processor 801 is for executing the application processing function stored in memory 802, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon
State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption
The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute
Stating second page is the pre-set encryption and decryption page in terminal.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with
Lower step:
According to the information of the target application icon and default key information to the corresponding target of the target application icon
Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre-
If key information includes: predetermined encryption information and default solution confidential information.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with
Lower step:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed
Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer
With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, the processor 801 is for holding
The application processing function stored in line storage 802, to perform the steps of
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction
Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information
Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information
When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, the processor 801 is for holding
The application processing function stored in line storage 802, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical
When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is
Any one process container in the second page, the 5th process container are in the default key information with the described 5th
The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container
When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with
Lower step:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target
Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute
Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with
Lower step:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first
The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal
The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the invention provides terminal, using setting safety label page, and arrange on the page application icon figure,
Sequentially, figure is finally arranged according to application icon and Gong Gezhong application placement location is decrypted, improving user security
Meanwhile also user being allowed voluntarily to select the corresponding decryption scheme of security level, meet the needs of user's different scenes, improves user
Experience, further promotes Terminal security.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has
One or more program, one or more of programs can be executed by one or more processor to realize as described above
Application processing method the step of.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program
Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention
Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code
The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.
Claims (22)
1. a kind of application processing method, which is characterized in that the described method includes:
The first operation to target application icon is received, is handled the target application icon from first according to first operation
Container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes
Control the state of the corresponding target application of the target application icon.
2. the method according to claim 1, wherein
First process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page.
3. the method according to claim 1, wherein
First process container and the second processing container are respectively positioned on the second page;Wherein, the second page is
The pre-set encryption and decryption page in terminal.
4. according to the method in claim 2 or 3, which is characterized in that at the information according to the target application icon
Manage the corresponding target application of the target application icon, comprising:
According to the information of the target application icon and default key information to the corresponding target application of the target application icon
Encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, it is described preset it is secret
Key information includes: predetermined encryption information and default solution confidential information.
5. according to the method described in claim 4, it is characterized in that, the information according to the target application icon and default
Key information is encrypted or is decrypted to the corresponding target application of the target application icon, comprising:
Obtain the first decrypted graphics of the process container arrangement that mobile target application icon and the application icon not moved are formed;
If first decrypted graphics are identical as default code key figure, the corresponding target application solution of the target application icon is prompted
It is close or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target application solution of the target application icon is prompted
Close or failed encryption.
6. according to the method described in claim 5, it is characterized in that, identical as default code key figure in first decrypted graphics
Later, further includes:
The second operation is received, the third process container and target where the target application icon of acquisition second operation instruction are answered
Application identities, wherein the third process container is the process container where target application icon;
The corresponding processing of identical with the application identities of target application application identities in the default key information is obtained to hold
Device;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information
When identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information
When different with the third process container, the target application decryption or failed encryption are prompted.
7. according to the method described in claim 5, it is characterized in that, identical as default code key figure in first decrypted graphics
Later, further includes:
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical, mention
Show the corresponding application decryption of the application icon of the second page or encrypt successfully, wherein the fourth process container is described
Any one process container in second page, the 5th process container are to handle in the default key information with the described 5th
The identical process container of container;
When corresponding first application identities of the fourth process container the second application identities corresponding with the 5th process container
When different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
8. the method according to claim 1, wherein first operation received to target application icon, root
The target application icon is moved to second processing container from the first process container according to first operation, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target application
Icon is moved to the second processing container in the first page from the first process container in second page, wherein described
Two pages are the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
9. the method according to claim 1, wherein first operation received to target application icon, root
The target application icon is moved to second processing container from the first process container according to first operation, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first page
In the first process container be moved to the second processing container in second page, wherein the second page be terminal in advance
The encryption and decryption page of setting, the first page are not the encryption and decryption pages.
10. method according to any one of claims 1 to 9, which is characterized in that the target application icon includes: at least
One application icon.
11. a kind of terminal, which is characterized in that the terminal includes: processor and memory, and the processor is for executing storage
The application processing function stored in device, to perform the steps of
The first operation to target application icon is received, is handled the target application icon from first according to first operation
Container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes
Control the state of the corresponding target application of the target application icon.
12. terminal according to claim 11, which is characterized in that
First process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page.
13. terminal according to claim 11, which is characterized in that first process container and the second processing container
It is respectively positioned on the second page;Wherein, the second page is the pre-set encryption and decryption page in terminal.
14. terminal according to claim 12 or 13, which is characterized in that the processor is stored for executing in memory
Application processing function, to perform the steps of
According to the information of the target application icon and default key information to the corresponding target application of the target application icon
Encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, it is described preset it is secret
Key information includes: predetermined encryption information and default solution confidential information.
15. terminal according to claim 14, which is characterized in that the processor is used to execute answering of storing in memory
With processing routine, to perform the steps of
Obtain the first decrypted graphics of the process container arrangement that mobile target application icon and the application icon not moved are formed;
If first decrypted graphics are identical as default code key figure, the corresponding target application solution of the target application icon is prompted
It is close or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target application solution of the target application icon is prompted
Close or failed encryption.
16. terminal according to claim 15, which is characterized in that in first decrypted graphics and default code key figure phase
With after, the processor is for executing the application processing function stored in memory, to perform the steps of
The second operation is received, the third process container and target where the target application icon of acquisition second operation instruction are answered
Application identities, wherein the third process container is the process container where target application icon;
The corresponding processing of identical with the application identities of target application application identities in the default key information is obtained to hold
Device;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information
When identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information
When different with the third process container, the target application decryption or failed encryption are prompted.
17. terminal according to claim 15, which is characterized in that in first decrypted graphics and default code key figure phase
With after, the processor is for executing the application processing function stored in memory, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical, mention
Show the corresponding application decryption of the application icon of the second page or encrypt successfully, wherein the fourth process container is described
Any one process container in second page, the 5th process container are to handle in the default key information with the described 5th
The identical process container of container;
When corresponding first application identities of the fourth process container the second application identities corresponding with the 5th process container
When different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
18. terminal according to claim 11, which is characterized in that the processor is used to execute answering of storing in memory
With processing routine, to perform the steps of
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target application
Icon is moved to the second processing container in the first page from the first process container in second page, wherein described
Two pages are the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
19. terminal according to claim 11, which is characterized in that the processor is used to execute answering of storing in memory
With processing routine, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first page
In the first process container be moved to the second processing container in second page, wherein the second page be terminal in advance
The encryption and decryption page of setting, the first page are not the encryption and decryption pages.
20. 1 to 19 described in any item terminals according to claim 1, which is characterized in that the target application icon include: to
A few application icon.
21. a kind of terminal, which is characterized in that the terminal includes: receiver and processor, wherein
The receiver, for receiving the first operation to target application icon;
The processor, for the target application icon to be moved to second from the first process container according to first operation
Process container;It is also used to obtain the information of target application icon described in the second processing container;It is also used to according to the mesh
The corresponding target application of target application icon described in the information processing of application icon is marked, the processing includes controlling the target to answer
With the state of the corresponding target application of icon.
22. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be executed by one or more processor to perform the steps of
The target application icon is moved to second processing container from the first process container according to first operation;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes
Control the state of the corresponding target application of the target application icon.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710868280.1A CN109543370B (en) | 2017-09-22 | 2017-09-22 | Application processing method, terminal and computer readable storage medium |
PCT/CN2018/086536 WO2019056773A1 (en) | 2017-09-22 | 2018-05-11 | Application processing method, terminal and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710868280.1A CN109543370B (en) | 2017-09-22 | 2017-09-22 | Application processing method, terminal and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109543370A true CN109543370A (en) | 2019-03-29 |
CN109543370B CN109543370B (en) | 2024-01-23 |
Family
ID=65810054
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710868280.1A Active CN109543370B (en) | 2017-09-22 | 2017-09-22 | Application processing method, terminal and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109543370B (en) |
WO (1) | WO2019056773A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112905086A (en) * | 2021-02-03 | 2021-06-04 | 北京梧桐车联科技有限责任公司 | Application mode control method, device, equipment and computer readable storage medium |
CN113127911A (en) * | 2021-05-06 | 2021-07-16 | 国网河北省电力有限公司信息通信分公司 | Electric power data encryption method and device and terminal |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103514394A (en) * | 2012-12-10 | 2014-01-15 | Tcl集团股份有限公司 | Icon unlocking method of touch screen equipment and touch screen equipment |
CN104272236A (en) * | 2012-02-27 | 2015-01-07 | 诺基亚公司 | Apparatus and associated methods |
CN104424412A (en) * | 2013-09-03 | 2015-03-18 | 北京三星通信技术研究有限公司 | Method for protecting information in intelligent terminal, page switching method and intelligent terminal |
CN104615927A (en) * | 2014-12-31 | 2015-05-13 | 宇龙计算机通信科技(深圳)有限公司 | Multisystem safe verification method, multisystem safe verification device and terminal |
CN104966014A (en) * | 2015-07-17 | 2015-10-07 | 华勤通讯技术有限公司 | Terminal encryption method and apparatus and terminal decryption method and apparatus |
CN105868617A (en) * | 2016-03-25 | 2016-08-17 | 维沃移动通信有限公司 | Application encryption method and mobile terminal |
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
WO2017000350A1 (en) * | 2015-06-29 | 2017-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Touchscreen terminal-based unlock method and device and touchscreen terminal |
US20170193212A1 (en) * | 2015-01-09 | 2017-07-06 | Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. | Screen Interface Unlocking Method And Screen Interface Unlocking Device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701395A (en) * | 2014-11-28 | 2016-06-22 | 乐视移动智能信息技术(北京)有限公司 | Safe processing method and device of mobile terminal |
-
2017
- 2017-09-22 CN CN201710868280.1A patent/CN109543370B/en active Active
-
2018
- 2018-05-11 WO PCT/CN2018/086536 patent/WO2019056773A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104272236A (en) * | 2012-02-27 | 2015-01-07 | 诺基亚公司 | Apparatus and associated methods |
CN103514394A (en) * | 2012-12-10 | 2014-01-15 | Tcl集团股份有限公司 | Icon unlocking method of touch screen equipment and touch screen equipment |
CN104424412A (en) * | 2013-09-03 | 2015-03-18 | 北京三星通信技术研究有限公司 | Method for protecting information in intelligent terminal, page switching method and intelligent terminal |
CN104615927A (en) * | 2014-12-31 | 2015-05-13 | 宇龙计算机通信科技(深圳)有限公司 | Multisystem safe verification method, multisystem safe verification device and terminal |
WO2016106989A1 (en) * | 2014-12-31 | 2016-07-07 | 宇龙计算机通信科技(深圳)有限公司 | Multi-system security authentication method, multi-system security authentication apparatus and terminal |
US20170193212A1 (en) * | 2015-01-09 | 2017-07-06 | Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. | Screen Interface Unlocking Method And Screen Interface Unlocking Device |
WO2017000350A1 (en) * | 2015-06-29 | 2017-01-05 | 宇龙计算机通信科技(深圳)有限公司 | Touchscreen terminal-based unlock method and device and touchscreen terminal |
CN104966014A (en) * | 2015-07-17 | 2015-10-07 | 华勤通讯技术有限公司 | Terminal encryption method and apparatus and terminal decryption method and apparatus |
CN105868617A (en) * | 2016-03-25 | 2016-08-17 | 维沃移动通信有限公司 | Application encryption method and mobile terminal |
CN106250754A (en) * | 2016-07-27 | 2016-12-21 | 维沃移动通信有限公司 | The control method of a kind of application program and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112905086A (en) * | 2021-02-03 | 2021-06-04 | 北京梧桐车联科技有限责任公司 | Application mode control method, device, equipment and computer readable storage medium |
CN113127911A (en) * | 2021-05-06 | 2021-07-16 | 国网河北省电力有限公司信息通信分公司 | Electric power data encryption method and device and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109543370B (en) | 2024-01-23 |
WO2019056773A1 (en) | 2019-03-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105359153B (en) | The verification based on gesture in the case of no reservation certification gesture | |
CN103246842A (en) | Methods and devices for authentication and data encryption | |
CN107689097B (en) | Synchronizing Passwords based on frequency hopping generate and verify system and its application | |
CN104579680B (en) | A kind of method of secure distribution seed | |
CN106533663B (en) | Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus | |
CN103914662A (en) | Access control method and device of file encrypting system on the basis of partitions | |
CN100444184C (en) | Method and system of software identify identification | |
CN109190404A (en) | A kind of data desensitization system | |
CN107040520A (en) | A kind of cloud computing data-sharing systems and method | |
CN109903052A (en) | A kind of block chain endorsement method and mobile device | |
CN102938762B (en) | A kind of file safety management system based on mobile terminal | |
CN109543370A (en) | A kind of application processing method, terminal and computer readable storage medium | |
US11514153B2 (en) | Method of registering and authenticating a user of an online system | |
CN104966014B (en) | The encryption method and encryption device of terminal, the decryption method of terminal and decryption device | |
CN104363093A (en) | Method for encrypting file data by dynamic authorization code | |
US9268934B2 (en) | Cryptographic passcode reset | |
CN113744437A (en) | Intelligent house renting management method and system | |
CN1913547B (en) | Card distributing user terminer, paying center, and method and system for protecting repaid card data | |
CN101655893A (en) | Manufacture method of intelligent blog lock, Blog access control method and system thereof | |
CN110300289A (en) | Video security management system and method | |
CN109936530B (en) | Secret key sharing method based on cloud outsourcing and access control system thereof | |
CN103178955B (en) | A kind of authentication method, equipment and system | |
CN106027256A (en) | Identity card reading response system | |
US11190505B2 (en) | Password card hinting system | |
CN102714595A (en) | Digital signature server and user termina |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |