CN109543370A - A kind of application processing method, terminal and computer readable storage medium - Google Patents

A kind of application processing method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN109543370A
CN109543370A CN201710868280.1A CN201710868280A CN109543370A CN 109543370 A CN109543370 A CN 109543370A CN 201710868280 A CN201710868280 A CN 201710868280A CN 109543370 A CN109543370 A CN 109543370A
Authority
CN
China
Prior art keywords
target application
page
application icon
process container
icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710868280.1A
Other languages
Chinese (zh)
Other versions
CN109543370B (en
Inventor
徐莹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Zhongxing New Software Co Ltd
Original Assignee
Xian Zhongxing New Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Zhongxing New Software Co Ltd filed Critical Xian Zhongxing New Software Co Ltd
Priority to CN201710868280.1A priority Critical patent/CN109543370B/en
Priority to PCT/CN2018/086536 priority patent/WO2019056773A1/en
Publication of CN109543370A publication Critical patent/CN109543370A/en
Application granted granted Critical
Publication of CN109543370B publication Critical patent/CN109543370B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a kind of application processing method, terminal and computer readable storage medium, the first operation to target application icon is received, the target application icon is moved to from the first process container by second processing container according to first operation;Obtain the information of target application icon described in the second processing container;According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes controlling the state of the corresponding target application of the target application icon.

Description

A kind of application processing method, terminal and computer readable storage medium
Technical field
The present invention relates to electronic technology field more particularly to a kind of application processing methods, terminal and computer-readable storage Medium.
Background technique
In smart phone using more and more, many applications are related to individual subscriber privacy, but if once mobile phone quilt Decryption, other users can be checked arbitrarily or be applied using these, will be consulted by other people using some interior perhaps privacies being related to, Therefore, lock function is applied in order to give to increase using safety, it is ensured that being related to applying for privacy can not before no decryption Normal use.
In the prior art, the method for using coded lock substantially using encryption, user can set using lock cipher, i.e., to wanting The application setting coded lock of encryption needs to input setting code decryption ability when user needs the related application using encryption Enough applications using encryption.But the decryption scheme of this input password is relatively obvious, user can decrypt after obtaining password Encrypted multiple applications, security level is single and safety is relatively low.
Summary of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of application processing method, terminal and calculating Machine readable storage medium storing program for executing can satisfy the demand of user's different scenes, improve Terminal security.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
A kind of application processing method, which comprises
It receives to the first of target application icon the operation, according to first operation by the target application icon from first Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute Stating second page is the pre-set encryption and decryption page in terminal.
Further, the corresponding target of target application icon according to the information processing of the target application icon Using, comprising:
According to the information of the target application icon and default key information to the corresponding target of the target application icon Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre- If key information includes: predetermined encryption information and default solution confidential information.
Further, the information and default key information according to the target application icon is to the target application figure Corresponding target application is marked to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, further includes:
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, further includes:
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is Any one process container in the second page, the 5th process container are in the default key information with the described 5th The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, first operation received to target application icon, operates according to described first by the target Application icon is moved to second processing container from the first process container, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, first operation received to target application icon, operates according to described first by the target Application icon is moved to second processing container from the first process container, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the present invention also provides a kind of terminal, and the terminal includes: processor and memory, and the processor is used for The application processing function stored in memory is executed, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute Stating second page is the pre-set encryption and decryption page in terminal.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
According to the information of the target application icon and default key information to the corresponding target of the target application icon Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre- If key information includes: predetermined encryption information and default solution confidential information.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, the processor is for executing The application processing function stored in memory, to perform the steps of
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, the processor is for executing The application processing function stored in memory, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is Any one process container in the second page, the 5th process container are in the default key information with the described 5th The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, the processor is for executing the application processing function stored in memory, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the present invention also provides a kind of terminal, and the terminal includes: receiver and processor, wherein
The receiver, for receiving the first operation to target application icon;
The processor, for being moved to the target application icon from the first process container according to first operation Second processing container;It is also used to obtain the information of target application icon described in the second processing container;It is also used to according to institute The corresponding target application of target application icon described in the information processing of target application icon is stated, the processing includes controlling the mesh Mark the state of the corresponding target application of application icon.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has One or more program, one or more of programs can be executed by one or more processor to realize following step It is rapid:
The target application icon is moved to second processing container from the first process container according to first operation;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon State including controlling the corresponding target application of the target application icon.
The embodiment of the invention provides a kind of application processing method, terminal and computer readable storage mediums, utilize setting Safety label page, and application icon figure, sequence are arranged on the page, figure is finally arranged according to application icon and Gong Gezhong is answered It is decrypted with placement location, while improving user security, also user is allowed voluntarily to select the corresponding solution of security level Close scheme meets the needs of user's different scenes, improves user experience, further promotes Terminal security.
Detailed description of the invention
In attached drawing (it is not necessarily drawn to scale), similar appended drawing reference can describe phase in different views As component.Similar reference numerals with different letter suffix can indicate the different examples of similar component.Attached drawing with example and Unrestricted mode generally shows each embodiment discussed herein.
Fig. 1 is application processing method flow diagram one provided in an embodiment of the present invention;
Fig. 2 is application processing method flow diagram two provided in an embodiment of the present invention;
Fig. 3 is application processing method flow diagram three provided in an embodiment of the present invention;
Fig. 4 is application processing method flow diagram four provided in an embodiment of the present invention;
Fig. 5 is application processing method flow diagram five provided in an embodiment of the present invention;
Fig. 6 is application processing method flow diagram six provided in an embodiment of the present invention;
Fig. 7 is application processing method flow diagram seven provided in an embodiment of the present invention;
Fig. 8 is terminal structure schematic diagram provided in an embodiment of the present invention;
Fig. 9 is the mobile exemplary diagram one of application icon provided in an embodiment of the present invention;
Figure 10 is the mobile exemplary diagram two of application icon provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.
The embodiment of the present invention provides a kind of application processing method, as shown in Figure 1, this method may include:
The first operation of step 101, reception to target application icon, operates according to described first by the target application figure Mark is moved to second processing container from the first process container.
The executing subject of application processing method provided in an embodiment of the present invention is terminal, i.e. terminal receives user and answers target With the first operation of icon, the target application icon is moved to from second from the first process container according to first operation Manage container.The terminal can be mobile phone, tablet computer etc., can also be the terminal device that can install application.
Here, the first process container, second processing container can be understood as the band of position where application icon, and one is answered It can be understood as a process container with the band of position where icon, multiple application icons arrange the process container to be formed arrangement Figure can be understood as palace trrellis diagram, be understood that for example, nine application icons arrange the process container arrangement figure that arrangement is formed with 3 rows 3 For nine grids figure.
In a kind of possible implementation, first process container is located at first page, second processing container position In second page;Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not plus solves The close page.Illustratively, as shown in Figure 10, application icon is moved to another page by the process container of a page Manage container.
In a kind of possible implementation, first process container and the second processing container are respectively positioned on described second The page;Wherein, the second page is the pre-set encryption and decryption page in terminal.Illustratively, as shown in figure 9, will apply Icon is moved to another process container by the process container of a page.
Here, the page can be understood as the display interface of terminal.
Wherein, the pre-set encryption and decryption page is referred to as safety label page, which is the one of terminal A display interface, the arrangement position and putting in order for being placed on the application icon of the display interface preset for user, when needing Open it is in the safety label page in application, need arrange out user preset application icon arrangement position and arrange it is suitable Sequence.
Wherein, the target application icon includes: at least one application icon.I.e. user can answer one or more It is moved with icon.
In a kind of possible implementation, first operation received to target application icon, according to first behaviour Make the target application icon being moved to second processing container from the first process container, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Specifically, scheme provided in an embodiment of the present invention can be by solving application icon removal safety label page It is close.Concrete application removes that safety label page is decrypted can be with are as follows: the application icon that need to be decrypted is removed encryption safe Shipping Options Page; User is prompted to input decryption applied cryptography;Whether correct judge password, if correctly, application can be moved out of encryption safe Shipping Options Page, Using decrypted;If mistake, fails using decryption, safety label page can not be removed.
In a kind of possible implementation, first operation received to target application icon, according to first behaviour Make the target application icon being moved to second processing container from the first process container, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Specifically, scheme provided in an embodiment of the present invention can be added by mobile application icon to safety label page It is close.It may include: to add the safety of application encryption in safety label page setup module that specific setting safety label page, which encrypts application, The safety label page application unlocking pin is arranged in Shipping Options Page, and the application for needing to encrypt is moved in encryption safe Shipping Options Page, is mentioned Show using whether encrypting the application being added, user's selection is, using being added to safety label page, and encrypts success;With Family selection is no, cancels application encryption.
Step 102, the information for obtaining target application icon described in the second processing container.
Here, the information of target application icon may include: the location information of process container where target application icon, the Two process containers place the row value and train value of the palace lattice of application icon in the palace trrellis diagram that process container is formed, and can specifically pass through Array is indicated with row and column value where process container.
Step 103, the corresponding target application of target application icon according to the information processing of the target application icon, The processing includes controlling the state of the corresponding target application of the target application icon.
Wherein, the state includes enabled state or/and process status, and the process status includes end process or beginning Process.
Specifically, terminal corresponding target of target application icon according to the information processing of the target application icon is answered With may include: information and default key information according to the target application icon to the corresponding mesh of the target application icon Mark application is encrypted or is decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described Default key information includes: predetermined encryption information and default solution confidential information.
In method provided in an embodiment of the present invention, the realization of target application is locked or unlocked by application icon arrangement Mode, it is described in detail below.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or failed encryption.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key Figure is identical, just locks or unlock the corresponding target application of target application icon.
Here, mobile application icon is formed when the first decrypted graphics of process container arrangement can be understood as current decryption The palace trrellis diagram that mobile application icon is formed when process container arrangement figure, i.e. current decryption, it is pre-set for presetting code key figure The process container that application icon is formed arranges figure, i.e., default palace trrellis diagram.
Illustratively, for level-one security level, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit of palace trrellis diagram palace lattice is detected, placement in the lattice of palace is not matched using id, i.e., only detects the palace for placing application icon The correctness for placing the Gong Gezhong application icon of application icon is not detected in the position of lattice and the palace lattice for not placing application icon; Here, flag bit is used to indicate whether Gong Gezhong places application icon, and the flag bit that application icon is placed in the lattice of palace is 1, Gong Ge In do not place application icon flag bit be Null;The palace case marker will position data and safety database Middle Palace lattice of current input display The exact matching of flag bit data, then successful decryption, otherwise decrypts failure.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, the second operation is received, second operation is obtained and refers to The application identities of third process container and target application where the target application icon shown, wherein the third process container For the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container and the third process container difference, the target application decryption or failed encryption are prompted.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key While figure is identical, target application icon must be put on target position, just to the corresponding target application of target icon into Row locks or unlock.
Illustratively, for secondary safety rank, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit of palace trrellis diagram palace lattice is detected, if palace lattice flag bit successful match, read needs to be decrypted on current safety Shipping Options Page Palace lattice in apply id value, matched with palace lattice location application id value is corresponded in the id value and safety database, if match It is successful then decrypt the application, otherwise decryption failure.In the embodiment of the present invention, ID value is identical as id value meaning.
, specifically can be by Apply Names in the embodiment of the present invention by being matched using id to application, or application Packet is matched, and specifically be can be used and is matched using packet name (package name);It can be from system using packet name It is obtained in launcher database, will place in safety label page after allowing and (using the row, column of placement, answered using the data of palace lattice With packet name) it is saved in safety database.
In a kind of possible implementation, the information and default key information according to the target application icon is to institute The corresponding target application of target application icon is stated to be encrypted or decrypted, comprising:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, when corresponding first application identities of fourth process container When corresponding with the 5th process container the second application identities are identical, the corresponding application solution of the application icon of the second page is prompted It is close or encrypt successfully, wherein the fourth process container is any one process container in the second page, at the described 5th Managing container is process container identical with the 5th process container in the default key information;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Specifically, the process container arrangement that target application icon and other icons for participating in arrangement are formed is schemed and default code key While figure is identical, all application icons all be must be placed on scheduled position, just can unlock or lock target icon Corresponding target application.
Illustratively, for three-level security level, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit for detecting palace trrellis diagram palace lattice reads if palace lattice flag bit successful match and applies id value in the palace lattice that need to be decrypted, Read according to this it is each on safety label page place the id value applied in the lattice of application icon palace, and with palace lattice are corresponded in safety database It is middle to be matched with id value, if applying id value successful match in all palace lattice, successful decryption is applied, is otherwise failed.
Application processing method provided in an embodiment of the present invention, including setting encryption and decryption application process, encrypt in setting In the process, safety label page is arranged for placing the security application icon that need to be encrypted, specially in safety in user at the terminal It application icon is set on the palace lattice of Shipping Options Page places and figure and put in order, which is put figure and suitable by terminal system Sequence is stored in the database of safety zone.In decryption application process, the embodiment of the present invention provides three kinds of security levels for user Setting, level-one security level be lowest level, specifically, only when the application icon on the safety label page of terminal put figure with In safety database icon put figure it is consistent when, application can be decrypted;Secondary safety rank is need to be full when decrypting application On the basis of sufficient level-one security level, the placement location in safety database need to be applied with this by being decrypted application icon placement location This application can be just decrypted when matching;Three-level security level is, the position that each application icon is placed need completely with safe number Application can just be decrypted by matching according to icon storage location each in library.
Illustratively, by the information of array representation application icon, multiple process containers arrange the figure to be formed and can manage Solution is Gong Getu, and it may include: that the default page of terminal acquisition is currently shown that encryption specific implementation, which is decrypted, in the encryption page Icon data information of the palace trrellis diagram for the application icon arrangement shown in the system database of terminal, believes according to the icon data Breath the first array element of setting;Obtain the ciphertext data of the pre-set default page in the safety database of the terminal The second array element is arranged according to the ciphertext data information in information;By successively by first array element and described Two array elements match the application icon that the default page is decrypted.
Wherein, the default page is the pre-set encryption page in the terminal, and the icon data information includes: The process container arranges the row value and train value that the palace lattice of application icon are placed in the palace trrellis diagram to be formed, first array element For any one array element in the first array.
Specifically, the array element being arranged in the first array according to the icon data information, may include: terminal First identifier is set by the row value and corresponding first array element of train value of placing the palace lattice of application icon in the palace trrellis diagram, The second mark is set by the row value and corresponding first array element of train value of the palace lattice for not placing application icon in the palace trrellis diagram Know.
Wherein, the ciphertext data information includes: the row value and train value and the capable value with the default palace lattice of default palace lattice Third mark corresponding with train value, second array element are any one array element in the second array.
Specifically, the array element being arranged in the second array according to the ciphertext data information, may include: terminal The row value and train value with the default palace lattice are set by the row value and corresponding second array element of train value of the default palace lattice Corresponding third mark.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute The train value for stating the corresponding default palace lattice of the second array element is identical.
Specifically, terminal successively matches first array element and second array element, when described When one array element and the second array element successful match, i.e., described first array element and the second array element phase Meanwhile the application icon successful decryption of the default page;When the first array element of at least one of first array with Second array element shows that the application icon of the default page decrypts failure when it fails to match.
Illustratively, for level-one security level, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit of palace trrellis diagram palace lattice is detected, placement in the lattice of palace is not matched using id, i.e., only detects the palace for placing application icon The correctness for placing the Gong Gezhong application icon of application icon is not detected in the position of lattice and the palace lattice for not placing application icon; Here, flag bit is used to indicate whether Gong Gezhong places application icon, and the flag bit that application icon is placed in the lattice of palace is 1, Gong Ge In do not place application icon flag bit be Null;The palace case marker will position data and safety database Middle Palace lattice of current input display The exact matching of flag bit data, then successful decryption, otherwise decrypts failure.
Further, in the system for obtaining and presetting the palace trrellis diagram for the application icon arrangement that the page is currently shown in terminal Before icon data information in database, further includes: obtain the palace trrellis diagram for the application icon arrangement that the default page is currently shown Row data and column data, the row data be the palace trrellis diagram in any one temporary dwelling palace lattice number, the column data is described The number of any one column palace lattice of palace trrellis diagram;Array is created according to the row data and column data, the array includes multiple arrays Element, the row value and train value of the corresponding palace lattice of each array element, the array include: the first array, the second array, the Three arrays and the 4th array.
Further, the icon data information further include: the row with the palace lattice for placing application icon in the palace trrellis diagram It is worth the first application identities ID value corresponding with train value;In the palace lattice for obtaining the application icon arrangement that the default page is currently shown Figure is after the icon data information in the system database of terminal, further includes:
It sets row value and the corresponding third array element of train value that the palace lattice of application icon are placed in the palace trrellis diagram to First application ID value, the third array element are any one array element in third array.
Further, the ciphertext data information further include: with the row value and train value corresponding second of the default palace lattice Application ID value, the ciphertext data information of the pre-set default page in the safety database for obtaining the terminal Later, further includes: set the second application ID value, institute for the row value and corresponding 4th array element of train value of the default palace lattice Stating the 4th array element is any one array element in the 4th array.
Further, it is also wrapped after first array element and the second array element successful match described It includes: receiving the operational order of user, in the corresponding third array of application icon for obtaining the operational order instruction decryption The 5th array element;When the 5th array element is identical as the 4th array element, the operation of the user is shown The application icon successful decryption of instruction instruction decryption, wherein the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element The capable value that row is worth the default palace lattice corresponding with the 4th array element is identical, and the corresponding institute of the 5th array element It is identical to state the train value of the train value default palace lattice corresponding with the 4th array element of palace trrellis diagram Middle Palace lattice;When the described 5th When array element and the 4th array element difference, the application icon decryption of the operational order instruction decryption of the user is shown Failure.
Illustratively, for secondary safety rank, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit of palace trrellis diagram palace lattice is detected, if palace lattice flag bit successful match, read needs to be decrypted on current safety Shipping Options Page Palace lattice in apply id value, matched with palace lattice location application id value is corresponded in the id value and safety database, if match It is successful then decrypt the application, otherwise decryption failure.In the embodiment of the present invention, ID value is identical as id value meaning.
Further, it is also wrapped after first array element and the second array element successful match described It includes:
Successively the third array element and the 4th array element are matched, wherein the third array element pair The capable value of the row value default palace lattice corresponding with the 4th array element for the palace trrellis diagram Middle Palace lattice answered is identical, and institute State the train value default palace corresponding with the 4th array element of the corresponding palace trrellis diagram Middle Palace lattice of third array element The train value of lattice is identical;When the third array element and the 4th array element successful match, the default page is shown Application icon successful decryption;When at least one third array element and the 4th array element in the third array When with failure, show that the application icon of the default page decrypts failure.
Illustratively, for three-level security level, terminal reads the palace trrellis diagram of safety label page in system database Icon data information, by the data in system database using row, column value as key assignments, in the array aij of deposit user's creation, i is Palace table rows number, j are palace lattice columns;The palace lattice of icon will be placed with, according to the row, column of palace lattice, inquire the corresponding array of array Element, and the array element value is set to 1, by other palace lattice for not placing icon, the array element value corresponded in array is Null.It is matched with the array element with lattice each respective flag position information in palace default in safety database, the matching process is only The flag bit for detecting palace trrellis diagram palace lattice reads if palace lattice flag bit successful match and applies id value in the palace lattice that need to be decrypted, Read according to this it is each on safety label page place the id value applied in the lattice of application icon palace, and with palace lattice are corresponded in safety database It is middle to be matched with id value, if applying id value successful match in all palace lattice, successful decryption is applied, is otherwise failed.
Application decryption method provided in an embodiment of the present invention can also include ciphering process, the specific following institute of ciphering process It states.
Further, in the row data and column of the palace trrellis diagram for obtaining the application icon arrangement that the default page is currently shown After data, further includes:
The second verification information of user's input is obtained, second verification information is setting circle into the default page The input password in face;
When second verification information is identical as preset first verification information, receives user and answer to be encrypted It is moved to the operational order of the default palace lattice of the default page with icon, obtains first that the default page presets palace lattice Number obtains second number that user is moved to the application icon to be encrypted of the default page, when second number is equal to Or be greater than described first it is severals when, prompt user remove default page application icon to be encrypted, until described second Number is less than first number;
User is received to application icon moving operation to be encrypted in the default page, the moving operation is for being arranged Placement position of the application icon to be encrypted on the default palace lattice of the default page and put sequence;
When not receiving operation of the user to the default page in preset time, prompt the user whether to complete described default The setting of the page;
When receiving the operational order of user's instruction completion default page setup, the system data of the terminal is read The row value and train value of the default palace lattice of the application icon to be encrypted is placed in library, in the system database for reading the terminal With the second application ID value of the row value and train value of the default palace lattice of the application icon to be encrypted;
By the default palace lattice of the application icon to be encrypted row value and train value and with the application icon to be encrypted Default palace lattice row value and the second application ID value of train value be stored in the tables of data created in the safety database of the terminal In lattice, the data form after storage is the ciphertext data information;
User is received to indicate to complete the operational order of the default page setup.
Further, before the second verification information of the acquisition user input, further includes:
The third verification information of user's input is obtained, the third verification information is setting circle into the default page The input password in face;
When the third verification information is identical as preset first verification information, the described pre- of user's input is obtained If the row value and train value of the default palace lattice of the page, the secure data with train value in the terminal is worth according to the row of the default palace lattice Data form is created in library, initializes the data form;
When the third verification information and preset first verification information difference, prompt to enter the default page Set interface failure.
Further, after the reception user indicates the operational order of the completion default page setup, further includes:
The 4th verification information of user's input is obtained, the 4th verification information is setting circle into the default page The input password in face;
When the 4th verification information is identical as preset first verification information, the described pre- of user's input is obtained If the security level of the page, the decryption security level is set as the default page and decrypts rank.
Further, before the third verification information of the acquisition user input, further includes:
First verification information is set as into the default page by the first verification information for obtaining user's input The verifying password of set interface.
Illustratively, application decryption method provided in an embodiment of the present invention is applied to terminal, which may include: safety Shipping Options Page setup module decrypts security level setup module using decrypted graphics recording module, using decryption matching module, protects The safety database of decrypted graphics and position is deposited,
Safety label page setup module, for safety label page to be arranged, safety label page is the palace lattice page, is needed for placing Application icon to be encrypted;The interface will at least vacate a palace case and set and not place application icon when placing icon, and And when only the safety label footers position is in setting state, this page can just be used to setting application lock figure.
Using decrypted graphics recording module, application icon puts whole figure and application on the good safety label page of user setting Icon reads corresponding table in safety database after the lattice placement location of palace, relevant information of this page in system data In, record security Shipping Options Page places the row and column of application icon palace lattice, and is 1 the mark position of placement application icon palace lattice, Record this palace lattice simultaneously applies id;The palace lattice mark position for not placing application icon is Null, is Null using id value.
Security level setup module is decrypted, for decryption security level to be arranged, decryption security level is divided into 3 ranks, One, two, three or 1,2,3 grade, 1 to 3 level decryptions require to step up, and 3 level decryption solution security highests, are here number Word more high security level is higher, and it is higher to be optionally also possible to digital more low security level.
Using decryption matching module, corresponding different application decryption security level, using different matching schemes.
Safety database needs to be stored in the safety zone of terminal, is mainly used to save locked application icon in safety post The palace lattice position coordinates placed on label page, i.e., it is locked in preset decryption palace trrellis diagram shape and palace lattice on preservation safety label page to answer With the position of icon.
The embodiment of the invention provides a kind of application processing methods, using setting safety label page, and arrange on the page Application icon figure, sequence are finally arranged figure according to application icon and Gong Gezhong application placement location are decrypted, improving While user security, also user is allowed voluntarily to select the corresponding decryption scheme of security level, meet user's different scenes Demand improves user experience, further promotes Terminal security.
The embodiment of the present invention also provides a kind of application processing method, and this method may include: setting ciphering process and decryption Application process, wherein setting ciphering process may include: the setting of the default page, the setting of application icon palace lattice, security level Setting;Decryption application process may include level-one security level application decryption, the decryption of secondary safety level applications, three-level peace Full level applications decryption.
Specifically, as shown in Fig. 2, the setting of the default page, the i.e. setting up procedure of safety label page may include:
Step 201, terminal obtain the third verification information of user's input.
Wherein, the third verification information is the input password into the set interface of the default page.
Optionally, before the third verification information of the acquisition user input, further includes:
Terminal obtains the first verification information of user's input, and first verification information is set as to enter the default page The verifying password of the set interface in face.
Specifically, user enters the password of the set interface of safety label page firstly the need of setting, need to enter peace in this way It needs to carry out password authentification when the set interface of full Shipping Options Page, can prevent other users from entering the set interface of safety label page It modifies the arrangement position of application icon in the safety label page of user setting and puts in order.
Step 202, when the third verification information is identical as preset first verification information, terminal obtain user The row value and train value of the default palace lattice of the default page of input, according to the row value and train value of the default palace lattice at the end Data form is created in the safety database at end, initializes the data form.
Step 203, when the third verification information and when preset first verification information difference, terminal notifying enters The set interface of the default page fails.
Illustratively, safety label page setting method is specifically, user's opening mobile phone terminal is being set into the setting page The setting of page selection safety label page is set, setting enters the verifying password of safety label page, after password is provided with, by close Code verifying enters safety label page and is arranged, if Password Input mistake, safety label page setup failed can not carry out safety post Sign the setting of page;If Password Input is correct, safety label page setting is carried out, user operates on mobile phone, addition peace Full Shipping Options Page, the number of lines and columns of mobile phone terminal display setting safety label page Middle Palace lattice, respectively i and j, user are defeated on mobile phone Enter the row and column numerical value of palace lattice, the number of lines and columns for the safety label page palace lattice that mobile phone terminal is inputted according to user, in safety number According to creation data form corresponding with the safety label page in library, and row, column attribute value is initialized, the letter which includes Breath is as shown in table 2.
For example, the setting of database table initial value is as shown in table 1 below by taking 2 rows, 2 column palace lattice as an example:
Table 1
Table 2
Specifically, application icon in safety label page can further be arranged and place after the setting up of safety label page Palace trrellis diagram shape and sequence, as shown in figure 4, the setting of application icon palace lattice, i.e., application icon is placed in safety label page palace Trrellis diagram shape and sequence Input Process may include:
Step 301, terminal obtain the second verification information of user's input.
Wherein, second verification information is the input password into the set interface of the default page.
Specifically, user inputs password, i.e. the second verification information judges whether there is permission and opens peace by password authentification Full Shipping Options Page setting, if cryptographic check is correct, carries out step 302;If cryptographic check mistake terminates application icon and exists The setting procedure of Shipping Options Page.
Step 302, when second verification information is identical as preset first verification information, terminal receive user Application icon to be encrypted is moved to the operational order of the default palace lattice of the default page, it is default to obtain the default page First number of palace lattice obtains second number that user is moved to the application icon to be encrypted of the default page, when described When second number is several equal to or more than described first, user is prompted to remove default page application icon to be encrypted, Until second number is less than first number.
Specifically, terminal, which opens safety label page, is arranged state, encrypted application icon will be needed to be moved to the safety Indicate on page;Obtain safety sign page palace lattice number j;Judge whether application icon number i is less than page palace lattice number j, if Be, user set application icon on the page placement position and put sequence;If not, prompt user removes more icons, so After continue to obtain the safety label page palace lattice number.
Step 303 receives user to application icon moving operation to be encrypted in the default page, the moving operation For placement position of the application icon to be encrypted on the default palace lattice of the default page to be arranged and puts sequence.
Step 304, when operation of the user to the default page is not received in preset time, prompt the user whether to complete The setting of the default page.
Step 305, when receiving user and indicating to complete the operational order of the default page setup, read the terminal The row value and train value of the default palace lattice of the application icon to be encrypted, the system for reading the terminal are placed in system database In database with the default palace lattice of the application icon to be encrypted row value and train value the second application ID value.
Specifically, judge whether user completes to be arranged, if it is from table related in system launcher database, Row, column value corresponding to all palace lattice for placing icon of the safety label page is found, and applies id value;Otherwise user's setting is answered With icon on the page placement position and put sequence.
Specifically, in database purchase detailed storing process be the row that certain palace lattice is read from launcher database, Column, using id after, in secure decrypted data library, find corresponding row, column value, then id value will be answered to be stored in correspondence In the Appid attribute value of Index, while by palace lattice mark position 1.
As shown in table 3, if Gong Gezhong is placed with application icon, palace lattice flag bit is 1, and is recorded for each palace lattice data setting Using id;If Gong Gezhong does not place application icon, palace lattice flag bit is Null, and id value is set to Null.
Table 3
Step 306, by the default palace lattice of the application icon to be encrypted row value and train value and with it is described to be encrypted The row value of the default palace lattice of application icon and the second application ID value of train value are stored in the safety database of the terminal and create Data form in, the data form after storage is the ciphertext data information.
Step 307 receives the operational order that user indicates the completion default page setup.
Specifically, the value that terminal will successively be read from system database, is stored in safety database according to row, column attribute In table in;To the palace lattice for having icon, table Middle Palace case marker will bit attribute value is set to 1.Label is closed after the completion of setting Page setting switch.When the palace trrellis diagram shape and sequence that the middle application icon of the complete default page of user setting is placed, answered what is set The palace trrellis diagram shape and sequence placed with icon are upset, in this way, needing to rearrange and decryption verification when next time opens.
Specifically, after application icon is placed in safety label page palace trrellis diagram shape and sequence are set up, it can be further Setting application decryption security level, as shown in figure 4, the setting up procedure of security level may include:
Step 401, terminal obtain the 4th verification information of user's input.
Wherein, the 4th verification information is the input password into the set interface of the default page.
Step 402, when the 4th verification information is identical as preset first verification information, terminal obtain user The decryption security level is set as the default page and decrypts rank by the security level of the default page of input.
Specifically, user inputs password, i.e. the 4th verification information, terminal carries out password authentification to the password that user inputs, It judges whether there is permission and opens safety label page setup module, if cryptographic check mistake, termination of security Shipping Options Page safety level Other setting procedure;If cryptographic check is correct, it can be configured security level, here, user may be provided in terminal Multiple safety label pages, when carrying out security level setting, user needs to select the safety label page of setting security level, such as User selects the safety solution of the safety label page M for needing to set decryption security level, user's input or selection security level setting M Level of confidentiality is other.
Specifically, after the setting of the default page, being all provided with of the setting of application icon palace lattice and security level, terminal The ciphering process of the default page complete, when user needs to open the application icon in the default page, need to application icon The default interface at place is decrypted, and the security level for presetting interface includes three kinds, for different security levels, decrypting process It is different, wherein as shown in figure 5, level-one security level application decrypting process may include:
Step 501, terminal obtain the row data and columns of the palace trrellis diagram for the application icon arrangement that the default page is currently shown According to.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 502 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value, The array includes: the first array and the second array.
Specifically, terminal establishes array aij, bij according to safety label page palace lattice row, column, wherein i is palace table rows value, j For palace lattice train value, and array is initially Null.
Illustratively, by taking the palace lattice safety sign page of 2 rows 2 column as an example, array a [2] [2] can be established, if current page palace The 1st row of lattice, the 2nd column, the 2nd row, the 1st column are placed with icon, and other palace lattice are sky, then array element value are as follows:
A [1] [1]=Null;A [1] [2]=1;A [2] [1]=1;A [2] [2]=Null.
Step 503, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram Element is set as second identifier.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described The row value and train value of the palace lattice of application icon are placed in the trrellis diagram of palace, first array element is any one number in the first array Group element.
Specifically, terminal reads icon data information of the safety label page in system database, system database is read The middle row and column for placing application icon palace lattice, and according to the value of row and column, the value in array aij corresponding element is set to 1.
Step 504, the ciphertext data letter for obtaining the pre-set default page in the safety database of the terminal The row value and corresponding second array element of train value of the default palace lattice are set the row value and column with the default palace lattice by breath It is worth corresponding third mark.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange It is worth corresponding third mark, second array element is any one array element in the second array.
Specifically, terminal reads the ciphertext data of corresponding safety label page from safety database, and with row, column value be according to According to the data of database Middle Palace lattice flag bit are saved in array b ij corresponding element.
Step 505 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 506, when first array element and when the second array element successful match, show the default page The application icon successful decryption in face.
Step 507 is matched with second array element when the first array element of at least one of first array When failure, show that the application icon of the default page decrypts failure.
Specifically, terminal successively sequentially reads data aij and bij in two arrays;Aij value is carried out with this with bij value Matching, if aij=bij, judges whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than or equal to Shipping Options Page palace The columns of lattice carries out step 505 if two conditions all meet, if both greater than, Data Matching is completed, successful decryption can be with Starting application;Otherwise decryption failure.
Specifically, as shown in fig. 6, secondary safety level applications decrypting process may include:
Step 601, the row data and column data for obtaining the palace trrellis diagram that the application icon that the default page is currently shown arranges.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 602 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value, The array includes: the first array, the second array, third array and the 4th array.
Specifically, terminal establishes array aij, bij, mij, nij according to safety label page palace lattice row, column;I is Gong Gehang Value, j is palace lattice train value, and array is initially Null.
Step 603, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram Element is set as second identifier, and the row that the palace lattice of application icon are placed in the palace trrellis diagram is worth third array corresponding with train value Element is set as the first application ID value.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described The row value that the palace lattice of application icon are placed in the row value and train value, with the palace trrellis diagram of the palace lattice of application icon is placed in the trrellis diagram of palace The first application identities ID value corresponding with train value, first array element are any one array element in the first array, institute Stating third array element is any one array element in third array.
Specifically, terminal reads icon data information of the safety label page in system database, put in reading database The row, column value of application icon palace lattice and the id value of application are set, and according to the value of row and column, by the value in array aij corresponding element It is set to 1, while id value being placed into bij corresponding element.
Step 604, the ciphertext data letter for obtaining the pre-set default page in the safety database of the terminal The row value and corresponding second array element of train value of the default palace lattice are set the row value and column with the default palace lattice by breath It is worth corresponding third mark, sets the second application ID for the row value and corresponding 4th array element of train value of the default palace lattice Value.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange It is worth corresponding third mark, the second application ID value corresponding with the row value and train value of the default palace lattice, the second array member Element is any one array element in the second array, and the 4th array element is any one array element in the 4th array.
Specifically, the ciphertext data of corresponding safety label page is read from safety database, and using row, column value as foundation, The data of database Middle Palace lattice flag bit are saved in array mij corresponding element, nij is stored in using id value in the lattice of palace and corresponds to Element in.
Step 605 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 606, when first array element and when the second array element successful match, show the default page The application icon successful decryption in face.
Step 607 is matched with second array element when the first array element of at least one of first array When failure, show that the application icon of the default page decrypts failure.
After step 606 further include:
Step 608, the operational order for receiving user obtain the corresponding institute of application icon of the operational order instruction decryption State the 5th array element in third array.
Step 609, when the 5th array element is identical as the 4th array element, show the operation of the user The application icon successful decryption of instruction instruction decryption.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element and the 4th array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of the 5th array element and institute The train value for stating the corresponding default palace lattice of the 4th array element is identical;
Step 610, when the 5th array element and when the 4th array element difference, show the operation of the user The application icon of instruction instruction decryption decrypts failure.
Specifically, terminal successively sequentially reads data aij and mij in two arrays;Aij value is matched with mij value, If aij=mij, judge whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than or equal to Shipping Options Page palace lattice Columns, the income step 605 if two conditions all meet, if both greater than, illustrate application icon setting Graphic Pattern Matching at Function;Otherwise decryption failure.If Graphic Pattern Matching success is arranged in application icon, when opening certain Gong Gezhong application icon when the user clicks, It reads the icon in array bij and corresponds to id value, and judge that this value is matched with respective value in array nij;If bij=nij, It is then decrypted and applies successful decryption.;If it fails to match, it fails to match for the application.
Specifically, as shown in fig. 7, three-level security level application decrypting process may include:
Step 701, the row data and column data for obtaining the palace trrellis diagram that the application icon that the default page is currently shown arranges.
Wherein, the row data are the number of any one temporary dwelling palace lattice in the palace trrellis diagram, and the column data is the palace lattice Scheme the number of any one column palace lattice.
Specifically, default page setup application icon decrypted graphics of the user in terminal, setting application icon decryption figure Shape is the palace trrellis diagram for the application icon arrangement that the default page is currently shown, terminal obtains the row data and column data of the palace trrellis diagram.
Step 702 creates array according to the row data and column data.
Wherein, the array includes multiple array elements, and the row of the corresponding palace lattice of each array element is worth and train value, The array includes: the first array, the second array, third array and the 4th array.
Specifically, terminal establishes array aij, bij, mij, nij according to safety label page palace lattice row, column;I is Gong Gehang Value, j is palace lattice train value, and array is initially Null.
Step 703, system database of the palace trrellis diagram in terminal for obtaining the application icon arrangement that the default page is currently shown In icon data information, will the rows of the palace lattice that application icon is placed in the palace trrellis diagram to be worth corresponding with train value the first array first Element is set as first identifier, and the row value and corresponding first array of train value of the palace lattice of application icon will not be placed in the palace trrellis diagram Element is set as second identifier, and the row that the palace lattice of application icon are placed in the palace trrellis diagram is worth third array corresponding with train value Element is set as the first application ID value.
The default page is the pre-set encryption page in the terminal, and the icon data information includes: described The row value and train value of the palace lattice of application icon are placed in the trrellis diagram of palace, first array element is any one number in the first array Group element, the first application identities ID value corresponding with the row value of the palace lattice of placement application icon in the palace trrellis diagram and train value, institute Stating third array element is any one array element in third array.
Specifically, terminal reads icon data information of the safety label page in system database, put in reading database The row, column value of application icon palace lattice and the id value of application are set, and according to the value of row and column, by the value in array aij corresponding element It is set to 1, while id value being placed into bij corresponding element.
Step 704, the ciphertext data information for obtaining the pre-set default page in the safety database of terminal, will The row value and corresponding second array element of train value of the default palace lattice are set as row value and train value pair with the default palace lattice The row value and corresponding 4th array element of train value of the default palace lattice are set the second application ID value by the third mark answered.
The ciphertext data information include: default palace lattice row value and train value and with the capable value of the default palace lattice and arrange It is worth corresponding third mark, the second application ID value corresponding with the row value and train value of the default palace lattice, the second array member Element is any one array element in the second array, and the 4th array element is any one array element in the 4th array.
Specifically, the ciphertext data of corresponding safety label page is read from safety database, and using row, column value as foundation, The data of database Middle Palace lattice flag bit are saved in array mij corresponding element, nij is stored in using id value in the lattice of palace and corresponds to Element in.
Step 705 successively matches first array element and second array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and second array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of first array element and institute The train value for stating the corresponding default palace lattice of the second array element is identical.
Step 706, when first array element and when the second array element successful match, show the default page The application icon successful decryption in face.
Step 707, when it fails to match for the first array element of at least one of first array and the second array element, show Show the application icon decryption failure of the default page.
After step 706 further include:
Step 708 successively matches the third array element and the 4th array element.
Wherein, the row value of the corresponding palace trrellis diagram Middle Palace lattice of the third array element and the 4th array element pair The row value for the default palace lattice answered is identical, and the train value of the corresponding palace trrellis diagram Middle Palace lattice of the third array element and institute The train value for stating the corresponding default palace lattice of the 4th array element is identical;
Step 709, when the third array element and when the 4th array element successful match, show the default page The application icon successful decryption in face.
Step 710 is matched with the 4th array element when at least one third array element in the third array When failure, show that the application icon of the default page decrypts failure.
Specifically, terminal successively sequentially read array aij, bij value, and with array mij and nij respective value carry out Match;If aij=mij and bij=nij, judge whether i is less than or equal to the line number of Shipping Options Page palace lattice, and whether j is less than In the columns of Shipping Options Page palace lattice, step 705 is carried out if two conditions all meet;If both greater than, applying successful decryption; Otherwise decryption failure.
The embodiment of the invention provides a kind of application processing methods, using setting safety label page, and arrange on the page Application icon figure, sequence are finally arranged figure according to application icon and Gong Gezhong application placement location are decrypted, improving While user security, also user is allowed voluntarily to select the corresponding decryption scheme of security level, meet user's different scenes Demand improves user experience, further promotes Terminal security.
The embodiment of the invention provides terminal, using setting safety label page, and arrange on the page application icon figure, Sequentially, figure is finally arranged according to application icon and Gong Gezhong application placement location is decrypted, improving user security Meanwhile also user being allowed voluntarily to select the corresponding decryption scheme of security level, meet the needs of user's different scenes, improves user Experience, further promotes Terminal security.
The embodiment of the present invention provides a kind of terminal 80, as shown in figure 8, the terminal 80 includes: processor 801 and memory 802, the processor 801 is for executing the application processing function stored in memory 802, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first Process container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon, the processing described in the information processing of the target application icon State including controlling the corresponding target application of the target application icon.
Further, first process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not encryption and decryption The page.
Further, first process container and the second processing container are respectively positioned on the second page;Wherein, institute Stating second page is the pre-set encryption and decryption page in terminal.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with Lower step:
According to the information of the target application icon and default key information to the corresponding target of the target application icon Using being encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, described pre- If key information includes: predetermined encryption information and default solution confidential information.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with Lower step:
Obtain the first decryption of the process container arrangement that mobile target application icon and the application icon not moved are formed Figure;
If first decrypted graphics are identical as default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target of the target application icon is prompted to answer With decryption or failed encryption.
Further, after first decrypted graphics are identical as default code key figure, the processor 801 is for holding The application processing function stored in line storage 802, to perform the steps of
Receive the second operation, third process container and mesh where the target application icon of acquisition second operation instruction Mark the application identities of application, wherein the third process container is the process container where target application icon;
Obtain the corresponding place of identical with the application identities of target application application identities in the default key information Manage container;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container is identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding processing of application identities identical with the application identities of the target application in the default key information When container and the third process container difference, the target application decryption or failed encryption are prompted.
Further, after first decrypted graphics are identical as default code key figure, the processor 801 is for holding The application processing function stored in line storage 802, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical When, it prompts the application icon of the second page corresponding application decryption or encrypts successfully, wherein the fourth process container is Any one process container in the second page, the 5th process container are in the default key information with the described 5th The identical process container of process container;
When the second application corresponding with the 5th process container of corresponding first application identities of the fourth process container When identifying different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with Lower step:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target Application icon is moved to the second processing container in the first page from the first process container in second page, wherein institute Stating second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
Further, the processor 801 is for executing the application processing function stored in memory 802, with realize with Lower step:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first The first process container in the page is moved to the second processing container in second page, wherein the second page is in terminal The pre-set encryption and decryption page, the first page are not the encryption and decryption pages.
Further, the target application icon includes: at least one application icon.
The embodiment of the invention provides terminal, using setting safety label page, and arrange on the page application icon figure, Sequentially, figure is finally arranged according to application icon and Gong Gezhong application placement location is decrypted, improving user security Meanwhile also user being allowed voluntarily to select the corresponding decryption scheme of security level, meet the needs of user's different scenes, improves user Experience, further promotes Terminal security.
The embodiment of the present invention also provides a kind of computer readable storage medium, and the computer-readable recording medium storage has One or more program, one or more of programs can be executed by one or more processor to realize as described above Application processing method the step of.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, the shape of hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the present invention Formula.Moreover, the present invention, which can be used, can use storage in the computer that one or more wherein includes computer usable program code The form for the computer program product implemented on medium (including but not limited to magnetic disk storage and optical memory etc.).
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention.

Claims (22)

1. a kind of application processing method, which is characterized in that the described method includes:
The first operation to target application icon is received, is handled the target application icon from first according to first operation Container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes Control the state of the corresponding target application of the target application icon.
2. the method according to claim 1, wherein
First process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page.
3. the method according to claim 1, wherein
First process container and the second processing container are respectively positioned on the second page;Wherein, the second page is The pre-set encryption and decryption page in terminal.
4. according to the method in claim 2 or 3, which is characterized in that at the information according to the target application icon Manage the corresponding target application of the target application icon, comprising:
According to the information of the target application icon and default key information to the corresponding target application of the target application icon Encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, it is described preset it is secret Key information includes: predetermined encryption information and default solution confidential information.
5. according to the method described in claim 4, it is characterized in that, the information according to the target application icon and default Key information is encrypted or is decrypted to the corresponding target application of the target application icon, comprising:
Obtain the first decrypted graphics of the process container arrangement that mobile target application icon and the application icon not moved are formed;
If first decrypted graphics are identical as default code key figure, the corresponding target application solution of the target application icon is prompted It is close or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target application solution of the target application icon is prompted Close or failed encryption.
6. according to the method described in claim 5, it is characterized in that, identical as default code key figure in first decrypted graphics Later, further includes:
The second operation is received, the third process container and target where the target application icon of acquisition second operation instruction are answered Application identities, wherein the third process container is the process container where target application icon;
The corresponding processing of identical with the application identities of target application application identities in the default key information is obtained to hold Device;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information When identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information When different with the third process container, the target application decryption or failed encryption are prompted.
7. according to the method described in claim 5, it is characterized in that, identical as default code key figure in first decrypted graphics Later, further includes:
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical, mention Show the corresponding application decryption of the application icon of the second page or encrypt successfully, wherein the fourth process container is described Any one process container in second page, the 5th process container are to handle in the default key information with the described 5th The identical process container of container;
When corresponding first application identities of the fourth process container the second application identities corresponding with the 5th process container When different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
8. the method according to claim 1, wherein first operation received to target application icon, root The target application icon is moved to second processing container from the first process container according to first operation, comprising:
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target application Icon is moved to the second processing container in the first page from the first process container in second page, wherein described Two pages are the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
9. the method according to claim 1, wherein first operation received to target application icon, root The target application icon is moved to second processing container from the first process container according to first operation, comprising:
It receives to the first of target application icon the operation, according to first operation by the target application icon from first page In the first process container be moved to the second processing container in second page, wherein the second page be terminal in advance The encryption and decryption page of setting, the first page are not the encryption and decryption pages.
10. method according to any one of claims 1 to 9, which is characterized in that the target application icon includes: at least One application icon.
11. a kind of terminal, which is characterized in that the terminal includes: processor and memory, and the processor is for executing storage The application processing function stored in device, to perform the steps of
The first operation to target application icon is received, is handled the target application icon from first according to first operation Container is moved to second processing container;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes Control the state of the corresponding target application of the target application icon.
12. terminal according to claim 11, which is characterized in that
First process container is located at first page, and the second processing container is located at second page;
Wherein, the second page is the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page.
13. terminal according to claim 11, which is characterized in that first process container and the second processing container It is respectively positioned on the second page;Wherein, the second page is the pre-set encryption and decryption page in terminal.
14. terminal according to claim 12 or 13, which is characterized in that the processor is stored for executing in memory Application processing function, to perform the steps of
According to the information of the target application icon and default key information to the corresponding target application of the target application icon Encrypted or decrypted, wherein the corresponding target application of target application icon before mobile is pre-encrypt state, it is described preset it is secret Key information includes: predetermined encryption information and default solution confidential information.
15. terminal according to claim 14, which is characterized in that the processor is used to execute answering of storing in memory With processing routine, to perform the steps of
Obtain the first decrypted graphics of the process container arrangement that mobile target application icon and the application icon not moved are formed;
If first decrypted graphics are identical as default code key figure, the corresponding target application solution of the target application icon is prompted It is close or encrypt successfully;
If first decrypted graphics are different from default code key figure, the corresponding target application solution of the target application icon is prompted Close or failed encryption.
16. terminal according to claim 15, which is characterized in that in first decrypted graphics and default code key figure phase With after, the processor is for executing the application processing function stored in memory, to perform the steps of
The second operation is received, the third process container and target where the target application icon of acquisition second operation instruction are answered Application identities, wherein the third process container is the process container where target application icon;
The corresponding processing of identical with the application identities of target application application identities in the default key information is obtained to hold Device;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information When identical with the third process container, the target application is prompted to decrypt or encrypt successfully;
When the corresponding process container of application identities identical with the application identities of the target application in the default key information When different with the third process container, the target application decryption or failed encryption are prompted.
17. terminal according to claim 15, which is characterized in that in first decrypted graphics and default code key figure phase With after, the processor is for executing the application processing function stored in memory, to perform the steps of
When corresponding first application identities of fourth process container the second application identities corresponding with the 5th process container are identical, mention Show the corresponding application decryption of the application icon of the second page or encrypt successfully, wherein the fourth process container is described Any one process container in second page, the 5th process container are to handle in the default key information with the described 5th The identical process container of container;
When corresponding first application identities of the fourth process container the second application identities corresponding with the 5th process container When different, the corresponding application decryption of the application icon of the second page or failed encryption are prompted.
18. terminal according to claim 11, which is characterized in that the processor is used to execute answering of storing in memory With processing routine, to perform the steps of
The first operation to target application icon is received, shows Password Input prompting frame;
The password for obtaining input, judges whether the password of the input and pre-set password are identical;
When the password of the input is identical as pre-set password, according to first operational order by the target application Icon is moved to the second processing container in the first page from the first process container in second page, wherein described Two pages are the pre-set encryption and decryption page in terminal, and the first page is not the encryption and decryption page;
When the password of the input and pre-set password difference, the mobile failure of the target application icon is prompted.
19. terminal according to claim 11, which is characterized in that the processor is used to execute answering of storing in memory With processing routine, to perform the steps of
It receives to the first of target application icon the operation, according to first operation by the target application icon from first page In the first process container be moved to the second processing container in second page, wherein the second page be terminal in advance The encryption and decryption page of setting, the first page are not the encryption and decryption pages.
20. 1 to 19 described in any item terminals according to claim 1, which is characterized in that the target application icon include: to A few application icon.
21. a kind of terminal, which is characterized in that the terminal includes: receiver and processor, wherein
The receiver, for receiving the first operation to target application icon;
The processor, for the target application icon to be moved to second from the first process container according to first operation Process container;It is also used to obtain the information of target application icon described in the second processing container;It is also used to according to the mesh The corresponding target application of target application icon described in the information processing of application icon is marked, the processing includes controlling the target to answer With the state of the corresponding target application of icon.
22. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor to perform the steps of
The target application icon is moved to second processing container from the first process container according to first operation;
Obtain the information of target application icon described in the second processing container;
According to the corresponding target application of target application icon described in the information processing of the target application icon, the processing includes Control the state of the corresponding target application of the target application icon.
CN201710868280.1A 2017-09-22 2017-09-22 Application processing method, terminal and computer readable storage medium Active CN109543370B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710868280.1A CN109543370B (en) 2017-09-22 2017-09-22 Application processing method, terminal and computer readable storage medium
PCT/CN2018/086536 WO2019056773A1 (en) 2017-09-22 2018-05-11 Application processing method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710868280.1A CN109543370B (en) 2017-09-22 2017-09-22 Application processing method, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109543370A true CN109543370A (en) 2019-03-29
CN109543370B CN109543370B (en) 2024-01-23

Family

ID=65810054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710868280.1A Active CN109543370B (en) 2017-09-22 2017-09-22 Application processing method, terminal and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN109543370B (en)
WO (1) WO2019056773A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112905086A (en) * 2021-02-03 2021-06-04 北京梧桐车联科技有限责任公司 Application mode control method, device, equipment and computer readable storage medium
CN113127911A (en) * 2021-05-06 2021-07-16 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
CN104272236A (en) * 2012-02-27 2015-01-07 诺基亚公司 Apparatus and associated methods
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
CN104966014A (en) * 2015-07-17 2015-10-07 华勤通讯技术有限公司 Terminal encryption method and apparatus and terminal decryption method and apparatus
CN105868617A (en) * 2016-03-25 2016-08-17 维沃移动通信有限公司 Application encryption method and mobile terminal
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal
WO2017000350A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Touchscreen terminal-based unlock method and device and touchscreen terminal
US20170193212A1 (en) * 2015-01-09 2017-07-06 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Screen Interface Unlocking Method And Screen Interface Unlocking Device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701395A (en) * 2014-11-28 2016-06-22 乐视移动智能信息技术(北京)有限公司 Safe processing method and device of mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104272236A (en) * 2012-02-27 2015-01-07 诺基亚公司 Apparatus and associated methods
CN103514394A (en) * 2012-12-10 2014-01-15 Tcl集团股份有限公司 Icon unlocking method of touch screen equipment and touch screen equipment
CN104424412A (en) * 2013-09-03 2015-03-18 北京三星通信技术研究有限公司 Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN104615927A (en) * 2014-12-31 2015-05-13 宇龙计算机通信科技(深圳)有限公司 Multisystem safe verification method, multisystem safe verification device and terminal
WO2016106989A1 (en) * 2014-12-31 2016-07-07 宇龙计算机通信科技(深圳)有限公司 Multi-system security authentication method, multi-system security authentication apparatus and terminal
US20170193212A1 (en) * 2015-01-09 2017-07-06 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Screen Interface Unlocking Method And Screen Interface Unlocking Device
WO2017000350A1 (en) * 2015-06-29 2017-01-05 宇龙计算机通信科技(深圳)有限公司 Touchscreen terminal-based unlock method and device and touchscreen terminal
CN104966014A (en) * 2015-07-17 2015-10-07 华勤通讯技术有限公司 Terminal encryption method and apparatus and terminal decryption method and apparatus
CN105868617A (en) * 2016-03-25 2016-08-17 维沃移动通信有限公司 Application encryption method and mobile terminal
CN106250754A (en) * 2016-07-27 2016-12-21 维沃移动通信有限公司 The control method of a kind of application program and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112905086A (en) * 2021-02-03 2021-06-04 北京梧桐车联科技有限责任公司 Application mode control method, device, equipment and computer readable storage medium
CN113127911A (en) * 2021-05-06 2021-07-16 国网河北省电力有限公司信息通信分公司 Electric power data encryption method and device and terminal

Also Published As

Publication number Publication date
CN109543370B (en) 2024-01-23
WO2019056773A1 (en) 2019-03-28

Similar Documents

Publication Publication Date Title
CN105359153B (en) The verification based on gesture in the case of no reservation certification gesture
CN103246842A (en) Methods and devices for authentication and data encryption
CN107689097B (en) Synchronizing Passwords based on frequency hopping generate and verify system and its application
CN104579680B (en) A kind of method of secure distribution seed
CN106533663B (en) Data ciphering method, encryption method, apparatus and data decryption method, decryption method, apparatus
CN103914662A (en) Access control method and device of file encrypting system on the basis of partitions
CN100444184C (en) Method and system of software identify identification
CN109190404A (en) A kind of data desensitization system
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN109903052A (en) A kind of block chain endorsement method and mobile device
CN102938762B (en) A kind of file safety management system based on mobile terminal
CN109543370A (en) A kind of application processing method, terminal and computer readable storage medium
US11514153B2 (en) Method of registering and authenticating a user of an online system
CN104966014B (en) The encryption method and encryption device of terminal, the decryption method of terminal and decryption device
CN104363093A (en) Method for encrypting file data by dynamic authorization code
US9268934B2 (en) Cryptographic passcode reset
CN113744437A (en) Intelligent house renting management method and system
CN1913547B (en) Card distributing user terminer, paying center, and method and system for protecting repaid card data
CN101655893A (en) Manufacture method of intelligent blog lock, Blog access control method and system thereof
CN110300289A (en) Video security management system and method
CN109936530B (en) Secret key sharing method based on cloud outsourcing and access control system thereof
CN103178955B (en) A kind of authentication method, equipment and system
CN106027256A (en) Identity card reading response system
US11190505B2 (en) Password card hinting system
CN102714595A (en) Digital signature server and user termina

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant