CN109740312A - A kind of application control method and terminal device - Google Patents
A kind of application control method and terminal device Download PDFInfo
- Publication number
- CN109740312A CN109740312A CN201910079830.0A CN201910079830A CN109740312A CN 109740312 A CN109740312 A CN 109740312A CN 201910079830 A CN201910079830 A CN 201910079830A CN 109740312 A CN109740312 A CN 109740312A
- Authority
- CN
- China
- Prior art keywords
- information
- input
- area
- user
- draws
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 70
- 230000004044 response Effects 0.000 claims abstract description 28
- 238000004590 computer program Methods 0.000 claims description 8
- 238000012545 processing Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 6
- 238000003825 pressing Methods 0.000 description 6
- 230000006854 communication Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000005314 correlation function Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000009527 percussion Methods 0.000 description 1
- 230000005236 sound signal Effects 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention provides a kind of application control method and terminal device.This method comprises: receiving first input of the user to first object application interface;In response to first input, the first prompt information is exported, first prompt information is for prompting user to draw area's input information in the corresponding encryption information of first input;It obtains the user and draws the first information inputted in area in the encryption information;By the first information, target object is encrypted, the target object includes: the first object application interface or the corresponding application program of the first object application interface.The present invention can be realized real-time encrypted setting, high-efficient and simple to operate.
Description
Technical field
The present embodiments relate to field of communication technology more particularly to a kind of application control method and terminal devices.
Background technique
With the continuous development of science and technology, intelligent terminal is continuous universal.It is raw that intelligent terminal (such as mobile phone) has become people
Indispensable electronic product in work.In order to meet the use demand of user, various applications are installed on intelligent terminal.In order to protect
The individual privacy of user is protected, some applications are that user is reluctant that other people is allowed to see, therefore, application lock is come into being.
But most application lock is required to user and enters in application management interface go to be arranged at present, specifically need into
Row encryption application selection, some also need setting password, cumbersome, low efficiency are arranged, it has not been convenient to, user is more selection
It does not go to use it.
Summary of the invention
The embodiment of the present invention provides a kind of application control method and terminal device, to solve existing encryption application setting operation
The problem of cumbersome, low efficiency and inconvenience.
In order to solve the above-mentioned technical problem, the present invention is implemented as follows:
In a first aspect, being applied to terminal device the embodiment provides a kind of application control method, comprising:
Receive first input of the user to first object application interface;
In response to first input, the first prompt information is exported, first prompt information is for prompting user in institute
It states the corresponding encryption information of the first input and draws area's input information;
It obtains the user and draws the first information inputted in area in the encryption information;
By the first information, target object is encrypted, the target object includes: the first object application
Interface or the corresponding application program of the first object application interface.
Second aspect, the embodiment of the invention also provides a kind of terminal devices, comprising:
First receiving module, for receiving first input of the user to first object application interface;
First output module, for exporting the first prompt information, first prompt information in response to first input
For prompting user to draw area's input information in the corresponding encryption information of first input;
Module is obtained, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module, for being encrypted to target object, the target object includes: institute by the first information
State first object application interface or the corresponding application program of the first object application interface.
The third aspect the embodiment of the invention also provides a kind of terminal device, including processor, memory and is stored in institute
The computer program that can be run on memory and on the processor is stated, when the computer program is executed by the processor
The step of realizing application control method as described above.
Fourth aspect, it is described computer-readable to deposit the embodiment of the invention also provides a kind of computer readable storage medium
The step of being stored with computer program on storage media, realizing application control method as described above.
In the above scheme of the embodiment of the present invention, by receiving first input of the user to first object application interface;It rings
The first prompt information should be exported, first prompt information is for prompting user corresponding in first input in first input
Encryption information draws area and inputs information;It obtains user and draws the first information that inputs in area in encryption information, first believed by this
Breath, encrypts target object, the target object includes: first object application interface or the first object application interface
Corresponding application program so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate, improve the peace of operation
Quan Xing.
Detailed description of the invention
Fig. 1 is the flow diagram provided in an embodiment of the present invention using encryption method;
Fig. 2 is one of the specific implementation process schematic of application control method in one example of the embodiment of the present invention;
Fig. 3 is two of the specific implementation process schematic of application control method in one example of the embodiment of the present invention;
Fig. 4 is the realization process schematic of the step 103 of application control method in the example based on Fig. 3;
Fig. 5 is the specific implementation process signal of application control method after step 104 in one example of the embodiment of the present invention
One of figure;
Fig. 6 is the specific implementation process signal of application control method after step 104 in one example of the embodiment of the present invention
The two of figure;
Fig. 7 is the structural schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 8 is the hardware structural diagram of terminal device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
As shown in Figure 1, being the flow diagram of application control method provided in an embodiment of the present invention.It should scheme below specific
Illustrate the implementation process of this method.
Step 101, first input of the user to first object application interface is received.
In this step, first input be pre-set input, this first input can include but is not limited to click input,
Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words,
First input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated
Enter.
Step 102, in response to first input, the first prompt information is exported, first prompt information is for prompting
User draws area in the corresponding encryption information of first input and inputs information.
This step, the first input that terminal device is received in response to above-mentioned steps 101, exports the first prompt information.
It should be noted that the first prompt information includes: text prompt, auditory tone cues, optical flare prompt etc..Here,
One prompt information is used to help user and quickly identifies that encryption information draws area, in order to go on smoothly subsequent password setting.
Step 103, it obtains the user and draws the first information inputted in area in the encryption information.
In this step, the first information is encrypted message.Here, which is user in encryption information drafting area
It is arranged, it may include: the mixed cipher of any combination between numerical ciphers, letter code, graphical passwords or three.
It should be noted that graphical passwords can be the graphical passwords that password setting is carried out according to default input template,
It can be customized graphical passwords, such as gesture path etc..
Step 104, by the first information, target object is encrypted, the target object includes: described first
Target application interface or the corresponding application program of the first object application interface.
Here, can be before terminal device be encrypted, through the selection operation of user, determination is to first object
Application interface is encrypted, or is encrypted to the corresponding application program of first object application interface.Specifically, bullet can be passed through
Out include encryption first object application interface and the corresponding application program of first object application interface selection dialog box, for
Family selection, later, terminal device determines final encrypted object by the selection operation of user.
It is, of course, also possible to be arranged according to system default, determination is encrypted to first object application interface, or to
The corresponding application program in one target application interface is encrypted.
In addition, can also be according to the interface type of first object application interface, determination to first object application interface into
Row encryption, or the corresponding application program of first object application interface is encrypted.For example, if first object application interface is
Chat interface then encrypts the first object application interface;If first object application interface is that first object application interface is corresponding
The main interface of application program then encrypts the corresponding application program of first object application interface, i.e., carries out to entire application program
Encryption.Here, determine that final encrypted object is not limited only to aforesaid way, other modes can also, be not specifically limited here.
In the embodiment of the present invention, by receiving first input of the user to first object application interface;In response to this first
Input exports the first prompt information, and first prompt information is for prompting user to draw in the corresponding encryption information of the first input
Area processed inputs information;It obtains user and draws the first information inputted in area in encryption information, by the first information, to target pair
As being encrypted, the target object includes: first object application interface or the corresponding application of first object application interface
Program so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate, improve the safety of operation.
Based on embodiment shown in FIG. 1, as an optional implementation, step 102 can with specifically includes the following steps:
Obtain the input trajectory of first input;
In this step, the input trajectory of the first input can be obtained by track identification.
It is preferred here that first input is to slidably input;Wherein, the starting point of the sliding trace slidably inputed
Position is any position on the first side of screen, and the final position of the sliding trace slidably inputed is the second of the screen
Any position on side, described first is the different sides of the screen while from described second;
Alternatively, the start position of the sliding trace slidably inputed and final position are respectively same one side of the screen
Different location;
Alternatively, the sliding trace slidably inputed forms closed curve.
Based on the input trajectory, determine that encryption information draws area;
In this step, it is based on input trajectory, determines that encryption information draws area, method of determination is simply easy to handle, encryption letter
The determination that breath draws area is high-efficient.
Here, it is preferred that, the first object application interface is divided into two regions by the input trajectory.
In other words, the screen that the input trajectory will be displayed with first object application interface is divided into two regions, wherein
Area is drawn as encryption information in one region, another region can be used as application interface display area.
Here, before application interface display area can show the first input of reception, first object application interface is shown interior
Hold.
In this step, following two implementation specifically can include but is not limited to.
First side region of the input trajectory is determined as encryption information and draws area by mode one.
Since first object application interface is divided into two regions by the input trajectory, the input trajectory two sides are right respectively
Answer a region.
Here, the pre-set region of user can be used in the first side region of the input trajectory, can also be used and is
System default zone.
Mode two determines one of region in described two regions for encryption according to the area in described two regions
Information draws area.
Specifically, if the first object application interface is divided into area not two equal regions by the input trajectory,
The ratio that on-screen display (osd) area area is then accounted for according to region area, determine region area account for on-screen display (osd) area ratio it is lesser
Region is that encryption information draws area;Or the region for determining that region area accounts for the large percentage of on-screen display (osd) area is encryption information
Draw area.
Or if the first object application interface is divided into area not two equal regions by the input trajectory,
The lesser region of area in the two or the biggish region of area are then determined as encryption information and draw area.
Two kinds of implementation its treatment processes that above-mentioned determining encryption information draws area are simple and fast, and treatment effeciency is high.
Area is drawn based on the encryption information, exports the first prompt information.
In this step, if the first prompt information is text prompt information, it can be drawn in area in encryption information and show this article
Word prompt information.
If the first prompt information is auditory tone cues information, the institute that area can be drawn by auditory tone cues encryption information is in place
It sets.
If the first prompt information is optical flare prompt, encryption information can be controlled by terminal device and drawn corresponding to area
Screen area carries out optical flare with default flicker frequency.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 102, before step 103,
The method can also include:
Show that encryption information draws the region contour line in area.
Here, it draws area in encryption information in user and carries out password setting input, that is, it is especially logical when inputting the first information
When crossing the customized graphical passwords of gesture input, the region contour line that encryption information draws area can constrain the input operation width of user
Degree, to prevent cross region contour line except encryption information draw area in addition to other regions on input invalid input the case where hair
It is raw.
Certainly, input operation when password setting is carried out in order to facilitate user, meets user demand, region contour line can lead to
It crosses user and inputs to operate the size for being adjusted, and then adjusting encryption information drafting area.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 104, the method may be used also
To include:
The second target application is shown in region of the first object application interface in addition to the encryption information draws area
The desktop of interface or the terminal device.
It should be noted that using encrypted application interface or application program and being protected at any time for the ease of user
The individual privacy of user can be Fuzzy Processing or by way of covering other images specifically when carrying out using encryption
Area is drawn to encryption information to lock, and on this basis, other interfaces or application are made in order to not influence user
With, encryption complete after, first object application interface except encryption information draw area in addition to region can show the second target
The desktop of application interface or terminal device, with user-friendly.It is to be understood that being the area split screen display available screen Shang Liangge
The content in domain.
Here, generally, the second target application interface is into the first object before the first object application interface
The upper level interface of application interface.
Certainly, after step 104, other optional implementations can also be used.For example, if user is in encryption information
The password for drawing area's setting is that graphical passwords by Fuzzy Processing or can cover other then when carrying out using encryption
The mode of image locks first object application interface or the corresponding application program of first object application interface, later,
In order to reinforce memory of the user to graphical passwords, in the form of the animation that the figure that entire screen can be drawn by user gradually amplifies most
It is back to the desktop of terminal device afterwards.
Based on embodiment shown in FIG. 1, as another optional implementation, after step 104, the method may be used also
To include:
It hides the encryption information and draws area.
Here, the size that encryption information draws area can be adjusted by user's operation, realizes and the hidden of area is drawn to encryption information
Hiding.
Specifically, turning encryption information down by user's operation draws area, area is drawn in the screen of terminal device in encryption information
When accounting on curtain is decreased to zero, encryption information is drawn area and is hidden.
It should be noted that encryption information drafting area is hidden, its purpose is to facilitate user to except first answers
With except interface other application interface or application program operate with.
Below with regard to an example, the realization process of the method for the present invention is illustrated.
It is slidably inputed firstly, terminal device receives user to the first of application interface A, as shown in the arrow of Fig. 2 left hand view
Or shown in the arrow of Fig. 3 left hand view.
It should be noted that being provided with entering using encryption information drawing mode on the default side of the screen of terminal device
Mouthful.After recalling the entrance by user's operation, input valid input of the above-mentioned user to application interface A.
Later, it first is slidably inputed in response to this, display encrypted message draws area 1 and application interface viewing area 2, such as Fig. 2
Shown in right part of flg or shown in Fig. 3 right part of flg.
Here, as shown in Fig. 2 right part of flg or shown in Fig. 3 right part of flg, different shape is separated by slidably inputing for user
Two regions, one for encrypted message draw area, another be application interface viewing area.
It should be noted that the application interface viewing area 2 shows the information content of application interface A.
Then, it obtains user and draws the first information inputted in area in encryption information;
In other words, user is received to slidably input to encrypted message draws area 1 second;As shown in figure 4, the second sliding is defeated
Entering the sliding trace to be formed is a triangle, that is to say, that this time password is set as graphical passwords, which is the first letter
Breath.
Finally, by the first information, that is, second slidably input in response to this, encrypts application interface A or add
The application program of close correspondence application interface A.
Application control method provided in an embodiment of the present invention, it is defeated to the first of first object application interface by receiving user
Enter;In response to first input, the first prompt information is exported, first prompt information is for prompting user in first input pair
The encryption information answered draws area's input information;Obtain user and draw the first information that inputs in area in encryption information, by this
One information, encrypts target object, and the target object includes: first object application interface or the first object application
The corresponding application program in interface so, it is possible to realize real-time encrypted setting, high-efficient and simple to operate.
Based on embodiment shown in FIG. 1, as an optional implementation, after step 104, the method is also wrapped
It includes:
Receive second input of the user to the first interface where the encrypted target object;
In this step, second input be pre-set input, this second input can include but is not limited to click input,
Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words,
Second input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated
Enter.
In response to second input, the second prompt information is exported, second prompt information is for prompting user in institute
It states the corresponding solution confidential information of the second input and draws area's input information;
It should be noted that the second prompt information includes: text prompt, auditory tone cues, optical flare prompt etc..Here,
Two prompt informations are used to help user and quickly identify that solution confidential information draws area, in order to go on smoothly the defeated of subsequent solution confidential information
Enter.
It obtains the user and draws the second information inputted in area in the solution confidential information;
In this step, the second information is the information for decrypting encrypted target object.
Using second information, the encrypted target object is decrypted.
In this step, specifically, drawing the first of area's input in encryption information when password is arranged before the second information is
It, can the encrypted target object of successful decryption when information.
The second input in this implementation, by user to the first interface where encrypted target object;In response to
Second input exports the second prompt information, and second prompt information is for prompting user in the corresponding decryption of the second input
Information draws area and inputs information;It obtains user and draws the second information inputted in area in solution confidential information;It is right using second information
Encrypted target object is decrypted, in this way, its decryption oprerations is simple and convenient, it is high-efficient.
It should also be noted that, using second information, after the encrypted target object is decrypted,
The method, which may also include that, is displayed in full screen target object after decrypted on the screen of terminal device.
Specifically, if target object after decrypted is first object application interface, by the first object application interface
It is displayed in full screen on the screen of terminal device.
If target object after decrypted is the corresponding application program of first object application interface, by the application program
Application interface is displayed in full screen on the screen of terminal device.
Here, by after decrypted target object full screen display on the screen of terminal device, show terminal device enter
Normal operation interface facilitates the subsequent operation of user.
Furthermore after this step, the method may also include that
Area is drawn in solution confidential information and shows target object after decrypted, and at the first interface in addition to solution confidential information draws area
Region show the desktop of third target application interface or terminal device.
Here, in this step, user is not being influenced to the target object after decryption while operating with, moreover it is possible to convenient
User operates with other interfaces or application, it is to be understood that for the content in two regions on split screen display available screen.
Generally, third target application interface is the upper level interface into first interface before first interface.
Optionally, as another optional implementation, in response to second input, the second prompt information of output it
Afterwards, the user is being obtained before the solution confidential information draws the second information inputted in area, the method may also include that
Display solution confidential information draws the region contour line in area.
Here, area is drawn in solution confidential information in user and input is decrypted, that is, when inputting the second information, especially by hand
Before gesture input when the customized graphical passwords of user, the region contour line that solution confidential information draws area can constrain the input of user
Operation amplitude inputs in vain to prevent cross that region contour line inputs on other regions in addition to solution confidential information draws area
It happens.
Certainly, input operation when being decrypted in order to facilitate user, meets user demand, region contour line can pass through use
Family input operation is adjusted, and then adjusts the size that solution confidential information draws area.
Based on embodiment shown in FIG. 1, as an optional implementation, after step 104, the method be can wrap
It includes:
User is received to input the third at the first interface where the encrypted target object;
In this step, third input be pre-set input, the third input can include but is not limited to click input,
Pressing input, long-pressing input, mediate input, pull input, slidably input with stroke input at least one of, in other words,
Third input can be the one of which in above-mentioned input, or may be two of them or more than the combination that inputs it is defeated
Enter.
It is inputted in response to the third, shows that the third inputs corresponding solution confidential information and draws area;
In this step, solution confidential information draw area and encryption information draw area it is corresponding, in particular to, solution confidential information drafting area and
Position where encryption information when password is arranged draws area on the screen of terminal device is identical, and shape is identical and equal in magnitude,
The memory of password when its purpose is to help user quickly to remember to the setting of target object password, improves decryption efficiency.
It obtains the user and draws the third information inputted in area in the solution confidential information;
Using the third information, the encrypted target object is decrypted.
Below with two examples, the realization process of the method for the present invention after step 104 is illustrated.
Example one
The click of the application icon of the application program B encrypted on the desktop of terminal device is inputted firstly, receiving user,
As shown in left hand view in Fig. 5.
Later, terminal device is inputted in response to the click, and display solution confidential information draws area 3 and application interface viewing area 4, such as
In Fig. 5 shown in right part of flg.Here, specifically, application interface viewing area 4 shows the application drawing of the application program B encrypted
Target desktop.
Then, it obtains user and draws the second information inputted in area in solution confidential information;
In other words, user is received to slidably input in the third that solution confidential information draws area 3, as shown in right part of flg in Fig. 5, the
Three slidably input in the example of corresponding above-mentioned application control method second slidably input, correspond to shown in Fig. 4, third sliding
The sliding trace that input is formed is a triangle, that is to say, that the password for decryption is graphical passwords.
Finally, by the first information, that is, slidably inputed in response to the third, decrypt the application program encrypted
B。
Example two
The application interface C the 4th of terminal device encrypted is slidably inputed firstly, receiving user, the 4th slidably inputs
Glide direction as indicated by the arrows in fig. 6.
Later, terminal device is slidably inputed in response to the 4th, and display solution confidential information draws area 3 and application interface viewing area
4, as shown in Figure 6.Here, specifically, application interface viewing area 4 shows the application interface C encrypted.Here, the 4th is sliding
Dynamic input is resurrected for that will solve confidential information drafting area.
In addition, may also display solution confidential information after display solution confidential information draws area 3 and application interface viewing area 4 and draw
The region contour line 5 in area 3.
Then, it obtains user and draws the third information inputted in area in solution confidential information;
In other words, it receives user to slidably input in solve confidential information drafting area 3 the 5th, as shown in fig. 6, the 5th sliding is defeated
Second entered in the example of corresponding above-mentioned application control method slidably inputs, and corresponds to shown in Fig. 4, the 5th slidably inputs to be formed
Sliding trace be a triangle, that is to say, that for decryption password be graphical passwords.
Finally, by the first information, that is, slidably inputed in response to the 5th, decrypt the application interface encrypted
C。
Application control method provided in an embodiment of the present invention carries out target object to encrypt it by the first information
Afterwards, second input of the user to the first interface where encrypted target object;In response to second input, the second prompt of output
Information, second prompt information is for prompting user to draw area's input information in the corresponding solution confidential information of the second input;It obtains
User draws the second information inputted in area in solution confidential information;Using second information, encrypted target object is solved
It is close, in this way, its decryption oprerations is simple and convenient, it is high-efficient.
Based on the above method, the embodiment of the present invention provides a kind of terminal device to realize the above method.
As shown in fig. 7, being the structural schematic diagram of terminal device provided in an embodiment of the present invention.The embodiment of the present invention provides one
Kind terminal device 700, the terminal device 700 may include: the first receiving module 701, the first output module 702, obtain module
703 and encrypting module 704.
First receiving module 701, for receiving first input of the user to first object application interface;
First output module 702, for exporting the first prompt information, first prompt in response to first input
Information is for prompting user to draw area's input information in the corresponding encryption information of first input;
First obtains module 703, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module 704, for being encrypted to target object, the target object includes: by the first information
The first object application interface or the corresponding application program of the first object application interface.
Optionally, the first output module 702 can specifically include:
First acquisition submodule, for obtaining the input trajectory of first input;
Submodule is handled, for being based on the input trajectory, determines that encryption information draws area;
Output sub-module exports the first prompt information for drawing area based on the encryption information.
Preferably, first input is to slidably input;Wherein, the start position of the sliding trace slidably inputed is
Any position on the first side of the screen, the final position of the sliding trace slidably inputed are the second side of the screen
Any position, described first is the different sides of the screen while from described second;Alternatively, the sliding rail slidably inputed
The start position of mark and final position are respectively the different location on same one side of the screen;Alternatively, the cunning slidably inputed
Dynamic rail mark forms closed curve.
Optionally, the first object application interface is divided into two regions by the input trajectory;
Correspondingly, the processing submodule, comprising:
First processing units draw area for the first side region of the input trajectory to be determined as encryption information;
Alternatively, the second processing unit determines in described two regions wherein for the area according to described two regions
One region is that encryption information draws area.
Optionally, the terminal device 700 may also include that
First display module, for the region in the first object application interface in addition to the encryption information draws area
Show the desktop of the second target application interface or the terminal device.
Optionally, the terminal device 700 can also include:
Hidden module, for after encrypting to target object, hiding the encryption letter by the first information
Breath draws area.
Optionally, the terminal device 700 may also include that
Second receiving module, it is defeated to second of the first interface where the encrypted target object for receiving user
Enter;
Second output module, for exporting the second prompt information, second prompt information in response to second input
For prompting user to draw area's input information in the corresponding solution confidential information of second input;
Second obtains module, draws the second information inputted in area in the solution confidential information for obtaining the user;
First deciphering module is decrypted the encrypted target object for using second information.
Optionally, the terminal device 700 may also include that
Third receiving module, it is defeated to the third at the first interface where the encrypted target object for receiving user
Enter;
Second display module shows that the third inputs corresponding solution confidential information and draws for inputting in response to the third
Area processed;
Third obtains module, draws the third information inputted in area in the solution confidential information for obtaining the user;
Third deciphering module is decrypted the encrypted target object for using the third information.
Terminal device provided in an embodiment of the present invention can be realized mobile terminal in the embodiment of the method for Fig. 1 to Fig. 6 and realize
Each process, to avoid repeating, which is not described herein again.
Terminal device provided in an embodiment of the present invention receives user to first object application interface by the first receiving module
First input;First output module exports the first prompt information, first prompt information is for prompting in response to first input
User draws area in the corresponding encryption information of the first input and inputs information;Later, user is obtained by the first acquisition module to exist
Encryption information draws the first information inputted in area;Encrypting module encrypts target object by the first information, described
Target object includes: first object application interface or the corresponding application program of first object application interface, so, it is possible reality
Existing real-time encrypted setting, it is high-efficient and simple to operate.
A kind of hardware structural diagram of Fig. 8 terminal device of each embodiment to realize the present invention.
The terminal device 800 includes but is not limited to: radio frequency unit 801, network module 802, audio output unit 803, defeated
Enter unit 804, sensor 805, display unit 806, user input unit 807, interface unit 808, memory 809, processor
The components such as 810 and power supply 811.It will be understood by those skilled in the art that terminal device structure shown in Fig. 8 is not constituted
Restriction to terminal device, terminal device may include than illustrating more or fewer components, perhaps combine certain components or
Different component layouts.In embodiments of the present invention, terminal device include but is not limited to mobile phone, tablet computer, laptop,
Palm PC, vehicle-mounted terminal equipment, wearable device and pedometer etc..
Wherein, user input unit 807 is used to receive first input of the user to first object application interface;Processor
810 for exporting the first prompt information, first prompt information is for prompting user described in response to first input
The corresponding encryption information of first input draws area and inputs information;Obtain what the user inputted in encryption information drafting area
The first information;By the first information, target object is encrypted, the target object includes: that the first object is answered
With interface or the corresponding application program of the first object application interface.
In the embodiment of the present invention, real-time encrypted setting can be realized, it is high-efficient and simple to operate.
It should be understood that the embodiment of the present invention in, radio frequency unit 801 can be used for receiving and sending messages or communication process in, signal
Send and receive, specifically, by from base station downlink data receive after, to processor 810 handle;In addition, by uplink
Data are sent to base station.In general, radio frequency unit 801 includes but is not limited to antenna, at least one amplifier, transceiver, coupling
Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 801 can also by wireless communication system and network and other set
Standby communication.
Terminal device provides wireless broadband internet by network module 802 for user and accesses, and such as user is helped to receive
It sends e-mails, browse webpage and access streaming video etc..
Audio output unit 803 can be received by radio frequency unit 801 or network module 802 or in memory 809
The audio data of storage is converted into audio signal and exports to be sound.Moreover, audio output unit 803 can also provide and end
The relevant audio output of specific function that end equipment 800 executes is (for example, call signal receives sound, message sink sound etc.
Deng).Audio output unit 803 includes loudspeaker, buzzer and receiver etc..
Input unit 804 is for receiving audio or video signal.Input unit 804 may include graphics processor
(Graphics Processing Unit, GPU) 8041 and microphone 8042, graphics processor 8041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 1006.It can be with through treated the picture frame of graphics processor 8041
It is stored in memory 809 (or other storage mediums) or is sent via radio frequency unit 801 or network module 802.Wheat
Gram wind 8042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be with
The format output that mobile communication base station can be sent to via radio frequency unit 801 is converted in the case where telephone calling model.
Terminal device 800 further includes at least one sensor 805, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 8061, and proximity sensor can close when terminal device 800 is moved in one's ear
Display panel 8061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify mobile terminal device posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
Sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
Hygrometer, thermometer, infrared sensor etc., details are not described herein.
Display unit 806 is for showing information input by user or being supplied to the information of user.Display unit 806 can wrap
Display panel 8061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 8061.
User input unit 807 can be used for receiving the number or character information of input, and generation and mobile terminal device
User setting and function control related key signals input.Specifically, user input unit 807 includes touch panel 8071
And other input equipments 8072.Touch panel 8071, also referred to as touch screen collect the touch behaviour of user on it or nearby
Make (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 8071 or in touch panel
Operation near 8071).Touch panel 8071 may include both touch detecting apparatus and touch controller.Wherein, it touches
Detection device detects the touch orientation of user, and detects touch operation bring signal, transmits a signal to touch controller;Touching
It touches controller and receives touch information from touch detecting apparatus, and be converted into contact coordinate, then give processor 810, connect
It receives the order that processor 810 is sent and is executed.Furthermore, it is possible to using resistance-type, condenser type, infrared ray and surface acoustic wave
Equal multiple types realize touch panel 8071.In addition to touch panel 8071, user input unit 807 can also include other inputs
Equipment 8072.Specifically, other input equipments 8072 can include but is not limited to physical keyboard, function key (such as volume control
Key, switch key etc.), trace ball, mouse, operating stick, details are not described herein.
Further, touch panel 8071 can be covered on display panel 8061, when touch panel 8071 is detected at it
On or near touch operation after, send processor 810 to determine the type of touch event, be followed by subsequent processing device 810 according to touching
The type for touching event provides corresponding visual output on display panel 8061.Although in fig. 8, touch panel 8071 and display
Panel 8061 is the function that outputs and inputs of realizing mobile terminal device as two independent components, but in certain implementations
In example, touch panel 8071 and display panel 8061 can be integrated and be realized the function that outputs and inputs of mobile terminal device,
Specifically herein without limitation.
Interface unit 808 is the interface that external device (ED) is connect with terminal device 800.For example, external device (ED) may include having
Line or wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, storage card end
Mouth, port, the port audio input/output (I/O), video i/o port, earphone end for connecting the device with identification module
Mouthful etc..Interface unit 808 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and
By one or more elements that the input received is transferred in terminal device 800 or can be used in 800 He of terminal device
Data are transmitted between external device (ED).
Memory 809 can be used for storing software program and various data.Memory 809 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 809 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 810 is the control centre of mobile terminal device, utilizes various interfaces and the entire mobile terminal of connection
The various pieces of equipment by running or execute the software program and/or module that are stored in memory 809, and are called and are deposited
The data in memory 809 are stored up, the various functions and processing data of mobile terminal device are executed, thus to mobile terminal device
Carry out integral monitoring.Processor 810 may include one or more processing units;Preferably, processor 810 can be integrated using processing
Device and modem processor, wherein the main processing operation system of application processor, user interface and application program etc., modulation
Demodulation processor mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processing
In device 810.
Terminal device 800 can also include the power supply 811 (such as battery) powered to all parts, it is preferred that power supply 811
Can be logically contiguous by power-supply management system and processor 810, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
In addition, terminal device 800 includes some unshowned functional modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal device, including processor 810, and memory 809 is stored in
It is real when which is executed by processor 810 on memory 809 and the computer program that can be run on processor 810
Each process of existing above-mentioned application control embodiment of the method, and identical technical effect can be reached, to avoid repeating, here no longer
It repeats.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium
Calculation machine program, the computer program realize each process of above-mentioned application control embodiment of the method, and energy when being executed by processor
Reach identical technical effect, to avoid repeating, which is not described herein again.Wherein, the computer readable storage medium, such as only
Read memory (Read-Only Memory, abbreviation ROM), random access memory (Random Access Memory, abbreviation
RAM), magnetic or disk etc..
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes
Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form belongs within protection of the invention.
Claims (11)
1. a kind of application control method is applied to terminal device characterized by comprising
Receive first input of the user to first object application interface;
In response to first input, the first prompt information is exported, first prompt information is for prompting user described the
The corresponding encryption information of one input draws area and inputs information;
It obtains the user and draws the first information inputted in area in the encryption information;
By the first information, target object is encrypted, the target object includes: the first object application interface
Or the corresponding application program of the first object application interface.
2. application control method according to claim 1, which is characterized in that described in response to first input, output
First prompt information, comprising:
Obtain the input trajectory of first input;
Based on the input trajectory, determine that encryption information draws area;
Area is drawn based on the encryption information, exports the first prompt information.
3. application control method according to claim 2, which is characterized in that first input is to slidably input;
Wherein, the start position of the sliding trace slidably inputed is any position on the first side of screen, and the sliding is defeated
The final position of the sliding trace entered is any position on the second side of the screen, and described first is institute while with described second
State the different sides of screen;
Alternatively, the start position of the sliding trace slidably inputed and final position be respectively same one side of the screen not
Same position;
Alternatively, the sliding trace slidably inputed forms closed curve.
4. application control method according to claim 2, which is characterized in that the first object application interface is by described defeated
Enter track and is divided into two regions;
It is described to be based on the input trajectory, determine that encryption information draws area, comprising:
First side region of the input trajectory is determined as encryption information and draws area;
Alternatively, determining that one of region in described two regions is drawn for encryption information according to the area in described two regions
Area processed.
5. application control method according to claim 1, which is characterized in that it is described by the first information, to target
After object is encrypted, the method also includes:
The second target application interface is shown in region of the first object application interface in addition to the encryption information draws area
Or the desktop of the terminal device.
6. application control method according to claim 1, which is characterized in that it is described by the first information, to target
After object is encrypted, the method also includes:
It hides the encryption information and draws area.
7. application control method according to claim 1, which is characterized in that it is described by the first information, to target
After object is encrypted, which comprises
Receive second input of the user to the first interface where the encrypted target object;
In response to second input, the second prompt information is exported, second prompt information is for prompting user described the
The corresponding solution confidential information of two inputs draws area and inputs information;
It obtains the user and draws the second information inputted in area in the solution confidential information;
Using second information, the encrypted target object is decrypted.
8. application control method according to claim 1, which is characterized in that it is described by the first information, to target
After object is encrypted, which comprises
User is received to input the third at the first interface where the encrypted target object;
It is inputted in response to the third, shows that the third inputs corresponding solution confidential information and draws area;
It obtains the user and draws the third information inputted in area in the solution confidential information;
Using the third information, the encrypted target object is decrypted.
9. a kind of terminal device characterized by comprising
First receiving module, for receiving first input of the user to first object application interface;
First output module, for exporting the first prompt information, first prompt information is used in response to first input
It prompts user to draw area in the corresponding encryption information of first input and inputs information;
First obtains module, draws the first information inputted in area in the encryption information for obtaining the user;
Encrypting module, for being encrypted to target object by the first information, the target object includes: described the
One target application interface or the corresponding application program of the first object application interface.
10. a kind of terminal device, which is characterized in that including processor, memory and be stored on the memory and can be in institute
The computer program run on processor is stated, such as claim 1 to 8 is realized when the computer program is executed by the processor
Any one of described in application control method the step of.
11. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes such as application control method described in any item of the claim 1 to 8 when the computer program is executed by processor
The step of.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910079830.0A CN109740312B (en) | 2019-01-28 | 2019-01-28 | Application control method and terminal equipment |
PCT/CN2020/073805 WO2020156440A1 (en) | 2019-01-28 | 2020-01-22 | Application control method and terminal device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910079830.0A CN109740312B (en) | 2019-01-28 | 2019-01-28 | Application control method and terminal equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109740312A true CN109740312A (en) | 2019-05-10 |
CN109740312B CN109740312B (en) | 2021-04-06 |
Family
ID=66366310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910079830.0A Active CN109740312B (en) | 2019-01-28 | 2019-01-28 | Application control method and terminal equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109740312B (en) |
WO (1) | WO2020156440A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020156440A1 (en) * | 2019-01-28 | 2020-08-06 | 维沃移动通信有限公司 | Application control method and terminal device |
CN111818466A (en) * | 2020-05-29 | 2020-10-23 | 维沃移动通信有限公司 | Information sending and receiving method and device, electronic equipment and readable storage medium |
CN112261216A (en) * | 2020-10-20 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2650808A1 (en) * | 2010-12-06 | 2013-10-16 | Intsig Information Co., Ltd. | Method for integrating account management function in input method software |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN106919306A (en) * | 2017-03-08 | 2017-07-04 | 珠海市魅族科技有限公司 | Method into application interface and the system into application interface |
CN107357511A (en) * | 2017-06-05 | 2017-11-17 | 深圳天珑无线科技有限公司 | Password Input Area generation method, electric terminal and computer-readable recording medium |
CN108681664A (en) * | 2018-05-28 | 2018-10-19 | 维沃移动通信有限公司 | A kind of encryption method and device |
CN108985084A (en) * | 2018-07-13 | 2018-12-11 | 维沃移动通信有限公司 | A kind of Object Encryption Process and terminal device |
CN109002340A (en) * | 2018-07-12 | 2018-12-14 | 维沃移动通信有限公司 | A kind of screen locking method and electronic equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018132844A1 (en) * | 2017-01-13 | 2018-07-19 | Payeazy, Inc. | Authentication systems and methods for online services |
CN109740312B (en) * | 2019-01-28 | 2021-04-06 | 维沃移动通信有限公司 | Application control method and terminal equipment |
-
2019
- 2019-01-28 CN CN201910079830.0A patent/CN109740312B/en active Active
-
2020
- 2020-01-22 WO PCT/CN2020/073805 patent/WO2020156440A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2650808A1 (en) * | 2010-12-06 | 2013-10-16 | Intsig Information Co., Ltd. | Method for integrating account management function in input method software |
CN106384060A (en) * | 2016-09-23 | 2017-02-08 | 维沃移动通信有限公司 | Mobile terminal data encryption method and mobile terminal |
CN106919306A (en) * | 2017-03-08 | 2017-07-04 | 珠海市魅族科技有限公司 | Method into application interface and the system into application interface |
CN107357511A (en) * | 2017-06-05 | 2017-11-17 | 深圳天珑无线科技有限公司 | Password Input Area generation method, electric terminal and computer-readable recording medium |
CN108681664A (en) * | 2018-05-28 | 2018-10-19 | 维沃移动通信有限公司 | A kind of encryption method and device |
CN109002340A (en) * | 2018-07-12 | 2018-12-14 | 维沃移动通信有限公司 | A kind of screen locking method and electronic equipment |
CN108985084A (en) * | 2018-07-13 | 2018-12-11 | 维沃移动通信有限公司 | A kind of Object Encryption Process and terminal device |
Non-Patent Citations (1)
Title |
---|
刘志君等: "基于单片机的密码锁设计", 《万方数据库》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020156440A1 (en) * | 2019-01-28 | 2020-08-06 | 维沃移动通信有限公司 | Application control method and terminal device |
CN111818466A (en) * | 2020-05-29 | 2020-10-23 | 维沃移动通信有限公司 | Information sending and receiving method and device, electronic equipment and readable storage medium |
CN112261216A (en) * | 2020-10-20 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
CN112261216B (en) * | 2020-10-20 | 2022-05-03 | 北京字节跳动网络技术有限公司 | Terminal control method and device, terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2020156440A1 (en) | 2020-08-06 |
CN109740312B (en) | 2021-04-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107608514A (en) | Information processing method and mobile terminal | |
CN108629171B (en) | Unread message processing method and terminal | |
CN108491133A (en) | A kind of application control method and terminal | |
CN110188524B (en) | Information encryption method, information decryption method and terminal | |
CN107808084A (en) | A kind of touch operation method and mobile terminal | |
CN110149628B (en) | Information processing method and terminal equipment | |
WO2020199987A1 (en) | Message display method and mobile terminal | |
CN108415641A (en) | A kind of processing method and mobile terminal of icon | |
CN109145552A (en) | Information ciphering method and terminal device | |
CN109032406A (en) | A kind of control method and mobile terminal | |
CN109740312A (en) | A kind of application control method and terminal device | |
CN109981904A (en) | A kind of method for controlling volume and terminal device | |
CN110035183A (en) | Information sharing method and terminal | |
CN109766680A (en) | Authority control method and terminal | |
CN107358083A (en) | A kind of information processing method, terminal and computer-readable recording medium | |
CN110213438A (en) | A kind of processing method and terminal device of application program | |
CN109871176A (en) | A kind of object displaying method and terminal device | |
CN109446794A (en) | A kind of cipher-code input method and its mobile terminal | |
CN109992939B (en) | Login method and terminal equipment | |
CN111310250A (en) | Application sharing method and electronic equipment | |
CN109062492A (en) | A kind of application access method and terminal | |
CN109753776A (en) | A kind of method, apparatus and mobile terminal of information processing | |
CN108494958A (en) | A kind of image processing method and flexible screen terminal | |
CN108959905A (en) | A kind of log-on message reminding method and terminal device | |
CN108763905B (en) | Object processing method and terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |