CN112261216B - Terminal control method and device, terminal and storage medium - Google Patents

Terminal control method and device, terminal and storage medium Download PDF

Info

Publication number
CN112261216B
CN112261216B CN202011126251.6A CN202011126251A CN112261216B CN 112261216 B CN112261216 B CN 112261216B CN 202011126251 A CN202011126251 A CN 202011126251A CN 112261216 B CN112261216 B CN 112261216B
Authority
CN
China
Prior art keywords
application
input information
application interface
cover layer
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011126251.6A
Other languages
Chinese (zh)
Other versions
CN112261216A (en
Inventor
黎旋
莫铭锟
赵雨彤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202011126251.6A priority Critical patent/CN112261216B/en
Publication of CN112261216A publication Critical patent/CN112261216A/en
Application granted granted Critical
Publication of CN112261216B publication Critical patent/CN112261216B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Some embodiments of the present disclosure provide a control method and apparatus for a terminal, and a storage medium. The control method of the terminal comprises the following steps: responding to a first operation on the first object, and judging whether the first object is an encrypted object; if the first object is an encrypted object, starting the first application, and displaying a first cover layer covering the first application interface; in response to receiving the input information, judging whether the input information meets the decryption condition of the first object; if the input information meets the decryption condition of the first object, removing the first cover layer to display the first application interface; wherein the first application is a first object or an application associated with the first object. Some methods of the present disclosure can improve response speed.

Description

Terminal control method and device, terminal and storage medium
Technical Field
The present disclosure relates to the field of intelligent terminal technologies, and in particular, to a terminal control method, an apparatus, a terminal, and a storage medium.
Background
In an intelligent terminal such as a mobile phone and the like, objects such as applications, pictures, notes and the like can be encrypted, when the objects are opened, a password needs to be input, and when the input password is correct, the objects can be opened.
Disclosure of Invention
The disclosure provides a control method and device of a terminal, the terminal and a storage medium.
The present disclosure adopts the following technical solutions.
In some embodiments, the present disclosure provides a control method of a terminal, including:
in response to a first operation on the first object, judging whether the first object is an encrypted object;
if the first object is an encrypted object, starting a first application, and displaying a first cover layer of a covered first application interface, wherein the first application interface is the application interface of the first application;
in response to receiving the input information, judging whether the input information meets the decryption condition of the first object;
if the input information meets the decryption condition of the first object, removing the first cover layer to display the first application interface;
wherein the first application is a first object or an application associated with the first object.
In some embodiments, the present disclosure provides a control apparatus of a terminal, including:
a first judgment unit operable to judge whether or not the first object is an encrypted object in response to a first operation on the first object;
the control unit is used for starting a first application and displaying a first cover layer covering a first application interface if the first object is an encrypted object, wherein the first application interface is the application interface of the first application;
a second judgment unit configured to judge, in response to receiving the input information, whether the input information meets a decryption condition of the first object;
the control unit is also used for removing the first cover layer to display the first application interface if the input information accords with the decryption condition of the first object;
wherein the first application is a first object or an application associated with the first object.
In some embodiments, the present disclosure provides a terminal comprising: at least one memory and at least one processor;
the memory is used for storing program codes, and the processor is used for calling the program codes stored in the memory to execute the method.
In some embodiments, the present disclosure provides a storage medium for storing program code for performing the above-described method.
According to the control method of the terminal, the first application can be started when the encrypted object is opened, so that the first application interface is displayed, the first cover layer covering the first application interface is displayed, the first cover layer is removed when the input information meets the decryption condition of the first object, so that the first application interface is displayed, the response speed can be improved, and the starting process of the first application interface can be dynamically and fuzzily displayed.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
Fig. 1 is a flowchart of a control method of a terminal according to an embodiment of the present disclosure.
Fig. 2 is a positional relationship diagram of a first application interface and a first cover layer according to an embodiment of the disclosure.
Fig. 3 is a schematic diagram of a first application and a second application of an embodiment of the present disclosure.
Fig. 4 is a composition diagram of a control device of a terminal of an embodiment of the present disclosure.
Fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that various steps recited in method embodiments of the present disclosure may be performed in parallel and/or in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that reference to "one or more" unless the context clearly dictates otherwise.
The names of messages or input information exchanged between a plurality of devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or input information.
The embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Taking a terminal as a mobile phone as an example, an application on the mobile phone can be set with password encryption, in the related art, when the encrypted application is to be opened, a decryption program is started first, the password is required to be input, if the input password is correct, the decryption program calls the encrypted application and opens, and in the related art, the decryption program and the encryption program are two independent programs.
Some embodiments of the present disclosure provide a control method of a terminal, and as shown in fig. 1, fig. 1 is a flowchart of the control method of the terminal according to the embodiments of the present disclosure, which includes the following steps S11-S14.
S11: in response to a first operation on a first object, it is determined whether the first object is an encrypted object.
In some embodiments, the first object may be an application, a picture, a document, a tag, or the like, the first operation may be, for example, an opening operation for the first object, the first object is displayed on a display screen of the terminal, and after the first operation is performed on the first object, whether the first object is an encrypted object is determined, and the first object may be directly opened if the first object is not an encrypted object. In some embodiments, the encrypted object means that a certain condition needs to be satisfied when the object is used or opened, for example, the encrypted object may be an encrypted image, and a password needs to be input when the encrypted image is opened.
S12: and if the first object is an encrypted object, starting the first application and displaying a first covering layer covering the first application interface.
In some embodiments, the launching of the first application may be opening a first application that is not opened, or invoking the first application from the background, in some embodiments, the first application interface is an application interface of the first application, the first application may be a first object, that is, the first object is an encrypted first application, the first application may also be an application associated with the first object, for example, when the first object is an image, the first application may be an image viewer, when the first object is a document, the first application may be an application for opening the document, the first overlay is displayed on the first application interface so as to partially or completely hide the first application interface, a positional relationship between the first overlay and the first application interface may refer to fig. 2, a Z-axis value of a screen corresponding to the first overlay is greater than a Z-axis value of the first application interface, the first cover layer is located on the upper layer of the first application interface. In other embodiments, the first application is an application for displaying a first object, and the first object is displayed in the first application interface after the first application is started, for example, the first object may be a picture, and the first application is a picture display application at this time, and the picture is displayed in an application interface of the picture display application.
S13: in response to receiving the input information, it is determined whether the input information conforms to a decryption condition of the first object.
In some embodiments, the decryption condition may be, for example, that the input password is the same as the pre-stored password, or that the received image and the pre-stored image are images of the same person, for example, a face of the user may be collected by face recognition, and whether to decrypt the first object is determined according to the collected face, or that the input fingerprint password conforms to a preset fingerprint password.
S14: and if the input information meets the decryption condition of the first object, removing the first cover layer to display the first application interface.
In some embodiments, the first application may be used after the first cover layer is removed.
In some embodiments of the present disclosure, when the encrypted first object is opened, the first application is started and displays the first application interface covered by the first cover layer, and when the input information meets the decryption condition of the first object, the response speed can be improved because the first application is started in advance. In some embodiments, the process of starting to display the first application interface can be seen through the first cover layer, and dynamic fuzzy display is achieved.
In some embodiments, launching the first application, displaying a first overlay overlaying the first application interface, comprises: and starting a first activity associated with the first application to generate a first cover layer, and starting a second activity of the first application to generate the first application interface. That is, in some embodiments, the first overlay is generated and displayed from a first activity associated with the first application, and the first activity may be initiated before the second activity, thereby ensuring that a blurred image of the launch interface of the first application is visible.
To better explain the method in some embodiments of the present disclosure, the method proposed in some embodiments of the present disclosure is explained by taking the first object as an image application as an example, the image application is displayed on a screen of the terminal, the user clicks the image application to open the image application, triggering judgment when the image application is clicked, determining that the image application is an encryption application, starting the image application at the moment, two activities (activities) are started during the starting of the image application, one Activity is a mask layer, one Activity is an application interface of the image application, the application interface of the image application is displayed and the mask layer is overlaid on the application interface, input information input by a user is then received, and if the input information meets the decryption condition, the application interface of the image application is removed through the covering layer.
In some embodiments of the present disclosure, the first application is in a running state during being covered by the first cover layer. In some embodiments, since the first application is in a running state when being covered by the first cover layer, a function of dynamic fuzzy display can be realized, a fuzzy image of a starting animation of the first application interface can be seen, and since the first application is in the running state, when the input information meets a decryption condition of the first object, the first application interface can be displayed quickly and in response to an operation of the first application interface by a user.
In some embodiments of the present disclosure, the cover layer completely covers the first application interface, and in some embodiments, the first cover layer is correspondingly scaled with the scaling of the first application interface; in some embodiments, the first overlay changes according to a change in a size of the first application interface, and thus there is no concern about exposure of content on the obscured first application interface due to zooming of the first application interface.
In some embodiments of the present disclosure, the first cover layer moves correspondingly with the movement of the first application interface, and therefore, the blocked content is not exposed due to the movement of the first application interface.
In some embodiments of the present disclosure, the first overlay includes an information input interface through which the input information is received. In this embodiment, an input box may be provided on the first cover layer to input the input information, or a detection area may be provided on the first cover layer to detect a motion of a user sliding in the detection area as the input information.
In some embodiments of the disclosure, at least one second application is further displayed on the terminal, and a second cover layer of each second application is respectively covered on each second application interface; in some embodiments, the encryption application refers to an application that needs to satisfy a certain condition when in use, for example, an application that needs to input a password when in use. Referring to fig. 3, fig. 3 schematically shows a case when a second application is provided, in some embodiments, the terminal is in a multi-window display state, and may simultaneously display the first application interface and the second application interface, and the first application interface and the second application interface both have respective corresponding cover layers, so that a plurality of different cover layers may be simultaneously displayed, and the cover layers may not be affected by each other, and the display of the second cover layer may not be affected when the first cover layer is removed, and similarly, the display of the first cover layer may not be affected when the second cover layer is removed. In some embodiments, the number of the second applications may be multiple, each second application corresponds to a respective second cover layer, and the number of the second cover layers is the same as the number of the second applications.
In some embodiments of the present disclosure, the control method of the terminal further includes: judging whether the input information meets the decryption conditions of the second applications; and if the input information accords with the decryption condition of any second application, removing the second cover layer of the second application of which the decryption condition accords with the input information. In some embodiments, when the first application and the second application are simultaneously displayed on the display screen of the terminal, when input information is detected, whether the input information meets the unlocking condition of any second application can be simultaneously judged, and if yes, the second application meeting the unlocking condition is unlocked.
In some embodiments of the present disclosure, the control method of the terminal further includes: judging whether the input information meets the decryption conditions of the second applications; and if the input information meets the decryption condition of any second application, removing the second cover layer of each second application. In this embodiment, the second cover layers of the second applications are removed as long as the input information conforms to the decryption condition of one second application, and the user sometimes sets a plurality of different passwords, but the user easily confuses or forgets the passwords, which results in that decryption cannot be performed.
In order to better explain the method provided in the embodiment of the present disclosure, a specific embodiment is provided below, in which an icon of a first application is displayed on a display screen of a terminal, when the icon of the first application is clicked, the terminal first determines whether the first application is an encrypted application, if the first application is encrypted, two activities are started when the encrypted first application is started, one activity is a first overlay, and the other activity is a first application interface, and the first overlay is overlaid on the first application interface. That is, for the encrypted first application, an additional opportunity is added during the starting, the activity covers the first application interface with a first cover layer, and the first cover layer covers the first application interface and provides an area for inputting the password. If the input password is correct, the first cover layer is removed, the first application interface is seen, and therefore the first application is normally used. In some embodiments, the first application operates normally and is only covered by the first cover layer, and the first cover layer is removed to view the first application interface. The terminal can display a plurality of application interfaces, for example, four encrypted second application interfaces are additionally displayed on the foreground, and a total of five encrypted applications are covered on the application interfaces of the five applications, respectively, namely, one application corresponds to one masking layer.
In the related art, when the encrypted application is decrypted, the application lock needs to be started first, and after the application lock is released, the encrypted application is unlocked by the application lock. The screen can be optionally enlarged and reduced, the first cover layer can be changed along with the screen, the size of the first cover layer is completely matched with that of the first application interface, and the size of the cover layer in the related technology cannot be matched with that of the application. In some embodiments of the present disclosure, a starting animation of the first application interface covered by the first cover layer can be seen, and a fuzzified display is realized.
In some embodiments of the present disclosure, as shown in fig. 4, a control apparatus of a terminal is further provided, including: a first judgment unit 10 configured to judge whether or not the first object is an encrypted object in response to a first operation on the first object;
a control unit 20, configured to start a first application and display a first overlay covering a first application interface if the first object is an encrypted object, where the first application interface is an application interface of the first application;
a second judging unit 30 for judging whether the input information conforms to the decryption condition of the first object in response to receiving the input information;
the control unit 20 is further configured to remove the first cover layer to display the first application interface if the input information meets the decryption condition of the first object;
the first application is a first object, or an application associated with the first object of the first application, and optionally, the first object is displayed in the first application interface after the first application is started.
For the embodiments of the apparatus, since they correspond substantially to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described apparatus embodiments are merely illustrative, wherein the modules described as separate modules may or may not be separate. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The method and apparatus of the present disclosure have been described above based on the embodiments and application examples. In addition, the present disclosure also provides a terminal and a storage medium, which are described below.
Referring now to fig. 5, a schematic diagram of an electronic device (e.g., a terminal device or server) 800 suitable for use in implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a fixed terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in the drawings is only an example and should not bring any limitation to the functions and use range of the embodiments of the present disclosure.
The electronic device 800 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 801 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage means 808 into a Random Access Memory (RAM) 803. In the RAM803, various programs and data necessary for the operation of the electronic apparatus 800 are also stored. The processing apparatus 801, the ROM 802, and the RAM803 are connected to each other by a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
Generally, the following devices may be connected to the I/O interface 805: input devices 806 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 807 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage 808 including, for example, magnetic tape, hard disk, etc.; and a communication device 809. The communication means 809 may allow the electronic device 800 to communicate wirelessly or by wire with other devices to exchange data. While the figure illustrates an electronic device 800 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication means 809, or installed from the storage means 808, or installed from the ROM 802. The computer program, when executed by the processing apparatus 801, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to perform the methods of the present disclosure as described above.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, including:
responding to a first operation on the first object, and judging whether the first object is an encrypted object;
if the first object is an encrypted object, starting a first application, and displaying a first cover layer covering a first application interface, wherein the first application interface is the application interface of the first application;
in response to receiving the input information, judging whether the input information meets the decryption condition of the first object;
if the input information meets the decryption condition of the first object, removing the first cover layer to display the first application interface;
wherein the first application is a first object or an application associated with the first object.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, which starts a first application and displays a first cover layer covering a first application interface, including:
a first activity associated with the first application is launched to generate a first overlay, and a second activity of the first application is launched to generate a first application interface.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, in which the cover layer completely covers the first application interface.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, the first cover layer including an information input interface through which the input information is received.
According to one or more embodiments of the present disclosure, a control method of a terminal is provided, where at least one second application is further displayed on the terminal, and each second application interface is covered with a second cover layer of each second application;
the second application is an encryption application, and the second application interface is an application interface of the second application.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, further including:
judging whether the input information meets the decryption conditions of the second applications;
and if the input information accords with the decryption condition of any second application, removing the second cover layer of the second application of which the decryption condition accords with the input information.
According to one or more embodiments of the present disclosure, there is provided a control method of a terminal, further including:
judging whether the input information meets the decryption conditions of the second applications or not;
and if the input information meets the decryption condition of any second application, removing the second cover layer of each second application.
According to one or more embodiments of the present disclosure, there is provided a control apparatus of a terminal, including:
a first judgment unit operable to judge whether or not the first object is an encrypted object in response to a first operation on the first object;
the control unit is used for starting a first application and displaying a first cover layer covering a first application interface if the first object is an encrypted object, wherein the first application interface is the application interface of the first application;
a second judgment unit configured to judge, in response to receiving the input information, whether the input information meets a decryption condition of the first object;
the control unit is also used for removing the first cover layer to display the first application interface if the input information accords with the decryption condition of the first object;
wherein the first application is a first object or an application associated with the first object.
According to one or more embodiments of the present disclosure, there is provided a terminal including: at least one memory and at least one processor;
wherein the at least one memory is adapted to store program code and the at least one processor is adapted to invoke the program code stored in the at least one memory to perform the method of any of the above.
According to one or more embodiments of the present disclosure, there is provided a storage medium for storing program code for performing the above-described method.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (9)

1. A control method of a terminal, comprising:
responding to a first operation on a first object, and judging whether the first object is an encrypted object;
if the first object is an encrypted object, starting a first application, and displaying a first cover layer covering a first application interface, wherein the first application interface is the application interface of the first application; wherein, start first application, show the first covering layer that covers first application interface, include: the method comprises the steps of firstly starting a first activity associated with a first application to generate a first cover layer, and then starting a second activity of the first application to generate a first application interface, so that the starting process of the first application interface can be dynamically and fuzzily displayed;
in response to receiving input information, judging whether the input information meets the decryption condition of the first object;
if the input information meets the decryption condition of the first object, removing the first cover layer to display the first application interface;
wherein the first application is the first object or an application associated with the first object.
2. The method of claim 1,
the cover layer completely covers the first application interface.
3. The method of claim 1,
the first overlay includes an information input interface through which the input information is received.
4. The method according to any one of claims 1 to 3,
the terminal is also provided with at least one second application, and each second application interface is respectively covered with a second cover layer of each second application;
the second application is an encryption application, and the second application interface is an application interface of the second application.
5. The method of claim 4, further comprising:
judging whether the input information meets the decryption condition of each second application;
and if the input information accords with the decryption condition of any second application, removing a second cover layer of the second application of which the decryption condition accords with the input information.
6. The method of claim 4, further comprising:
judging whether the input information meets the decryption condition of each second application;
and if the input information meets the decryption condition of any second application, removing the second cover layer of each second application.
7. A control apparatus of a terminal, comprising:
a first judgment unit configured to judge whether a first object is an encrypted object in response to a first operation on the first object;
a control unit, configured to start a first application and display a first overlay covering a first application interface if the first object is an encrypted object, where the first application interface is an application interface of the first application, and the starting the first application and the displaying the first overlay covering the first application interface include: the method comprises the steps of firstly starting a first activity associated with a first application to generate a first cover layer, and then starting a second activity of the first application to generate a first application interface, so that the starting process of the first application interface can be dynamically and fuzzily displayed;
a second judgment unit configured to judge, in response to receiving input information, whether the input information meets a decryption condition of the first object;
the control unit is further configured to remove the first cover layer to display the first application interface if the input information meets the decryption condition of the first object;
wherein the first application is the first object or an application associated with the first object.
8. A terminal, comprising:
at least one memory and at least one processor;
wherein the at least one memory is configured to store program code and the at least one processor is configured to invoke the program code stored in the at least one memory to perform the method of any of claims 1 to 6.
9. A storage medium for storing program code for performing the method of any one of claims 1 to 6.
CN202011126251.6A 2020-10-20 2020-10-20 Terminal control method and device, terminal and storage medium Active CN112261216B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011126251.6A CN112261216B (en) 2020-10-20 2020-10-20 Terminal control method and device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011126251.6A CN112261216B (en) 2020-10-20 2020-10-20 Terminal control method and device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN112261216A CN112261216A (en) 2021-01-22
CN112261216B true CN112261216B (en) 2022-05-03

Family

ID=74245127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011126251.6A Active CN112261216B (en) 2020-10-20 2020-10-20 Terminal control method and device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN112261216B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113452843A (en) * 2021-06-25 2021-09-28 浙江百应科技有限公司 Mobile phone locking method, server and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250152A (en) * 2016-07-29 2016-12-21 北京金山安全软件有限公司 Mobile terminal control method and device and mobile terminal
CN106991307A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Using time slot scrambling and device
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device
CN109871707A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN111274564A (en) * 2020-01-14 2020-06-12 青岛海信移动通信技术股份有限公司 Communication terminal and application unlocking method in split screen mode
CN111309208A (en) * 2020-02-07 2020-06-19 维沃移动通信有限公司 File protection method and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140359785A1 (en) * 2013-05-30 2014-12-04 Microsoft Corporation Security for Displayed Electronic Content from Unauthorized Access During Application Idle Periods

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106250152A (en) * 2016-07-29 2016-12-21 北京金山安全软件有限公司 Mobile terminal control method and device and mobile terminal
CN106991307A (en) * 2017-04-10 2017-07-28 四川阵风科技有限公司 Using time slot scrambling and device
CN109871707A (en) * 2017-12-04 2019-06-11 广州市动景计算机科技有限公司 Method for secret protection and device calculate equipment and storage medium
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device
CN111274564A (en) * 2020-01-14 2020-06-12 青岛海信移动通信技术股份有限公司 Communication terminal and application unlocking method in split screen mode
CN111309208A (en) * 2020-02-07 2020-06-19 维沃移动通信有限公司 File protection method and electronic equipment

Also Published As

Publication number Publication date
CN112261216A (en) 2021-01-22

Similar Documents

Publication Publication Date Title
CN111510645B (en) Video processing method and device, computer readable medium and electronic equipment
CN113741755A (en) Information processing method and device, terminal and storage medium
CN111459364B (en) Icon updating method and device and electronic equipment
CN111190520A (en) Menu item selection method and device, readable medium and electronic equipment
CN113191726A (en) Task detail interface display method, device, equipment and computer readable medium
CN113315924A (en) Image special effect processing method and device
CN111565332A (en) Video transmission method, electronic device, and computer-readable medium
CN111309416B (en) Information display method, device and equipment of application interface and readable medium
CN112261216B (en) Terminal control method and device, terminal and storage medium
CN112579218B (en) User interface display method and device, computer readable medium and electronic equipment
CN113986003A (en) Multimedia information playing method and device, electronic equipment and computer storage medium
CN113391774A (en) Screen projection processing method, device, equipment and storage medium
CN115086305B (en) Information processing method, apparatus, electronic device and storage medium
CN116596748A (en) Image stylization processing method, apparatus, device, storage medium, and program product
CN115576458A (en) Application window display method, device, equipment and medium
CN115082368A (en) Image processing method, device, equipment and storage medium
CN111290692B (en) Picture display method and device, electronic equipment and computer readable medium
CN113342440A (en) Screen splicing method and device, electronic equipment and storage medium
CN112822328A (en) Data display method and device and electronic equipment
CN112256173A (en) Window display method and device of electronic equipment, terminal and storage medium
CN111770385A (en) Card display method and device, electronic equipment and medium
CN111290812A (en) Application control display method and device, terminal and storage medium
CN111400693B (en) Method and device for unlocking target object, electronic equipment and readable medium
CN116540874A (en) Information processing method, device, terminal and storage medium
CN115390776A (en) Screen projection control method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant