WO2016197669A1 - Terminal and application management method therefor - Google Patents

Terminal and application management method therefor Download PDF

Info

Publication number
WO2016197669A1
WO2016197669A1 PCT/CN2016/077710 CN2016077710W WO2016197669A1 WO 2016197669 A1 WO2016197669 A1 WO 2016197669A1 CN 2016077710 W CN2016077710 W CN 2016077710W WO 2016197669 A1 WO2016197669 A1 WO 2016197669A1
Authority
WO
WIPO (PCT)
Prior art keywords
location
application
security
pressure value
area
Prior art date
Application number
PCT/CN2016/077710
Other languages
French (fr)
Chinese (zh)
Inventor
范钊
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2016197669A1 publication Critical patent/WO2016197669A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser

Definitions

  • This application relates to, but is not limited to, the field of electronic device technology.
  • the current terminal device generally has the functions of fingerprint recognition and password unlocking, but after fingerprint recognition or password unlocking, all applications in the terminal may be used arbitrarily, for example, when others borrow mobile phones to make calls and play games, Others may view your WeChat, SMS, QQ, Alipay and other information, resulting in a security risk of information leakage.
  • the security identification of the terminal is one-time, and all the icons can be accessed by entering the terminal desktop.
  • some software in the terminal requires a higher level of security verification, such as personal privacy software, and others are unnecessary. Verified, such as weather, calendar, browser, etc. Therefore, it is not an effective practice to boot the authentication fingerprint or password at one time.
  • the related technology is to use third-party software for encryption. If you uninstall this software, you will not be able to implement this function.
  • the security zone is set to the system level function, and the software starts encryption, and does not reorganize the icons. For example, if you set up multiple software that requires secure access, it is difficult to remember which one is over-encrypted and which is not encrypted.
  • This document provides a terminal and its application management method, which can divide the security screen of the terminal screen and encrypt the application in the security area.
  • a method for managing a terminal application includes: detecting a first pressure value of a first position, triggering a safe area selection operation when the first pressure value is greater than a preset first pressure threshold; and detecting a second position of the second position a pressure value, when the second pressure value is greater than a preset second pressure threshold, determining a selected safety zone according to the first location and the second location;
  • the application within the domain performs an encryption operation.
  • the method before determining the selected security area according to the first location and the second location, the method further includes: determining whether the detected first location and the second location are valid, when one of the following manners is Valid: detecting that the first position and the second position are simultaneous pressing; detecting that the pressing time interval of the first position and the second position is within a preset time range; detecting the first position to the The pressing time interval of the second position is not within the preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
  • determining the selected security area according to the first location and the second location including: determining a security zone according to coordinates of the first location and coordinates of the second location; Determining the security area by the coordinates of the location and the coordinates of the second location, including: when the first location and the second location are located on the same screen, the security zone is a coordinate of the first location and a coordinate frame of the second location An area; when the first position is located at the first screen, and the second position is located at the second screen, the security area includes a fourth quadrant defined by coordinates of the first position, the coordinates of the second position are defined The area in which the second quadrant is located, and the screen area between the first screen and the second screen.
  • the method further includes: prompting the user to adjust an application icon location in the security zone and an application icon to be added to or removed from the security zone.
  • the method further includes: storing an identifier of the application in the security area in the security list; determining, when the application is triggered, whether the identifier of the application is in the security list, when the identifier of the application is In the security list, the activation is refused, and when the identifier of the application is not in the security list, it is directly started.
  • the encryption is performed by one of the following methods: a fingerprint, an iris, an eye pattern, a pattern, and a character string.
  • a terminal application management method comprising: detecting a third pressure value of a third location input in a security zone, wherein the security zone is a first pressure value detecting the first location, when the first When the pressure value is greater than the preset first pressure threshold, triggering the safe area selection operation, and detecting the second pressure value of the second position, when the second pressure value is greater than the preset second pressure threshold, according to the first The position and the second position are determined to be selected; when the third pressure value is greater than the pre- When the third pressure threshold is set first, the application in the secure area is decrypted.
  • decrypting an application in the security area includes: when the third location corresponds to an application in the security zone, separately Decrypting the application; decrypting all applications in the secure area when the third location corresponds to a blank area in the secure area.
  • a terminal includes: a pressure sensing module configured to: detect a first pressure value of the first position and a second pressure value of the second position; and select a module, configured to: when the first pressure value is greater than a preset first When the pressure threshold is used, the safe area selection operation is triggered; when the second pressure value is greater than the preset second pressure threshold, the selected security area is determined according to the first position and the second position; the encryption module is set to : Encrypt the application in the secure area.
  • the terminal further includes: a determining module, configured to: determine whether the detected first location and the second location are valid before determining the selected security zone according to the first location and the second location, when When it is one of the following manners, it is effective: detecting that the input first position and the second position are simultaneous pressing; detecting that the pressing time interval between the first position and the second position is within a preset time range; The pressing time interval from the first position to the second position is not within the preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
  • a determining module configured to: determine whether the detected first location and the second location are valid before determining the selected security zone according to the first location and the second location, when When it is one of the following manners, it is effective: detecting that the input first position and the second position are simultaneous pressing; detecting that the pressing time interval between the first position and the second position is within a preset time range; The pressing time interval from the first position to the second position is not within the preset time range, but an operation of
  • the selection module is configured to: determine a security area according to coordinates of the first location and coordinates of the second location.
  • the selection module is configured to: when the first location and the second location are located on the same screen, the security zone is a coordinate of the first location and a coordinate frame of the second location; The first position is located on the first screen, and the second position is located on the second screen, the security area includes a fourth quadrant defined by the coordinates of the first location, and the second quadrant is defined by the coordinates of the second location And the area of the screen between the first screen and the second screen.
  • the terminal further includes a prompting module, configured to: prompt the user to adjust an application icon location in the security zone and an application to be added to or removed from the security zone before performing an encryption operation on the application in the security zone. icon.
  • a prompting module configured to: prompt the user to adjust an application icon location in the security zone and an application to be added to or removed from the security zone before performing an encryption operation on the application in the security zone. icon.
  • the terminal further includes: a monitoring module, configured to: store the identifier of the application in the security area in the security list; and when the terminal application starts, determine whether the identifier of the application is in the security In the full list, when the identifier of the application is in the security list, the activation is refused, and when the identifier of the application is not in the security list, it is directly started.
  • the pressure sensing module is further configured to: detect a third pressure value of the third position input in the safety zone;
  • the terminal further includes: a verification module, configured to: when the third pressure value is greater than a preset third pressure threshold, decrypt the application in the security area.
  • the verification module is configured to: when the third location corresponds to an application in the security zone, decrypt the application separately; when the third location corresponds to a blank in the security zone Zone, decrypts all applications in the secure zone.
  • a computer readable storage medium storing computer executable instructions for performing the method of any of the above.
  • the embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking.
  • FIG. 1 is a flowchart of a method for managing a terminal application according to a first embodiment of the present invention
  • FIG. 2 is a schematic diagram of a first position and a second position of a security zone selected on the same screen as the embodiment of the present invention
  • FIG. 3 is a schematic diagram of an application for selecting a security zone with a screen according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of selecting a first location and a second location of a security zone across a screen according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a cross-screen selection security zone selection application according to an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of prompting application icon position adjustment and movement according to an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of prompting input verification password according to an embodiment of the present invention.
  • FIG. 8 is a flowchart of a terminal application management method according to a second embodiment of the present invention.
  • FIG. 9 is a schematic diagram of a terminal module according to a third embodiment of the present invention.
  • FIG. 1 is a flowchart of a terminal application management method according to a first embodiment of the present invention. As shown in FIG. 1 , a management method provided by an embodiment of the present invention includes:
  • S101 detecting a first pressure value of the first position, and triggering a safe area selection operation when the first pressure value is greater than a preset first pressure threshold;
  • S102 detecting a second pressure value of the second position, when the second pressure value is greater than a preset second pressure threshold, determining the selected safety area according to the first position and the second position;
  • the application in the security zone includes an application included in the security zone and an application added to the security zone, and the security zone may be a blank zone or an area including multiple applications.
  • the embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking.
  • the terminal adopts a pressure screen.
  • the terminal monitors the user's touch pressing operation, and uses the pressure sensing technology to detect the first position of the user's pressing and the first pressure value in the screen, when the first pressure value exceeds the preset value.
  • a pressure threshold is triggered, the safe area selection operation is triggered, and the user can freely select the area where the application icon is located, or select a blank area, and when detecting that the second pressure value of the second position pressed by the user is greater than the preset second pressure threshold
  • the selection of the security zone is determined based on the first location and the second location.
  • the first preset pressure threshold and the second preset pressure threshold may be the same or different.
  • the method before determining the selected security area according to the first location and the second location, the method further includes: determining whether the detected first location and the second location are valid, and being effective when one of the following manners is First position and second position:
  • the first position and the second position of the input are detected as simultaneous pressing, that is, the user is detected while the two fingers are pressed hard;
  • the pressing time interval of the first position to the second position is not within a preset time range, but detecting an operation of switching from the first touch screen to the second touch screen, that is, a pressing interval between the first position and the second position
  • the time is longer, but the user has detected other touch operations between the pressing of the first position and the second position, but the operations performed by the user in order to find another pressing position during the touch operation are generally performed for the second time.
  • the display content of the screen may have changed at the same time, but the content of the first pressing position belongs to a continuous relationship.
  • the two presses belong to the effective operation performed by the user to confirm the selected content, and the coordinates of the first pressing position and the second pressing position of the pressing point are respectively recorded, thereby being used for the corresponding screen. Queue information.
  • the method for selecting a security zone on the screen in the embodiment of the present invention first detects the pressure value of the first position (starting point) input by the user, and when the first pressure value of the first location is greater than the When the first pressure threshold is set, the terminal safety area selection operation is triggered; the terminal continues to detect the pressure value of the second position input by the user, when the second pressure value of the second position (end point) is greater than the preset second pressure threshold Determining the selected security area according to the first location and the second location to determine the terminal security zone.
  • the security area is determined according to the coordinates of the first location and the coordinates of the second location: respectively acquiring coordinates of the first location and the second location on the screen, where the security zone is the coordinates of the first location and the second location The area selected by the coordinate frame; or the application icon position closest to the first position, for example, the application icon position of the first row and the first column; and the application icon position closest to the second location, for example, the fourth row and the fourth The application icon position of the column, then the security area is the area of four rows and four columns of sixteen icons.
  • the method for selecting a security area across the screen in the embodiment of the present invention first detects the pressure value of the first position (starting point) input by the user, and when the pressure value of the first position is greater than the preset first pressure.
  • the terminal security area selection operation is triggered; the terminal detects that the user slides the screen to the left (or slides the screen to the right), and enters the second screen, and the terminal continues to detect that the user is a second pressure value of the second position input by the second screen, when the second pressure value of the second position (end point) is greater than a preset second pressure threshold, according to the coordinates of the first position and the second The coordinates of the location determine the terminal security zone.
  • the fourth quadrant defined by the coordinates of the first location, the second quadrant defined by the coordinates of the second location, and the screen area between the first screen and the second screen determine the security zone; or
  • the location of the application icon closest to a location, for example, the application icon location of the first row and the first column, and the coordinates of the application icon closest to the second location, for example, the application icon location of the third row and the fourth column, the security zone is The entire page icon area of the first page and the three-row, four-column icon area of the second page.
  • Other screens may be included between the first screen and the second screen, and all other screens are selected.
  • the position coordinates of the first position and the position coordinates of the second position are acquired according to the natural coordinate system of the terminal.
  • the method includes: prompting the user to adjust an application icon location in the security zone, and an application icon to be added to or removed from the security zone. .
  • the terminal application icon enters the selectable state, and the icon changes to prompt the user, the user may place the application icon that needs to be encrypted into the security zone, and may also remove or adjust the application in the security zone. Location, if there is an icon in the original security zone, move all the icons in the security zone backward.
  • the method further includes: storing an identifier of the application in the security area in the security list; determining, when the terminal application is started, whether the application is in the security list, and rejecting the startup when the application is in the security list.
  • the application identifier in the security area is stored in the security list, where the application identifier includes an application name attribute and an installation time attribute.
  • the terminal is started or restarted, the above list is monitored and is the highest authority of the system and cannot be ended and tampering.
  • the system first enters the security list to find the name, whether it is in the security list. If it is in the list, it checks the installation time attribute to determine whether it has been tampered with; if it is not in the list, it starts directly. If the installation time attribute also matches, you are prompted for a password.
  • the encryption is performed by one of the following methods: a fingerprint, an iris, an eye pattern, a pattern, and a character string.
  • the terminal application management method of the second embodiment of the present invention includes:
  • S201 Detect a third pressure value of the third position input in the safety zone, wherein the safety zone is a first pressure value that detects the first location, and when the first pressure value is greater than a preset first pressure threshold And triggering the safe area selection operation, and detecting the second pressure value of the second position, when the second pressure value is greater than the preset second pressure threshold, determining the selected according to the first position and the second position;
  • S202 Decrypt the application in the secure area when the third pressure value is greater than a preset third pressure threshold.
  • S202 includes: when the third location corresponds to an application in the security zone, decrypting the application separately; when the third location corresponds to a blank area in the security zone, to a security zone All applications within it are decrypted.
  • the foregoing method further includes: prompting to input a verification password.
  • the decrypting step includes: decrypting an application in the secure area when the input verification password matches the preset verification password.
  • the embodiment of the invention further provides a computer readable storage medium storing computer executable instructions for executing the management method of the terminal application.
  • the terminal of the third embodiment of the present invention includes:
  • the pressure sensing module 91 is configured to: detect a first pressure value of the first position and a second pressure value of the second position;
  • the selection module 92 is configured to: when the first pressure value is greater than a preset first pressure threshold, triggering a safe area selection operation; when the second pressure value is greater than a preset second pressure threshold, according to the The first location and the second location determine the selected security zone;
  • the encryption module 93 is configured to encrypt an application in the secure area.
  • the terminal further includes: a determining module, configured to: determine that the security zone selection operation is valid by one of the following methods:
  • the first position and the second position of the input are detected to be simultaneously pressed, and the first position and the second position are detected, and the two fingers are pressed at the same time;
  • the pressing time interval between the first position and the second position is within a preset time range, the first position, the second position, that is, after the user presses a little force, after a period of searching for another a pressing point outside;
  • the pressing time interval of the first position to the second position is not within a preset time range, but detecting an operation from the first touch screen to the second position of the second touch screen, the first position, the first position, and The pressing interval of the second position is longer, but the user has detected other touch operations between the pressing of the first position and the second position, but the operations performed by the user in order to find another pressing position during the touch operation are generally
  • the display content of the screen may have changed at the same time, but the content of the first pressing position belongs to a continuous relationship.
  • the two presses belong to the effective operation performed by the user to confirm the selected content, and the coordinates of the first pressing position and the second pressing position of the pressing point are respectively recorded, thereby being used for the corresponding screen. Queue information.
  • a method for selecting a security zone on the screen firstly, the pressure sensing module 91 detects a pressure value of a first position (starting point) input by the user, when the first position is first. When the pressure value is greater than the preset first pressure threshold, the selection module 92 triggers the terminal safety zone selection operation; the pressure sensing module 91 continues to detect the pressure value of the second position input by the user, and the second pressure of the second position (end point) When the value is greater than the preset second pressure threshold, the selection module 92 determines the selected security zone based on the first location and the second location to determine the terminal security zone.
  • the security area is determined according to the coordinates of the first location and the coordinates of the second location: respectively acquiring coordinates of the first location and the second location on the screen, where the security zone is the coordinates of the first location and the second location The area selected by the coordinate frame; or the application icon position closest to the first position, for example, the application icon position of the first row and the first column; and the application icon position closest to the second location, for example, the fourth row and the fourth The application icon position of the column, then the security area is the area of four rows and four columns of sixteen icons.
  • the security area method is selected across the screen.
  • the pressure sensing module 91 detects the pressure value of the first position (starting point) input by the user, and selects the pressure value of the first position of the module 92.
  • the terminal security area selection operation is triggered; the terminal detects that the user slides the screen to the left (or slides the screen to the right) to enter the second screen, and the pressure sensing module 91 continues to detect that the user is in the second a second pressure value of the second position input by the screen, when the second pressure value of the second position (end point) is greater than a preset second pressure threshold
  • the selection module 92 determines the terminal security area based on the coordinates of the first location and the coordinates of the second location.
  • the closest application icon location for example, the application icon location in the first column of the first row, and the coordinates of the application icon closest to the second location, for example, the application icon location in the fourth row and the fourth column, the security zone is the first The page full page icon area and the area of the second page of the three rows and four columns of icons.
  • the terminal further includes a prompting module, configured to prompt the user to move the application icon in the security area and the application icon to be dragged into the security area before encrypting the application in the security area.
  • a prompting module configured to prompt the user to move the application icon in the security area and the application icon to be dragged into the security area before encrypting the application in the security area.
  • the terminal further includes: a monitoring module, configured to: store an identifier of one or more applications in the security area in the monitoring list; when the terminal starts or restarts, read the monitoring list, determine the location The application corresponding to the identifier is in an encrypted state.
  • a monitoring module configured to: store an identifier of one or more applications in the security area in the monitoring list; when the terminal starts or restarts, read the monitoring list, determine the location The application corresponding to the identifier is in an encrypted state.
  • the pressure sensing module 91 is further configured to: detect a third pressure value of the third position input in the safety zone;
  • the verification module 94 is configured to decrypt the application in the secure area when the third pressure value is greater than a preset third pressure threshold.
  • the verification module 94 is configured to: when the third location corresponds to an application in the security zone, decrypt the application separately; when the third location corresponds to a blank area in the security zone , decrypt all applications in the secure area.
  • the terminal further includes a prompting module, configured to: prompt to input a verification password; and the verification module 94 is configured to: when the input verification password matches the preset verification password, decrypt the security area.
  • a prompting module configured to: prompt to input a verification password
  • the verification module 94 is configured to: when the input verification password matches the preset verification password, decrypt the security area.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking, so that the terminal is prevented.
  • the confidentiality is stronger and the use is convenient, which improves the user's operating experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

Disclosed are a terminal and an application management method therefor. The method comprises: detecting a pressure value of a first position which is input, and when the pressure value of the first position is greater than a pre-set first pressure threshold, triggering a security zone selection operation; detecting a pressure value of a second position which is input, and when the pressure value of the second position is greater than a pre-set second pressure threshold, determining a selected security zone; and encrypting an application in the security zone.

Description

一种终端及其应用的管理方法Terminal and management method thereof 技术领域Technical field
本申请涉及但不限于电子设备技术领域。This application relates to, but is not limited to, the field of electronic device technology.
背景技术Background technique
目前的终端设备一般具有指纹识别和密码解锁的功能,但是在指纹识别或者密码解锁之后,终端内所有的应用都有可能被肆意的使用,比如,当他人借用手机打电话、玩游戏的时候,他人可能会查看你的微信,短信,QQ,支付宝等信息,从而导致信息泄露安全隐患很大。The current terminal device generally has the functions of fingerprint recognition and password unlocking, but after fingerprint recognition or password unlocking, all applications in the terminal may be used arbitrarily, for example, when others borrow mobile phones to make calls and play games, Others may view your WeChat, SMS, QQ, Alipay and other information, resulting in a security risk of information leakage.
发明内容Summary of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
相关技术中终端的安全识别是一次性的,进入终端桌面,所有图标都可以进行访问,然而终端内一部分软件是需要更高级别的安全验证的,比如个人隐私类软件,另外一些是没必要进行验证的,比如天气、日历、浏览器等。所以一次性开机认证指纹或者密码,并不是有效做法。In the related art, the security identification of the terminal is one-time, and all the icons can be accessed by entering the terminal desktop. However, some software in the terminal requires a higher level of security verification, such as personal privacy software, and others are unnecessary. Verified, such as weather, calendar, browser, etc. Therefore, it is not an effective practice to boot the authentication fingerprint or password at one time.
相关技术是使用第三方软件进行加密,如果卸载这个软件,将无法实现此功能。安全区设置为系统层级的功能,而且,软件启动加密,并没有把图标进行再次整理,例如,设置了多个需要安全访问的软件,很难记得哪个是加过密的哪个是没有加密的。The related technology is to use third-party software for encryption. If you uninstall this software, you will not be able to implement this function. The security zone is set to the system level function, and the software starts encryption, and does not reorganize the icons. For example, if you set up multiple software that requires secure access, it is difficult to remember which one is over-encrypted and which is not encrypted.
本文提供了一种终端及其应用的管理方法,能够对终端屏幕划分安全区域,将安全区域内的应用进行加密。This document provides a terminal and its application management method, which can divide the security screen of the terminal screen and encrypt the application in the security area.
一种终端应用的管理方法,包括:检测第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;检测第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;对所述安全区 域内的应用进行加密操作。A method for managing a terminal application includes: detecting a first pressure value of a first position, triggering a safe area selection operation when the first pressure value is greater than a preset first pressure threshold; and detecting a second position of the second position a pressure value, when the second pressure value is greater than a preset second pressure threshold, determining a selected safety zone according to the first location and the second location; The application within the domain performs an encryption operation.
可选的,上述根据所述第一位置与所述第二位置确定选取的安全区域之前,还包括:判断检测到的所述第一位置和第二位置是否有效,当为以下方式之一时则有效:检测到所述第一位置和第二位置为同时按压;检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内;检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作。Optionally, before determining the selected security area according to the first location and the second location, the method further includes: determining whether the detected first location and the second location are valid, when one of the following manners is Valid: detecting that the first position and the second position are simultaneous pressing; detecting that the pressing time interval of the first position and the second position is within a preset time range; detecting the first position to the The pressing time interval of the second position is not within the preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
可选的,上述根据所述第一位置与所述第二位置确定选取的安全区域,包括:根据所述第一位置的坐标和所述第二位置的坐标确定安全区域;根据所述第一位置的坐标和所述第二位置的坐标确定安全区域,包括:当所述第一位置和第二位置位于同一屏幕时,所述安全区域为第一位置的坐标和第二位置的坐标框选的区域;当所述第一位置位于第一屏幕,所述第二位置位于第二屏幕时,所述安全区域包括第一位置的坐标限定的第四象限所在区域,第二位置的坐标限定的第二象限所在区域,以及第一屏幕和第二屏幕之间的屏幕区域。Optionally, determining the selected security area according to the first location and the second location, including: determining a security zone according to coordinates of the first location and coordinates of the second location; Determining the security area by the coordinates of the location and the coordinates of the second location, including: when the first location and the second location are located on the same screen, the security zone is a coordinate of the first location and a coordinate frame of the second location An area; when the first position is located at the first screen, and the second position is located at the second screen, the security area includes a fourth quadrant defined by coordinates of the first position, the coordinates of the second position are defined The area in which the second quadrant is located, and the screen area between the first screen and the second screen.
可选的,上述对所述安全区域内的应用进行加密之前,还包括:提示用户调整安全区域内的应用图标位置和待添加入安全区域内或者从安全区域移出的应用图标。Optionally, before the encrypting the application in the security zone, the method further includes: prompting the user to adjust an application icon location in the security zone and an application icon to be added to or removed from the security zone.
可选的,上述方法还包括:将安全区域内的应用的标识存储到安全列表中;当触发启动应用时,判断所述应用的标识是否在所述安全列表中,当所述应用的标识在所述安全列表中则拒绝启动,当所述应用的标识不在所述安全列表中则直接启动。Optionally, the method further includes: storing an identifier of the application in the security area in the security list; determining, when the application is triggered, whether the identifier of the application is in the security list, when the identifier of the application is In the security list, the activation is refused, and when the identifier of the application is not in the security list, it is directly started.
可选的,对所述安全区域内的应用进行加密的步骤中,通过以下方式之一进行加密:指纹、虹膜、眼纹、图案和字符串。Optionally, in the step of encrypting the application in the security area, the encryption is performed by one of the following methods: a fingerprint, an iris, an eye pattern, a pattern, and a character string.
一种终端应用管理方法,所述方法包括:检测安全区域内输入的第三位置的第三压力值,其中,所述安全区域为检测到第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作,且检测到第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据第一位置与第二位置确定选取的;当所述第三压力值大于预 先设置的第三压力阈值时,对安全区域内的应用进行解密。A terminal application management method, the method comprising: detecting a third pressure value of a third location input in a security zone, wherein the security zone is a first pressure value detecting the first location, when the first When the pressure value is greater than the preset first pressure threshold, triggering the safe area selection operation, and detecting the second pressure value of the second position, when the second pressure value is greater than the preset second pressure threshold, according to the first The position and the second position are determined to be selected; when the third pressure value is greater than the pre- When the third pressure threshold is set first, the application in the secure area is decrypted.
可选的,所述当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密包括:当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解密;当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。Optionally, when the third pressure value is greater than a preset third pressure threshold, decrypting an application in the security area includes: when the third location corresponds to an application in the security zone, separately Decrypting the application; decrypting all applications in the secure area when the third location corresponds to a blank area in the secure area.
一种终端包括:压力感应模块,设置为:检测第一位置的第一压力值和第二位置的第二压力值;选取模块,设置为:当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;加密模块,设置为:对所述安全区域内的应用进行加密。A terminal includes: a pressure sensing module configured to: detect a first pressure value of the first position and a second pressure value of the second position; and select a module, configured to: when the first pressure value is greater than a preset first When the pressure threshold is used, the safe area selection operation is triggered; when the second pressure value is greater than the preset second pressure threshold, the selected security area is determined according to the first position and the second position; the encryption module is set to : Encrypt the application in the secure area.
可选的,上述终端还包括:判断模块,设置为:根据所述第一位置与所述第二位置确定选取的安全区域之前判断检测到的所述第一位置和第二位置是否有效,当为以下方式之一时则有效:检测到输入的第一位置和第二位置为同时按压;检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内;检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作。Optionally, the terminal further includes: a determining module, configured to: determine whether the detected first location and the second location are valid before determining the selected security zone according to the first location and the second location, when When it is one of the following manners, it is effective: detecting that the input first position and the second position are simultaneous pressing; detecting that the pressing time interval between the first position and the second position is within a preset time range; The pressing time interval from the first position to the second position is not within the preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
可选的,上述选取模块是设置为:根据所述第一位置的坐标和所述第二位置的坐标确定安全区域。Optionally, the selection module is configured to: determine a security area according to coordinates of the first location and coordinates of the second location.
可选的,所述选取模块是设置为:当所述第一位置和第二位置位于同一屏幕时,所述安全区域为第一位置的坐标和第二位置的坐标框选的区域;当所述第一位置位于第一屏幕,所述第二位置位于第二屏幕时,所述安全区域包括第一位置的坐标限定的第四象限所在区域,第二位置的坐标限定的第二象限所在区域,以及第一屏幕和第二屏幕之间的屏幕区域。Optionally, the selection module is configured to: when the first location and the second location are located on the same screen, the security zone is a coordinate of the first location and a coordinate frame of the second location; The first position is located on the first screen, and the second position is located on the second screen, the security area includes a fourth quadrant defined by the coordinates of the first location, and the second quadrant is defined by the coordinates of the second location And the area of the screen between the first screen and the second screen.
可选的,上述终端还包括提示模块,设置为:对所述安全区域内的应用进行加密操之前提示用户调整安全区域内的应用图标位置和待添加入安全区域内或者从安全区域移出的应用图标。Optionally, the terminal further includes a prompting module, configured to: prompt the user to adjust an application icon location in the security zone and an application to be added to or removed from the security zone before performing an encryption operation on the application in the security zone. icon.
可选的,上述终端还包括:监控模块,设置为:将安全区域内的应用的标识存储到安全列表中;当终端应用启动时,判断所述应用的标识是否在安 全列表中,当所述应用的标识在安全列表中则拒绝启动,当所述应用的标识不在所述安全列表中则直接启动。可选地,所述压力感应模块,还设置为:检测安全区域内输入的第三位置的第三压力值;Optionally, the terminal further includes: a monitoring module, configured to: store the identifier of the application in the security area in the security list; and when the terminal application starts, determine whether the identifier of the application is in the security In the full list, when the identifier of the application is in the security list, the activation is refused, and when the identifier of the application is not in the security list, it is directly started. Optionally, the pressure sensing module is further configured to: detect a third pressure value of the third position input in the safety zone;
所述终端还包括:验证模块,设置为:当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密。The terminal further includes: a verification module, configured to: when the third pressure value is greater than a preset third pressure threshold, decrypt the application in the security area.
可选的,所述验证模块是设置为:当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解密;当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。Optionally, the verification module is configured to: when the third location corresponds to an application in the security zone, decrypt the application separately; when the third location corresponds to a blank in the security zone Zone, decrypts all applications in the secure zone.
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述任一项的方法。A computer readable storage medium storing computer executable instructions for performing the method of any of the above.
本发明实施例能够利用压力屏幕的技术,划分终端桌面屏幕为不同的安全层级,从而用户在终端屏幕解锁之后一部分应用可以被使用,另外一部分仍然处于保密状态,从而可防止用户秘密泄露。The embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking.
在阅读并理解了附图和详细描述后,可以明白其他方面。Other aspects will be apparent upon reading and understanding the drawings and detailed description.
附图概述BRIEF abstract
图1为本发明第一实施例终端应用的管理方法的流程图;1 is a flowchart of a method for managing a terminal application according to a first embodiment of the present invention;
图2为本发明实施例同屏幕选取安全区第一位置和第二位置示意图;2 is a schematic diagram of a first position and a second position of a security zone selected on the same screen as the embodiment of the present invention;
图3为本发明实施例同屏幕选取安全区选取应用示意图;3 is a schematic diagram of an application for selecting a security zone with a screen according to an embodiment of the present invention;
图4为本发明实施例跨屏选取安全区域第一位置和第二位置示意图;4 is a schematic diagram of selecting a first location and a second location of a security zone across a screen according to an embodiment of the present invention;
图5为本发明实施例跨屏选取安全区选取应用示意图;FIG. 5 is a schematic diagram of a cross-screen selection security zone selection application according to an embodiment of the present invention; FIG.
图6为本发明实施例提示应用图标位置调整和移动示意图;FIG. 6 is a schematic diagram of prompting application icon position adjustment and movement according to an embodiment of the present invention; FIG.
图7为本发明实施例提示输入验证密码示意图;FIG. 7 is a schematic diagram of prompting input verification password according to an embodiment of the present invention; FIG.
图8为本发明第二实施例终端应用管理方法流程图;FIG. 8 is a flowchart of a terminal application management method according to a second embodiment of the present invention; FIG.
图9为本发明第三实施例终端模块示意图。 FIG. 9 is a schematic diagram of a terminal module according to a third embodiment of the present invention.
本发明的实施方式Embodiments of the invention
下文中将结合附图对本发明的实施方式进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。Embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that, in the case of no conflict, the features in the embodiments and the embodiments in the present application may be arbitrarily combined with each other.
下面结合附图描述本发明一些实施例所述的终端及终端应用加、解密的方法。A method for adding and decrypting a terminal and a terminal according to some embodiments of the present invention will be described below with reference to the accompanying drawings.
图1为本发明第一实施例终端应用管理方法的流程图,如图1所示,本发明实施例提供的管理方法,包括:FIG. 1 is a flowchart of a terminal application management method according to a first embodiment of the present invention. As shown in FIG. 1 , a management method provided by an embodiment of the present invention includes:
S101:检测第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;S101: detecting a first pressure value of the first position, and triggering a safe area selection operation when the first pressure value is greater than a preset first pressure threshold;
S102:检测第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;S102: detecting a second pressure value of the second position, when the second pressure value is greater than a preset second pressure threshold, determining the selected safety area according to the first position and the second position;
S103:对所述安全区域内的应用进行加密。其中,安全区域内的应用包括安全区域包含的应用和被添加到所述安全区域内的应用,安全区域可以为一个空白区域,也可以为包含多个应用的区域。S103: Encrypt the application in the security zone. The application in the security zone includes an application included in the security zone and an application added to the security zone, and the security zone may be a blank zone or an area including multiple applications.
本发明实施例能够利用压力屏幕的技术,划分终端桌面屏幕为不同安全层级,从而用户在终端屏幕解锁之后一部分应用可以被使用,另外一部分仍然处于保密状态,从而可防止用户秘密泄露。The embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking.
终端采用压力屏,当终端处于界面状态时,终端监控用户的触摸按压操作,利用压力感应技术在屏幕中检测用户按压的第一位置的以及第一压力值,当第一压力值超过预先设置第一压力阈值时,触发安全区域选取操作,用户可以进行自由的选取应用图标所在区域,或者选取一个空白区域,当检测到用户按压的第二位置的第二压力值大于预设的第二压力阈值时,根据第一位置和第二位置确定安全区域的选择。其中,第一预设压力阈值和第二预设压力阈值可以相同也可以不同。The terminal adopts a pressure screen. When the terminal is in the interface state, the terminal monitors the user's touch pressing operation, and uses the pressure sensing technology to detect the first position of the user's pressing and the first pressure value in the screen, when the first pressure value exceeds the preset value. When a pressure threshold is triggered, the safe area selection operation is triggered, and the user can freely select the area where the application icon is located, or select a blank area, and when detecting that the second pressure value of the second position pressed by the user is greater than the preset second pressure threshold The selection of the security zone is determined based on the first location and the second location. The first preset pressure threshold and the second preset pressure threshold may be the same or different.
可选的,根据第一位置与所述第二位置确定选取的安全区域之前,还包括:判断检测到的所述第一位置和第二位置是否有效,当为以下方式之一时则为有效的第一位置和第二位置: Optionally, before determining the selected security area according to the first location and the second location, the method further includes: determining whether the detected first location and the second location are valid, and being effective when one of the following manners is First position and second position:
检测到输入的第一位置和第二位置为同时按压,即检测到用户同时两指用力按压;The first position and the second position of the input are detected as simultaneous pressing, that is, the user is detected while the two fingers are pressed hard;
检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内,即用户用力按压一点之后,经过一段时间的寻找到另外一个按压点;Detecting that the pressing time interval between the first position and the second position is within a preset time range, that is, after the user presses a point forcefully, another pressing point is found after a period of time;
检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作,即第一位置和第二位置的按压间隔时间较长,但是在第一位置和第二位置的按压之间检测到用户有其他的触摸操作,但是这些触摸操作时用户为了找到另一个按压位置所做的操作,一般是在第二次进行按压位置与第一次按压位置在不同的屏幕的情况下,同时屏幕的显示内容可能已经发生变化,但是与第一次按压位置的内容属于连续的关系。Detecting that the pressing time interval of the first position to the second position is not within a preset time range, but detecting an operation of switching from the first touch screen to the second touch screen, that is, a pressing interval between the first position and the second position The time is longer, but the user has detected other touch operations between the pressing of the first position and the second position, but the operations performed by the user in order to find another pressing position during the touch operation are generally performed for the second time. In the case where the pressing position is different from the first pressing position, the display content of the screen may have changed at the same time, but the content of the first pressing position belongs to a continuous relationship.
如果满足上述的选取操作条件,则认为这两次按压属于用户为了确认选择内容而做的有效操作,分别记录两次按压点第一按压位置和第二按压位置的坐标,从而用于对应所在屏幕的行列信息。If the above-mentioned selection operation condition is satisfied, it is considered that the two presses belong to the effective operation performed by the user to confirm the selected content, and the coordinates of the first pressing position and the second pressing position of the pressing point are respectively recorded, thereby being used for the corresponding screen. Queue information.
如图2和图3所示,本发明实施例同屏幕选取安全区的方法,首先检测用户输入的第一位置(起始点)的压力值,当所述第一位置的第一压力值大于预先设置的第一压力阈值时,触发终端安全区域选择操作;终端继续检测用户输入的第二位置的压力值,当第二位置(结束点)的第二压力值大于预先设置的第二压力阈值时,根据第一位置与第二位置确定选取的安全区域确定终端安全区域。其中,根据所述第一位置的坐标和所述第二位置的坐标确定安全区域:分别获取第一位置和第二位置在屏幕的坐标,则安全区域为第一位置的坐标和第二位置的坐标框选的区域;或者获取与第一位置最为接近的应用图标位置,例如:第一行第一列的应用图标位置;获取第二位置最为接近的应用图标位置,例如:第四行第四列的应用图标位置,那么,则安全区域为四行四列十六个图标的区域。As shown in FIG. 2 and FIG. 3, the method for selecting a security zone on the screen in the embodiment of the present invention first detects the pressure value of the first position (starting point) input by the user, and when the first pressure value of the first location is greater than the When the first pressure threshold is set, the terminal safety area selection operation is triggered; the terminal continues to detect the pressure value of the second position input by the user, when the second pressure value of the second position (end point) is greater than the preset second pressure threshold Determining the selected security area according to the first location and the second location to determine the terminal security zone. The security area is determined according to the coordinates of the first location and the coordinates of the second location: respectively acquiring coordinates of the first location and the second location on the screen, where the security zone is the coordinates of the first location and the second location The area selected by the coordinate frame; or the application icon position closest to the first position, for example, the application icon position of the first row and the first column; and the application icon position closest to the second location, for example, the fourth row and the fourth The application icon position of the column, then the security area is the area of four rows and four columns of sixteen icons.
如图4和图5所示,本发明实施例跨屏选取安全区域方法,首先检测用户输入的第一位置(起始点)的压力值,当第一位置的压力值大于预先设置的第一压力阈值时,触发终端安全区域选择操作;终端检测用户向左滑动屏幕动作(或者向右滑动屏幕动作),进入到第二屏幕,终端继续检测用户在 第二屏幕输入的第二位置的第二压力值,当第二位置(结束点)的第二压力值大于预先设置的第二压力阈值时,根据所述第一位置的坐标和所述第二位置的坐标确定终端安全区域。其中,根据第一位置的坐标限定的第四象限所在区域,第二位置的坐标限定的第二象限所在区域,以及第一屏幕和第二屏幕之间的屏幕区域确定安全区域;或者获取与第一位置最为接近的应用图标位置,例如:第一行第一列的应用图标位置,获取第二位置最接近的应用图标的坐标例如:第三行第四列的应用图标位置,则安全区域为第一页整页图标区域和第二页的三行四列图标的区域。第一屏幕和第二屏幕之间可以包括其他屏幕,其他屏幕都全部选取。As shown in FIG. 4 and FIG. 5, the method for selecting a security area across the screen in the embodiment of the present invention first detects the pressure value of the first position (starting point) input by the user, and when the pressure value of the first position is greater than the preset first pressure. When the threshold is used, the terminal security area selection operation is triggered; the terminal detects that the user slides the screen to the left (or slides the screen to the right), and enters the second screen, and the terminal continues to detect that the user is a second pressure value of the second position input by the second screen, when the second pressure value of the second position (end point) is greater than a preset second pressure threshold, according to the coordinates of the first position and the second The coordinates of the location determine the terminal security zone. Wherein the fourth quadrant defined by the coordinates of the first location, the second quadrant defined by the coordinates of the second location, and the screen area between the first screen and the second screen determine the security zone; or The location of the application icon closest to a location, for example, the application icon location of the first row and the first column, and the coordinates of the application icon closest to the second location, for example, the application icon location of the third row and the fourth column, the security zone is The entire page icon area of the first page and the three-row, four-column icon area of the second page. Other screens may be included between the first screen and the second screen, and all other screens are selected.
其中,第一位置的位置坐标和第二位置的位置坐标根据终端自然坐标系获取。The position coordinates of the first position and the position coordinates of the second position are acquired according to the natural coordinate system of the terminal.
如图6所示,可选的,上述S103:对安全区域内的应用进行加密之前,包括:提示用户调整安全区域内的应用图标位置和待添加入安全区域内或者从安全区域移出的应用图标。其中,当安全区域确定后,终端应用图标进入可选取状态,并且图标发生变化以便提示用户,用户可以将需要加密的应用图标放置到安全区域,同时也可以对安全区域内的应用进行移出或者调整位置,如果原来安全区域有图标,则将所有在安全区域内的图标向后移动。As shown in FIG. 6 , optionally, the foregoing S103: before encrypting the application in the security area, the method includes: prompting the user to adjust an application icon location in the security zone, and an application icon to be added to or removed from the security zone. . After the security zone is determined, the terminal application icon enters the selectable state, and the icon changes to prompt the user, the user may place the application icon that needs to be encrypted into the security zone, and may also remove or adjust the application in the security zone. Location, if there is an icon in the original security zone, move all the icons in the security zone backward.
可选的,上述方法还包括:将安全区域内的应用的标识存储到安全列表中;当终端应用启动时,判断所述应用是否在安全列表中,当所述应用在安全列表中则拒绝启动,当所述应用的标识不在所述安全列表中则直接启动。其中,将安全区域内的应用标识存储到安全列表,其中应用标识包括应用名称属性和安装时间属性。在终端启动或者重新启动时,监控上述列表,并且为系统最高权限,不能被结束和篡改。同时在开启终端应用时,系统首先进入安全列表中查找名称,是否在安全列表中,如果在列表中,则查看安装时间属性,判断是否被篡改;如果不在列表中,则直接启动。如果安装时间属性也匹配上,则提示输入密码。Optionally, the method further includes: storing an identifier of the application in the security area in the security list; determining, when the terminal application is started, whether the application is in the security list, and rejecting the startup when the application is in the security list. When the identifier of the application is not in the safe list, it is directly started. The application identifier in the security area is stored in the security list, where the application identifier includes an application name attribute and an installation time attribute. When the terminal is started or restarted, the above list is monitored and is the highest authority of the system and cannot be ended and tampering. At the same time, when the terminal application is started, the system first enters the security list to find the name, whether it is in the security list. If it is in the list, it checks the installation time attribute to determine whether it has been tampered with; if it is not in the list, it starts directly. If the installation time attribute also matches, you are prompted for a password.
可选的,上对所述安全区域内的应用进行加密的步骤中,通过以下方式之一进行加密:指纹、虹膜、眼纹、图案和字符串。Optionally, in the step of encrypting the application in the security area, the encryption is performed by one of the following methods: a fingerprint, an iris, an eye pattern, a pattern, and a character string.
如图8所示,本发明第二实施例终端应用管理方法包括: As shown in FIG. 8, the terminal application management method of the second embodiment of the present invention includes:
S201:检测安全区域内输入的第三位置的第三压力值,其中,所述安全区域为检测到第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作,且检测到第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据第一位置与第二位置确定选取的;S201: Detect a third pressure value of the third position input in the safety zone, wherein the safety zone is a first pressure value that detects the first location, and when the first pressure value is greater than a preset first pressure threshold And triggering the safe area selection operation, and detecting the second pressure value of the second position, when the second pressure value is greater than the preset second pressure threshold, determining the selected according to the first position and the second position;
S202:当所述第三压力值大于预先设置的第三压力阈值时对安全区域内的应用进行解密。S202: Decrypt the application in the secure area when the third pressure value is greater than a preset third pressure threshold.
可选的,S202包括:当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解密;当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。Optionally, S202 includes: when the third location corresponds to an application in the security zone, decrypting the application separately; when the third location corresponds to a blank area in the security zone, to a security zone All applications within it are decrypted.
如图7所示,可选的,上述方法还包括:提示输入验证密码。所述解密的步骤包括:当输入的验证密码与预设的验证密码匹配时,则对安全区域内的应用进行解密。As shown in FIG. 7 , optionally, the foregoing method further includes: prompting to input a verification password. The decrypting step includes: decrypting an application in the secure area when the input verification password matches the preset verification password.
本发明实施例还提供一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行上述终端应用的管理方法。The embodiment of the invention further provides a computer readable storage medium storing computer executable instructions for executing the management method of the terminal application.
如图9所示,本发明第三实施例终端包括:As shown in FIG. 9, the terminal of the third embodiment of the present invention includes:
压力感应模块91,设置为:检测第一位置的第一压力值和第二位置的第二压力值;The pressure sensing module 91 is configured to: detect a first pressure value of the first position and a second pressure value of the second position;
选取模块92,设置为:当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;The selection module 92 is configured to: when the first pressure value is greater than a preset first pressure threshold, triggering a safe area selection operation; when the second pressure value is greater than a preset second pressure threshold, according to the The first location and the second location determine the selected security zone;
加密模块93,设置为:对所述安全区域内的应用进行加密。The encryption module 93 is configured to encrypt an application in the secure area.
可选的,上述终端还包括:判断模块,设置为:通过以下方式之一确定安全区域选择操作有效:Optionally, the terminal further includes: a determining module, configured to: determine that the security zone selection operation is valid by one of the following methods:
检测到输入的第一位置和第二位置为同时按压,第一位置第二位置即检测到用户同时两指用力按压;The first position and the second position of the input are detected to be simultaneously pressed, and the first position and the second position are detected, and the two fingers are pressed at the same time;
检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内,第一位置第二位置即用户用力按压一点之后,经过一段时间的寻找到另 外一个按压点;Detecting that the pressing time interval between the first position and the second position is within a preset time range, the first position, the second position, that is, after the user presses a little force, after a period of searching for another a pressing point outside;
检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作第一位置第二位置,即第一位置和第二位置的按压间隔时间较长,但是在第一位置和第二位置的按压之间检测到用户有其他的触摸操作,但是这些触摸操作时用户为了找到另一个按压位置所做的操作,一般是在第二次进行按压位置与第一次按压位置在不同的屏幕的情况下,同时屏幕的显示内容可能已经发生变化,但是与第一次按压位置的内容属于连续的关系。Detecting that the pressing time interval of the first position to the second position is not within a preset time range, but detecting an operation from the first touch screen to the second position of the second touch screen, the first position, the first position, and The pressing interval of the second position is longer, but the user has detected other touch operations between the pressing of the first position and the second position, but the operations performed by the user in order to find another pressing position during the touch operation are generally In the case where the second pressing position is different from the first pressing position, the display content of the screen may have changed at the same time, but the content of the first pressing position belongs to a continuous relationship.
如果满足上述的选取操作条件,则认为这两次按压属于用户为了确认选择内容而做的有效操作,分别记录两次按压点第一按压位置和第二按压位置的坐标,从而用于对应所在屏幕的行列信息。If the above-mentioned selection operation condition is satisfied, it is considered that the two presses belong to the effective operation performed by the user to confirm the selected content, and the coordinates of the first pressing position and the second pressing position of the pressing point are respectively recorded, thereby being used for the corresponding screen. Queue information.
如图2和图3所示,本发明实施例同屏幕选取安全区的方法,首先压力感应模块91检测用户输入的第一位置(起始点)的压力值,当所述第一位置的第一压力值大于预先设置的第一压力阈值时,选取模块92触发终端安全区域选择操作;压力感应模块91继续检测用户输入的第二位置的压力值,当第二位置(结束点)的第二压力值大于预先设置的第二压力阈值时,选取模块92根据第一位置与第二位置确定选取的安全区域确定终端安全区域。其中,根据所述第一位置的坐标和所述第二位置的坐标确定安全区域:分别获取第一位置和第二位置在屏幕的坐标,则安全区域为第一位置的坐标和第二位置的坐标框选的区域;或者获取与第一位置最为接近的应用图标位置,例如:第一行第一列的应用图标位置;获取第二位置最为接近的应用图标位置,例如:第四行第四列的应用图标位置,那么,则安全区域为四行四列十六个图标的区域。As shown in FIG. 2 and FIG. 3, in the embodiment of the present invention, a method for selecting a security zone on the screen, firstly, the pressure sensing module 91 detects a pressure value of a first position (starting point) input by the user, when the first position is first. When the pressure value is greater than the preset first pressure threshold, the selection module 92 triggers the terminal safety zone selection operation; the pressure sensing module 91 continues to detect the pressure value of the second position input by the user, and the second pressure of the second position (end point) When the value is greater than the preset second pressure threshold, the selection module 92 determines the selected security zone based on the first location and the second location to determine the terminal security zone. The security area is determined according to the coordinates of the first location and the coordinates of the second location: respectively acquiring coordinates of the first location and the second location on the screen, where the security zone is the coordinates of the first location and the second location The area selected by the coordinate frame; or the application icon position closest to the first position, for example, the application icon position of the first row and the first column; and the application icon position closest to the second location, for example, the fourth row and the fourth The application icon position of the column, then the security area is the area of four rows and four columns of sixteen icons.
如图4和图5所示,本发明实施例跨屏选取安全区域方法,首先压力感应模块91检测用户输入的第一位置(起始点)的压力值,选取模块92当第一位置的压力值大于预先设置的第一压力阈值时,触发终端安全区域选择操作;终端检测用户向左滑动屏幕动作(或者向右滑动屏幕动作),进入到第二屏幕,压力感应模块91继续检测用户在第二屏幕输入的第二位置的第二压力值,当第二位置(结束点)的第二压力值大于预先设置的第二压力阈值 时,选取模块92根据所述第一位置的坐标和所述第二位置的坐标确定终端安全区域。根据第一位置的坐标限定的第四象限所在区域,第二位置的坐标限定的第二象限所在区域,以及第一屏幕和第二屏幕之间的屏幕区域确定安全区域;或者获取与第一位置最为接近的应用图标位置,例如:第一行第一列的应用图标位置,获取第二位置最接近的应用图标的坐标例如:第三行第四列的应用图标位置,则安全区域为第一页整页图标区域和第二页的三行四列图标的区域。As shown in FIG. 4 and FIG. 5, in the embodiment of the present invention, the security area method is selected across the screen. First, the pressure sensing module 91 detects the pressure value of the first position (starting point) input by the user, and selects the pressure value of the first position of the module 92. When the first pressure threshold is greater than the preset pressure threshold, the terminal security area selection operation is triggered; the terminal detects that the user slides the screen to the left (or slides the screen to the right) to enter the second screen, and the pressure sensing module 91 continues to detect that the user is in the second a second pressure value of the second position input by the screen, when the second pressure value of the second position (end point) is greater than a preset second pressure threshold The selection module 92 determines the terminal security area based on the coordinates of the first location and the coordinates of the second location. a region of the fourth quadrant defined according to the coordinates of the first location, a region of the second quadrant defined by the coordinates of the second location, and a screen region between the first screen and the second screen to determine the security region; or obtaining the first location The closest application icon location, for example, the application icon location in the first column of the first row, and the coordinates of the application icon closest to the second location, for example, the application icon location in the fourth row and the fourth column, the security zone is the first The page full page icon area and the area of the second page of the three rows and four columns of icons.
可选的,上述终端还包括提示模块,设置为:对安全区域内的应用进行加密之前,提示用户移动安全区域内的应用图标和待拖入安全区域内的应用图标。当安全区域确定后,所有应用图标进入可选取状态,用户可以将需要加密的应用图标放置到安全区域,同时也可以对安全区域内的应用进行移动。Optionally, the terminal further includes a prompting module, configured to prompt the user to move the application icon in the security area and the application icon to be dragged into the security area before encrypting the application in the security area. When the security zone is determined, all application icons enter the selectable state, and the user can place the application icon that needs to be encrypted into the security zone, and can also move the application in the security zone.
可选的,上述终端还包括:监控模块,设置为:将安全区域内的一个或者多个应用的标识存储到监控列表中;当终端启动或重新启动时,读取所述监控列表,确定所述标识对应的所述应用处于加密状态。Optionally, the terminal further includes: a monitoring module, configured to: store an identifier of one or more applications in the security area in the monitoring list; when the terminal starts or restarts, read the monitoring list, determine the location The application corresponding to the identifier is in an encrypted state.
压力感应模块91,还设置为:检测安全区域内输入的第三位置的第三压力值;The pressure sensing module 91 is further configured to: detect a third pressure value of the third position input in the safety zone;
验证模块94,设置为:当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密。The verification module 94 is configured to decrypt the application in the secure area when the third pressure value is greater than a preset third pressure threshold.
可选地,验证模块94是设置为:当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解密;当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。Optionally, the verification module 94 is configured to: when the third location corresponds to an application in the security zone, decrypt the application separately; when the third location corresponds to a blank area in the security zone , decrypt all applications in the secure area.
可选的,上述终端还包括提示模块,设置为:提示输入验证密码;验证模块94是设置为:当输入的验证密码与预设的验证密码匹配时,对安全区域进行解密。Optionally, the terminal further includes a prompting module, configured to: prompt to input a verification password; and the verification module 94 is configured to: when the input verification password matches the preset verification password, decrypt the security area.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行, 在执行时,包括方法实施例的步骤之一或其组合。One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, System, device, device, device, etc.) In execution, one or a combination of the steps of the method embodiments is included.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
虽然本发明所揭露的实施方式如上,但所述的内容仅为便于理解本发明而采用的实施方式,并非用以限定本发明。任何本发明所属领域内的技术人员,在不脱离本发明所揭露的精神和范围的前提下,可以在实施的形式及细节上进行任何的修改与变化,但本发明的专利保护范围,仍须以所附的权利要求书所界定的范围为准。While the embodiments of the present invention have been described above, the described embodiments are merely for the purpose of understanding the invention and are not intended to limit the invention. Any modification and variation in the form and details of the embodiments may be made by those skilled in the art without departing from the spirit and scope of the invention. The scope defined by the appended claims shall prevail.
工业实用性Industrial applicability
本发明实施例能够利用压力屏幕的技术,划分终端桌面屏幕为不同的安全层级,从而用户在终端屏幕解锁之后一部分应用可以被使用,另外一部分仍然处于保密状态,从而可防止用户秘密泄露,使得终端的保密性更强,且使用方便,提升了用户的操作体验。 The embodiment of the present invention can utilize the technology of the pressure screen to divide the terminal desktop screen into different security levels, so that some users can be used after the terminal screen is unlocked, and another part is still in a secret state, thereby preventing the user from secretly leaking, so that the terminal is prevented. The confidentiality is stronger and the use is convenient, which improves the user's operating experience.

Claims (15)

  1. 一种终端应用的管理方法,所述方法包括:A method for managing a terminal application, the method comprising:
    检测第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;Detecting a first pressure value of the first position, and triggering a safe area selection operation when the first pressure value is greater than a preset first pressure threshold;
    检测第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;Detecting a second pressure value of the second position, and determining the selected safety area according to the first position and the second position when the second pressure value is greater than a preset second pressure threshold;
    对所述安全区域内的应用进行加密操作。Encrypting operations on applications in the secure area.
  2. 如权利要求1所述的方法,其中,所述根据所述第一位置与所述第二位置确定选取的安全区域之前,还包括:判断检测到的所述第一位置和第二位置是否有效,当为以下方式之一时则有效:The method of claim 1, wherein the determining the selected security area according to the first location and the second location further comprises: determining whether the detected first location and the second location are valid , valid when it is one of the following ways:
    检测到所述第一位置和第二位置为同时按压;Detecting the first position and the second position as simultaneous pressing;
    检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内;Detecting that the pressing time interval between the first position and the second position is within a preset time range;
    检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作。The pressing time interval in which the first position to the second position is detected is not within a preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
  3. 如权利要求2所述的方法,其中,所述根据所述第一位置与所述第二位置确定选取的安全区域,包括:根据所述第一位置的坐标和所述第二位置的坐标确定安全区域。The method of claim 2, wherein the determining the selected security region based on the first location and the second location comprises: determining, based on coordinates of the first location and coordinates of the second location Safe area.
  4. 如权利要求3所述的方法,其中,根据所述第一位置的坐标和所述第二位置的坐标确定安全区域,包括:The method of claim 3, wherein determining the security zone based on the coordinates of the first location and the coordinates of the second location comprises:
    当所述第一位置和第二位置位于同一屏幕时,所述安全区域为第一位置的坐标和第二位置的坐标框选的区域;When the first location and the second location are on the same screen, the security zone is a coordinate of the first location and a coordinate selection of the second location;
    当所述第一位置位于第一屏幕,所述第二位置位于第二屏幕时,所述安全区域包括第一位置的坐标限定的第四象限所在区域,第二位置的坐标限定的第二象限所在区域,以及第一屏幕和第二屏幕之间的屏幕区域。When the first position is located at the first screen and the second position is located at the second screen, the security area includes a fourth quadrant defined by the coordinates of the first location, and the second quadrant of the coordinate of the second location The area, and the area of the screen between the first screen and the second screen.
  5. 如权利要求1所述的方法,其中,所述对所述安全区域内的应用进行加密之前,还包括: The method of claim 1, wherein before the encrypting the application in the secure area, the method further comprises:
    提示用户调整安全区域内的应用图标位置和待添加入安全区域内或者从安全区域移出的应用图标。The user is prompted to adjust the location of the application icon in the security zone and the application icon to be added to or removed from the security zone.
  6. 如权利要求1所述的方法,所述方法还包括:The method of claim 1 further comprising:
    将安全区域内的应用的标识存储到安全列表中;Store the ID of the application in the secure area to the safe list;
    当触发启动应用时,判断所述应用的标识是否在所述安全列表中,当所述应用的标识在所述安全列表中则拒绝启动,当所述应用的标识不在所述安全列表中则直接启动。When the application is triggered to be triggered, it is determined whether the identifier of the application is in the security list, and when the identifier of the application is in the security list, the activation is refused, and when the identifier of the application is not in the security list, start up.
  7. 如权利要求2至6任意一项所述的方法,其中,对所述安全区域内的应用进行加密的步骤中,通过以下方式之一进行加密:指纹、虹膜、眼纹、图案和字符串。The method according to any one of claims 2 to 6, wherein in the step of encrypting an application in the secure area, encryption is performed by one of the following methods: a fingerprint, an iris, an eye pattern, a pattern, and a character string.
  8. 一种终端应用管理方法,所述方法包括:A terminal application management method, the method comprising:
    检测安全区域内输入的第三位置的第三压力值,其中,所述安全区域为检测到第一位置的第一压力值,当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作,且检测到第二位置的第二压力值,当所述第二压力值大于预先设置的第二压力阈值时,根据第一位置与第二位置确定选取的;Detecting a third pressure value of the third position input in the safety zone, wherein the safety zone is a first pressure value detecting the first position, and when the first pressure value is greater than a preset first pressure threshold, Triggering a safe area selection operation, and detecting a second pressure value of the second position, when the second pressure value is greater than a preset second pressure threshold, determining the selected according to the first position and the second position;
    当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密。When the third pressure value is greater than a third pressure threshold set in advance, the application in the secure area is decrypted.
  9. 如权利要求8所述的方法,所述当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密包括:The method according to claim 8, wherein when the third pressure value is greater than a preset third pressure threshold, decrypting an application in the secure area comprises:
    当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解密;Demystifying the application separately when the third location corresponds to an application in the security zone;
    当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。When the third location corresponds to a blank area in the secure area, all applications in the secure area are decrypted.
  10. 一种终端,所述终端包括:A terminal, the terminal comprising:
    压力感应模块,设置为:检测第一位置的第一压力值和第二位置的第二压力值; a pressure sensing module configured to: detect a first pressure value of the first position and a second pressure value of the second position;
    选取模块,设置为:当所述第一压力值大于预先设置的第一压力阈值时,触发安全区域选取操作;当所述第二压力值大于预先设置的第二压力阈值时,根据所述第一位置与所述第二位置确定选取的安全区域;a selection module, configured to: when the first pressure value is greater than a preset first pressure threshold, triggering a safe area selection operation; and when the second pressure value is greater than a preset second pressure threshold, according to the a location and the second location determine a selected security zone;
    加密模块,设置为:对所述安全区域内的应用进行加密。The encryption module is configured to: encrypt an application in the security zone.
  11. 如权利要求10所述的终端,所述终端还包括:判断模块,设置为:根据所述第一位置与所述第二位置确定选取的安全区域之前判断检测到的所述第一位置和第二位置是否有效,当为以下方式之一时则有效:The terminal of claim 10, the terminal further comprising: a determining module, configured to: determine the detected first location and the first before determining the selected security zone according to the first location and the second location Whether the second position is valid is valid when it is one of the following ways:
    检测到输入的第一位置和第二位置为同时按压;The first position and the second position of the input are detected to be simultaneously pressed;
    检测到所述第一位置与所述第二位置的按压时间间隔在预设时间范围内;Detecting that the pressing time interval between the first position and the second position is within a preset time range;
    检测到所述第一位置到所述第二位置的按压时间间隔不在预设时间范围内,但检测到从第一触摸屏切换到第二触摸屏的操作。The pressing time interval in which the first position to the second position is detected is not within a preset time range, but an operation of switching from the first touch screen to the second touch screen is detected.
  12. 如权利要求10所述的终端,所述终端还包括提示模块,设置为:对所述安全区域内的应用进行加密操之前,提示用户调整安全区域内的应用图标位置和待添加入安全区域内或者从安全区域移出的应用图标。The terminal of claim 10, the terminal further comprising a prompting module, configured to: prompt the user to adjust the location of the application icon in the security zone and to be added to the security zone before performing the encryption operation on the application in the security zone Or an app icon that is removed from the secure area.
  13. 如权利要求10所述的终端,所述终端还包括:The terminal of claim 10, the terminal further comprising:
    监控模块,设置为:将安全区域内的应用的标识存储到安全列表中;当终端应用启动时,判断所述应用的标识是否在安全列表中,当所述应用的标识在安全列表中则拒绝启动,当所述应用的标识不在所述安全列表中则直接启动。The monitoring module is configured to: store the identifier of the application in the security area in the security list; when the terminal application starts, determine whether the identifier of the application is in the security list, and reject the identifier of the application in the security list. Startup, starting directly when the identity of the application is not in the security list.
  14. 如权利要求10所述的终端,其中,The terminal of claim 10, wherein
    所述压力感应模块,还设置为:检测安全区域内输入的第三位置的第三压力值;The pressure sensing module is further configured to: detect a third pressure value of the third position input in the safety zone;
    所述终端还包括:验证模块,设置为:当所述第三压力值大于预先设置的第三压力阈值时,对安全区域内的应用进行解密。The terminal further includes: a verification module, configured to: when the third pressure value is greater than a preset third pressure threshold, decrypt the application in the security area.
  15. 如权利要求14所述的终端,其中,所述验证模块是设置为:The terminal of claim 14, wherein the verification module is configured to:
    当所述第三位置对应所述安全区域内的应用时,单独对所述应用进行解 密;Solving the application separately when the third location corresponds to an application in the security zone dense;
    当所述第三位置对应所述安全区域内的空白区域,对安全区域内的所有应用进行解密。 When the third location corresponds to a blank area in the secure area, all applications in the secure area are decrypted.
PCT/CN2016/077710 2015-11-02 2016-03-29 Terminal and application management method therefor WO2016197669A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510733759.5 2015-11-02
CN201510733759.5A CN106650390B (en) 2015-11-02 2015-11-02 Terminal and application management method thereof

Publications (1)

Publication Number Publication Date
WO2016197669A1 true WO2016197669A1 (en) 2016-12-15

Family

ID=57504690

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/077710 WO2016197669A1 (en) 2015-11-02 2016-03-29 Terminal and application management method therefor

Country Status (2)

Country Link
CN (1) CN106650390B (en)
WO (1) WO2016197669A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107450834A (en) * 2017-07-26 2017-12-08 珠海市魅族科技有限公司 A kind of method, apparatus of data deciphering, computer installation and computer-readable storage medium
CN109407938A (en) 2018-09-30 2019-03-01 联想(北京)有限公司 A kind of information processing method, device and electronic equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103543933A (en) * 2012-07-09 2014-01-29 华为终端有限公司 Method for selecting files and touch terminal
CN104992109A (en) * 2015-06-12 2015-10-21 努比亚技术有限公司 Method and device for password setting and method and device for password matching
CN104991643A (en) * 2015-06-23 2015-10-21 广东欧珀移动通信有限公司 Control method for user terminal and user terminal

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110092049A (en) * 2010-02-08 2011-08-17 삼성전자주식회사 Touch-type display apparatus, screen division method and storage medium thereof
CN102479040B (en) * 2010-11-25 2015-06-24 联想(北京)有限公司 Touch processing method and portable mobile terminal
US9372540B2 (en) * 2011-04-19 2016-06-21 Lg Electronics Inc. Method and electronic device for gesture recognition
CN102750101B (en) * 2012-06-26 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Trigger method and the device of the instruction that starts application
KR20140027578A (en) * 2012-07-06 2014-03-07 삼성전자주식회사 Method for controlling lock function and an electronic device thereof
CN103870073B (en) * 2012-12-18 2017-02-08 联想(北京)有限公司 Information processing method and electronic equipment
CN104915606A (en) * 2015-05-29 2015-09-16 努比亚技术有限公司 File encryption and decryption methods and devices
CN104898926B (en) * 2015-05-29 2018-04-27 努比亚技术有限公司 The screenshot method and device of mobile terminal
CN104915119B (en) * 2015-06-24 2018-05-18 努比亚技术有限公司 Terminal desktop icon method of adjustment and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103543933A (en) * 2012-07-09 2014-01-29 华为终端有限公司 Method for selecting files and touch terminal
CN104992109A (en) * 2015-06-12 2015-10-21 努比亚技术有限公司 Method and device for password setting and method and device for password matching
CN104991643A (en) * 2015-06-23 2015-10-21 广东欧珀移动通信有限公司 Control method for user terminal and user terminal

Also Published As

Publication number Publication date
CN106650390B (en) 2021-08-03
CN106650390A (en) 2017-05-10

Similar Documents

Publication Publication Date Title
US11531758B2 (en) Provision of domains in secure enclave to support multiple users
US10073985B2 (en) Apparatus and method for trusted execution environment file protection
EP3120291B1 (en) Rapid data protection for storage devices
KR101682158B1 (en) Adaptive sensing component resolution based on touch location authentication
CN107431924B (en) Device theft protection associating device identifiers with user identifiers
US10909234B2 (en) Method and apparatus for unlocking user interface
US11455432B1 (en) Multi-user storage volume encryption via secure processor
KR101687510B1 (en) Authentication using a subset of a user-known code sequence
US8296841B2 (en) Trusted platform module supported one time passwords
WO2017008676A1 (en) Application authority configuration method and apparatus, and electronic device
US10523663B2 (en) Shared password protection within applications
US8875263B1 (en) Controlling a soft token running within an electronic apparatus
TW201539247A (en) Password input and verification method and system thereof
US20170169213A1 (en) Electronic device and method for running applications in different security environments
US20150047019A1 (en) Information processing method and electronic device
CN105809000A (en) Information processing method and electronic device
CN106778124A (en) The application method and device of a kind of hiden application
WO2016197669A1 (en) Terminal and application management method therefor
US20200401679A1 (en) Method and system for preventing unauthorized computer processing
JP2011192154A (en) Usb storage device
CN104239809A (en) File protecting method, file protecting device, file decryption method, file decryption device and terminal
TWI501106B (en) Storage medium securing method and media access device thereof background
Initiative Man in the cloud (mitc) attacks
TW201504838A (en) Application executing system and method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16806567

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16806567

Country of ref document: EP

Kind code of ref document: A1