WO2020156440A1 - Application control method and terminal device - Google Patents

Application control method and terminal device Download PDF

Info

Publication number
WO2020156440A1
WO2020156440A1 PCT/CN2020/073805 CN2020073805W WO2020156440A1 WO 2020156440 A1 WO2020156440 A1 WO 2020156440A1 CN 2020073805 W CN2020073805 W CN 2020073805W WO 2020156440 A1 WO2020156440 A1 WO 2020156440A1
Authority
WO
WIPO (PCT)
Prior art keywords
input
information
user
drawing area
encrypted
Prior art date
Application number
PCT/CN2020/073805
Other languages
French (fr)
Chinese (zh)
Inventor
彭海清
Original Assignee
维沃移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 维沃移动通信有限公司 filed Critical 维沃移动通信有限公司
Publication of WO2020156440A1 publication Critical patent/WO2020156440A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the embodiments of the present disclosure relate to the field of communication technologies, and in particular, to an application control method and terminal equipment.
  • Smart terminals such as mobile phones
  • smart terminals have become indispensable electronic products in people's lives.
  • various applications are installed on smart terminals.
  • some applications are unwilling to be seen by other users. Therefore, application locks came into being.
  • the embodiments of the present disclosure provide an application control method and a terminal device to solve the problems of cumbersome, low-efficiency and inconvenient encryption application setting operations in related technologies.
  • an embodiment of the present disclosure provides an application control method applied to a terminal device, including:
  • the target object is encrypted through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
  • the embodiments of the present disclosure also provide a terminal device, including:
  • the first receiving module is configured to receive the first input of the user on the first target application interface
  • the first output module is configured to output first prompt information in response to the first input, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
  • An obtaining module configured to obtain the first information input by the user in the encrypted information drawing area
  • the encryption module is configured to encrypt a target object through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
  • the embodiments of the present disclosure also provide a terminal device, including a processor, a memory, and a computer program stored on the memory and running on the processor, and the computer program is executed by the processor.
  • the steps of the application control method as described above are realized during execution.
  • the embodiments of the present disclosure also provide a computer-readable storage medium having a computer program stored on the computer-readable storage medium to implement the steps of the application control method described above.
  • the first prompt information is used to prompt the user to enter the first input Input information in the corresponding encrypted information drawing area; obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the first
  • the application program corresponding to the target application interface in this way, can realize real-time encryption setting, with high efficiency and simple and convenient operation, which improves the safety of operation.
  • FIG. 1 is a schematic flowchart of an application encryption method provided by an embodiment of the disclosure
  • FIG 3 is the second schematic diagram of the specific implementation process of the application control method in an example of the first embodiment of the disclosure
  • step 103 of the application control method is a schematic diagram of the implementation process of step 103 of the application control method based on the example of FIG. 3;
  • FIG. 6 is the second schematic diagram of the specific implementation process of the application control method after step 104 in an example of the embodiment of the disclosure
  • FIG. 7 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure.
  • FIG. 8 is a schematic diagram of the hardware structure of a terminal device provided by an embodiment of the disclosure.
  • FIG. 1 it is a schematic flowchart of an application control method provided by an embodiment of the present disclosure. The following describes the implementation process of this method in detail with reference to the figure.
  • Step 101 Receive a user's first input on a first target application interface.
  • the first input is a preset input.
  • the first input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input
  • the first input can be one of the above-mentioned inputs, or can also be a combined input of two or more of them.
  • Step 102 In response to the first input, output first prompt information, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input.
  • the terminal device outputs the first prompt message in response to the first input received in step 101 above.
  • the first prompt information includes: text prompt, sound prompt, light flashing prompt, etc.
  • the first prompt information is used to help the user quickly identify the encrypted information drawing area, so as to smoothly perform subsequent password settings.
  • Step 103 Obtain the first information input by the user in the encrypted information drawing area.
  • the first information is password information.
  • the password information is set by the user in the encrypted information drawing area, and may include: a digital password, a letter password, a graphic password, or a mixed password of any combination of the three.
  • the graphical password can be a graphical password set according to a preset input template, or a custom graphical password, such as a gesture track.
  • Step 104 Encrypt a target object through the first information, the target object including: the first target application interface or an application program corresponding to the first target application interface.
  • the terminal device before the terminal device performs encryption processing, through a user's selection operation, it can be determined whether to encrypt the first target application interface or to encrypt the application program corresponding to the first target application interface. Specifically, a selection dialog box including the encrypted first target application interface and the application corresponding to the first target application interface may be popped up for the user to select, and then the terminal device determines the final encryption object through the user's selection operation.
  • the determination of the final encryption object is not limited to the above-mentioned methods, and other methods are also possible, which are not specifically limited here.
  • the first prompt information is used to prompt the user to enter the encryption corresponding to the first input Input information in the information drawing area; obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the first target application interface
  • the corresponding application program in this way, can realize real-time encryption settings, with high efficiency and simple and convenient operation, which improves the safety of operation.
  • step 102 may specifically include the following steps:
  • the input trajectory of the first input can be obtained through trajectory recognition.
  • the first input is a sliding input; wherein the starting position of the sliding track of the sliding input is any position on the first side of the screen, and the ending position of the sliding track of the sliding input is Any position of the second side of the screen, where the first side and the second side are different sides of the screen;
  • start position and the end position of the sliding track of the sliding input are respectively different positions on the same side of the screen;
  • the sliding track of the sliding input forms a closed curve.
  • the encrypted information drawing area is determined based on the input trajectory, and the determination method is simple and easy to handle, and the efficiency of determining the encrypted information drawing area is high.
  • the first target application interface is divided into two areas by the input track.
  • the input trajectory divides the screen displaying the first target application interface into two areas, one of which can be used as an encrypted information drawing area, and the other can be used as an application interface display area.
  • the application interface display area may display content displayed on the first target application interface before receiving the first input.
  • the specific may include but not limited to the following two implementation modes.
  • Manner 1 Determine the area where the first side of the input track is located as the encrypted information drawing area.
  • the two sides of the input track respectively correspond to one area.
  • the area where the first side of the input track is located can be an area preset by the user, or a system default area.
  • Manner 2 According to the areas of the two regions, it is determined that one of the two regions is an encrypted information drawing area.
  • the input trajectory divides the first target application interface into two regions with unequal areas, then according to the ratio of the area area to the screen display area, it is determined that the ratio of the area area to the screen display area is smaller
  • the area is the encrypted information drawing area; or the area where the area is determined to occupy a larger proportion of the screen display area is the encrypted information drawing area.
  • the area with the smaller area or the area with the larger area of the two is determined as the encrypted information drawing area.
  • first prompt information is output.
  • the text prompt information can be displayed in the encrypted information drawing area.
  • the location of the encrypted information drawing area can be prompted by voice.
  • the terminal device can be used to control the screen area corresponding to the encrypted information drawing area to flash light at a preset flashing frequency.
  • the method may further include:
  • the area contour line of the encrypted information drawing area can restrict the user's input operation range to prevent It happens that invalid input is entered on other areas than the encrypted information drawing area by crossing the area outline.
  • the area contour line can be adjusted through the user's input operation, thereby adjusting the size of the encrypted information drawing area.
  • the method may further include:
  • a second target application interface or a desktop of the terminal device is displayed in an area of the first target application interface except the encrypted information drawing area.
  • the encrypted information drawing area can be locked by obfuscation or overwriting other images.
  • the second target application interface or terminal device’s interface can be displayed in the area of the first target application interface except the encrypted information drawing area.
  • Desktop to facilitate user operation It can be understood here that the contents of two areas on the screen are displayed on a split screen.
  • the second target application interface is an upper level interface of the first target application interface before entering the first target application interface.
  • step 104 other optional implementation manners can also be adopted.
  • the password set by the user in the encrypted information drawing area is a graphic password
  • the first target application interface or the application corresponding to the first target application interface can be obfuscated or overwritten by other images.
  • the entire screen will finally return to the desktop of the terminal device in the form of an animation in which the graphic drawn by the user is gradually enlarged.
  • the method may further include:
  • the size of the encrypted information drawing area can be adjusted through user operations to realize the hiding of the encrypted information drawing area.
  • the encrypted information drawing area is reduced by a user operation, and when the proportion of the encrypted information drawing area on the screen of the terminal device decreases to zero, the encrypted information drawing area is hidden.
  • the terminal device receives the user's first sliding input on the application interface A, as shown by the arrow on the left side of FIG. 2 or the arrow on the left side of FIG. 3.
  • an entrance to the drawing mode of applying encrypted information is provided on the preset side of the screen of the terminal device. After the entry is called out through a user operation, the user's input to the application interface A is a valid input.
  • the password information drawing area 1 and the application interface display area 2 are displayed, as shown in the right diagram of FIG. 2 or as shown in the right diagram of FIG. 3.
  • two areas of different shapes are divided by the user's sliding input, one is the password information drawing area, and the other is the application interface display area.
  • the application interface display area 2 displays the information content of the application interface A.
  • the user s second sliding input to the password information drawing area 1 is received; as shown in Figure 4, the sliding track formed by the second sliding input is a triangle, that is, the password is set to a graphic password this time. That is the first information.
  • the application interface A or the application corresponding to the application interface A is encrypted.
  • the application control method receives a user's first input on a first target application interface; in response to the first input, outputs first prompt information, and the first prompt information is used to prompt the user to enter the first target application interface.
  • Input the corresponding input information in the encrypted information drawing area obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the second
  • An application program corresponding to a target application interface in this way, can realize real-time encryption settings, with high efficiency and simple and convenient operation.
  • step 104 the method further includes:
  • the second input is a preset input
  • the second input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input
  • the second input can be one of the aforementioned inputs, or can also be a combination of two or more of the inputs.
  • output second prompt information In response to the second input, output second prompt information, where the second prompt information is used to prompt the user to input information in the decryption information drawing area corresponding to the second input;
  • the second prompt information includes: text prompt, sound prompt, light flashing prompt, etc.
  • the second prompt information is used to help the user quickly identify the decryption information drawing area, so as to facilitate subsequent input of the decryption information.
  • the second information is information used to decrypt the encrypted target object.
  • the encrypted target object can be successfully decrypted only when the second information is the first information input in the encrypted information drawing area when the previous password is set.
  • the second prompt information is output, and the second prompt information is used to prompt the user to enter the corresponding Enter information in the decryption information drawing area; obtain the second information input by the user in the decryption information drawing area; use the second information to decrypt the encrypted target object, so that the decryption operation is simple and convenient, and the efficiency is high.
  • the method may further include: displaying the decrypted target object in full screen on the screen of the terminal device.
  • the decrypted target object is the first target application interface
  • the first target application interface is displayed on the screen of the terminal device in full screen.
  • the application interface of the application program is displayed on the screen of the terminal device in full screen.
  • the decrypted target object is displayed on the screen of the terminal device in full screen, indicating that the terminal device has entered a normal operation interface, which is convenient for the user's subsequent operations.
  • the method may further include:
  • the decrypted target object is displayed in the decryption information drawing area, and the third target application interface or the desktop of the terminal device is displayed in the area of the first interface except the decryption information drawing area.
  • this step while not affecting the user's operation and use of the decrypted target object, it can also facilitate the user's operation and use of other interfaces or applications, which can be understood as a split-screen display of two areas on the screen.
  • the third target application interface is an upper level interface of the first interface before entering the first interface.
  • the method can also include:
  • the area contour of the decryption information drawing area can restrict the user's input operation range. In order to prevent the invalid input from crossing the contour line of the area and inputting on other areas except the decrypted information drawing area.
  • the area contour line can be adjusted through the user's input operation, thereby adjusting the size of the decryption information drawing area.
  • the method may include:
  • the third input is a preset input.
  • the third input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input
  • the third input can be one of the aforementioned inputs, or can also be a combination of two or more of the inputs.
  • the decrypted information drawing area corresponds to the encrypted information drawing area. Specifically, it means that the decrypted information drawing area and the encrypted information drawing area when the password is set have the same position on the screen of the terminal device, the same shape and the same size, and its purpose It is to help users quickly recall the password of the target object when the password was set, and to improve the efficiency of decryption.
  • step 104 The following two examples are used to specifically illustrate the implementation process of the method of the present disclosure after step 104.
  • the terminal device displays the decryption information drawing area 3 and the application interface display area 4, as shown in the right diagram in FIG. 5.
  • the application interface display area 4 displays the desktop of the application icon of the encrypted application B.
  • the third sliding input of the user in the decryption information drawing area 3 is received, as shown in the right diagram in FIG. 5, the third sliding input corresponds to the second sliding input in the example of the above application control method, corresponding to FIG. 4
  • the sliding track formed by the third sliding input is a triangle, that is, the password used for decryption is a graphic password.
  • the terminal device displays the decryption information drawing area 3 and the application interface display area 4 in response to the fourth sliding input, as shown in FIG. 6.
  • the application interface display area 4 displays the encrypted application interface C.
  • the fourth sliding input is used to call out the decryption information drawing area.
  • the area outline 5 of the decryption information drawing area 3 can also be displayed.
  • the fifth sliding input of the user in the decryption information drawing area 3 is received.
  • the fifth sliding input corresponds to the second sliding input in the example of the above application control method, and corresponds to the second sliding input shown in FIG.
  • the sliding track formed by the fifth sliding input is a triangle, that is, the password used for decryption is a graphic password.
  • the user inputs a second input of the first interface where the encrypted target object is located; in response to the second input, the second input is output.
  • Prompt information the second prompt information is used to prompt the user to input information in the decrypted information drawing area corresponding to the second input; obtain the second information entered by the user in the decrypted information drawing area; use the second information to The target object is decrypted, so its decryption operation is simple, convenient and efficient.
  • embodiments of the present disclosure provide a terminal device for implementing the above method.
  • FIG. 7 it is a schematic structural diagram of a terminal device provided by an embodiment of the present disclosure.
  • the embodiment of the present disclosure provides a terminal device 700, which may include: a first receiving module 701, a first output module 702, an obtaining module 703, and an encryption module 704.
  • the first receiving module 701 is configured to receive a user's first input on the first target application interface
  • the first output module 702 is configured to output first prompt information in response to the first input, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
  • the first obtaining module 703 is configured to obtain the first information input by the user in the encrypted information drawing area
  • the encryption module 704 is configured to encrypt a target object through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
  • the first output module 702 may specifically include:
  • the first acquisition sub-module is used to acquire the input track of the first input
  • the output submodule is used to draw the area based on the encrypted information and output the first prompt information.
  • the first input is a sliding input; wherein the starting position of the sliding track of the sliding input is any position on the first side of the screen, and the ending position of the sliding track of the sliding input is Any position of the second side of the screen, the first side and the second side are different sides of the screen; or, the start position and the end position of the sliding track of the sliding input are respectively the screen Different positions on the same side of, or, the sliding track of the sliding input forms a closed curve.
  • the first target application interface is divided into two areas by the input track;
  • processing sub-module includes:
  • a first processing unit configured to determine an area where the first side of the input track is located as an encrypted information drawing area
  • the second processing unit is configured to determine that one of the two areas is an encrypted information drawing area according to the areas of the two areas.
  • the terminal device 700 may further include:
  • the first display module is configured to display a second target application interface or the desktop of the terminal device in an area of the first target application interface except the encrypted information drawing area.
  • the terminal device 700 may further include:
  • the hiding module is used to hide the encrypted information drawing area after encrypting the target object through the first information.
  • the terminal device 700 may further include:
  • the second receiving module is configured to receive a user's second input on the first interface where the encrypted target object is located;
  • the second output module is configured to output second prompt information in response to the second input, where the second prompt information is used to prompt the user to input information in the decryption information drawing area corresponding to the second input;
  • the second acquisition module is configured to acquire the second information input by the user in the decryption information drawing area
  • the first decryption module is configured to use the second information to decrypt the encrypted target object.
  • the terminal device 700 may further include:
  • the third receiving module is configured to receive a user's third input on the first interface where the encrypted target object is located;
  • the second display module is configured to display the decryption information drawing area corresponding to the third input in response to the third input;
  • the third acquisition module is configured to acquire the third information input by the user in the decryption information drawing area
  • the third decryption module is configured to use the third information to decrypt the encrypted target object.
  • the terminal device provided by the embodiment of the present disclosure can implement each process implemented by the mobile terminal in the method embodiments of FIGS. 1 to 6. To avoid repetition, details are not described herein again.
  • the terminal device receives the user's first input to the first target application interface through the first receiving module; the first output module responds to the first input and outputs the first prompt information, and the first prompt information is used In order to prompt the user to input information in the encrypted information drawing area corresponding to the first input; afterwards, the first obtaining module obtains the first information input by the user in the encrypted information drawing area; the encryption module uses the first information to perform the target object Encryption, the target object includes: a first target application interface or an application program corresponding to the first target application interface. In this way, real-time encryption settings can be realized, with high efficiency and simple and convenient operation.
  • FIG. 8 is a schematic diagram of the hardware structure of a terminal device implementing various embodiments of the present disclosure.
  • the terminal device 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and Power supply 811 and other components.
  • a radio frequency unit 801 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and Power supply 811 and other components.
  • the terminal device may include more or fewer components than shown in the figure, or a combination of certain components, or different components. Layout.
  • terminal devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminal devices, wearable devices, and pedometers.
  • the user input unit 807 is configured to receive a user's first input on the first target application interface; the processor 810 is configured to output first prompt information in response to the first input, and the first prompt information is used to prompt the user Input information in the encrypted information drawing area corresponding to the first input; obtain the first information input by the user in the encrypted information drawing area; encrypt the target object through the first information, and the target object Including: the first target application interface or an application program corresponding to the first target application interface.
  • real-time encryption settings can be realized, with high efficiency and simple and convenient operation.
  • the radio frequency unit 801 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 810; Uplink data is sent to the base station.
  • the radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like.
  • the radio frequency unit 801 can also communicate with the network and other devices through a wireless communication system.
  • the terminal device provides users with wireless broadband Internet access through the network module 802, such as helping users to send and receive emails, browse web pages, and access streaming media.
  • the audio output unit 803 can convert the audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into audio signals and output them as sounds. Moreover, the audio output unit 803 may also provide audio output related to a specific function performed by the terminal device 800 (for example, call signal reception sound, message reception sound, etc.).
  • the audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
  • the input unit 804 is used to receive audio or video signals.
  • the input unit 804 may include a graphics processing unit (GPU) 8041 and a microphone 8042.
  • the graphics processor 8041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed.
  • the processed image frame can be displayed on the display unit 1006.
  • the image frame processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or sent via the radio frequency unit 801 or the network module 802.
  • the microphone 8042 can receive sound and can process such sound into audio data.
  • the processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 801 for output in the case of a telephone call mode.
  • the terminal device 800 also includes at least one sensor 805, such as a light sensor, a motion sensor, and other sensors.
  • the light sensor includes an ambient light sensor and a proximity sensor.
  • the ambient light sensor can adjust the brightness of the display panel 8061 according to the brightness of the ambient light.
  • the proximity sensor can close the display panel 8061 and the display panel when the terminal device 800 is moved to the ear. / Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of mobile terminal equipment (such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, tap), etc.; sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecular sensor, gyroscope, barometer, hygrometer, thermometer , Infrared sensors, etc., I won’t repeat them here.
  • the display unit 806 is used to display information input by the user or information provided to the user.
  • the display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • the user input unit 807 can be used to receive inputted number or character information, and generate key signal input related to user settings and function control of the mobile terminal device.
  • the user input unit 807 includes a touch panel 8071 and other input devices 8072.
  • the touch panel 8071 also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 8071 or near the touch panel 8071. operating).
  • the touch panel 8071 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 810, the command sent by the processor 810 is received and executed.
  • the touch panel 8071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the user input unit 807 may also include other input devices 8072.
  • other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
  • the touch panel 8071 can cover the display panel 8061.
  • the touch panel 8071 detects a touch operation on or near it, it transmits it to the processor 810 to determine the type of the touch event.
  • the type of event provides corresponding visual output on the display panel 8061.
  • the touch panel 8071 and the display panel 8061 are used as two independent components to implement the input and output functions of the mobile terminal device, in some embodiments, the touch panel 8071 and the display panel 8061 can be combined. Integrate to realize the input and output functions of the mobile terminal device, which is not specifically limited here.
  • the interface unit 808 is an interface for connecting an external device with the terminal device 800.
  • the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc.
  • the interface unit 808 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the terminal device 800 or can be used to connect to the terminal device 800 and external Transfer data between devices.
  • the memory 809 can be used to store software programs and various data.
  • the memory 809 may mainly include a program storage area and a data storage area.
  • the program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones.
  • the memory 809 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
  • the processor 810 is the control center of the mobile terminal device. It uses various interfaces and lines to connect the various parts of the entire mobile terminal device, runs or executes the software programs and/or modules stored in the memory 809, and calls and stores them in the memory 809. Execute various functions and process data of the mobile terminal equipment, so as to monitor the mobile terminal equipment as a whole.
  • the processor 810 may include one or more processing units; optionally, the processor 810 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface and application programs, etc.
  • the adjustment processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 810.
  • the terminal device 800 may also include a power source 811 (such as a battery) for supplying power to various components.
  • a power source 811 such as a battery
  • the power source 811 may be logically connected to the processor 810 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • the terminal device 800 includes some functional modules not shown, which will not be repeated here.
  • an embodiment of the present disclosure further provides a terminal device, including a processor 810, a memory 809, and a computer program stored in the memory 809 and running on the processor 810.
  • the computer program is executed when the processor 810 is executed.
  • the embodiments of the present disclosure also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, each process of the above application control method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here.
  • the computer-readable storage medium such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk, or optical disk, etc.
  • the technical solution of the present disclosure can be embodied in the form of a software product in essence or the part that contributes to the related technology.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk). ) Includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the method described in each embodiment of the present disclosure.

Abstract

An application control method and a terminal device. The method comprises: receiving a first input to a first target application interface by a user (101); in response to the first input, outputting first prompt information, wherein the first prompt information is used to prompt the user to input information in an encrypted information drawing area corresponding to the first input (102); acquiring the first information input by the user in the encrypted information drawing area (103); and encrypting a target object with the first information, wherein the target object comprises: the first target application interface or an application corresponding to the first target application interface (104).

Description

应用控制方法及终端设备Application control method and terminal equipment
相关申请的交叉引用Cross references to related applications
本申请主张在2019年1月28日在中国提交的中国专利申请号No.201910079830.0的优先权,其全部内容通过引用包含于此。This application claims the priority of Chinese Patent Application No. 201910079830.0 filed in China on January 28, 2019, the entire content of which is incorporated herein by reference.
技术领域Technical field
本公开实施例涉及通信技术领域,尤其涉及一种应用控制方法及终端设备。The embodiments of the present disclosure relate to the field of communication technologies, and in particular, to an application control method and terminal equipment.
背景技术Background technique
随着科技的不断发展,智能终端的不断普及。智能终端(如手机)已经成为人们生活中不可或缺的电子产品。为了满足用户的使用需求,智能终端上安装有各种应用。为了保护用户的个人隐私,有些应用是用户不愿让其他人看到的,因此,应用锁应运而生。With the continuous development of technology, smart terminals continue to be popularized. Smart terminals (such as mobile phones) have become indispensable electronic products in people's lives. In order to meet the needs of users, various applications are installed on smart terminals. In order to protect the privacy of users, some applications are unwilling to be seen by other users. Therefore, application locks came into being.
但是,目前大部分的应用锁均需要用户进到应用管理界面中去设置,具体需要进行加密应用选择,有的还需设置密码,其设置操作繁琐,效率低,不方便,用户更多的是选择不去用它。However, most of the current application locks require the user to enter the application management interface to set it, which needs to be encrypted application selection, and some also need to set a password. The setting operation is cumbersome, inefficient and inconvenient. The user is more Choose not to use it.
发明内容Summary of the invention
本公开实施例提供一种应用控制方法及终端设备,以解决相关技术中加密应用设置操作繁琐、效率低且不方便的问题。The embodiments of the present disclosure provide an application control method and a terminal device to solve the problems of cumbersome, low-efficiency and inconvenient encryption application setting operations in related technologies.
为了解决上述技术问题,本公开是这样实现的:In order to solve the above technical problems, the present disclosure is implemented as follows:
第一方面,本公开的实施例提供了一种应用控制方法,应用于终端设备,包括:In the first aspect, an embodiment of the present disclosure provides an application control method applied to a terminal device, including:
接收用户对第一目标应用界面的第一输入;Receiving a user's first input on the first target application interface;
响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;In response to the first input, outputting first prompt information, the first prompt information being used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
获取所述用户在所述加密信息绘制区中输入的第一信息;Acquiring the first information input by the user in the encrypted information drawing area;
通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。The target object is encrypted through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
第二方面,本公开实施例还提供了一种终端设备,包括:In the second aspect, the embodiments of the present disclosure also provide a terminal device, including:
第一接收模块,用于接收用户对第一目标应用界面的第一输入;The first receiving module is configured to receive the first input of the user on the first target application interface;
第一输出模块,用于响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;The first output module is configured to output first prompt information in response to the first input, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
获取模块,用于获取所述用户在所述加密信息绘制区中输入的第一信息;An obtaining module, configured to obtain the first information input by the user in the encrypted information drawing area;
加密模块,用于通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。The encryption module is configured to encrypt a target object through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
第三方面,本公开实施例还提供了一种终端设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现如上所述的应用控制方法的步骤。In a third aspect, the embodiments of the present disclosure also provide a terminal device, including a processor, a memory, and a computer program stored on the memory and running on the processor, and the computer program is executed by the processor. The steps of the application control method as described above are realized during execution.
第四方面,本公开实施例还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,实现如上所述的应用控制方法的步骤。In a fourth aspect, the embodiments of the present disclosure also provide a computer-readable storage medium having a computer program stored on the computer-readable storage medium to implement the steps of the application control method described above.
本公开实施例的上述方案中,通过接收用户对第一目标应用界面的第一输入;响应于该第一输入,输出第一提示信息,该第一提示信息用于提示用户在该第一输入对应的加密信息绘制区输入信息;获取用户在加密信息绘制区中输入的第一信息,通过该第一信息,对目标对象进行加密,所述目标对象包括:第一目标应用界面或者该第一目标应用界面对应的应用程序,如此,能够实现实时加密设置,效率高且操作简单方便,提高了操作的安全性。In the above solution of the embodiment of the present disclosure, by receiving the user's first input on the first target application interface; in response to the first input, outputting first prompt information, the first prompt information is used to prompt the user to enter the first input Input information in the corresponding encrypted information drawing area; obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the first The application program corresponding to the target application interface, in this way, can realize real-time encryption setting, with high efficiency and simple and convenient operation, which improves the safety of operation.
附图说明Description of the drawings
图1为本公开实施例提供的应用加密方法的流程示意图;FIG. 1 is a schematic flowchart of an application encryption method provided by an embodiment of the disclosure;
图2为本公开实施例一示例中应用控制方法的具体实现过程示意图之一;2 is one of the schematic diagrams of the specific implementation process of the application control method in an example of the embodiment of the disclosure;
图3为本公开实施例一示例中应用控制方法的具体实现过程示意图之二;3 is the second schematic diagram of the specific implementation process of the application control method in an example of the first embodiment of the disclosure;
图4为基于图3的示例中应用控制方法的步骤103的实现过程示意图;4 is a schematic diagram of the implementation process of step 103 of the application control method based on the example of FIG. 3;
图5为本公开实施例一示例中应用控制方法在步骤104之后的具体实现过程示意图之一;5 is one of the schematic diagrams of the specific implementation process of the application control method after step 104 in an example of the embodiment of the disclosure;
图6为本公开实施例一示例中应用控制方法在步骤104之后的具体实现 过程示意图之二;6 is the second schematic diagram of the specific implementation process of the application control method after step 104 in an example of the embodiment of the disclosure;
图7为本公开实施例提供的终端设备的结构示意图;FIG. 7 is a schematic structural diagram of a terminal device provided by an embodiment of the disclosure;
图8为本公开实施例提供的终端设备的硬件结构示意图。FIG. 8 is a schematic diagram of the hardware structure of a terminal device provided by an embodiment of the disclosure.
具体实施方式detailed description
下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。The technical solutions in the embodiments of the present disclosure will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present disclosure. Obviously, the described embodiments are part of the embodiments of the present disclosure, not all of the embodiments. Based on the embodiments in the present disclosure, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present disclosure.
如图1所示,为本公开实施例提供的应用控制方法的流程示意图。下面就该图具体说明该方法的实施过程。As shown in FIG. 1, it is a schematic flowchart of an application control method provided by an embodiment of the present disclosure. The following describes the implementation process of this method in detail with reference to the figure.
步骤101,接收用户对第一目标应用界面的第一输入。Step 101: Receive a user's first input on a first target application interface.
本步骤中,第一输入为预先设置的输入,该第一输入可以包括但不限于点击输入、按压输入、长按输入、捏合输入、拖拽输入、滑动输入和划动输入中的至少一种,也即是说,该第一输入可以为上述输入中的其中一种,或者也可以为其中两种或以上输入的组合输入。In this step, the first input is a preset input. The first input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input In other words, the first input can be one of the above-mentioned inputs, or can also be a combined input of two or more of them.
步骤102,响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息。Step 102: In response to the first input, output first prompt information, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input.
本步骤,终端设备响应于上述步骤101接收到的第一输入,输出第一提示信息。In this step, the terminal device outputs the first prompt message in response to the first input received in step 101 above.
需要说明的是,第一提示信息包括:文字提示、声音提示、光闪烁提示等。这里,第一提示信息用于帮助用户快速识别加密信息绘制区,以便于顺利进行后续的密码设置。It should be noted that the first prompt information includes: text prompt, sound prompt, light flashing prompt, etc. Here, the first prompt information is used to help the user quickly identify the encrypted information drawing area, so as to smoothly perform subsequent password settings.
步骤103,获取所述用户在所述加密信息绘制区中输入的第一信息。Step 103: Obtain the first information input by the user in the encrypted information drawing area.
本步骤中,所述第一信息为密码信息。这里,该密码信息为用户在加密信息绘制区设置的,可包括:数字密码、字母密码、图形密码或者三者之间任一组合的混合密码。In this step, the first information is password information. Here, the password information is set by the user in the encrypted information drawing area, and may include: a digital password, a letter password, a graphic password, or a mixed password of any combination of the three.
需要说明的是,图形密码可以是按照预设输入模板进行密码设置的图形密码,也可以是自定义图形密码,比如手势轨迹等。It should be noted that the graphical password can be a graphical password set according to a preset input template, or a custom graphical password, such as a gesture track.
步骤104,通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。Step 104: Encrypt a target object through the first information, the target object including: the first target application interface or an application program corresponding to the first target application interface.
这里,可在终端设备进行加密处理之前,通过用户的选择操作,确定是对第一目标应用界面进行加密,还是对第一目标应用界面对应的应用程序进行加密。具体的,可通过弹出包括加密第一目标应用界面和第一目标应用界面对应的应用程序的选择对话框,以供用户选择,之后,终端设备通过用户的选择操作,确定最终的加密对象。Here, before the terminal device performs encryption processing, through a user's selection operation, it can be determined whether to encrypt the first target application interface or to encrypt the application program corresponding to the first target application interface. Specifically, a selection dialog box including the encrypted first target application interface and the application corresponding to the first target application interface may be popped up for the user to select, and then the terminal device determines the final encryption object through the user's selection operation.
当然,还可以根据系统默认设置,确定是对第一目标应用界面进行加密,还是对第一目标应用界面对应的应用程序进行加密。Of course, it is also possible to determine whether to encrypt the first target application interface or the application corresponding to the first target application interface according to the system default settings.
还有,还可以根据第一目标应用界面的界面类型,确定是对第一目标应用界面进行加密,还是对第一目标应用界面对应的应用程序进行加密。比如,若第一目标应用界面为聊天界面,则加密该第一目标应用界面;若第一目标应用界面为第一目标应用界面对应的应用程序的主界面,则加密该第一目标应用界面对应的应用程序,即对整个应用程序进行加密。这里,确定最终的加密对象不仅限于上述方式,其他方式也可,这里不做具体限定。In addition, it may also be determined according to the interface type of the first target application interface whether to encrypt the first target application interface or to encrypt the application program corresponding to the first target application interface. For example, if the first target application interface is a chat interface, encrypt the first target application interface; if the first target application interface is the main interface of the application corresponding to the first target application interface, encrypt the first target application interface corresponding to The application program is to encrypt the entire application program. Here, the determination of the final encryption object is not limited to the above-mentioned methods, and other methods are also possible, which are not specifically limited here.
本公开实施例中,通过接收用户对第一目标应用界面的第一输入;响应于该第一输入,输出第一提示信息,该第一提示信息用于提示用户在该第一输入对应的加密信息绘制区输入信息;获取用户在加密信息绘制区中输入的第一信息,通过该第一信息,对目标对象进行加密,所述目标对象包括:第一目标应用界面或者该第一目标应用界面对应的应用程序,如此,能够实现实时加密设置,效率高且操作简单方便,提高了操作的安全性。In the embodiments of the present disclosure, by receiving the user's first input on the first target application interface; in response to the first input, outputting first prompt information, the first prompt information is used to prompt the user to enter the encryption corresponding to the first input Input information in the information drawing area; obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the first target application interface The corresponding application program, in this way, can realize real-time encryption settings, with high efficiency and simple and convenient operation, which improves the safety of operation.
基于图1所示的实施例,作为一可选的实现方式,步骤102可以具体包括以下步骤:Based on the embodiment shown in FIG. 1, as an optional implementation, step 102 may specifically include the following steps:
获取所述第一输入的输入轨迹;Acquiring the input track of the first input;
本步骤中,通过轨迹识别可获取第一输入的输入轨迹。In this step, the input trajectory of the first input can be obtained through trajectory recognition.
这里,可选地,所述第一输入为滑动输入;其中,所述滑动输入的滑动轨迹的起点位置为屏幕的第一边的任一位置,所述滑动输入的滑动轨迹的终点位置为所述屏幕的第二边的任一位置,所述第一边与所述第二边为所述屏幕的不同边;Here, optionally, the first input is a sliding input; wherein the starting position of the sliding track of the sliding input is any position on the first side of the screen, and the ending position of the sliding track of the sliding input is Any position of the second side of the screen, where the first side and the second side are different sides of the screen;
或者,所述滑动输入的滑动轨迹的起点位置和终点位置分别为所述屏幕的同一边的不同位置;Alternatively, the start position and the end position of the sliding track of the sliding input are respectively different positions on the same side of the screen;
或者,所述滑动输入的滑动轨迹形成封闭曲线。Alternatively, the sliding track of the sliding input forms a closed curve.
基于所述输入轨迹,确定加密信息绘制区;Determine an encrypted information drawing area based on the input trajectory;
本步骤中,基于输入轨迹,确定加密信息绘制区,其确定方式简单易处理,加密信息绘制区的确定效率高。In this step, the encrypted information drawing area is determined based on the input trajectory, and the determination method is simple and easy to handle, and the efficiency of determining the encrypted information drawing area is high.
这里,可选的,所述第一目标应用界面被所述输入轨迹划分为两个区域。Here, optionally, the first target application interface is divided into two areas by the input track.
换言之,所述输入轨迹将显示有第一目标应用界面的屏幕划分为两个区域,其中一个区域作为加密信息绘制区,另一个区域可作为应用界面显示区域。In other words, the input trajectory divides the screen displaying the first target application interface into two areas, one of which can be used as an encrypted information drawing area, and the other can be used as an application interface display area.
这里,应用界面显示区域可显示接收第一输入之前,第一目标应用界面显示的内容。Here, the application interface display area may display content displayed on the first target application interface before receiving the first input.
本步骤中,具体的可以包括但不限于以下两种实现方式。In this step, the specific may include but not limited to the following two implementation modes.
方式一,将所述输入轨迹的第一侧所在区域确定为加密信息绘制区。Manner 1: Determine the area where the first side of the input track is located as the encrypted information drawing area.
由于第一目标应用界面被所述输入轨迹划分为两个区域,该输入轨迹两侧分别对应一个区域。Since the first target application interface is divided into two areas by the input track, the two sides of the input track respectively correspond to one area.
这里,所述输入轨迹的第一侧所在区域可采用用户预先设置的区域,也可采用系统默认区域。Here, the area where the first side of the input track is located can be an area preset by the user, or a system default area.
方式二,根据所述两个区域的面积,确定所述两个区域中的其中一个区域为加密信息绘制区。Manner 2: According to the areas of the two regions, it is determined that one of the two regions is an encrypted information drawing area.
具体的,若所述输入轨迹将所述第一目标应用界面划分为面积不等的两个区域,则根据区域面积占屏幕显示区域面积的比例,确定区域面积占屏幕显示区域的比例较小的区域为加密信息绘制区;或者确定区域面积占屏幕显示区域的比例较大的区域为加密信息绘制区。Specifically, if the input trajectory divides the first target application interface into two regions with unequal areas, then according to the ratio of the area area to the screen display area, it is determined that the ratio of the area area to the screen display area is smaller The area is the encrypted information drawing area; or the area where the area is determined to occupy a larger proportion of the screen display area is the encrypted information drawing area.
又或者,若所述输入轨迹将所述第一目标应用界面划分为面积不等的两个区域,则将二者中面积较小的区域或者面积较大的区域确定为加密信息绘制区。Or, if the input trajectory divides the first target application interface into two areas with different areas, the area with the smaller area or the area with the larger area of the two is determined as the encrypted information drawing area.
上述确定加密信息绘制区的两种实现方式其处理过程简单快捷,处理效率高。The above two implementations of determining the encrypted information drawing area have a simple and quick processing process and high processing efficiency.
基于所述加密信息绘制区,输出第一提示信息。Based on the encrypted information drawing area, first prompt information is output.
本步骤中,若第一提示信息为文字提示信息,则可在加密信息绘制区内显示该文字提示信息。In this step, if the first prompt information is text prompt information, the text prompt information can be displayed in the encrypted information drawing area.
若第一提示信息为声音提示信息,则可通过声音提示加密信息绘制区的所在位置。If the first prompt information is voice prompt information, the location of the encrypted information drawing area can be prompted by voice.
若第一提示信息为光闪烁提示,则可通过终端设备控制加密信息绘制区所对应的屏幕区域以预设闪烁频率进行光闪烁。If the first prompt information is a light flashing prompt, the terminal device can be used to control the screen area corresponding to the encrypted information drawing area to flash light at a preset flashing frequency.
基于图1所示的实施例,作为另一可选的实现方式,在步骤102之后,步骤103之前,所述方法还可以包括:Based on the embodiment shown in FIG. 1, as another optional implementation manner, after step 102 and before step 103, the method may further include:
显示加密信息绘制区的区域轮廓线。Display the area outline of the encrypted information drawing area.
这里,在用户在加密信息绘制区进行密码设置输入,即输入第一信息时,尤其是通过手势输入自定义图形密码时,加密信息绘制区的区域轮廓线能够约束用户的输入操作幅度,以防越过区域轮廓线在除加密信息绘制区之外的其他区域上输入的无效输入的情况发生。Here, when the user enters the password setting input in the encrypted information drawing area, that is, when the first information is input, especially when the user-defined graphic password is input through gestures, the area contour line of the encrypted information drawing area can restrict the user's input operation range to prevent It happens that invalid input is entered on other areas than the encrypted information drawing area by crossing the area outline.
当然,为了方便用户进行密码设置时的输入操作,满足用户需求,区域轮廓线可通过用户输入操作进行调整,进而调整加密信息绘制区的大小。Of course, in order to facilitate the user's input operation when setting the password and meet the user's needs, the area contour line can be adjusted through the user's input operation, thereby adjusting the size of the encrypted information drawing area.
基于图1所示的实施例,作为又一可选的实现方式,在步骤104之后,所述方法还可以包括:Based on the embodiment shown in FIG. 1, as yet another optional implementation manner, after step 104, the method may further include:
在所述第一目标应用界面除所述加密信息绘制区之外的区域显示第二目标应用界面或所述终端设备的桌面。A second target application interface or a desktop of the terminal device is displayed in an area of the first target application interface except the encrypted information drawing area.
需要说明的是,为了便于用户随时使用加密后的应用界面或者应用程序并且保护用户的个人隐私,具体在进行应用加密处理时,可通过模糊处理或者覆盖其他图像的方式对加密信息绘制区进行锁定,而且在此基础上,为了不影响用户对其他界面或者应用的使用,在加密完成之后,在第一目标应用界面除加密信息绘制区之外的区域可显示第二目标应用界面或终端设备的桌面,以方便用户操作。这里可以理解为,分屏显示屏幕上的两个区域的内容。It should be noted that in order to facilitate the user to use the encrypted application interface or application at any time and protect the user's personal privacy, when the application encryption process is performed, the encrypted information drawing area can be locked by obfuscation or overwriting other images. , And on this basis, in order not to affect the user’s use of other interfaces or applications, after the encryption is completed, the second target application interface or terminal device’s interface can be displayed in the area of the first target application interface except the encrypted information drawing area. Desktop to facilitate user operation. It can be understood here that the contents of two areas on the screen are displayed on a split screen.
这里,一般地,第二目标应用界面为进入该第一目标应用界面之前的该第一目标应用界面的上一级界面。Here, generally, the second target application interface is an upper level interface of the first target application interface before entering the first target application interface.
当然,在步骤104之后,还可以采用其他可选的实现方式。比如,若用 户在加密信息绘制区设置的密码为图形密码,则在进行应用加密处理时,可通过模糊处理或者覆盖其他图像的方式对第一目标应用界面或者第一目标应用界面对应的应用程序进行锁定,之后,为了加强用户对图形密码的记忆,整个屏幕会以用户所绘制的图形逐渐放大的动画形式最后返回至终端设备的桌面。Of course, after step 104, other optional implementation manners can also be adopted. For example, if the password set by the user in the encrypted information drawing area is a graphic password, when performing application encryption processing, the first target application interface or the application corresponding to the first target application interface can be obfuscated or overwritten by other images. After locking, in order to strengthen the user's memory of the graphic password, the entire screen will finally return to the desktop of the terminal device in the form of an animation in which the graphic drawn by the user is gradually enlarged.
基于图1所示的实施例,作为再一可选的实现方式,在步骤104之后,所述方法还可以包括:Based on the embodiment shown in FIG. 1, as yet another optional implementation manner, after step 104, the method may further include:
隐藏所述加密信息绘制区。Hide the encrypted information drawing area.
这里,可通过用户操作调整加密信息绘制区的大小,实现对加密信息绘制区的隐藏。Here, the size of the encrypted information drawing area can be adjusted through user operations to realize the hiding of the encrypted information drawing area.
具体的,通过用户操作调小加密信息绘制区,在加密信息绘制区在终端设备的屏幕上的占比减小至零时,加密信息绘制区被隐藏。Specifically, the encrypted information drawing area is reduced by a user operation, and when the proportion of the encrypted information drawing area on the screen of the terminal device decreases to zero, the encrypted information drawing area is hidden.
需要说明的是,将加密信息绘制区进行隐藏,其目的是为了方便用户对除第一应用界面之外的其他应用界面或者应用程序的操作使用。It should be noted that the purpose of hiding the encrypted information drawing area is to facilitate the user's operation and use of other application interfaces or applications except the first application interface.
下面就一示例,具体说明本公开方法的实现过程。An example is given below to specifically describe the implementation process of the method of the present disclosure.
首先,终端设备接收用户对应用界面A的第一滑动输入,如图2左侧图的箭头所示或者图3左侧图的箭头所示。First, the terminal device receives the user's first sliding input on the application interface A, as shown by the arrow on the left side of FIG. 2 or the arrow on the left side of FIG. 3.
需要说明的是,终端设备的屏幕的预设边上设置有应用加密信息绘制模式的入口。在通过用户操作调出该入口之后,上述用户对应用界面A的输入方为有效输入。It should be noted that an entrance to the drawing mode of applying encrypted information is provided on the preset side of the screen of the terminal device. After the entry is called out through a user operation, the user's input to the application interface A is a valid input.
之后,响应于该第一滑动输入,显示密码信息绘制区1和应用界面显示区2,如图2右侧图所示或者图3右侧图所示。After that, in response to the first sliding input, the password information drawing area 1 and the application interface display area 2 are displayed, as shown in the right diagram of FIG. 2 or as shown in the right diagram of FIG. 3.
这里,如图2右侧图所示或者图3右侧图所示,通过用户的滑动输入分出不同形状的的两个区域,一个为密码信息绘制区,另一个为应用界面显示区。Here, as shown in the right side diagram of FIG. 2 or shown in the right side diagram of FIG. 3, two areas of different shapes are divided by the user's sliding input, one is the password information drawing area, and the other is the application interface display area.
需要说明的是,该应用界面显示区2显示应用界面A的信息内容。It should be noted that the application interface display area 2 displays the information content of the application interface A.
接着,获取用户在加密信息绘制区中输入的第一信息;Next, obtain the first information input by the user in the encrypted information drawing area;
换句话说,接收用户对密码信息绘制区1的第二滑动输入;如图4所示,第二滑动输入形成的滑动轨迹为一三角形,也就是说,此次密码设置为图形 密码,该三角形即为第一信息。In other words, the user’s second sliding input to the password information drawing area 1 is received; as shown in Figure 4, the sliding track formed by the second sliding input is a triangle, that is, the password is set to a graphic password this time. That is the first information.
最后,通过该第一信息,也就是响应于该第二滑动输入,加密该应用界面A或者加密对应该应用界面A的应用程序。Finally, through the first information, that is, in response to the second sliding input, the application interface A or the application corresponding to the application interface A is encrypted.
本公开实施例提供的应用控制方法,通过接收用户对第一目标应用界面的第一输入;响应于该第一输入,输出第一提示信息,该第一提示信息用于提示用户在该第一输入对应的加密信息绘制区输入信息;获取用户在加密信息绘制区中输入的第一信息,通过该第一信息,对目标对象进行加密,所述目标对象包括:第一目标应用界面或者该第一目标应用界面对应的应用程序,如此,能够实现实时加密设置,效率高且操作简单方便。The application control method provided by the embodiments of the present disclosure receives a user's first input on a first target application interface; in response to the first input, outputs first prompt information, and the first prompt information is used to prompt the user to enter the first target application interface. Input the corresponding input information in the encrypted information drawing area; obtain the first information input by the user in the encrypted information drawing area, and encrypt the target object through the first information, the target object including: the first target application interface or the second An application program corresponding to a target application interface, in this way, can realize real-time encryption settings, with high efficiency and simple and convenient operation.
基于图1所示的实施例,作为一可选的实现方式,在步骤104之后,所述方法还包括:Based on the embodiment shown in FIG. 1, as an optional implementation, after step 104, the method further includes:
接收用户对加密后的所述目标对象所在第一界面的第二输入;Receiving a user's second input on the encrypted first interface where the target object is located;
本步骤中,第二输入为预先设置的输入,该第二输入可以包括但不限于点击输入、按压输入、长按输入、捏合输入、拖拽输入、滑动输入和划动输入中的至少一种,也即是说,该第二输入可以为上述输入中的其中一种,或者也可以为其中两种或以上输入的组合输入。In this step, the second input is a preset input, and the second input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input In other words, the second input can be one of the aforementioned inputs, or can also be a combination of two or more of the inputs.
响应于所述第二输入,输出第二提示信息,所述第二提示信息用于提示用户在所述第二输入对应的解密信息绘制区输入信息;In response to the second input, output second prompt information, where the second prompt information is used to prompt the user to input information in the decryption information drawing area corresponding to the second input;
需要说明的是,第二提示信息包括:文字提示、声音提示、光闪烁提示等。这里,第二提示信息用于帮助用户快速识别解密信息绘制区,以便于顺利进行后续的解密信息的输入。It should be noted that the second prompt information includes: text prompt, sound prompt, light flashing prompt, etc. Here, the second prompt information is used to help the user quickly identify the decryption information drawing area, so as to facilitate subsequent input of the decryption information.
获取所述用户在所述解密信息绘制区中输入的第二信息;Acquiring the second information input by the user in the decryption information drawing area;
本步骤中,第二信息为用于解密加密后的目标对象的信息。In this step, the second information is information used to decrypt the encrypted target object.
采用所述第二信息,对加密后的所述目标对象进行解密。Using the second information, decrypt the encrypted target object.
本步骤中,具体的,在第二信息为之前密码设置时在加密信息绘制区输入的第一信息时,方可成功解密加密后的目标对象。In this step, specifically, the encrypted target object can be successfully decrypted only when the second information is the first information input in the encrypted information drawing area when the previous password is set.
本实现方式中,通过用户对加密后的目标对象所在第一界面的第二输入;响应于该第二输入,输出第二提示信息,所述第二提示信息用于提示用户在第二输入对应的解密信息绘制区输入信息;获取用户在解密信息绘制区中输 入的第二信息;采用该第二信息,对加密后的目标对象进行解密,如此,其解密操作简单方便,效率高。In this implementation, through the user's second input to the first interface where the encrypted target object is located; in response to the second input, the second prompt information is output, and the second prompt information is used to prompt the user to enter the corresponding Enter information in the decryption information drawing area; obtain the second information input by the user in the decryption information drawing area; use the second information to decrypt the encrypted target object, so that the decryption operation is simple and convenient, and the efficiency is high.
还需要说明的是,在采用所述第二信息,对加密后的所述目标对象进行解密之后,所述方法还可包括:将经解密后的目标对象全屏显示于终端设备的屏幕上。It should also be noted that, after using the second information to decrypt the encrypted target object, the method may further include: displaying the decrypted target object in full screen on the screen of the terminal device.
具体的,若经解密后的目标对象为第一目标应用界面,则将该第一目标应用界面全屏显示于终端设备的屏幕上。Specifically, if the decrypted target object is the first target application interface, the first target application interface is displayed on the screen of the terminal device in full screen.
若经解密后的目标对象为第一目标应用界面对应的应用程序,则将该应用程序的应用界面全屏显示于终端设备的屏幕上。If the decrypted target object is the application program corresponding to the first target application interface, the application interface of the application program is displayed on the screen of the terminal device in full screen.
这里,将经解密后的目标对象全屏显示于终端设备的屏幕上,表明终端设备进入正常的操作界面,方便用户的后续操作。Here, the decrypted target object is displayed on the screen of the terminal device in full screen, indicating that the terminal device has entered a normal operation interface, which is convenient for the user's subsequent operations.
再者,在本步骤之后,所述方法还可包括:Furthermore, after this step, the method may further include:
在解密信息绘制区显示经解密后的目标对象,并在第一界面除解密信息绘制区外的区域显示第三目标应用界面或终端设备的桌面。The decrypted target object is displayed in the decryption information drawing area, and the third target application interface or the desktop of the terminal device is displayed in the area of the first interface except the decryption information drawing area.
这里,本步骤中,在不影响用户对解密后的目标对象的操作使用的同时,还能方便用户对其他界面或者应用的操作使用,这里可以理解为分屏显示屏幕上两个区域的内容。Here, in this step, while not affecting the user's operation and use of the decrypted target object, it can also facilitate the user's operation and use of other interfaces or applications, which can be understood as a split-screen display of two areas on the screen.
一般地,第三目标应用界面为进入该第一界面之前的该第一界面的上一级界面。Generally, the third target application interface is an upper level interface of the first interface before entering the first interface.
可选地,作为另一可选的实现方式,在响应于所述第二输入,输出第二提示信息之后,在获取所述用户在所述解密信息绘制区中输入的第二信息之前,所述方法还可包括:Optionally, as another optional implementation manner, after outputting second prompt information in response to the second input, before acquiring the second information input by the user in the decryption information drawing area, The method can also include:
显示解密信息绘制区的区域轮廓线。Display the area outline of the decrypted information drawing area.
这里,在用户在解密信息绘制区进行解密输入,即输入第二信息时,尤其是通过手势输入之前用户自定义的图形密码时,解密信息绘制区的区域轮廓线能够约束用户的输入操作幅度,以防越过区域轮廓线在除解密信息绘制区之外的其他区域上输入的无效输入的情况发生。Here, when the user performs decryption input in the decryption information drawing area, that is, when inputting the second information, especially when the user-defined graphic password is input through gestures, the area contour of the decryption information drawing area can restrict the user's input operation range. In order to prevent the invalid input from crossing the contour line of the area and inputting on other areas except the decrypted information drawing area.
当然,为了方便用户进行解密时的输入操作,满足用户需求,区域轮廓线可通过用户输入操作进行调整,进而调整解密信息绘制区的大小。Of course, in order to facilitate the user's input operation during decryption and meet user needs, the area contour line can be adjusted through the user's input operation, thereby adjusting the size of the decryption information drawing area.
基于图1所示的实施例,作为一可选的实现方式,在步骤104之后,所述方法可以包括:Based on the embodiment shown in FIG. 1, as an optional implementation, after step 104, the method may include:
接收用户对加密后的所述目标对象所在第一界面的第三输入;Receiving a user's third input on the encrypted first interface where the target object is located;
本步骤中,第三输入为预先设置的输入,该第三输入可以包括但不限于点击输入、按压输入、长按输入、捏合输入、拖拽输入、滑动输入和划动输入中的至少一种,也即是说,该第三输入可以为上述输入中的其中一种,或者也可以为其中两种或以上输入的组合输入。In this step, the third input is a preset input. The third input may include, but is not limited to, at least one of click input, press input, long press input, pinch input, drag input, slide input, and swipe input In other words, the third input can be one of the aforementioned inputs, or can also be a combination of two or more of the inputs.
响应于所述第三输入,显示所述第三输入对应的解密信息绘制区;In response to the third input, display the decryption information drawing area corresponding to the third input;
本步骤中,解密信息绘制区与加密信息绘制区对应,具体是指,解密信息绘制区与密码设置时的加密信息绘制区所在终端设备的屏幕上的位置相同,形状相同且大小相等,其目的是为了帮助用户快速回忆起对目标对象密码设置时的密码的记忆,提高解密效率。In this step, the decrypted information drawing area corresponds to the encrypted information drawing area. Specifically, it means that the decrypted information drawing area and the encrypted information drawing area when the password is set have the same position on the screen of the terminal device, the same shape and the same size, and its purpose It is to help users quickly recall the password of the target object when the password was set, and to improve the efficiency of decryption.
获取所述用户在所述解密信息绘制区中输入的第三信息;Acquiring the third information input by the user in the decryption information drawing area;
采用所述第三信息,对加密后的所述目标对象进行解密。Using the third information, decrypt the encrypted target object.
下面以两个示例,具体说明本公开方法在步骤104之后的实现过程。The following two examples are used to specifically illustrate the implementation process of the method of the present disclosure after step 104.
示例一Example one
首先,接收用户对终端设备的桌面上已加密的应用程序B的应用图标的点击输入,如图5中左侧图所示。First, the user's click input on the application icon of the encrypted application B on the desktop of the terminal device is received, as shown in the left diagram in FIG. 5.
之后,终端设备响应于该点击输入,显示解密信息绘制区3和应用界面显示区4,如图5中右侧图所示。这里,具体的,应用界面显示区4显示有该已加密的应用程序B的应用图标的桌面。Then, in response to the click input, the terminal device displays the decryption information drawing area 3 and the application interface display area 4, as shown in the right diagram in FIG. 5. Here, specifically, the application interface display area 4 displays the desktop of the application icon of the encrypted application B.
接着,获取用户在解密信息绘制区中输入的第二信息;Next, obtain the second information input by the user in the decryption information drawing area;
换句话说,接收用户在解密信息绘制区3的第三滑动输入,如图5中右侧图所示,第三滑动输入对应上述应用控制方法的示例中的第二滑动输入,对应于图4所示,该第三滑动输入形成的滑动轨迹为一三角形,也就是说,用于解密的密码为图形密码。In other words, the third sliding input of the user in the decryption information drawing area 3 is received, as shown in the right diagram in FIG. 5, the third sliding input corresponds to the second sliding input in the example of the above application control method, corresponding to FIG. 4 As shown, the sliding track formed by the third sliding input is a triangle, that is, the password used for decryption is a graphic password.
最后,通过该第一信息,也就是响应于该第三滑动输入,解密该已加密的应用程序B。Finally, through the first information, that is, in response to the third sliding input, the encrypted application B is decrypted.
示例二Example two
首先,接收用户对终端设备的已加密的应用界面C第四滑动输入,该第四滑动输入的滑动方向如图6中的箭头所示。First, a fourth sliding input from the user to the encrypted application interface C of the terminal device is received, and the sliding direction of the fourth sliding input is shown by the arrow in FIG. 6.
之后,终端设备响应于该第四滑动输入,显示解密信息绘制区3和应用界面显示区4,如图6所示。这里,具体的,应用界面显示区4显示有该已加密的应用界面C。这里,第四滑动输入用于将解密信息绘制区唤出。After that, the terminal device displays the decryption information drawing area 3 and the application interface display area 4 in response to the fourth sliding input, as shown in FIG. 6. Here, specifically, the application interface display area 4 displays the encrypted application interface C. Here, the fourth sliding input is used to call out the decryption information drawing area.
还有,在显示解密信息绘制区3和应用界面显示区4之后,还可显示解密信息绘制区3的区域轮廓线5。Also, after the decryption information drawing area 3 and the application interface display area 4 are displayed, the area outline 5 of the decryption information drawing area 3 can also be displayed.
接着,获取用户在解密信息绘制区中输入的第三信息;Next, obtain the third information entered by the user in the decryption information drawing area;
换句话说,接收用户在解密信息绘制区3的第五滑动输入,如图6所示,第五滑动输入对应上述应用控制方法的示例中的第二滑动输入,对应于图4所示,该第五滑动输入形成的滑动轨迹为一三角形,也就是说,用于解密的密码为图形密码。In other words, the fifth sliding input of the user in the decryption information drawing area 3 is received. As shown in FIG. 6, the fifth sliding input corresponds to the second sliding input in the example of the above application control method, and corresponds to the second sliding input shown in FIG. The sliding track formed by the fifth sliding input is a triangle, that is, the password used for decryption is a graphic password.
最后,通过该第一信息,也就是响应于该第五滑动输入,解密该已加密的应用界面C。Finally, through the first information, that is, in response to the fifth sliding input, the encrypted application interface C is decrypted.
本公开实施例提供的应用控制方法,通过所述第一信息,对目标对象进行加密之后,用户对加密后的目标对象所在第一界面的第二输入;响应于该第二输入,输出第二提示信息,所述第二提示信息用于提示用户在第二输入对应的解密信息绘制区输入信息;获取用户在解密信息绘制区中输入的第二信息;采用该第二信息,对加密后的目标对象进行解密,如此,其解密操作简单方便,效率高。In the application control method provided by the embodiments of the present disclosure, after the target object is encrypted through the first information, the user inputs a second input of the first interface where the encrypted target object is located; in response to the second input, the second input is output. Prompt information, the second prompt information is used to prompt the user to input information in the decrypted information drawing area corresponding to the second input; obtain the second information entered by the user in the decrypted information drawing area; use the second information to The target object is decrypted, so its decryption operation is simple, convenient and efficient.
基于上述方法,本公开实施例提供一种用以实现上述方法的终端设备。Based on the above method, embodiments of the present disclosure provide a terminal device for implementing the above method.
如图7所示,为本公开实施例提供的终端设备的结构示意图。本公开实施例提供一种终端设备700,该终端设备700可以包括:第一接收模块701、第一输出模块702、获取模块703和加密模块704。As shown in FIG. 7, it is a schematic structural diagram of a terminal device provided by an embodiment of the present disclosure. The embodiment of the present disclosure provides a terminal device 700, which may include: a first receiving module 701, a first output module 702, an obtaining module 703, and an encryption module 704.
第一接收模块701,用于接收用户对第一目标应用界面的第一输入;The first receiving module 701 is configured to receive a user's first input on the first target application interface;
第一输出模块702,用于响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;The first output module 702 is configured to output first prompt information in response to the first input, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
第一获取模块703,用于获取所述用户在所述加密信息绘制区中输入的第一信息;The first obtaining module 703 is configured to obtain the first information input by the user in the encrypted information drawing area;
加密模块704,用于通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。The encryption module 704 is configured to encrypt a target object through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
可选地,第一输出模块702可以具体包括:Optionally, the first output module 702 may specifically include:
第一获取子模块,用于获取所述第一输入的输入轨迹;The first acquisition sub-module is used to acquire the input track of the first input;
处理子模块,用于基于所述输入轨迹,确定加密信息绘制区;A processing sub-module for determining an encrypted information drawing area based on the input trajectory;
输出子模块,用于基于所述加密信息绘制区,输出第一提示信息。The output submodule is used to draw the area based on the encrypted information and output the first prompt information.
可选地,所述第一输入为滑动输入;其中,所述滑动输入的滑动轨迹的起点位置为所述屏幕的第一边的任一位置,所述滑动输入的滑动轨迹的终点位置为所述屏幕的第二边的任一位置,所述第一边与所述第二边为所述屏幕的不同边;或者,所述滑动输入的滑动轨迹的起点位置和终点位置分别为所述屏幕的同一边的不同位置;或者,所述滑动输入的滑动轨迹形成封闭曲线。Optionally, the first input is a sliding input; wherein the starting position of the sliding track of the sliding input is any position on the first side of the screen, and the ending position of the sliding track of the sliding input is Any position of the second side of the screen, the first side and the second side are different sides of the screen; or, the start position and the end position of the sliding track of the sliding input are respectively the screen Different positions on the same side of, or, the sliding track of the sliding input forms a closed curve.
可选地,所述第一目标应用界面被所述输入轨迹划分为两个区域;Optionally, the first target application interface is divided into two areas by the input track;
相应地,所述处理子模块,包括:Correspondingly, the processing sub-module includes:
第一处理单元,用于将所述输入轨迹的第一侧所在区域确定为加密信息绘制区;A first processing unit, configured to determine an area where the first side of the input track is located as an encrypted information drawing area;
或者,第二处理单元,用于根据所述两个区域的面积,确定所述两个区域中的其中一个区域为加密信息绘制区。Alternatively, the second processing unit is configured to determine that one of the two areas is an encrypted information drawing area according to the areas of the two areas.
可选地,所述终端设备700还可包括:Optionally, the terminal device 700 may further include:
第一显示模块,用于在所述第一目标应用界面除所述加密信息绘制区之外的区域显示第二目标应用界面或所述终端设备的桌面。The first display module is configured to display a second target application interface or the desktop of the terminal device in an area of the first target application interface except the encrypted information drawing area.
可选地,所述终端设备700还可以包括:Optionally, the terminal device 700 may further include:
隐藏模块,用于在通过所述第一信息,对目标对象进行加密之后,隐藏所述加密信息绘制区。The hiding module is used to hide the encrypted information drawing area after encrypting the target object through the first information.
可选地,所述终端设备700还可包括:Optionally, the terminal device 700 may further include:
第二接收模块,用于接收用户对加密后的所述目标对象所在第一界面的第二输入;The second receiving module is configured to receive a user's second input on the first interface where the encrypted target object is located;
第二输出模块,用于响应于所述第二输入,输出第二提示信息,所述第二提示信息用于提示用户在所述第二输入对应的解密信息绘制区输入信息;The second output module is configured to output second prompt information in response to the second input, where the second prompt information is used to prompt the user to input information in the decryption information drawing area corresponding to the second input;
第二获取模块,用于获取所述用户在所述解密信息绘制区中输入的第二信息;The second acquisition module is configured to acquire the second information input by the user in the decryption information drawing area;
第一解密模块,用于采用所述第二信息,对加密后的所述目标对象进行解密。The first decryption module is configured to use the second information to decrypt the encrypted target object.
可选地,所述终端设备700还可包括:Optionally, the terminal device 700 may further include:
第三接收模块,用于接收用户对加密后的所述目标对象所在第一界面的第三输入;The third receiving module is configured to receive a user's third input on the first interface where the encrypted target object is located;
第二显示模块,用于响应于所述第三输入,显示所述第三输入对应的解密信息绘制区;The second display module is configured to display the decryption information drawing area corresponding to the third input in response to the third input;
第三获取模块,用于获取所述用户在所述解密信息绘制区中输入的第三信息;The third acquisition module is configured to acquire the third information input by the user in the decryption information drawing area;
第三解密模块,用于采用所述第三信息,对加密后的所述目标对象进行解密。The third decryption module is configured to use the third information to decrypt the encrypted target object.
本公开实施例提供的终端设备能够实现图1至图6的方法实施例中移动终端实现的各个过程,为避免重复,这里不再赘述。The terminal device provided by the embodiment of the present disclosure can implement each process implemented by the mobile terminal in the method embodiments of FIGS. 1 to 6. To avoid repetition, details are not described herein again.
本公开实施例提供的终端设备,通过第一接收模块收用户对第一目标应用界面的第一输入;第一输出模块响应于该第一输入,输出第一提示信息,该第一提示信息用于提示用户在该第一输入对应的加密信息绘制区输入信息;之后,通过第一获取模块获取用户在加密信息绘制区中输入的第一信息;加密模块通过该第一信息,对目标对象进行加密,所述目标对象包括:第一目标应用界面或者该第一目标应用界面对应的应用程序,如此,能够实现实时加密设置,效率高且操作简单方便。The terminal device provided by the embodiment of the present disclosure receives the user's first input to the first target application interface through the first receiving module; the first output module responds to the first input and outputs the first prompt information, and the first prompt information is used In order to prompt the user to input information in the encrypted information drawing area corresponding to the first input; afterwards, the first obtaining module obtains the first information input by the user in the encrypted information drawing area; the encryption module uses the first information to perform the target object Encryption, the target object includes: a first target application interface or an application program corresponding to the first target application interface. In this way, real-time encryption settings can be realized, with high efficiency and simple and convenient operation.
图8为实现本公开各个实施例的一种终端设备的硬件结构示意图。FIG. 8 is a schematic diagram of the hardware structure of a terminal device implementing various embodiments of the present disclosure.
该终端设备800包括但不限于:射频单元801、网络模块802、音频输出单元803、输入单元804、传感器805、显示单元806、用户输入单元807、接口单元808、存储器809、处理器810、以及电源811等部件。本领域技术人员可以理解,图8中示出的终端设备结构并不构成对终端设备的限定,终端设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。在本公开实施例中,终端设备包括但不限于手机、平板电脑、笔记本 电脑、掌上电脑、车载终端设备、可穿戴设备、以及计步器等。The terminal device 800 includes, but is not limited to: a radio frequency unit 801, a network module 802, an audio output unit 803, an input unit 804, a sensor 805, a display unit 806, a user input unit 807, an interface unit 808, a memory 809, a processor 810, and Power supply 811 and other components. Those skilled in the art can understand that the structure of the terminal device shown in FIG. 8 does not constitute a limitation on the terminal device. The terminal device may include more or fewer components than shown in the figure, or a combination of certain components, or different components. Layout. In the embodiments of the present disclosure, terminal devices include, but are not limited to, mobile phones, tablet computers, notebook computers, palmtop computers, vehicle-mounted terminal devices, wearable devices, and pedometers.
其中,用户输入单元807用于接收用户对第一目标应用界面的第一输入;处理器810用于响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;获取所述用户在所述加密信息绘制区中输入的第一信息;通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。Wherein, the user input unit 807 is configured to receive a user's first input on the first target application interface; the processor 810 is configured to output first prompt information in response to the first input, and the first prompt information is used to prompt the user Input information in the encrypted information drawing area corresponding to the first input; obtain the first information input by the user in the encrypted information drawing area; encrypt the target object through the first information, and the target object Including: the first target application interface or an application program corresponding to the first target application interface.
本公开实施例中,能够实现实时加密设置,效率高且操作简单方便。In the embodiments of the present disclosure, real-time encryption settings can be realized, with high efficiency and simple and convenient operation.
应理解的是,本公开实施例中,射频单元801可用于收发信息或通话过程中,信号的接收和发送,具体的,将来自基站的下行数据接收后,给处理器810处理;另外,将上行的数据发送给基站。通常,射频单元801包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器、双工器等。此外,射频单元801还可以通过无线通信系统与网络和其他设备通信。It should be understood that, in the embodiment of the present disclosure, the radio frequency unit 801 can be used for receiving and sending signals in the process of sending and receiving information or talking. Specifically, the downlink data from the base station is received and processed by the processor 810; Uplink data is sent to the base station. Generally, the radio frequency unit 801 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 801 can also communicate with the network and other devices through a wireless communication system.
终端设备通过网络模块802为用户提供了无线的宽带互联网访问,如帮助用户收发电子邮件、浏览网页和访问流式媒体等。The terminal device provides users with wireless broadband Internet access through the network module 802, such as helping users to send and receive emails, browse web pages, and access streaming media.
音频输出单元803可以将射频单元801或网络模块802接收的或者在存储器809中存储的音频数据转换成音频信号并且输出为声音。而且,音频输出单元803还可以提供与终端设备800执行的特定功能相关的音频输出(例如,呼叫信号接收声音、消息接收声音等等)。音频输出单元803包括扬声器、蜂鸣器以及受话器等。The audio output unit 803 can convert the audio data received by the radio frequency unit 801 or the network module 802 or stored in the memory 809 into audio signals and output them as sounds. Moreover, the audio output unit 803 may also provide audio output related to a specific function performed by the terminal device 800 (for example, call signal reception sound, message reception sound, etc.). The audio output unit 803 includes a speaker, a buzzer, a receiver, and the like.
输入单元804用于接收音频或视频信号。输入单元804可以包括图形处理器(Graphics Processing Unit,GPU)8041和麦克风8042,图形处理器8041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。处理后的图像帧可以显示在显示单元1006上。经图形处理器8041处理后的图像帧可以存储在存储器809(或其它存储介质)中或者经由射频单元801或网络模块802进行发送。麦克风8042可以接收声音,并且能够将这样的声音处理为音频数据。处理后的音频数据可以在电话通话模式的情况下转换为可经由射频单元801发送到移动通信基站的格式输出。The input unit 804 is used to receive audio or video signals. The input unit 804 may include a graphics processing unit (GPU) 8041 and a microphone 8042. The graphics processor 8041 is configured to monitor images of still pictures or videos obtained by an image capture device (such as a camera) in a video capture mode or an image capture mode. Data is processed. The processed image frame can be displayed on the display unit 1006. The image frame processed by the graphics processor 8041 may be stored in the memory 809 (or other storage medium) or sent via the radio frequency unit 801 or the network module 802. The microphone 8042 can receive sound and can process such sound into audio data. The processed audio data can be converted into a format that can be sent to a mobile communication base station via the radio frequency unit 801 for output in the case of a telephone call mode.
终端设备800还包括至少一种传感器805,比如光传感器、运动传感器以及其他传感器。具体地,光传感器包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板8061的亮度,接近传感器可在终端设备800移动到耳边时,关闭显示面板8061和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别移动终端设备姿态(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;传感器805还可以包括指纹传感器、压力传感器、虹膜传感器、分子传感器、陀螺仪、气压计、湿度计、温度计、红外线传感器等,在此不再赘述。The terminal device 800 also includes at least one sensor 805, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor. The ambient light sensor can adjust the brightness of the display panel 8061 according to the brightness of the ambient light. The proximity sensor can close the display panel 8061 and the display panel when the terminal device 800 is moved to the ear. / Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (usually three axes), and can detect the magnitude and direction of gravity when stationary, and can be used to identify the posture of mobile terminal equipment (such as horizontal and vertical screen switching, related Games, magnetometer posture calibration), vibration recognition related functions (such as pedometer, tap), etc.; sensor 805 can also include fingerprint sensor, pressure sensor, iris sensor, molecular sensor, gyroscope, barometer, hygrometer, thermometer , Infrared sensors, etc., I won’t repeat them here.
显示单元806用于显示由用户输入的信息或提供给用户的信息。显示单元806可包括显示面板8061,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板8061。The display unit 806 is used to display information input by the user or information provided to the user. The display unit 806 may include a display panel 8061, and the display panel 8061 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), etc.
用户输入单元807可用于接收输入的数字或字符信息,以及产生与移动终端设备的用户设置以及功能控制有关的键信号输入。具体地,用户输入单元807包括触控面板8071以及其他输入设备8072。触控面板8071,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板8071上或在触控面板8071附近的操作)。触控面板8071可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器810,接收处理器810发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板8071。除了触控面板8071,用户输入单元807还可以包括其他输入设备8072。具体地,其他输入设备8072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。The user input unit 807 can be used to receive inputted number or character information, and generate key signal input related to user settings and function control of the mobile terminal device. Specifically, the user input unit 807 includes a touch panel 8071 and other input devices 8072. The touch panel 8071, also called a touch screen, can collect user touch operations on or near it (for example, the user uses any suitable objects or accessories such as fingers, stylus, etc.) on the touch panel 8071 or near the touch panel 8071. operating). The touch panel 8071 may include two parts: a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch position, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it To the processor 810, the command sent by the processor 810 is received and executed. In addition, the touch panel 8071 can be implemented in multiple types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 8071, the user input unit 807 may also include other input devices 8072. Specifically, other input devices 8072 may include, but are not limited to, a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackball, mouse, and joystick, which will not be repeated here.
进一步的,触控面板8071可覆盖在显示面板8061上,当触控面板8071检测到在其上或附近的触摸操作后,传送给处理器810以确定触摸事件的类 型,随后处理器810根据触摸事件的类型在显示面板8061上提供相应的视觉输出。虽然在图8中,触控面板8071与显示面板8061是作为两个独立的部件来实现移动终端设备的输入和输出功能,但是在某些实施例中,可以将触控面板8071与显示面板8061集成而实现移动终端设备的输入和输出功能,具体此处不做限定。Further, the touch panel 8071 can cover the display panel 8061. When the touch panel 8071 detects a touch operation on or near it, it transmits it to the processor 810 to determine the type of the touch event. The type of event provides corresponding visual output on the display panel 8061. Although in FIG. 8, the touch panel 8071 and the display panel 8061 are used as two independent components to implement the input and output functions of the mobile terminal device, in some embodiments, the touch panel 8071 and the display panel 8061 can be combined. Integrate to realize the input and output functions of the mobile terminal device, which is not specifically limited here.
接口单元808为外部装置与终端设备800连接的接口。例如,外部装置可以包括有线或无线头戴式耳机端口、外部电源(或电池充电器)端口、有线或无线数据端口、存储卡端口、用于连接具有识别模块的装置的端口、音频输入/输出(I/O)端口、视频I/O端口、耳机端口等等。接口单元808可以用于接收来自外部装置的输入(例如,数据信息、电力等等)并且将接收到的输入传输到终端设备800内的一个或多个元件或者可以用于在终端设备800和外部装置之间传输数据。The interface unit 808 is an interface for connecting an external device with the terminal device 800. For example, the external device may include a wired or wireless headset port, an external power source (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device with an identification module, audio input/output (I/O) port, video I/O port, headphone port, etc. The interface unit 808 can be used to receive input (for example, data information, power, etc.) from an external device and transmit the received input to one or more elements in the terminal device 800 or can be used to connect to the terminal device 800 and external Transfer data between devices.
存储器809可用于存储软件程序以及各种数据。存储器809可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器809可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 809 can be used to store software programs and various data. The memory 809 may mainly include a program storage area and a data storage area. The program storage area may store an operating system, an application program required by at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data (such as audio data, phone book, etc.) created by the use of mobile phones. In addition, the memory 809 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, or other volatile solid-state storage devices.
处理器810是移动终端设备的控制中心,利用各种接口和线路连接整个移动终端设备的各个部分,通过运行或执行存储在存储器809内的软件程序和/或模块,以及调用存储在存储器809内的数据,执行移动终端设备的各种功能和处理数据,从而对移动终端设备进行整体监控。处理器810可包括一个或多个处理单元;可选的,处理器810可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器810中。The processor 810 is the control center of the mobile terminal device. It uses various interfaces and lines to connect the various parts of the entire mobile terminal device, runs or executes the software programs and/or modules stored in the memory 809, and calls and stores them in the memory 809. Execute various functions and process data of the mobile terminal equipment, so as to monitor the mobile terminal equipment as a whole. The processor 810 may include one or more processing units; optionally, the processor 810 may integrate an application processor and a modem processor, where the application processor mainly processes the operating system, user interface and application programs, etc. The adjustment processor mainly deals with wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 810.
终端设备800还可以包括给各个部件供电的电源811(比如电池),可选的,电源811可以通过电源管理系统与处理器810逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The terminal device 800 may also include a power source 811 (such as a battery) for supplying power to various components. Optionally, the power source 811 may be logically connected to the processor 810 through a power management system, so as to manage charging, discharging, and power consumption through the power management system. Management and other functions.
另外,终端设备800包括一些未示出的功能模块,在此不再赘述。In addition, the terminal device 800 includes some functional modules not shown, which will not be repeated here.
可选的,本公开实施例还提供一种终端设备,包括处理器810,存储器809,存储在存储器809上并可在处理器810上运行的计算机程序,该计算机程序被处理器810执行时实现上述应用控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, an embodiment of the present disclosure further provides a terminal device, including a processor 810, a memory 809, and a computer program stored in the memory 809 and running on the processor 810. The computer program is executed when the processor 810 is executed. Each process of the above application control method embodiment can achieve the same technical effect. To avoid repetition, it will not be repeated here.
本公开实施例还提供一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,该计算机程序被处理器执行时实现上述应用控制方法实施例的各个过程,且能达到相同的技术效果,为避免重复,这里不再赘述。其中,所述的计算机可读存储介质,如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等。The embodiments of the present disclosure also provide a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium. When the computer program is executed by a processor, each process of the above application control method embodiment is realized, and the same technology can be achieved. The effect, in order to avoid repetition, will not be repeated here. Wherein, the computer-readable storage medium, such as read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk, or optical disk, etc.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。It should be noted that, in this article, the terms "including", "including" or any other variations thereof are intended to cover non-exclusive inclusion, so that a process, method, article or device including a series of elements not only includes those elements, It also includes other elements not explicitly listed, or elements inherent to the process, method, article, or device. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article or device that includes the element.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本公开的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the method of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, hardware can also be used, but in many cases the former is better.的实施方式。 Based on this understanding, the technical solution of the present disclosure can be embodied in the form of a software product in essence or the part that contributes to the related technology. The computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk). ) Includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) execute the method described in each embodiment of the present disclosure.
上面结合附图对本公开的实施例进行了描述,但是本公开并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本公开的启示下,在不脱离本公开宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本公开的保护之内。The embodiments of the present disclosure are described above with reference to the accompanying drawings, but the present disclosure is not limited to the above-mentioned specific embodiments. The above-mentioned specific embodiments are only illustrative and not restrictive. Those of ordinary skill in the art are Under the enlightenment of the present disclosure, many forms can be made without departing from the purpose of the present disclosure and the scope of protection of the claims, all of which fall within the protection of the present disclosure.

Claims (11)

  1. 一种应用控制方法,应用于终端设备,包括:An application control method applied to terminal equipment, including:
    接收用户对第一目标应用界面的第一输入;Receiving a user's first input on the first target application interface;
    响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;In response to the first input, outputting first prompt information, the first prompt information being used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
    获取所述用户在所述加密信息绘制区中输入的第一信息;Acquiring the first information input by the user in the encrypted information drawing area;
    通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。The target object is encrypted through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
  2. 根据权利要求1所述的应用控制方法,其中,所述响应于所述第一输入,输出第一提示信息,包括:The application control method according to claim 1, wherein said outputting first prompt information in response to said first input comprises:
    获取所述第一输入的输入轨迹;Acquiring the input track of the first input;
    基于所述输入轨迹,确定加密信息绘制区;Determine an encrypted information drawing area based on the input trajectory;
    基于所述加密信息绘制区,输出第一提示信息。Based on the encrypted information drawing area, first prompt information is output.
  3. 根据权利要求2所述的应用控制方法,其中,所述第一输入为滑动输入;The application control method according to claim 2, wherein the first input is a sliding input;
    其中,所述滑动输入的滑动轨迹的起点位置为屏幕的第一边的任一位置,所述滑动输入的滑动轨迹的终点位置为所述屏幕的第二边的任一位置,所述第一边与所述第二边为所述屏幕的不同边;Wherein, the starting position of the sliding track of the sliding input is any position on the first side of the screen, the ending position of the sliding track of the sliding input is any position on the second side of the screen, and the first The side and the second side are different sides of the screen;
    或者,所述滑动输入的滑动轨迹的起点位置和终点位置分别为所述屏幕的同一边的不同位置;Alternatively, the start position and the end position of the sliding track of the sliding input are respectively different positions on the same side of the screen;
    或者,所述滑动输入的滑动轨迹形成封闭曲线。Alternatively, the sliding track of the sliding input forms a closed curve.
  4. 根据权利要求2所述的应用控制方法,其中,所述第一目标应用界面被所述输入轨迹划分为两个区域;The application control method according to claim 2, wherein the first target application interface is divided into two areas by the input track;
    所述基于所述输入轨迹,确定加密信息绘制区,包括:The determining an encrypted information drawing area based on the input trajectory includes:
    将所述输入轨迹的第一侧所在区域确定为加密信息绘制区;Determining the area where the first side of the input track is located as the encrypted information drawing area;
    或者,根据所述两个区域的面积,确定所述两个区域中的其中一个区域为加密信息绘制区。Or, according to the areas of the two areas, it is determined that one of the two areas is an encrypted information drawing area.
  5. 根据权利要求1所述的应用控制方法,其中,所述通过所述第一信息, 对目标对象进行加密之后,所述方法还包括:The application control method according to claim 1, wherein after said encrypting the target object through said first information, said method further comprises:
    在所述第一目标应用界面除所述加密信息绘制区之外的区域显示第二目标应用界面或所述终端设备的桌面。A second target application interface or a desktop of the terminal device is displayed in an area of the first target application interface except the encrypted information drawing area.
  6. 根据权利要求1所述的应用控制方法,其中,所述通过所述第一信息,对目标对象进行加密之后,所述方法还包括:The application control method according to claim 1, wherein, after said encrypting the target object through the first information, the method further comprises:
    隐藏所述加密信息绘制区。Hide the encrypted information drawing area.
  7. 根据权利要求1所述的应用控制方法,其中,所述通过所述第一信息,对目标对象进行加密之后,所述方法包括:The application control method according to claim 1, wherein, after the target object is encrypted through the first information, the method comprises:
    接收用户对加密后的所述目标对象所在第一界面的第二输入;Receiving a user's second input on the encrypted first interface where the target object is located;
    响应于所述第二输入,输出第二提示信息,所述第二提示信息用于提示用户在所述第二输入对应的解密信息绘制区输入信息;In response to the second input, output second prompt information, where the second prompt information is used to prompt the user to input information in the decryption information drawing area corresponding to the second input;
    获取所述用户在所述解密信息绘制区中输入的第二信息;Acquiring the second information input by the user in the decryption information drawing area;
    采用所述第二信息,对加密后的所述目标对象进行解密。Using the second information, decrypt the encrypted target object.
  8. 根据权利要求1所述的应用控制方法,其中,所述通过所述第一信息,对目标对象进行加密之后,所述方法包括:The application control method according to claim 1, wherein, after the target object is encrypted through the first information, the method comprises:
    接收用户对加密后的所述目标对象所在第一界面的第三输入;Receiving a user's third input on the encrypted first interface where the target object is located;
    响应于所述第三输入,显示所述第三输入对应的解密信息绘制区;In response to the third input, display the decryption information drawing area corresponding to the third input;
    获取所述用户在所述解密信息绘制区中输入的第三信息;Acquiring the third information input by the user in the decryption information drawing area;
    采用所述第三信息,对加密后的所述目标对象进行解密。Using the third information, decrypt the encrypted target object.
  9. 一种终端设备,包括:A terminal device, including:
    第一接收模块,用于接收用户对第一目标应用界面的第一输入;The first receiving module is configured to receive the first input of the user on the first target application interface;
    第一输出模块,用于响应于所述第一输入,输出第一提示信息,所述第一提示信息用于提示用户在所述第一输入对应的加密信息绘制区输入信息;The first output module is configured to output first prompt information in response to the first input, where the first prompt information is used to prompt the user to input information in the encrypted information drawing area corresponding to the first input;
    第一获取模块,用于获取所述用户在所述加密信息绘制区中输入的第一信息;The first obtaining module is configured to obtain the first information input by the user in the encrypted information drawing area;
    加密模块,用于通过所述第一信息,对目标对象进行加密,所述目标对象包括:所述第一目标应用界面或者所述第一目标应用界面对应的应用程序。The encryption module is configured to encrypt a target object through the first information, and the target object includes: the first target application interface or an application program corresponding to the first target application interface.
  10. 一种终端设备,包括处理器、存储器及存储在所述存储器上并可在所述处理器上运行的计算机程序,所述计算机程序被所述处理器执行时实现 如权利要求1至8中任一项所述的应用控制方法的步骤。A terminal device, comprising a processor, a memory, and a computer program stored on the memory and capable of running on the processor. The computer program is executed by the processor to implement any of claims 1 to 8. One of the steps of the application control method.
  11. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至8中任一项所述的应用控制方法的步骤。A computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the application control method according to any one of claims 1 to 8 are realized.
PCT/CN2020/073805 2019-01-28 2020-01-22 Application control method and terminal device WO2020156440A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910079830.0 2019-01-28
CN201910079830.0A CN109740312B (en) 2019-01-28 2019-01-28 Application control method and terminal equipment

Publications (1)

Publication Number Publication Date
WO2020156440A1 true WO2020156440A1 (en) 2020-08-06

Family

ID=66366310

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/073805 WO2020156440A1 (en) 2019-01-28 2020-01-22 Application control method and terminal device

Country Status (2)

Country Link
CN (1) CN109740312B (en)
WO (1) WO2020156440A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740312B (en) * 2019-01-28 2021-04-06 维沃移动通信有限公司 Application control method and terminal equipment
CN111818466B (en) * 2020-05-29 2022-02-22 维沃移动通信有限公司 Information sending and receiving method and device, electronic equipment and readable storage medium
CN112261216B (en) * 2020-10-20 2022-05-03 北京字节跳动网络技术有限公司 Terminal control method and device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
US20180205716A1 (en) * 2017-01-13 2018-07-19 Payeazy, Inc. Authentication systems and methods for online services
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102073810B (en) * 2010-12-06 2013-01-23 上海合合信息科技发展有限公司 Method for integrating account management function in input method software
CN106919306A (en) * 2017-03-08 2017-07-04 珠海市魅族科技有限公司 Method into application interface and the system into application interface
CN107357511A (en) * 2017-06-05 2017-11-17 深圳天珑无线科技有限公司 Password Input Area generation method, electric terminal and computer-readable recording medium
CN109002340B (en) * 2018-07-12 2021-05-28 维沃移动通信有限公司 Screen locking method and electronic equipment
CN108985084B (en) * 2018-07-13 2021-03-05 维沃移动通信有限公司 Object encryption method and terminal equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384060A (en) * 2016-09-23 2017-02-08 维沃移动通信有限公司 Mobile terminal data encryption method and mobile terminal
US20180205716A1 (en) * 2017-01-13 2018-07-19 Payeazy, Inc. Authentication systems and methods for online services
CN108681664A (en) * 2018-05-28 2018-10-19 维沃移动通信有限公司 A kind of encryption method and device
CN109740312A (en) * 2019-01-28 2019-05-10 维沃移动通信有限公司 A kind of application control method and terminal device

Also Published As

Publication number Publication date
CN109740312B (en) 2021-04-06
CN109740312A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
WO2021098678A1 (en) Screencast control method and electronic device
WO2020156111A1 (en) Interface display method and terminal
WO2021098677A1 (en) Display method and electronic device
WO2020156169A1 (en) Display control method and terminal device
WO2020238497A1 (en) Icon moving method and terminal device
WO2020156440A1 (en) Application control method and terminal device
WO2020238449A1 (en) Notification message processing method and terminal
CN109241775B (en) Privacy protection method and terminal
WO2020259091A1 (en) Screen content display method and terminal
WO2021098705A1 (en) Display method and electronic device
WO2020011074A1 (en) Screen lock method and electronic device
WO2020233323A1 (en) Display control method, terminal device, and computer-readable storage medium
WO2020220876A1 (en) Application interface displaying method and mobile terminal
WO2020238463A1 (en) Message processing method and terminal
WO2020151513A1 (en) Information processing method and terminal device
CN108681664B (en) Encryption method and device
WO2021004327A1 (en) Method for setting application permission, and terminal device
WO2020199783A1 (en) Interface display method and terminal device
WO2019223569A1 (en) Information processing method and mobile terminal
WO2020211596A1 (en) Control method and terminal device
WO2020156123A1 (en) Information processing method and terminal device
WO2020063107A1 (en) Screenshot method and terminal
WO2020156441A1 (en) Privacy space operation method and terminal device
WO2021109961A1 (en) Method for generating shortcut icon, electronic apparatus, and medium
WO2019184947A1 (en) Image viewing method and mobile terminal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20748223

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20748223

Country of ref document: EP

Kind code of ref document: A1