WO2021088272A1 - 应用保护方法、控制装置和可读存储介质 - Google Patents
应用保护方法、控制装置和可读存储介质 Download PDFInfo
- Publication number
- WO2021088272A1 WO2021088272A1 PCT/CN2020/076330 CN2020076330W WO2021088272A1 WO 2021088272 A1 WO2021088272 A1 WO 2021088272A1 CN 2020076330 W CN2020076330 W CN 2020076330W WO 2021088272 A1 WO2021088272 A1 WO 2021088272A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- page
- information
- fingerprint
- preset
- Prior art date
Links
- 230000004224 protection Effects 0.000 title claims abstract description 107
- 238000000034 method Methods 0.000 title claims abstract description 104
- 238000012795 verification Methods 0.000 claims abstract description 129
- 238000001514 detection method Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Definitions
- This application relates to the field of electronic technology, in particular to application protection methods, control devices and readable storage media.
- the main purpose of this application is to provide an application protection method, which aims to quickly realize the application unlocking of multiple applications on different pages, so as to ensure the privacy of the user's terminal application while simplifying the user's operation.
- the application protection method includes the following steps:
- the terminal receives the first verification information
- this application also provides another application protection method, and the application protection method includes:
- the terminal receives the first fingerprint information and the second fingerprint information
- the first moment is different from the second moment.
- the application protection method includes the following steps:
- the terminal receives the first verification information
- the present application also provides a control device, the control device comprising: a memory, a processor, and an application protection program stored on the memory and running on the processor, the application When the protection program is executed by the processor, the steps of the application protection method described in any one of the above are implemented.
- the present application also provides a readable storage medium having an application protection program stored on the readable storage medium, and when the application protection program is executed by a processor, the application as described in any of the preceding items is implemented. Steps of the protection method.
- An application protection method proposed in this application the method obtains first verification information input based on a terminal, and determines a first corresponding page according to the first verification information, the first corresponding page includes at least one preset page, and displaying the first corresponding page includes
- the user can associate the page of the application that is allowed to be seen by other people with the first verification information.
- the unlocking of the application ensures the privacy of the user's terminal application while simplifying the user's operation.
- FIG. 1 is a schematic diagram of the hardware structure of an embodiment of a display terminal of the present application
- FIG. 3 is a schematic flowchart of a second embodiment of the application protection method of this application.
- FIG. 5 is a schematic flowchart of a fourth embodiment of the application protection method of this application.
- FIG. 6 is a schematic flowchart of a fifth embodiment of the application protection method of this application.
- FIG. 7 is a schematic flowchart of a sixth embodiment of the application protection method of this application.
- FIG. 8 is a schematic flowchart of a seventh embodiment of the application protection method of this application.
- FIG. 9 is a schematic flowchart of a ninth embodiment of an application protection method according to this application.
- FIG. 10 is a schematic flowchart of a tenth embodiment of an application protection method according to this application.
- the main solution of the embodiment of the present application is: acquiring the terminal to receive the first verification information; determining the first corresponding page according to the first verification information, the first corresponding page includes at least one preset page; displaying the first corresponding page includes Application ID.
- This application provides the above-mentioned solution, which aims to quickly realize application unlocking of multiple applications on different pages, ensuring the privacy of users using terminal applications and simplifying user operations.
- the display terminal is a display terminal installed with systems such as Android, and may be a TV, a mobile phone, a smart watch, a computer, and the like.
- the display terminal specifically includes a control device 100, a display 200, a fingerprint sensor 300, and the like.
- the control device 100 is specifically used for the protection of applications installed in the Android system of the display terminal.
- the display 200 is specifically used to display different interfaces during the operation of the system.
- the fingerprint sensor 300 is used to collect fingerprint information input by the user based on the terminal.
- the control device 100 includes a processor 1001, such as a CPU, a memory 1002, and the like.
- the memory 1002 may be a high-speed RAM memory, or a non-volatile memory (non-volatile memory), such as a magnetic disk memory.
- the memory 1002 may also be a storage device independent of the aforementioned processor 1001.
- the processor 1001 is in communication connection with the memory 1002, the display 200, and the fingerprint sensor 300 respectively.
- the processor 1001 may call required storage data from the memory 1002 or store data required for operation in the memory 1002.
- the processor 1001 may call a management module (such as a launcher (desktop launcher)) in the Android system to adjust the display interface in the display 200.
- the processor 1001 may obtain fingerprint information from the fingerprint sensor 300 based on the input of the display terminal.
- the device structure shown in FIG. 1 does not constitute a limitation on the device, and may include more or fewer components than shown in the figure, or combine some components, or arrange different components.
- the memory 1002 which is a readable storage medium, may include an application protection program.
- the processor 1001 may be used to call the application protection program stored in the memory 1002, and execute the relevant steps of the application protection method in the following embodiments.
- This application also provides an application protection method for application protection in operating systems such as Android.
- the application protection method includes:
- Step S10 the terminal receives the first verification information
- the terminal here is specifically a display terminal, and the display terminal is installed with an operating system such as Android, and may include a TV, a mobile phone, a smart watch, a computer, and the like.
- the first verification information may specifically include fingerprint information, character information, pattern information, face information, gesture information, and the like.
- An information collection module (such as a fingerprint sensor, a camera, a touch screen, etc.) corresponding to the first verification information may be provided on the terminal.
- the information collection module can continuously monitor and collect the first verification information in a preset mode.
- the information collection module can also start the detection of the first verification information after receiving a specific instruction.
- the above-mentioned first verification information can be obtained by acquiring the data detected by the information collection module.
- Step S20 Determine a first corresponding page according to the first verification information, where the first corresponding page includes at least one preset page;
- the first corresponding page refers to a page used to display application identifiers (such as application icons, application names, etc.) during the running of the display terminal system.
- the first corresponding page refers to a desktop page of an operating system such as Android.
- the application identifier here is specifically used as the access channel of the application.
- Different pre-stored verification information is associated with different preset pages to form a preset correspondence.
- the type of the first verification information and the page associated with the first verification information can be set by the user by operating the terminal. For example, the user can select face information as the type of the first verification information, and can also select fingerprint information as the type of the first verification information.
- the pre-stored verification information can be set with one or more according to requirements. Different verification information can be associated with different preset pages.
- desktop pages include desktop page 1, desktop page 2, desktop page 3, desktop page 4, and desktop page 5; fingerprint 1 corresponds to associated desktop page 1 and desktop page 3, fingerprint 2 corresponds to associated desktop page 1, desktop page 2, and desktop Page 4, Face 1 corresponds to the associated desktop page 2 and desktop page 5.
- the first corresponding page corresponding to the currently acquired first verification information can be determined.
- all preset pages associated with the first verification information may be used as the first corresponding pages.
- all preset pages that are not associated with the first verification information may also be used as the first corresponding pages. For example, when the first verification information is face 1, the first corresponding pages are desktop page 2 and desktop page 5; when the first verification information is fingerprint 1, the first corresponding pages are desktop page 1 and desktop page 3.
- Step S30 Display the application identifier contained in the first corresponding page.
- all the application identifiers of the first corresponding page can be set to a visible state. For example, based on the above desktop pages including desktop page 1, desktop page 2, desktop page 3, desktop page 4, and desktop page 5, when the first verification information is fingerprint 1, the first corresponding pages are desktop page 1 and desktop page 3. , Then the application logos on desktop page 1 and desktop page 3 are visible.
- This embodiment proposes an application protection method.
- the method obtains first verification information input based on a terminal, and determines a first corresponding page according to the first verification information, the first corresponding page includes at least one preset page, and the first corresponding page is displayed
- the included application ID through the above method, the user can associate the page of the application that is allowed to be seen by other people with the first verification information. By entering the first verification information once, you can quickly realize all the pages on different pages or on the same page.
- the application unlocking of the application ensures the privacy of the user's terminal application while simplifying the user's operation.
- the first verification information may specifically be fingerprint information.
- the application protection method includes:
- Step S10a acquiring fingerprint information based on terminal input
- the terminal here is specifically a display terminal, and the display terminal is installed with an operating system such as Android, and may include a TV, a mobile phone, a smart watch, a computer, and the like.
- the fingerprint information is the characteristic data generated when the fingerprint sensor detects the contact of the finger.
- the terminal When the terminal is in the application protection state, it can continuously monitor the fingerprint information based on the terminal.
- the terminal can be set to the application protection state or the non-application protection state according to the user, or it can be set to always be in the application protection state by default.
- step S10 When the terminal is in the application protection state, it indicates that the owner of the terminal does not disclose all application usage status, then step S10 is executed; when the terminal is in the non-application protection state, it indicates that the terminal owner can disclose all the application usage status, then the terminal All applications on the can be displayed indiscriminately and can be started freely.
- Step S20a Determine the first corresponding page according to the fingerprint information; by pre-setting the corresponding relationship between the fingerprint information and the page, different preset fingerprints can correspond to different preset pages. Among them, there may be one preset fingerprint or more than one fingerprint. The number of preset pages corresponding to the same preset fingerprint can be one or more than one, which can be set according to the actual needs of the user. For example, fingerprint 1 and fingerprint 2 may be preset, fingerprint 1 corresponds to the associated desktop page 1 and desktop page 3, and fingerprint 2 corresponds to the associated desktop page 1, desktop page 2, and desktop page 4.
- step S20a may include:
- Step S21 In at least one preset page of the terminal, it is determined whether there is a page associated with the fingerprint information; if it exists, step S22 is executed; if it does not exist, all the preset pages can be displayed or hidden. Application icon.
- the preset page here can be set according to actual needs.
- all desktop pages of the terminal can be used as preset pages.
- Step S22 Use a preset page associated with the fingerprint information as the first corresponding page.
- the preset page corresponding to the preset fingerprint matching the current fingerprint information may be used as the first corresponding page.
- the preset page corresponding to the preset fingerprint that is inconsistent with the current fingerprint information match may also be used as the first corresponding page.
- Step S30a Display the application identifiers included in the first corresponding page, and hide the application identifiers not included in the first corresponding page.
- all application identities on the first corresponding page can be set to a visible state, and all application identities on other pages except all application identities on the first corresponding page can be hidden.
- the page where the hidden application logo is located can be hidden (the page does not appear in the terminal) or visible (the page remains in the terminal, but the application logo is not visible on the page, only the page background interface) .
- An application protection method proposed in an embodiment of the present application is to obtain fingerprint information based on terminal input, determine a first corresponding page based on the fingerprint information, and display the application identifier contained in the first corresponding page.
- the user can be allowed to be The page of the application seen by other people is associated with the first verification information.
- the fingerprint information By entering the fingerprint information once, all the application identifiers contained in the first corresponding page can be displayed, enabling quick unlocking of different pages or all applications on the same page. Therefore, It is helpful to improve the user's operation efficiency when implementing application protection.
- the application identifiers on different pages can also be displayed based on different fingerprints, which improves the convenience of user application protection, and implements different application protections as their own needs change.
- the step S20a includes:
- Step S21 In at least one preset page of the terminal, it is determined whether there is a page associated with the fingerprint information; if there is, step S23 and step S31 are executed; if not, step S24 is executed.
- the preset page here can be set according to actual needs.
- all desktop pages of the terminal can be used as preset pages.
- Step S23 using a preset page associated with the fingerprint information as the first corresponding page, and using a preset page not associated with the fingerprint information as the second corresponding page;
- the preset page corresponding to the preset fingerprint that matches the current fingerprint information can be used as the first corresponding page, and pages other than the first corresponding page in the preset pages may be used as the second corresponding page. page.
- step S30 includes: displaying the first corresponding page.
- the first corresponding page is visible. According to the user, any first corresponding page can be selected as the current display page of the terminal.
- the preset pages of the terminal include page 1, page 2, page 3, page 4, and page 5, fingerprint A corresponds to associated page 1, page 3, and page 4, and fingerprint B corresponds to associated page 3 and page 5.
- fingerprint information is A fingerprint
- page 1, page 3, and page 4 are displayed; when the fingerprint information is B fingerprint, page 3 and page 5 are displayed.
- Step S24 displaying all the preset pages. All preset pages are visible, and the user can select any preset page as the current display page of the terminal.
- the first corresponding page associated with the fingerprint information and the second corresponding page not associated with the fingerprint information are respectively determined, and through the first corresponding
- the page display realizes the display of the application identifier on the first corresponding page, so that the display interface can conform to user habits, and the user experience of terminal application protection is further improved, and at least one icon can be displayed simultaneously based on page operations, thereby improving operation efficiency.
- step S10a and before step S20a the method further includes:
- Step S11 When the terminal is in a locked screen state, compare the fingerprint information with at least one first preset fingerprint
- the lock screen state is a state in which the screen of the terminal is locked and the user's operation on the terminal is restricted.
- the first preset fingerprint is specifically an unlocking fingerprint used for unlocking the terminal, and one or more than one can be set according to the user.
- the preset fingerprint associated with the preset page may be used as the first preset fingerprint, and the preset fingerprint not associated with the preset page may also be used as the first preset fingerprint.
- Step S12 When the fingerprint information matches the first preset fingerprint, unlock the terminal.
- the terminal is unlocked.
- the user can unlock the terminal screen and display and hide the application identification at the same time in only one operation. After unlocking, the terminal user will not see the hidden application identification, which simplifies User operations also improve the privacy of users when using terminal applications.
- the method further includes:
- Step S40 When a first application start instruction based on the first corresponding page is received, determine the first target application corresponding to the first application start instruction;
- the user can input the first application start instruction to the terminal by clicking on the application identifier on the first corresponding page and other operations.
- the application start instruction is received, the first target application corresponding to the first application start instruction can be determined.
- Step S50 Open the first target application.
- the user can open any page on the first corresponding page by issuing the first application start instruction, which protects user privacy and improves the convenience for the user to open the application.
- the first corresponding page includes the application identifier of the privacy application.
- the privacy application here is an application that requires the user to enter verification information when opening the application, and the application can be successfully opened after the verification is passed. Based on this, referring to FIG. 6, after step S30, the method further includes:
- Step S60 When a second application start instruction based on the first corresponding page is received, determine a second target application corresponding to the second application start instruction;
- Step S70 When the second target application is the privacy application, obtain second verification information corresponding to the second target application;
- Each privacy application may be correspondingly set with its verification information, and the second verification information may be a fingerprint or a password.
- the second verification information corresponding to the second target application as the privacy application can be acquired.
- Step S80 When the second verification information matches the fingerprint information, the second target application is opened.
- the second target application When the second verification information is a fingerprint and is consistent with the fingerprint information, the second target application is allowed to be opened. When the second verification information does not match the fingerprint information, the second target application is not allowed to be opened, or the second verification information can be entered and the application can be opened after the verification is passed.
- the user when the user needs to open the privacy application on the first corresponding page, the user can start the privacy application without performing application verification separately, which simplifies user operations while ensuring the privacy of the user's use of the terminal application.
- fingerprint information can be used to unlock the terminal
- the user can unlock the terminal, protect the applications that are not seen by others, and unlock the privacy application multiple operations with only one operation, which further simplifies user operations and improves the user’s use of terminal applications. Privacy.
- the method further includes:
- Step S01 Obtain operation information of at least one preset page of the terminal
- the operation information here is information formed by the user selecting, moving, starting, and deleting one or more application identifiers on the page on the preset page.
- Step S02 When the operation information is position adjustment information, determine the target application identifier to be adjusted and the target page in the preset page according to the operation information;
- the operation information is the selection and movement of the application identifier
- the operation information can be regarded as position adjustment information, and the selected application identifier can be used as the target application identifier according to the operation information, and the user's selection will be moved in the preset page The page to be used as the target page.
- Step S03 Move the target application identifier to the target page.
- the target application identifier is deleted from the original page and the target application identifier is displayed in association with the target page.
- the user can adjust the application logo to different pages according to actual needs, and only use the mobile operation of the application logo to set the display or hiding of the application logo, which improves the user’s ability to display or hide different application logos. Convenience and operational efficiency.
- a seventh embodiment of the application protection method of the present application is proposed.
- the method further includes:
- Step S001 Acquire the first verification information in the setting mode
- the terminal may collect the user's fingerprints, characters, patterns, faces, gestures and other information as the first verification information.
- the first verification information may specifically be fingerprint information.
- the fingerprint information can be a fingerprint pre-stored in the system, such as an unlocking fingerprint of the system.
- the fingerprint information may also be a new fingerprint input by the user based on the terminal in the current setting mode.
- Step S002 in at least one preset page of the terminal, select part or all of the preset page as a target corresponding page based on a setting instruction;
- the preset pages of the terminal may specifically include page 1, page 2, page 3, page 4, and page 5.
- the user can select page 1 and page 2 as the target corresponding page through the setting instruction, or select page 3 as the target corresponding page through the setting instruction, and select page 1, page 2, page 3, page 4, and page 5 as the target corresponding page through the setting instruction.
- Target corresponding page may specifically include page 1, page 2, page 3, page 4, and page 5.
- Step S003 Associate the target corresponding page with the fingerprint information to form the first corresponding page.
- the user can arbitrarily adjust the page associated with the first verification information according to actual needs through the above method, so as to improve the convenience when implementing application protection, and can adapt to the diverse privacy needs of users to realize terminal application protection.
- the preset pages associated with different fingerprint information are different or partially the same.
- fingerprint A corresponds to page 1 page 3, and page 4
- fingerprint B corresponds to page 3 and page 5
- fingerprint C corresponds to page 3 and page 5.
- users can set different combinations of preset pages to associate with different fingerprint information based on their different application usage requirements, so as to ensure that the terminal can adapt to the user's diverse application privacy protection needs.
- the application protection method of this application is proposed.
- the eighth embodiment after the first corresponding page is determined through the above step S20 or step S20a, the method further includes: displaying the Application identifiers included in the first corresponding page, and application identifiers not included in the first corresponding page are hidden.
- all application identities on the first corresponding page can be set to a visible state, and all application identities on other pages except all application identities on the first corresponding page can be hidden.
- the page where the hidden application logo is located can be hidden (the page does not appear in the terminal) or visible (the page remains in the terminal, but the application logo is not visible on the page, only the page background interface) .
- desktop pages including desktop page 1, desktop page 2, desktop page 3, desktop page 4, and desktop page 5, when the first verification information is fingerprint 1, the first corresponding pages are desktop page 1 and desktop page 3.
- the application logos on the desktop page 1 and the desktop page 3 are visible, and the desktop page 2, the desktop page 4, and the desktop page 5 are invisible.
- the user can hide application identities that they do not want to be seen by other people on the terminal through fingerprints, and only display application identities that are allowed to be seen by other people on the terminal.
- the use of other terminals The user cannot understand the user’s application usage, so as to improve the user’s privacy when using the terminal application.
- the application protection method further includes the following steps:
- Step S100 the terminal receives the first fingerprint information and the second fingerprint information
- the specific implementation manners related to the first fingerprint information and the second fingerprint information are the same as the manner of acquiring the fingerprint information in step S10, and will not be repeated here.
- Step S200 Determine a third corresponding page according to the first fingerprint information, and determine a fourth corresponding page according to the second fingerprint information; the third corresponding page and the fourth corresponding page contain different or partially the same application identifiers ;
- the specific implementation of determining the third corresponding page according to the first fingerprint information and determining the fourth corresponding page according to the second fingerprint information is the same as the specific implementation of determining the first corresponding page according to the fingerprint information in the foregoing embodiment , I won’t repeat it here.
- Different fingerprint information and their associated pages can be pre-stored in the system. For example, fingerprint A corresponds to associated page 1, page 3 and page 4, fingerprint B corresponds to associated page 3 and page 5, and fingerprint C corresponds to associated page 2 and page 5.
- the third corresponding pages may specifically be page 1, page 3, and page 4.
- the fourth corresponding pages are specifically page 3 and page 5.
- the third and fourth corresponding pages both include page 3
- the third and fourth corresponding pages both include page 3. Therefore, the third corresponding page and the fourth corresponding page contain the same application identifier.
- the first fingerprint information is an A fingerprint
- the third corresponding pages may specifically be page 1, page 3, and page 4.
- the second fingerprint information is the C fingerprint
- the fourth corresponding pages are specifically page 2 and page 5. Since the third corresponding page and the fourth corresponding page do not have the same page, the third and fourth corresponding pages contain applications The logo is different.
- Step S300 Display the application identifier contained in the third corresponding page at the first moment
- step S400 the application identifier contained in the fourth corresponding page is displayed at a second moment; wherein, the first moment is different from the second moment.
- the first moment may specifically be any moment within the preset time period after the first fingerprint information is detected, and the second moment may specifically be any moment within the preset time period after the second fingerprint information is detected.
- the application identifiers contained in the third corresponding page can be displayed while also hiding application identifiers not contained in the third corresponding page; while the application identifiers contained in the fourth corresponding page can be displayed, the fourth corresponding page can also be hidden.
- the application identifier is not included to realize that other users cannot perceive the restriction on the use of the application by the user of the terminal, thereby further improving the privacy of the terminal protection.
- the method before step S200, the method further includes:
- Step S101 When the terminal is in a locked screen state, compare the first fingerprint information or the second fingerprint information with at least one first preset fingerprint;
- the first preset fingerprint here is specifically an unlocking fingerprint used to unlock the terminal, and one or more than one can be set according to the user.
- the preset fingerprint associated with the preset page may be used as the first preset fingerprint
- the preset fingerprint not associated with the preset page may also be used as the first preset fingerprint.
- the first fingerprint information is compared with each first preset fingerprint
- the second fingerprint information is compared with each first preset fingerprint.
- Step S102 When the first fingerprint information or the second fingerprint information matches the first preset fingerprint, unlock the terminal.
- the terminal is unlocked.
- the user can unlock the terminal screen and display and hide the application identifier at the same time with only one operation. After unlocking, the terminal user will not see the hidden
- the application logo simplifies user operations and improves user privacy when using terminal applications.
- step S300 or step S400 the method further includes:
- Step S500 When a third application start instruction based on the third corresponding page or the fourth corresponding page is received, determine a third target application corresponding to the third application start instruction;
- the user can input the third application start instruction to the terminal by clicking the application identifier on the corresponding page currently displayed.
- the third target application corresponding to the third application start instruction can be determined.
- Step S600 Open the third target application.
- the user can open any page on the currently displayed third corresponding page or the fourth corresponding page by issuing a third application start instruction, which protects user privacy and improves the convenience for the user to open the application.
- the application protection method further includes the following steps:
- Step S1 the terminal receives the first verification information
- the terminal here is specifically a display terminal, and the display terminal is installed with an operating system such as Android, and may include a TV, a mobile phone, a smart watch, a computer, and the like.
- the first verification information may specifically include fingerprint information, character information, pattern information, face information, gesture information, and the like.
- the terminal may be provided with an information collection module (such as a fingerprint sensor, a camera, a touch screen, etc.) corresponding to the first verification information.
- the information collection module can continuously monitor and collect the first verification information in a preset mode.
- the information collection module can also start the detection of the first verification information after receiving a specific instruction.
- the above-mentioned first verification information can be obtained by acquiring the data detected by the information collection module.
- Step S2 Determine a first corresponding application according to the first verification information
- the first corresponding application refers to an application associated with the first verification information in the display terminal system.
- the first corresponding application may include at least one preset application. Different pre-stored verification information is associated with different preset applications to form a preset correspondence.
- the type of the first verification information and the application associated with the first verification information can be set by the user by operating the terminal. For example, the user can select face information as the type of the first verification information, and can also select fingerprint information as the type of the first verification information.
- the pre-stored verification information can be set with one or more according to requirements. Different verification information can be associated with different preset applications. There may be one or more preset applications associated with one piece of first verification information. For example, desktop applications include application 1, application 2, application 3, application 4, and application 5; fingerprint 1 corresponds to associated application 1 and application 3, fingerprint 2 corresponds to associated application 1, application 2, and application 4, and face 1 corresponds to associated application 2. And application 5.
- the first corresponding application corresponding to the currently acquired first verification information can be determined.
- all preset applications associated with the first verification information may be used as the first corresponding applications.
- all preset applications that are not associated with the first verification information may also be used as the first corresponding applications. For example, when the first verification information is face 1, the first corresponding applications are application 2 and application 5; when the first verification information is fingerprint 1, the first corresponding applications are application 1 and application 3.
- Step S3 Display the application identifier of the first corresponding application.
- all application identifiers of the first corresponding application may be set to a visible state. For example, based on the above-mentioned applications including application 1, application 2, application 3, application 4, and application 5, when the first verification information is fingerprint 1, the first corresponding application is application 1 and application 3, then application 1 and application 3 Visibility of the application logo.
- an application protection method is proposed.
- the method obtains first verification information input based on the terminal, determines the first corresponding application according to the first verification information, and displays the application identifier contained in the first corresponding application.
- the user can associate the application of the application that is allowed to be seen by other people with the first verification information.
- the application of different applications can be unlocked quickly, ensuring the privacy of the user while using the terminal application. Simplify user operations.
- the page displaying the application identifier may be the page where the application identifier of the first corresponding application is located. For example, if the display page to which application 1 itself belongs is page 1, then the application identifier of application 1 is displayed on page 1; in addition, The page displaying the application identifier may also be any page other than the page to which the application identifier of the first corresponding application belongs, and the user can specify the page displaying the first corresponding application identifier according to requirements. Wherein, the application identifier of the first corresponding application is displayed on one page or on multiple pages.
- the display page of the terminal includes page 1, page 2, and page 3, when it is determined that the first corresponding application is application 1, the application identifier of application 1 can be displayed on any of page 1, page 2, and page 3. ;
- the three application identities of Application 1, Application 2 and Application 3 can be displayed on any one of Page 1, Page 2 and Page 3 at the same time; Select more than one page from page 1, page 2, and page 3 to display three application identifiers. For example, page 1 displays application identifiers of application 3, and page 2 displays application identifiers of application 1 and application 2.
- the first corresponding application further includes the application identifier of the privacy application.
- the privacy application here is an application that requires the user to enter verification information when opening the application, and the application can be successfully opened after the verification is passed. Based on this, after step S3, it also includes:
- Step S3a When a second application start instruction based on the first corresponding application is received, determine a second target application corresponding to the second application start instruction;
- Step S3b when the second target application is a privacy application, obtain second verification information corresponding to the second target application;
- Each privacy application may be correspondingly set with its verification information, and the second verification information may be a fingerprint or a password.
- the second verification information corresponding to the second target application as the privacy application can be acquired.
- Step S3c When the second verification information matches the first verification information, the second target application is opened.
- the second target application When the second verification information is a fingerprint and is consistent with the fingerprint information, the second target application is allowed to be opened. When the second verification information does not match the fingerprint information, the second target application is not allowed to be opened, or the second verification information can be entered and the application can be opened after the verification is passed.
- the user when the user needs to open the privacy application, the user can start the privacy application without performing application verification separately, which simplifies user operations while ensuring the privacy of the user's use of the terminal application.
- fingerprint information can be used to unlock the terminal
- the user can unlock the terminal, protect the applications that are not seen by others, and unlock the privacy application multiple operations with only one operation, which further simplifies user operations and improves the user’s use of terminal applications. Privacy.
- step S1 it also includes:
- Step S01a Acquire the first verification information in the setting mode
- the terminal may collect the user's fingerprints, characters, patterns, faces, gestures and other information as the first verification information.
- the first verification information may specifically be fingerprint information.
- the fingerprint information can be a fingerprint pre-stored in the system, such as an unlocking fingerprint of the system.
- the fingerprint information may also be a new fingerprint input by the user based on the terminal in the current setting mode.
- Step S02a selecting at least one application as the target corresponding application based on the setting instruction
- the preset applications of the terminal may specifically include application 1, application 2, application 3, application 4, and application 5.
- the user can select application 1 and application 2 as the target corresponding application through the setting instruction, or select application 3 as the target corresponding application through the setting instruction, and also select application 1, application 2, application 3, application 4, and application 5 as the target application through setting instructions.
- the target corresponds to the application.
- Step S03a Associate the target corresponding application with the first verification information to form the first corresponding application.
- the user can freely adjust the page associated with the first verification information according to actual needs, so as to improve the convenience when implementing application protection, and can adapt to the diverse privacy needs of users to realize terminal application protection .
- preset applications associated with different first verification information are different or partially the same.
- the preset applications of the terminal include application 1, application 2, application 3, application 4, and application 5
- fingerprint A corresponds to application 1
- fingerprint B corresponds to application 3 and application 5
- fingerprint C corresponds to application 3 and application 5.
- the user can set different combinations of preset applications to associate with different first verification information based on their different application usage requirements, thereby ensuring that the terminal can meet the user's diverse application privacy protection requirements.
- an embodiment of the present application also proposes a readable storage medium having an application protection program stored on the readable storage medium, and when the application protection program is executed by a processor, the relevant steps of any embodiment of the above application protection method are implemented. .
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Telephone Function (AREA)
Abstract
一种应用保护方法、控制装置和可读存储介质,该方法包括:终端接收第一验证信息(S10);根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面(S20);显示所述第一对应页面包含的应用标识(S30)。
Description
本申请要求于2019年11月04日申请的,申请号为201911067875.2,申请名称为“应用保护方法、控制装置和可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本申请涉及电子技术领域,尤其涉及应用保护方法、控制装置和可读存储介质。
随着人们对隐私的保护越来越重视,应用锁在终端上得到广泛应用。然而,目前终端使用者在启动设有应用锁的应用时,需通过输入预置的密钥验证后进入,每个应用都需要单独验证,操作繁琐。
发明概述
问题的解决方案
本申请的主要目的在于提供一种应用保护方法,旨在快捷实现不同页面的多个应用的应用解锁,保证用户在使用终端应用的隐私性同时简化用户操作。
为实现上述目的,本申请提供一种应用保护方法,所述应用保护方法包括以下步骤:
终端接收第一验证信息;
根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;以及
显示所述第一对应页面包含的应用标识。此外,为了实现上述目的,本申请还提供另一种应用保护方法,所述应用保护方法包括:
终端接收第一指纹信息和第二指纹信息;
根据所述第一指纹信息确定第三对应页面,根据所述第二指纹信息确定第四对 应页面;所述第三对应页面和所述第四对应页面包含的应用标识不同或部分相同;
在第一时刻显示所述第三对应页面包含的应用标识;以及
在第二时刻显示所述第四对应页面包含的应用标识;
其中,所述第一时刻不同于所述第二时刻。
此外,为了实现上述目的,本申请还提供又一种应用保护方法,所述应用保护方法包括以下步骤:
终端接收第一验证信息;
根据所述第一验证信息确定第一对应应用;以及
显示所述第一对应应用的应用标识。
此外,为了实现上述目的,本申请还提供一种控制装置,所述控制装置包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的应用保护程序,所述应用保护程序被所述处理器执行时实现如上任一项所述的应用保护方法的步骤。
此外,为了实现上述目的,本申请还提供一种可读存储介质,所述可读存储介质上存储有应用保护程序,所述应用保护程序被处理器执行时实现如上任一项所述的应用保护方法的步骤。
本申请提出的一种应用保护方法,该方法获取基于终端输入的第一验证信息,根据第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面,显示第一对应页面包含的应用标识,通过上述方式,用户可以将允许被其他人看到的应用的所在页面与第一验证信息关联,通过输入一次第一验证信息,便可快捷实现不同页面或同一页面上的全部应用的应用解锁,保证用户在使用终端应用的隐私性同时简化用户操作。
发明的有益效果
对附图的简要说明
图1是本申请显示终端一实施例的硬件结构示意图;
图2为本申请应用保护方法第一实施例的流程示意图;
图3为本申请应用保护方法第二实施例的流程示意图;
图4为本申请应用保护方法第三实施例的流程示意图;
图5为本申请应用保护方法第四实施例的流程示意图;
图6为本申请应用保护方法第五实施例的流程示意图;
图7为本申请应用保护方法第六实施例的流程示意图;
图8为本申请应用保护方法第七实施例的流程示意图;
图9为本申请应用保护方法第九实施例的流程示意图;
图10为本申请应用保护方法第十实施例的流程示意图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
发明实施例
应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。
本申请实施例的主要解决方案是:获取终端接收第一验证信息;根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;显示所述第一对应页面包含的应用标识。
由于现有技术中,目前终端使用者在启动设有应用锁的应用时,需通过输入预置的密钥验证后进入,每个应用都需要单独验证,操作繁琐。
本申请提供上述的解决方案,旨在快捷实现不同页面的多个应用的应用解锁,保证用户在使用终端应用的隐私性同时简化用户操作。
本申请提出一种显示终端。具体的,该显示终端为安装有安卓等系统的显示终端,可以是电视、手机、智能手表、电脑等。在本申请实施例中,参照图1,显示终端具体包括控制装置100、显示器200和指纹传感器300等。控制装置100具体用于显示终端的安卓系统中所安装应用的保护。显示器200具体用于显示系统运行过程中的不同界面。指纹传感器300用于采集用户基于终端输入的指纹信息。参照图1,控制装置100包括:处理器1001,例如CPU,存储器1002等。存储器1002可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1002可选的还可以是独立于前述处理器1001的存储装 置。
其中,处理器1001分别与存储器1002、显示器200、指纹传感器300通信连接。处理器1001可从存储器1002调用所需的存储数据或将运行所需的数据存储于存储器1002。处理器1001可调用安卓系统中的管理模块(如launcher(桌面启动器))对显示器200中的显示界面进行调整。处理器1001可从指纹传感器300中获取基于显示终端输入的指纹信息。
本领域技术人员可以理解,图1中示出的装置结构并不构成对装置的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。如图1所示,作为一种可读存储介质的存储器1002中可以包括应用保护程序。在图1所示的装置中,处理器1001可以用于调用存储器1002中存储的应用保护程序,并执行以下实施例中应用保护方法的相关步骤操作。
本申请还提供一种应用保护方法,用于安卓等运行系统中的应用保护。
参照图2,提出本申请应用保护方法第一实施例,所述应用保护方法包括:
步骤S10,终端接收第一验证信息;
这里的终端具体为显示终端,该显示终端安装有安卓等运行系统,可包括电视、手机、智能手表、电脑等。第一验证信息可具体包括指纹信息、字符信息、图案信息、人脸信息和手势信息等。
终端上可设有用于采集第一验证信息对应的信息采集模块(如指纹传感器、摄像头、触摸屏等)。信息采集模块可在预设模式下持续的第一验证信息进行监控采集,此外,信息采集模块还可接收到特定指令后开启对第一验证信息的检测。获取信息采集模块检测的数据便可得到上述的第一验证信息。
步骤S20,根据第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;
第一对应页面指的是显示终端系统运行的过程中用于应用标识(如应用图标、应用名称等)显示的页面。具体的,第一对应页面指的是安卓等运行系统的桌面页面。这里的应用标识具体作为应用的接入通道。不同预存的验证信息对应关联不同的预设页面,形成预设对应关系。第一验证信息的类型、第一验证信息所关联的页面可由用户通过操作终端进行设置。例如,用户可选取人脸信息 作为第一验证信息的类型,也可选择指纹信息作为第一验证信息的类型。预存的验证信息可根据需求设置有一个或多个。不同的验证信息可关联有不同的预设页面。一个第一验证信息所关联的预设页面可以有一个,也可以有多个。例如,桌面页面包括桌面页面1、桌面页面2、桌面页面3、桌面页面4和桌面页面5;指纹1对应关联桌面页面1和桌面页面3,指纹2对应关联桌面页面1、桌面页面2和桌面页面4,人脸1对应关联桌面页面2和桌面页面5。通过上述预设对应关系,便可确定当前获取的第一验证信息所对应的第一对应页面。其中,可将与第一验证信息关联的全部预设页面作为第一对应页面。在其他实施例中,也可将与第一验证信息不关联的全部预设页面作为第一对应页面。例如,当第一验证信息为人脸1时,第一对应页面为桌面页面2和桌面页面5;当第一验证信息为指纹1时,第一对应页面为桌面页面1和桌面页面3。
步骤S30,显示所述第一对应页面包含的应用标识。
具体的,可将第一对应页面的所有应用标识设置为可见状态。例如,基于上述桌面页面包括桌面页面1、桌面页面2、桌面页面3、桌面页面4和桌面页面5时,当第一验证信息为指纹1时,第一对应页面为桌面页面1和桌面页面3,则桌面页面1和桌面页面3上的应用标识的可见。
本实施例提出的一种应用保护方法,该方法获取基于终端输入的第一验证信息,根据第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面,显示第一对应页面包含的应用标识,通过上述方式,用户可以将允许被其他人看到的应用的所在页面与第一验证信息关联,通过输入一次第一验证信息,便可快捷实现不同页面或同一页面上的全部应用的应用解锁,保证用户在使用终端应用的隐私性同时简化用户操作。
具体的,在第一实施例中,为了便于用户操作和信息的采集识别,第一验证信息可具体为指纹信息。基于此,所述应用保护方法包括:
步骤S10a,获取基于终端输入的指纹信息;
这里的终端具体为显示终端,该显示终端安装有安卓等运行系统,可包括电视、手机、智能手表、电脑等。指纹信息为指纹传感器检测到手指的接触时所产生的特征数据。当终端处于应用保护状态时,可持续监测基于终端的指纹信息 。终端可根据用户设置为应用保护状态或非应用保护状态,也可默认设置为一直处于应用保护状态。当终端处于应用保护状态时,表明终端的拥有者不公开所有的应用使用状况,则执行步骤S10;当终端处于非应用保护状态时,表明终端的拥有者可公开所有的应用使用状况,则终端上的所有应用可无差别显示且自由启动。
步骤S20a,根据所述指纹信息确定第一对应页面;通过预先设置指纹信息与页面的对应关系,不同的预设指纹可对应有不同的预设页面。其中,预设指纹可有一个,也可设有多于一个。同一预设指纹所对应的预设页面的数量可以为一个,也可以多于一个,可适应于用户的实际需求设置。例如,可预先设置有指纹1和指纹2,指纹1对应关联桌面页面1和桌面页面3,指纹2对应关联桌面页面1、桌面页面2和桌面页面4。
具体的,步骤S20a可包括:
步骤S21,在所述终端的至少一个预设页面中,判断是否存在与所述指纹信息关联的页面;若存在,则执行步骤S22;若不存在,则可显示或隐藏预设页面中的所有应用图标。这里的预设页面可根据实际需求进行设置。可选的,可将终端的所有的桌面页面均作为预设页面。
步骤S22,将与所述指纹信息关联的预设页面作为所述第一对应页面。
在本实施例中,可将与当前指纹信息匹配一致的预设指纹所对应的预设页面作为第一对应页面。此外,在其他实施例中,也可将与当前指纹信息匹配不一致的预设指纹所对应的预设页面作为第一对应页面。
步骤S30a,显示所述第一对应页面包含的应用标识,且隐藏所述第一对应页面不包含的应用标识。
具体的,可将第一对应页面的所有应用标识设置为可见状态,将除第一对应页面的所有应用标识以外的在其他页面上的应用标识全部隐藏。其中,隐藏的应用标识所在的页面可以隐藏(该页面不出现在终端),也可以为可见状态(该页面保留在终端,但在该页面上看不到应用标识,只看到页面背景界面)。
本申请实施例提出的一种应用保护方法,该方法获取基于终端输入的指纹信息,根据指纹信息确定第一对应页面,显示第一对应页面包含的应用标识,通过 上述方式,用户可以将允许被其他人看到的应用的所在页面与第一验证信息关联,通过输入一次指纹信息,所有第一对应页面包含的应用标识便可进行显示,实现快捷解锁不同页面或同一页面上的全部应用,因此有利于提高用户实行应用保护时的操作效率。此外,还可基于不同的指纹将不同页面上的应用标识显示,提高用户应用保护时的便利性,随自身需求的变化实施不同的应用保护。
进一步的,基于第一实施例,提出本申请应用保护方法第二实施例。在第二实施例中,参照图3,所述步骤S20a包括:
步骤S21,在所述终端的至少一个预设页面中,判断是否存在与所述指纹信息关联的页面;若存在,则执行步骤S23和步骤S31;若不存在,则执行步骤S24。这里的预设页面可根据实际需求进行设置。可选的,可将终端的所有的桌面页面均作为预设页面。
步骤S23,将与所述指纹信息关联的预设页面作为所述第一对应页面,将未与所述指纹信息关联的预设页面作为第二对应页面;
在上述预先设置的对应关系中,可将与当前指纹信息匹配一致的预设指纹所对应的预设页面作为第一对应页面,将预设页面中除第一对应页面以外的页面作为第二对应页面。
基于步骤S23,步骤S30包括:显示所述第一对应页面。
其中,第一对应页面为可见状态。可根据用户选择任一第一对应页面作为终端当前显示页面。具体的,当终端的预设页面包括页面1、页面2、页面3、页面4和页面5时,A指纹对应关联页面1、页面3和页面4,B指纹对应关联页面3和页面5。当指纹信息为A指纹时显示页面1、页面3和页面4;当指纹信息为B指纹时显示页面3和页面5。
步骤S24,显示所有所述预设页面。所有的预设页面均为可见状态,用户可选择任一预设页面作为终端当前显示页面。
在本实施例中,终端上的预设页面存在与所述指纹信息关联的页面时,分别确定与指纹信息关联的第一对应页面和未与指纹信息关联的第二对应页面,通过第一对应页面显示,实现第一对应页面上应用标识的显示,使显示界面可符合 用户习惯,进一步提高终端应用保护时的用户体验,并且可基于页面操作同时对至少一个图标进行显示,提高操作效率。其中,终端上的预设页面不存在与所述指纹信息关联的页面时,可认为预设页面上的所有页面均可公开,用户不存在保护应用需求,则可显示所有预设页面,以使终端的使用者可基于预设页面上的应用标识使用任意的应用。
进一步的,基于上述任一实施例,提出本申请应用保护方法第三实施例。在第三实施例中,参照图4,步骤S10a后,所述步骤S20a之前,还包括:
步骤S11,当所述终端处于锁屏状态时,将所述指纹信息与至少一个第一预设指纹对比;
锁屏状态为终端的屏幕被锁定且限制用户对终端操作的状态。第一预设指纹具体为用于终端解锁的解锁指纹,可根据用户自行设置有一个或多于一个。其中,与预设页面关联的预设指纹可作为第一预设指纹,没有与预设页面关联的预设指纹也可作为第一预设指纹。
步骤S12,当所述指纹信息与所述第一预设指纹匹配时,解锁所述终端。
当任意一个第一预设指纹与指纹信息一致时,解锁终端。
在本实施例中,基于获取到的指纹信息,用户仅需一步操作便可同时实现终端屏幕的解锁和应用标识的显示和隐藏,解锁后终端使用者不会看到被隐藏的应用标识,简化用户操作同时提高用户使用终端应用时的隐私性。
进一步的,基于上述任一实施例,提出本申请应用保护方法第四实施例。在第四实施例中,参照图5,所述步骤S30之后,还包括:
步骤S40,在接收到基于所述第一对应页面的第一应用启动指令时,确定所述第一应用启动指令对应的第一目标应用;
用户可通过点击第一对应页面上应用标识等操作向终端输入第一应用启动指令。在接收到应用启动指令时,可确定第一应用启动指令所对应的第一目标应用。
步骤S50,打开所述第一目标应用。
在本实施例中,用户可通过发出第一应用启动指令打开第一对应页面上的任意页面,保护用户隐私同时提高用户打开应用的便利性。
进一步的,基于上述第一实施例至第三实施例,提出本申请应用保护方法第五实施例。在第五实施例中,第一对应页面中包括隐私应用的应用标识。这里的隐私应用为需要用户打开应用时需输入验证信息,验证通过才可成功打开的应用。基于此,参照图6,步骤S30之后,还包括:
步骤S60,在接收到基于所述第一对应页面的第二应用启动指令时,确定所述第二应用启动指令对应的第二目标应用;
步骤S70,当所述第二目标应用为所述隐私应用时,获取所述第二目标应用对应的第二验证信息;
用户可根据其使用需求将系统中的任意应用设置为隐私应用。每个隐私应用可对应设置有其验证信息,第二验证信息可以是指纹,也可以是密码等。可获取第二目标应用作为隐私应用所对应的第二验证信息。
步骤S80,当所述第二验证信息与所述指纹信息匹配时,打开所述第二目标应用。
当第二验证信息为指纹且与指纹信息一致时,允许打开第二目标应用。当第二验证信息与指纹信息不匹配时,则不允许打开第二目标应用,或可通过输入第二验证信息,通过验证后才可打开。
在本实施例中,在用户需要打开第一对应页面上的隐私应用时,用户无需单独进行应用验证便可启动隐私应用,简化用户操作同时保证用户使用终端应用的隐私性。尤其是在指纹信息可用于终端解锁时,用户仅仅通过一次操作便可实现终端解锁、保护不想被别人看到的应用和解锁隐私应用多个操作,进一步简化用户操作同时提高用户使用终端应用时的隐私性。
进一步的,基于上述任一实施例,提出本申请应用保护方法第六实施例。在第六实施例中,参照图7,步骤S10之前,还包括:
步骤S01,获取所述终端的至少一个预设页面的操作信息;
这里的操作信息为用户在预设页面上对页面上的一个或多于一个应用标识进行选定、移动、启动、删除等操作形成的信息。
步骤S02,当所述操作信息为位置调整信息时,根据所述操作信息确定所需调整的目标应用标识和所述预设页面中的目标页面;
当操作信息为对应用标识的选定和移动时,可认为操作信息为位置调整信息,可依据操作信息将所选定的应用标识作为目标应用标识,将在预设页面中将用户所选择移动至的页面作为目标页面。
步骤S03,将所述目标应用标识移动至所述目标页面。
将目标应用标识在原页面删除且将目标应用标识与目标页面关联显示。
在本实施例中,用户可根据实际需求将应用标识调整至不同的页面,仅通过应用标识移动操作便可对应用标识的显示或隐藏进行设置,提高用户对不同应用标识的显示或隐藏设置的便利性和操作效率。
进一步的,基于上述任一实施例,提出本申请应用保护方法第七实施例。在第七实施例中,参照图8,步骤S10之前,还包括:
步骤S001,在设置模式下,获取所述第一验证信息;
具体的,在设置模式下,终端可以对用户的指纹、字符、图案、人脸、手势等信息进行采集,作为第一验证信息。其中,为了便于用户操作和验证的可靠性,第一验证信息可具体为指纹信息。指纹信息可以为系统预存的指纹,如系统的解锁指纹等。此外,指纹信息也可以为用户在当前设置模式下基于终端输入的新指纹。
步骤S002,在所述终端的至少一个预设页面中,基于设置指令选取部分或全部所述预设页面作为目标对应页面;
终端的预设页面可具体包括页面1、页面2、页面3、页面4和页面5。用户可通过设置指令选择页面1和页面2作为目标对应页面,也可通过设置指令选择页面3作为目标对应页面,还可通过设置指令选择页面1、页面2、页面3、页面4和页面5作为目标对应页面。
步骤S003,将所述目标对应页面与所述指纹信息关联,形成所述第一对应页面。
本实施例中,通过上述方式用户可根据实际需求对第一验证信息所关联的页面进行随意调整,以提高实行应用保护时的便利性,可适应用户多样化的隐私需求实现终端应用保护。
其中,不同的所述指纹信息对应关联的预设页面不同或部分相同。例如,当终 端的预设页面包括页面1、页面2、页面3、页面4和页面5时,A指纹对应关联页面1、页面3和页面4,B指纹对应关联页面3和页面5,C指纹对应关联页面2和页面5。通过上述方式,用户可基于其不同的应用使用需求设置不同组合的预设页面与不同的指纹信息关联,从而保证终端可适应用户多样化的应用隐私保护需求。
进一步的,基于上述任一实施例,提出本申请应用保护方法,第八实施例,在第八实施例中,通过上述的步骤S20或步骤S20a确定第一对应页面后,还包括:显示所述第一对应页面包含的应用标识,且隐藏所述第一对应页面不包含的应用标识。
具体的,可将第一对应页面的所有应用标识设置为可见状态,将除第一对应页面的所有应用标识以外的在其他页面上的应用标识全部隐藏。其中,隐藏的应用标识所在的页面可以隐藏(该页面不出现在终端),也可以为可见状态(该页面保留在终端,但在该页面上看不到应用标识,只看到页面背景界面)。例如,基于上述桌面页面包括桌面页面1、桌面页面2、桌面页面3、桌面页面4和桌面页面5时,当第一验证信息为指纹1时,第一对应页面为桌面页面1和桌面页面3,则桌面页面1和桌面页面3上的应用标识的可见,隐藏桌面页面2、桌面页面4和桌面页面5上的不可见。在本实施例中,通过上述方式,用户可以通过指纹便可将不想被其他人看到的应用标识在终端上隐藏,只在终端上显示允许被其他人看到的应用标识,其他终端的使用者无法从了解该用户的应用使用情况,从而提高用户在使用终端应用时的隐私性。
进一步的,基于上述任一实施例,提出本申请应用保护方法第九实施例。在第九实施例中,参照图9,应用保护方法还包括以下步骤:
步骤S100,终端接收第一指纹信息和第二指纹信息;
第一指纹信息和第二指纹信息相关的具体实施方式均与步骤S10中指纹信息的获取方式相同,在此不作赘述。
步骤S200,根据所述第一指纹信息确定第三对应页面,根据所述第二指纹信息确定第四对应页面;所述第三对应页面和所述第四对应页面包含的应用标识不同或部分相同;
根据所述第一指纹信息确定第三对应页面、以及根据所述第二指纹信息确定第四对应页面的具体实施方式与上述实施例中根据所述指纹信息确定第一对应页面的具体实施方式相同,在此不作赘述。系统中可预存有不同的指纹信息及各自所关联的页面。例如,A指纹对应关联页面1、页面3和页面4,B指纹对应关联页面3和页面5,C指纹对应关联页面2和页面5。当第一指纹信息为A指纹时,第三对应页面可具体为页面1、页面3和页面4。第二指纹信息为B指纹时,第四对应页面具体为页面3和页面5,由于第三对应页面与第四对应页面均包含页面3,第三对应页面和第四对应页面均包含页面3上的应用标识,因此第三对应页面和第四对应页面包含的应用标识部分相同。当第一指纹信息为A指纹时,第三对应页面可具体为页面1、页面3和页面4。第二指纹信息为C指纹时,第四对应页面具体为页面2和页面5,由于第三对应页面与第四对应页面不存在相同的页面,因此第三对应页面和第四对应页面包含的应用标识不同。
步骤S300,在第一时刻显示所述第三对应页面包含的应用标识;
步骤S400,在第二时刻显示所述第四对应页面包含的应用标识;其中,所述第一时刻不同于所述第二时刻。第一时刻可具体为检测到第一指纹信息后预设时长内的任意时刻,第二时刻可具体为检测到第二指纹信息后预设时长内的任意时刻。
在本实施例中,用户在具有不同的应用保护需求时,可采用不同的指纹信息操作终端以切换当前终端显示的应用标识状态,通过上述方式,可满足用户多样化的应用保护需求,并提高实现应用保护状态切换的便利性。
此外,在其他实施例中,显示第三对应页面包含的应用标识的同时还可隐藏第三对应页面不包含的应用标识;显示第四对应页面包含的应用标识的同时还可隐藏第四对应页面不包含的应用标识,以实现其他用户无法感知终端的使用者对其应用使用的限制,从而进一步提高终端保护的隐私性。
具体的,在本实施例中,步骤S200之前,还包括:
步骤S101,当所述终端处于锁屏状态时,将所述第一指纹信息或所述第二指纹信息与至少一个第一预设指纹对比;
这里的第一预设指纹具体为用于终端解锁的解锁指纹,可根据用户自行设置有 一个或多于一个。其中,与预设页面关联的预设指纹可作为第一预设指纹,没有与预设页面关联的预设指纹也可作为第一预设指纹。将第一指纹信息与每个第一预设指纹比对,将第二指纹信息与每个第一预设指纹比对。
步骤S102,当所述第一指纹信息或所述第二指纹信息与所述第一预设指纹匹配时,解锁所述终端。
当任意一个第一预设指纹与第一指纹信息一致,或,任意一个第一预设指纹与第二指纹信息一致时,解锁终端。
通过上述方式,基于获取到的第一指纹信息或第二指纹信息,用户仅需一步操作便可同时实现终端屏幕的解锁和应用标识的显示和隐藏,解锁后终端使用者不会看到被隐藏的应用标识,简化用户操作同时提高用户使用终端应用时的隐私性。
进一步的,在本实施例中,步骤S300或步骤S400之后,还包括:
步骤S500,在接收到基于所述第三对应页面或所述第四对应页面的第三应用启动指令时,确定所述第三应用启动指令对应的第三目标应用;
在第三应用页面或第四应用页面显示的过程中,用户可通过点击当前显示的对应页面上应用标识等操作向终端输入第三应用启动指令。在接收到应用启动指令时,可确定第三应用启动指令所对应的第三目标应用。
步骤S600,打开所述第三目标应用。
在本实施例中,用户可通过发出第三应用启动指令打开当前显示的第三对应页面或第四对应页面上的任意页面,保护用户隐私同时提高用户打开应用的便利性。
进一步的,基于上述任一实施例,提出本申请应用保护方法第十实施例。在第十实施例中,参照图10,应用保护方法还包括以下步骤:
步骤S1,终端接收第一验证信息;
这里的终端具体为显示终端,该显示终端安装有安卓等运行系统,可包括电视、手机、智能手表、电脑等。第一验证信息可具体包括指纹信息、字符信息、图案信息、人脸信息和手势信息等。
终端上可设有用于采集第一验证信息对应的信息采集模块(如指纹传感器、摄 像头、触摸屏等)。信息采集模块可在预设模式下持续的第一验证信息进行监控采集,此外,信息采集模块还可接收到特定指令后开启对第一验证信息的检测。获取信息采集模块检测的数据便可得到上述的第一验证信息。
步骤S2,根据所述第一验证信息确定第一对应应用;
第一对应应用指的是显示终端系统中与第一验证信息关联的应用。第一对应应用可包括至少一个预设应用。不同预存的验证信息对应关联不同的预设应用,形成预设对应关系。第一验证信息的类型、第一验证信息所关联的应用可由用户通过操作终端进行设置。例如,用户可选取人脸信息作为第一验证信息的类型,也可选择指纹信息作为第一验证信息的类型。预存的验证信息可根据需求设置有一个或多个。不同的验证信息可关联有不同的预设应用。一个第一验证信息所关联的预设应用可以有一个,也可以有多个。例如,桌面应用包括应用1、应用2、应用3、应用4和应用5;指纹1对应关联应用1和应用3,指纹2对应关联应用1、应用2和应用4,人脸1对应关联应用2和应用5。
通过上述预设对应关系,便可确定当前获取的第一验证信息所对应的第一对应应用。其中,可将与第一验证信息关联的全部预设应用作为第一对应应用。在其他实施例中,也可将与第一验证信息不关联的全部预设应用作为第一对应应用。例如,当第一验证信息为人脸1时,第一对应应用为应用2和应用5;当第一验证信息为指纹1时,第一对应应用为应用1和应用3。
步骤S3,显示所述第一对应应用的应用标识。
具体的,可将第一对应应用的所有应用标识设置为可见状态。例如,基于上述应用包括应用1、应用2、应用3、应用4和应用5时,当第一验证信息为指纹1时,第一对应应用为应用1和应用3,则应用1和应用3的应用标识的可见。
在本实施例中,提出的一种应用保护方法,该方法获取基于终端输入的第一验证信息,根据第一验证信息确定第一对应应用,显示第一对应应用包含的应用标识,通过上述方式,用户可以将允许被其他人看到的应用的所在应用与第一验证信息关联,通过输入一次第一验证信息,便可快捷实现不同应用的应用解锁,保证用户在使用终端应用的隐私性同时简化用户操作。
在执行步骤S3时,显示应用标识的页面可为第一对应应用的应用标识本身所在 的页面,例如,应用1本身所属的显示页面为页面1,则在页面1显示应用1的应用标识;此外,显示应用标识的页面也可为第一对应应用的应用标识本身所属页面以外的其他任意页面,用户可根据需求指定显示第一对应应用标识的页面。其中,所述第一对应应用的应用标识显示于一个页面上,或多个页面上。也就是说,在终端的显示页面包括页面1、页面2和页面3时,在确定第一对应应用为应用1时,应用1的应用标识可显示于页面1、页面2和页面3中任意一个;在确定第一对应应用包括应用1、应用2、应用3时,应用1、应用2与应用3的三个应用标识可以同时显示于页面1、页面2和页面3中任意一个;也可在页面1、页面2和页面3中选择多于一个页面显示三个应用标识,例如,页面1显示应用3的应用标识,页面2显示应用1和应用2的应用标识。
进一步的,在第十实施例中,第一对应应用还包括隐私应用的应用标识。这里的隐私应用为需要用户打开应用时需输入验证信息,验证通过才可成功打开的应用。基于此,步骤S3之后,还包括:
步骤S3a,在接收到基于所述第一对应应用的第二应用启动指令时,确定所述第二应用启动指令对应的第二目标应用;
步骤S3b,当第二目标应用为隐私应用时,获取第二目标应用对应的第二验证信息;
用户可根据其使用需求将系统中的任意应用设置为隐私应用。每个隐私应用可对应设置有其验证信息,第二验证信息可以是指纹,也可以是密码等。可获取第二目标应用作为隐私应用所对应的第二验证信息。
步骤S3c,当所述第二验证信息与所述第一验证信息匹配时,打开所述第二目标应用。
当第二验证信息为指纹且与指纹信息一致时,允许打开第二目标应用。当第二验证信息与指纹信息不匹配时,则不允许打开第二目标应用,或可通过输入第二验证信息,通过验证后才可打开。
在本实施例中,在用户需要打开隐私应用时,用户无需单独进行应用验证便可启动隐私应用,简化用户操作同时保证用户使用终端应用的隐私性。尤其是在指纹信息可用于终端解锁时,用户仅仅通过一次操作便可实现终端解锁、保护 不想被别人看到的应用和解锁隐私应用多个操作,进一步简化用户操作同时提高用户使用终端应用时的隐私性。
进一步的,步骤S1之前,还包括:
步骤S01a,在设置模式下,获取所述第一验证信息;
具体的,在设置模式下,终端可以对用户的指纹、字符、图案、人脸、手势等信息进行采集,作为第一验证信息。其中,为了便于用户操作和验证的可靠性,第一验证信息可具体为指纹信息。指纹信息可以为系统预存的指纹,如系统的解锁指纹等。此外,指纹信息也可以为用户在当前设置模式下基于终端输入的新指纹。
步骤S02a,基于设置指令选取至少一个应用作为目标对应应用;
终端的预设应用可具体包括应用1、应用2、应用3、应用4和应用5。用户可通过设置指令选择应用1和应用2作为目标对应应用,也可通过设置指令选择应用3作为目标对应应用,还可通过设置指令选择应用1、应用2、应用3、应用4和应用5作为目标对应应用。
步骤S03a,将所述目标对应应用与所述第一验证信息关联,形成所述第一对应应用。
在本实施例中,通过上述方式,用户可以根据实际需求对第一验证信息所关联的页面进行随意调整,以提高实行应用保护时的便利性,可适应用户多样化的隐私需求实现终端应用保护。
其中,不同的所述第一验证信息对应关联的预设应用不同或部分相同。例如,当终端的预设应用包括应用1、应用2、应用3、应用4和应用5时,A指纹对应关联应用1、应用3和应用4,B指纹对应关联应用3和应用5,C指纹对应关联应用2和应用5。通过上述方式,用户可基于其不同的应用使用需求设置不同组合的预设应用与不同的第一验证信息关联,从而保证终端可适应用户多样化的应用隐私保护需求。
此外,本申请实施例还提出一种可读存储介质,所述可读存储介质上存储有应用保护程序,所述应用保护程序被处理器执行时实现如上应用保护方法任一实施例的相关步骤。
Claims (27)
- 一种应用保护方法,其中,所述应用保护方法包括以下步骤:终端接收第一验证信息;根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;以及显示所述第一对应页面包含的应用标识。
- 如权利要求1所述的应用保护方法,其中,所述第一验证信息为指纹信息,所述应用保护方法包括以下步骤:获取基于所述终端输入的指纹信息;根据所述指纹信息确定第一对应页面;以及显示所述第一对应页面包含的应用标识。
- 如权利要求2所述的应用保护方法,其中,所述根据所述指纹信息确定第一对应页面的步骤包括:在所述终端的至少一个预设页面中,判断是否存在与所述指纹信息关联的页面;以及若存在,则将与所述指纹信息关联的预设页面作为所述第一对应页面。
- 如权利要求3所述的应用保护方法,其中,所述在所述终端的至少一个预设页面中,判断是否存在与所述指纹信息关联的页面的步骤之后,还包括:若存在,则将与所述指纹信息关联的预设页面作为所述第一对应页面,将未与所述指纹信息关联的预设页面作为第二对应页面;以及所述显示所述第一对应页面包含的应用标识包括:显示所述第一对应页面。
- 如权利要求3所述的应用保护方法,其中,所述在所述终端的至少一个预设页面中,判断是否存在与所述指纹信息关联的页面的步骤之后,还包括:若不存在,则显示所有所述预设页面。
- 如权利要求2所述的应用保护方法,其中,所述根据所述指纹信息确定第一对应页面的步骤之前,还包括:当所述终端处于锁屏状态时,将所述指纹信息与至少一个第一预设指纹对比;以及当所述指纹信息与所述第一预设指纹匹配时,解锁所述终端。
- 如权利要求6所述的应用保护方法,其中,所述第一预设指纹为解锁指纹。
- 如权利要求1所述的应用保护方法,其中,所述显示所述第一对应页面包含的应用标识的步骤之后,还包括:在接收到基于所述第一对应页面的第一应用启动指令时,确定所述第一应用启动指令对应的第一目标应用;以及打开所述第一目标应用。
- 如权利要求1所述的应用保护方法,其中,所述第一对应页面包括隐私应用的应用标识。
- 如权利要求9所述的应用保护方法,其中,所述显示所述第一对应页面包含的应用标识的步骤之后,还包括:在接收到基于所述第一对应页面的第二应用启动指令时,确定所述第二应用启动指令对应的第二目标应用;当所述第二目标应用为所述隐私应用时,获取所述第二目标应用对应的第二验证信息;以及当所述第二验证信息与所述指纹信息匹配时,打开所述第二目标应用。
- 如权利要求2所述的应用保护方法,其中,所述获取基于终端输入的指纹信息的步骤之前,还包括:获取所述终端的至少一个预设页面的操作信息;当所述操作信息为位置调整信息时,根据所述操作信息确定所需调整的目标应用标识和所述预设页面中的目标页面;以及将所述目标应用标识移动至所述目标页面。
- 如权利要求1所述的应用保护方法,其中,所述获取基于终端输入的第一验证信息之前,还包括:在设置模式下,获取所述第一验证信息;在所述终端的至少一个预设页面中,基于设置指令选取部分或全部所述预设页面作为目标对应页面;以及将所述目标对应页面与所述第一验证信息关联,形成所述第一对应页面。
- 如权利要求1所述的应用保护方法,其中,不同的所述第一验证信息对应关联的所述预设页面不同或部分相同。
- 如权利要求1所述的应用保护方法,其中,所述第一验证信息包括指纹信息、字符信息、图案信息、人脸信息、手势信息。
- 如权利要求1所述的应用保护方法,其中,确定所述第一对应页面之后,还包括:显示所述第一对应页面包含的应用标识,且隐藏所述第一对应页面不包含的应用标识。
- 一种应用保护方法,其中,所述应用保护方法包括:终端接收第一指纹信息和第二指纹信息;根据所述第一指纹信息确定第三对应页面,根据所述第二指纹信息确定第四对应页面;所述第三对应页面和所述第四对应页面包含的应用标识不同或部分相同;在第一时刻显示所述第三对应页面包含的应用标识;以及在第二时刻显示所述第四对应页面包含的应用标识;其中,所述第一时刻不同于所述第二时刻。
- 如权利要求16所述的应用保护方法,其中,所述根据所述第一指纹信息确定第三对应页面,根据所述第二指纹信息确定第四对应页面;所述第三对应页面和所述第四对应页面包含的应用标识不同或部分相同的步骤之前,还包括:当所述终端处于锁屏状态时,将所述第一指纹信息或所述第二指纹信息与至少一个第一预设指纹对比;以及当所述第一指纹信息或所述第二指纹信息与所述第一预设指纹匹配时,解锁所述终端。
- 如权利要求16所述的应用保护方法,其中,所述在第一时刻显示所述第三对应页面包含的应用标识的步骤之后,或,所述在第二时刻显示所述第四对应页面包含的应用标识的步骤之后,还包括:在接收到基于所述第三对应页面或所述第四对应页面的第三应用启动指令时,确定所述第三应用启动指令对应的第三目标应用;以及打开所述第三目标应用。
- 一种应用保护方法,其中,所述应用保护方法包括以下步骤:终端接收第一验证信息;根据所述第一验证信息确定第一对应应用;以及显示所述第一对应应用的应用标识。
- 如权利要求19所述的应用保护方法,其中,所述终端接收第一验证信息的步骤之前,还包括:在设置模式下,获取所述第一验证信息;基于设置指令选取至少一个应用作为目标对应应用;以及将所述目标对应应用与所述第一验证信息关联,形成所述第一对应应用。
- 如权利要求19所述的应用保护方法,其中,所述第一对应应用包括至少一个应用。
- 如权利要求19所述的应用保护方法,其中,不同的所述第一验证信息对应关联的所述应用不同或部分相同。
- 如权利要求19所述的应用保护方法,其中,所述第一对应应用的应用标识显示于一个页面上,或多个页面上。
- 如权利要求19所述的应用保护方法,其中,所述第一对应应用包括隐私应用。
- 如权利要求19所述的应用保护方法,其中,所述显示所述第一对应应用的应用标识的步骤之后,还包括:在接收到基于所述第一对应应用的第二应用启动指令时,确定所述第二应用启动指令对应的第二目标应用;当所述第二目标应用为所述隐私应用时,获取所述第二目标应用对应的第二验证信息;以及当所述第二验证信息与所述第一验证信息匹配时,打开所述第二目标应用。
- 一种控制装置,其中,所述控制装置包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的应用保护程序,所述应用保护程序被所述处理器执行时实现如下步骤:终端接收第一验证信息;根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;以及显示所述第一对应页面包含的应用标识。
- 一种可读存储介质,其中,所述可读存储介质上存储有应用保护程序,所述应用保护程序被处理器执行时实现如下步骤:终端接收第一验证信息;根据所述第一验证信息确定第一对应页面,第一对应页面包括至少一个预设页面;以及显示所述第一对应页面包含的应用标识。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202080075812.6A CN115427948A (zh) | 2019-11-04 | 2020-02-24 | 应用保护方法、控制装置和可读存储介质 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911067875.2A CN110826029A (zh) | 2019-11-04 | 2019-11-04 | 应用保护方法、控制装置和可读存储介质 |
CN201911067875.2 | 2019-11-04 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021088272A1 true WO2021088272A1 (zh) | 2021-05-14 |
Family
ID=69552772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/076330 WO2021088272A1 (zh) | 2019-11-04 | 2020-02-24 | 应用保护方法、控制装置和可读存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN110826029A (zh) |
WO (1) | WO2021088272A1 (zh) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110826029A (zh) * | 2019-11-04 | 2020-02-21 | 深圳传音控股股份有限公司 | 应用保护方法、控制装置和可读存储介质 |
CN112468643A (zh) * | 2020-11-23 | 2021-03-09 | 深圳传音控股股份有限公司 | 移动终端的控制方法、移动终端及存储介质 |
CN112528310A (zh) * | 2020-12-21 | 2021-03-19 | 北京百度网讯科技有限公司 | 加密内容的显示方法、装置、设备以及存储介质 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120167202A1 (en) * | 2010-12-28 | 2012-06-28 | Kim Jeong-Ho | Apparatus and method for unlocking a user equipment |
CN103699830A (zh) * | 2013-12-30 | 2014-04-02 | 中科创达软件股份有限公司 | 一种操作系统解锁方法及装置 |
CN103745147A (zh) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | 系统模式启动方法、应用程序启动方法及设备 |
CN103902862A (zh) * | 2012-12-30 | 2014-07-02 | 联想(北京)有限公司 | 一种移动设备管理方法、装置及一种移动设备 |
CN105808993A (zh) * | 2016-03-30 | 2016-07-27 | 广东欧珀移动通信有限公司 | 一种解锁方法和相关装置 |
CN108268763A (zh) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | 终端控制方法、装置、存储介质及终端 |
CN108460256A (zh) * | 2018-01-18 | 2018-08-28 | 北京珠穆朗玛移动通信有限公司 | 数据保护方法、移动终端及装置 |
CN110826029A (zh) * | 2019-11-04 | 2020-02-21 | 深圳传音控股股份有限公司 | 应用保护方法、控制装置和可读存储介质 |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120124388A1 (en) * | 2010-11-14 | 2012-05-17 | Disa Digitalsafety Pte Ltd | Electronic-device theft-deterring systems |
US9268966B1 (en) * | 2012-08-24 | 2016-02-23 | A9.Com, Inc. | Quick usage control |
CN105117101B (zh) * | 2015-08-19 | 2018-11-30 | 小米科技有限责任公司 | 应用程序的显示方法和装置 |
CN106295305A (zh) * | 2016-08-09 | 2017-01-04 | 上海斐讯数据通信技术有限公司 | 一种触摸屏终端的屏幕解锁方法及装置 |
CN106778125A (zh) * | 2016-11-25 | 2017-05-31 | 北京小米移动软件有限公司 | 解锁方法、装置和设备 |
CN107704173B (zh) * | 2017-09-30 | 2020-04-07 | 努比亚技术有限公司 | 一种应用程序显示方法、终端和计算机可读存储介质 |
-
2019
- 2019-11-04 CN CN201911067875.2A patent/CN110826029A/zh active Pending
-
2020
- 2020-02-24 CN CN202080075812.6A patent/CN115427948A/zh active Pending
- 2020-02-24 WO PCT/CN2020/076330 patent/WO2021088272A1/zh active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120167202A1 (en) * | 2010-12-28 | 2012-06-28 | Kim Jeong-Ho | Apparatus and method for unlocking a user equipment |
CN103902862A (zh) * | 2012-12-30 | 2014-07-02 | 联想(北京)有限公司 | 一种移动设备管理方法、装置及一种移动设备 |
CN103699830A (zh) * | 2013-12-30 | 2014-04-02 | 中科创达软件股份有限公司 | 一种操作系统解锁方法及装置 |
CN103745147A (zh) * | 2013-12-30 | 2014-04-23 | 华为技术有限公司 | 系统模式启动方法、应用程序启动方法及设备 |
CN105808993A (zh) * | 2016-03-30 | 2016-07-27 | 广东欧珀移动通信有限公司 | 一种解锁方法和相关装置 |
CN108460256A (zh) * | 2018-01-18 | 2018-08-28 | 北京珠穆朗玛移动通信有限公司 | 数据保护方法、移动终端及装置 |
CN108268763A (zh) * | 2018-02-13 | 2018-07-10 | 广东欧珀移动通信有限公司 | 终端控制方法、装置、存储介质及终端 |
CN110826029A (zh) * | 2019-11-04 | 2020-02-21 | 深圳传音控股股份有限公司 | 应用保护方法、控制装置和可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN115427948A (zh) | 2022-12-02 |
CN110826029A (zh) | 2020-02-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021088272A1 (zh) | 应用保护方法、控制装置和可读存储介质 | |
US20220385471A1 (en) | Mobile Terminal Privacy Protection Method and Protection Apparatus, and Mobile Terminal | |
CN104992091B (zh) | 访问终端的方法、装置及存储介质 | |
US9027117B2 (en) | Multiple-access-level lock screen | |
WO2022089431A1 (zh) | 设备控制方法、装置和电子设备 | |
CN107580127B (zh) | 一种通讯消息提示方法及移动终端 | |
JP2012521170A (ja) | 生体認識スキャン構成およびその方法 | |
CN107229396B (zh) | 一种移动终端应用图标隐藏的方法及移动终端 | |
CN107959789B (zh) | 一种图像处理方法及移动终端 | |
CN107506198B (zh) | 一种移动终端的显示方法及移动终端 | |
JP2022002103A (ja) | モバイル端末のプライバシー保護方法および保護装置、並びにモバイル端末 | |
CN106778344B (zh) | 一种数据权限控制方法及终端 | |
KR101435487B1 (ko) | 사용자 단말기, 사용자 단말기의 숨김 페이지 사용 방법 및 컴퓨터 판독 가능한 기록 매체 | |
WO2023160640A1 (zh) | 应用标识的控制方法及其装置 | |
KR102014408B1 (ko) | 이미지 터치 패스워드를 이용한 사용자 인증 방법 및 이를 위한 컴퓨터 프로그램 | |
CN107644155B (zh) | 一种验证方式的设置方法及终端 | |
JP5910654B2 (ja) | 情報処理装置、情報処理装置の制御方法、およびプログラム。 | |
CN102799275B (zh) | 终端和终端内容的管理方法 | |
KR20200000776A (ko) | 터치 및 슬라이딩을 이용한 제스처 사용자 인증 방법 및 컴퓨터 프로그램 | |
CN111279339A (zh) | 一种应用锁定的方法、终端设备及计算机可读介质 | |
WO2020125667A1 (zh) | 一种设备控制方法、装置及系统 | |
KR20140039346A (ko) | 지문을 이용한 파일 사용 제한 방법, 사용자 단말기 및 기록 매체 | |
TW201642162A (zh) | 便攜式電子裝置解鎖系統及方法 | |
KR20140139704A (ko) | 사용자 단말기의 개인정보 보호 방법, 사용자 단말기, 컴퓨터로 읽을 수 있는 기록 매체 및 전송 장치 | |
KR20190142163A (ko) | 제스처를 이용한 터치 패스워드 사용자 인증 방법 및 컴퓨터 프로그램 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20884727 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20884727 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20884727 Country of ref document: EP Kind code of ref document: A1 |