[go: up one dir, main page]

CN111279339B - Application locking method, terminal equipment and computer readable medium - Google Patents

Application locking method, terminal equipment and computer readable medium Download PDF

Info

Publication number
CN111279339B
CN111279339B CN201780096367.XA CN201780096367A CN111279339B CN 111279339 B CN111279339 B CN 111279339B CN 201780096367 A CN201780096367 A CN 201780096367A CN 111279339 B CN111279339 B CN 111279339B
Authority
CN
China
Prior art keywords
application
authentication
touch screen
screen action
locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780096367.XA
Other languages
Chinese (zh)
Other versions
CN111279339A (en
Inventor
李晓亮
黄成钟
郑雪瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Publication of CN111279339A publication Critical patent/CN111279339A/en
Application granted granted Critical
Publication of CN111279339B publication Critical patent/CN111279339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An application locking method, a terminal device and a computer readable medium, wherein the method comprises: the terminal equipment receives a first touch screen action, wherein the first touch screen action is to click an application icon for a first preset time (101); locking an application (102) corresponding to the application icon according to the first touch screen action; if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application, wherein the second touch screen action is to click the application icon for a second preset time (103); and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is to click the application icon for a third preset number of times (104). By locking the application, information security may be improved.

Description

Application locking method, terminal equipment and computer readable medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to an application locking method, a terminal device, and a computer readable medium.
Background
As the processing capability of the mobile terminal device for data increases, the number of application programs on the mobile terminal device increases. Some applications are used to pay or store important information of a user, and if the user loses the mobile terminal device or is used by another person, the important information may be revealed, causing some irreparable loss. The mobile terminal device may then enhance information security by locking the application.
The currently used application locking technique is to lock the application by a swipe gesture, and input a password to unlock the application.
However, the existing technology has the defects that when a certain application icon is subjected to sliding operation, misoperation is often caused on other application icons, so that the operation is inconvenient, and when other people open the locked application and reject the locked application by the mobile terminal device, the operation is equivalent to reminding that important information is stored in the application program, and the safety performance is reduced.
Disclosure of Invention
The embodiment of the invention provides an application locking method which can improve information security.
In a first aspect, an embodiment of the present invention provides a method for locking an application, where the method includes:
the method comprises the steps that terminal equipment receives a first touch screen action, wherein the first touch screen action is to click an application icon for a first preset time; locking the application corresponding to the application icon according to the first touch screen action;
if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application, wherein the second touch screen action is to click the application icon for a second preset number of times;
and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is to click the application icon for a third preset time.
By implementing the method described in the first aspect, the terminal device receives the first touch screen action, the second touch screen action or the third touch screen action, and performs different operations according to the received touch screen action, and compared with the existing technology of locking an application, the clicking operation mode is more accurate, and the requirement on the terminal device is low. The embodiment of the invention is simple to operate in actual life, saves cost, and can effectively ensure the safety of information in the application by locking the application.
With reference to the first aspect, in a first implementation of the first aspect, the locking, according to the first touch screen action, an application corresponding to the application icon includes:
if the terminal equipment receives the first touch screen action for the first time, displaying setting prompt information, and locking an application corresponding to the application icon after receiving the set authentication information;
and if the terminal equipment does not receive the first touch screen action for the first time, the terminal equipment locks the application according to the first touch screen action.
By executing the steps, the terminal device can perform locking or authentication information setting operation by judging whether the application receives the first touch screen action for the first time. The application locking method has universality, and by setting in the system of the terminal equipment, a plurality of applications on the terminal equipment can be locked, so that the practicability of application locking is improved.
With reference to the first aspect, in a second implementation of the first aspect, after the displaying the first authentication interface, the method further includes:
receiving first authentication information, and displaying a second authentication interface if the first authentication information fails to pass authentication;
receiving second authentication information through the second authentication interface, wherein the second authentication information is different from the first authentication information in type;
and opening the application corresponding to the application icon after the second authentication information passes the authentication.
By executing the steps, the second authentication can be performed after the first authentication fails, the authentication modes of the first authentication and the second authentication are different, and the authentication modes can comprise fingerprint lock screen, pattern lock screen or character code lock screen, so that the second authentication information can be input for the second time when the user forgets the first authentication information, the self authentication passing probability of the user is improved, and the purposes of ensuring application safety and facilitating the user are achieved.
With reference to the second implementation of the first aspect, in a third implementation of the first aspect, the method further includes:
and if the second authentication information does not pass the authentication, sending warning prompt information to a target terminal bound with the terminal equipment, and hiding or locking the application preset time length corresponding to the application icon.
By executing the steps, the application can be locked or hidden under the condition that the second authentication is not passed, and warning prompt information can be sent to the target terminal bound with the terminal equipment. Because the target terminal bound with the terminal equipment can be regarded as the terminal equipment trusted by the user, the function of warning the user can be achieved under the condition that the application is not authenticated for many times, and the safety is further improved.
With reference to the second implementation of the first aspect or the third implementation of the first aspect, in a fourth implementation of the first aspect, after the displaying the first authentication interface, the method further includes:
the first authentication interface comprises a hidden application icon, and if the hidden application icon is selected, the first authentication information is received;
and if the first authentication information passes the authentication, hiding the application for a second preset duration.
By executing the above steps, the terminal device may hide the application under the selection of the user, if the application hiding icon is selected in the first authentication interface, then authenticate the authentication information received by the terminal device, and if the authentication is passed, hide the application for a second preset duration, where the second preset duration may be any set time. By the method, the embodiment of the invention can further improve the safety by hiding the application.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes a unit for executing the method of the first aspect, and the method includes:
the receiving unit is used for receiving a first touch screen action, wherein the first touch screen action is to click an application icon for a first preset time; receiving a second touch screen action, wherein the second touch screen action is to click the application icon for a second preset time; receiving a third touch screen action, wherein the third touch screen action is to click the application icon for a third preset time;
the locking control unit is used for locking the application corresponding to the application icon according to the first touch screen action;
the prompting unit is used for displaying locking prompting information if the receiving unit receives the second touch screen action;
an application control unit, configured to block an instruction for opening the application if the receiving unit receives the second touch screen action;
and the authentication unit is used for displaying a first authentication interface if the receiving unit receives the third touch screen action.
By implementing the method described in the first aspect, the receiving unit receives the first touch screen action, the second touch screen action or the third touch screen action, and performs different operations according to the received touch screen action, the lock control unit, the prompting unit, the application control unit or the authentication unit. The embodiment of the invention is simple to operate in actual life, and the safety of information in the application can be effectively ensured by locking the application.
With reference to the second aspect, in a first implementation of the second aspect:
the locking control unit is used for displaying setting prompt information by the prompt unit if the receiving unit receives the first touch screen action for the first time, and locking the application corresponding to the application icon after the authentication unit receives the set first authentication information;
and if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
By executing the steps, the receiving unit can judge whether the application receives the first touch screen action for the first time, so that the application control unit locks or the prompting unit prompts the operation of setting the authentication information. The application locking method has universality, and by setting in the system of the terminal equipment, a plurality of applications on the terminal equipment can be locked, so that the practicability of application locking is improved.
With reference to the second aspect, in a second implementation of the second aspect:
the authentication unit is used for receiving the first authentication information, and displaying a second authentication interface if the first authentication information fails to pass authentication; receiving second authentication information, wherein the second authentication information is different from the first authentication information in type;
And the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication.
By executing the steps, the second authentication can be performed after the first authentication fails, the authentication modes of the first authentication and the second authentication are different, and the authentication modes can comprise fingerprint lock screen, pattern lock screen or character code lock screen, so that the second authentication information can be input for the second time when the user forgets the first authentication information, the self authentication passing probability of the user is improved, and the purposes of ensuring application safety and facilitating the user are achieved.
With reference to the second aspect, in a third implementation manner of the second aspect, the terminal device further includes:
and the sending unit is used for sending warning prompt information to a target terminal bound with the terminal equipment if the second authentication information fails to pass, and the application control unit conceals the application corresponding to the application icon or the locking control unit locks the application preset duration corresponding to the application icon.
By executing the steps, the application control unit locks or hides the application under the condition that the second authentication is not passed yet, and the sending unit sends warning prompt information to the target terminal bound with the terminal equipment. Because the target terminal bound with the terminal equipment can be regarded as the terminal equipment trusted by the user, the function of warning the user can be achieved under the condition that the application is not authenticated for many times, and the safety is further improved.
With reference to the second implementation manner or the third implementation manner of the second aspect, in a fourth implementation manner of the second aspect, the application control unit is further configured to, after the authentication unit displays the first authentication interface, hide the application for a second preset duration if the receiving unit receives the information selected by the hidden application icon and the received first authentication information is authenticated, where the first authentication interface includes the hidden application icon.
By executing the above steps, the application control unit may hide the application, if the hidden application icon is selected in the first authentication interface, then the authentication unit authenticates the received authentication information, and if the authentication is passed, the application is hidden for a second preset duration, where the second preset duration may be any set time. By the method, the embodiment of the invention can further improve the safety by hiding the application.
In a third aspect, an embodiment of the present invention provides another terminal device, including a processor, an input device, an output device, a memory, and a communication interface, where the processor, the input device, the output device, the memory, and the communication interface are connected to each other by a bus, where the memory is configured to store a computer program supporting the terminal device to execute the method described above, where the computer program includes program instructions, and where the processor is configured to invoke the program instructions to execute the method of the first aspect described above.
In a fourth aspect, embodiments of the present invention provide a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of the first aspect described above.
The embodiment of the invention can improve the safety of information in the application by locking or hiding the application.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a method for application locking provided by an embodiment of the invention;
FIG. 2 is a schematic flow chart of a method of application locking provided by another embodiment of the present invention;
fig. 3 is an effect diagram of a first authentication interface containing a hidden icon in a method for locking an application according to an embodiment of the present invention;
fig. 4 is a schematic block diagram of a terminal device according to an embodiment of the present invention;
Fig. 5 is a schematic block diagram of a terminal device according to another embodiment of the present invention;
fig. 6 is a structural block diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
As used in this specification and the appended claims, the term "if" may be interpreted as "when..once" or "in response to a determination" or "in response to detection" depending on the context. Similarly, the phrase "if a determination" or "if a [ described condition or event ] is detected" may be interpreted in the context of meaning "upon determination" or "in response to determination" or "upon detection of a [ described condition or event ]" or "in response to detection of a [ described condition or event ]".
In particular implementations, the terminal devices described in embodiments of the present invention include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having a touch-sensitive surface (e.g., a touch screen display and/or a touch pad). It should also be appreciated that in some embodiments, the device is not a portable communication device, but rather a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or a touchpad).
In the following discussion, a terminal device including a display and a touch-sensitive surface is described. However, it should be understood that the terminal device may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The terminal device supports various applications, such as one or more of the following: drawing applications, presentation applications, word processing applications, website creation applications, disk burning applications, spreadsheet applications, gaming applications, telephony applications, video conferencing applications, email applications, instant messaging applications, workout support applications, photo management applications, digital camera applications, digital video camera applications, web browsing applications, digital music player applications, and/or digital video player applications.
Various applications that may be executed on the terminal device may use at least one common physical user interface device such as a touch sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal device may be adjusted and/or changed between applications and/or within the corresponding applications. In this way, the common physical architecture (e.g., touch-sensitive surface) of the terminal device may support various applications with user interfaces that are intuitive and transparent to the user.
Referring to fig. 1, which is a schematic flowchart of a method for locking applications according to an embodiment of the present invention, as shown in fig. 1, the method may include:
101: the terminal equipment receives a first touch screen action, wherein the first touch screen action is to click an application icon for a first preset time.
In the embodiment of the present invention, the first touch screen action is to click the application icon preset times set in the system, and the preset times are two or more times. Application icons, i.e. software identifications, different application icons corresponding to different application programs. The application icon of the desktop of the terminal device can be selected to perform different operations.
For example, the user clicks an application icon on the desktop of the terminal device, the sensor of the terminal device receives the clicked action, delays for a certain time, ensures that the complete action is received, analyzes the object of the action, i.e. finds the application icon, further, the terminal device identifies the action, and if the condition of clicking the preset times is met, the action is the first preset times.
In the embodiment of the invention, if the terminal equipment receives the first touch screen action for the first time, setting prompt information is displayed, and an application corresponding to the application icon is locked after the set authentication information is received, wherein the setting prompt information is used for prompting a user to set a screen locking code when the application is locked, and the screen locking can be fingerprint screen locking, pattern screen locking or character code screen locking and the like; if the terminal device does not receive the first touch screen action for the first time, the terminal device locks an application corresponding to the application icon according to the first touch screen action, wherein the application locking means that the application cannot be subjected to any operation by a user, including opening, moving, deleting or updating.
For example, if the terminal device receives the first touch screen action for the first time, a setting prompt message is displayed, where the setting prompt message may be "the application is not provided with a password and cannot be locked, please set a password", after the terminal device displays the setting prompt message, a screen locking password setting interface is displayed, after receiving the set authentication information, the application corresponding to the application icon is locked,
102: and locking the application corresponding to the application icon according to the first touch screen action.
In the embodiment of the present invention, the application corresponding to the locked application icon refers to that the application icon is selected, that is, the application corresponding to the application icon is selected, and the terminal device locks the application, and the application cannot be subjected to any operation by the user, including opening, moving, deleting, updating, and the like.
103: and if the second touch screen action is received, displaying locking prompt information and blocking an application opening instruction, wherein the second touch screen action is to click an application icon for a second preset time.
In the embodiment of the present invention, the second touch screen action is to click an application icon set in the system a second preset number of times, where the second preset number of times is one, and the locking prompt information is used to prompt that the application is locked and cannot be opened, moved, deleted or updated, for example, "the application is locked and cannot be operated, and continuously clicks the three-input password unlock application".
For example, the terminal device detects that the application icon is clicked once, typically, opens an application corresponding to the application icon, and in the embodiment of the present invention, if the terminal device receives the second touch screen action, that is, the application icon is clicked once, the terminal device firstly queries whether the application corresponding to the application icon is locked, and if the application icon is locked, blocks an instruction of opening the application icon, or receives the instruction but does not respond; and if the application icon is not locked, opening the application corresponding to the application icon.
104: and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is to click the application icon for a third preset time.
In the embodiment of the present invention, the third touch screen action is a third preset number of times of clicking the application icon set in the system, the third preset number of times is two or more than two, the third preset number of times is different from the second preset number of times, and the first authentication interface is a screen locking interface, and is used for receiving an authentication password input by a user, and may be a fingerprint screen locking, a pattern screen locking, or a character screen locking.
In an embodiment of the present invention, the first authentication interface includes a hidden application icon, for example, as shown in fig. 3. If the hidden application icon is selected by the user, hiding the application for a second preset time period after the first authentication information passes the authentication. The second preset time length is a fixed time length set in the system.
In the embodiment of the invention, the user can simply operate the application corresponding to the application icon by clicking the application icon on the terminal equipment so as to lock the application, and in the embodiment of the invention, the user can perform the second authentication under the condition that the first authentication fails and the first authentication mode is different from the second authentication mode, so that the authentication modes are diversified, the user passes the authentication as much as possible, and the user is prevented from opening the application by other people, thereby improving the security of information in the application.
Referring to FIG. 2, which is a schematic flow chart of another method for locking applications according to an embodiment of the present invention, the method 2 may include:
201: the terminal equipment receives a first touch screen action, wherein the first touch screen action is to click an application icon for a first preset time.
In the embodiment of the present invention, the first touch screen action is to click the application icon preset times set in the system, and the preset times are two or more times. Application icons, i.e. software identifications, different application icons corresponding to different application programs. And the application icon of the desktop of the terminal equipment can be triggered, so that the application corresponding to the application icon is operated.
For example, the user clicks an application icon on the desktop of the terminal device, the sensor of the terminal device receives the clicked action, delays for a certain time, ensures that the complete action is received, analyzes the object of the action, i.e. finds the application icon, further, the terminal device identifies the action, and if the condition of clicking the preset times is met, the action is the first preset times.
202: whether the terminal device receives the first touch screen action for the first time.
If yes, go to step 203; if not, step 205 is performed.
In the embodiment of the invention, after receiving the first touch screen action, the terminal equipment inquires whether the application corresponding to the selected application icon has authentication information in an authentication list in a system, wherein the authentication list is used for storing the authentication information, the authentication information is password information which is set by a user and used for locking the application corresponding to the application icon, and the password comprises fingerprints, patterns or characters and the like. If the terminal equipment inquires that the application has authentication information, the application is not firstly informed of receiving the first touch screen action; if the terminal equipment does not inquire the authentication information of the application, the application is indicated to receive the first touch screen action for the first time.
203: and displaying the setting prompt information.
In the embodiment of the invention, if the terminal equipment receives the first touch screen action for the first time, the terminal equipment displays setting prompt information, wherein the setting prompt information is used for prompting a user to set a screen locking code when the application is locked, and the screen locking can be fingerprint screen locking, pattern screen locking or character code screen locking and the like.
For example, after judging that the terminal device receives the first touch screen action for the first time, displaying a setting prompt message, where the setting prompt message may be "the application cannot be locked without setting a password" and requests to set a password, after displaying the setting prompt message, the terminal device displays a screen locking password setting interface, and locks the application corresponding to the application icon after receiving the set authentication information.
204: and locking the application corresponding to the application icon after receiving the set authentication information.
In the embodiment of the present invention, since the user sets the authentication information in the previous step 203, the terminal device receives the authentication information, stores the authentication information in the authentication list in the system, and then locks the application corresponding to the application icon. The authentication list comprises authentication information and application identifiers, and the authentication information corresponds to the application identifiers one by one.
205: and locking the application corresponding to the application icon according to the first touch screen action.
In the embodiment of the invention, since the terminal device does not receive the first touch screen action for the first time, the terminal device locks the application corresponding to the application icon according to the first touch screen action, wherein the application locking means that the application cannot be subjected to any operation by a user, including opening, moving, deleting or updating, and the like.
206: and if the second touch screen action is received, displaying locking prompt information and blocking an application opening instruction, wherein the second touch screen action is to click an application icon for a second preset time.
In the embodiment of the present invention, the second touch screen action is to click an application icon set in the system a second preset number of times, where the second preset number of times is one, and the locking prompt information is used to prompt that the application is locked and cannot be opened, moved, deleted or updated, for example, "the application is locked and cannot be operated, and continuously clicks the three-input password unlock application".
For example, the terminal device detects that the application icon is clicked once, typically, opens an application corresponding to the application icon, and in the embodiment of the present invention, if the terminal device receives the second touch screen action, that is, the application icon is clicked once, the terminal device firstly queries whether the application corresponding to the application icon is locked, and if the application icon is locked, blocks an instruction of opening the application icon, or receives the instruction but does not respond; and if the application icon is not locked, opening the application corresponding to the application icon.
207: and if a third touch screen action is received, displaying a first authentication interface, wherein the third touch screen action is to click the application icon for a third preset time.
In the embodiment of the present invention, the third touch screen action is a third preset number of times of clicking the application icon set in the system, the third preset number of times is two or more than two, the third preset number of times is different from the second preset number of times, and the first authentication interface is a screen locking interface, and is used for receiving an authentication password input by a user, and may be a fingerprint screen locking, a pattern screen locking, or a character screen locking.
In an embodiment of the present invention, the first authentication interface includes a hidden application icon, for example, as shown in fig. 3. If the hidden application icon is selected by the user, hiding the application for a second preset time period after the first authentication information passes the authentication. The second preset time length is a fixed time length set in the system.
208: whether the first authentication information is authenticated.
If yes, go to step 209; if not, go to step 210.
In the embodiment of the present invention, after receiving the first authentication information, the terminal device matches the first authentication information with the authentication information of the authentication list in the terminal device system, and if the matching is successful, step 209 is executed; if the match fails, step 210 is performed.
209: and opening the application corresponding to the application icon.
In the embodiment of the present invention, since the first authentication information is authenticated in step 208, the terminal device responds to the instruction for opening the application corresponding to the application icon, and opens the application corresponding to the application icon.
210: and displaying a second authentication interface, and receiving second authentication information through the second authentication interface.
In the embodiment of the present invention, since the first authentication information does not pass authentication in step 208, the terminal device displays a second authentication interface, where the second authentication interface is a lock screen interface, and is used for receiving an authentication password input by the user, and may be a fingerprint lock screen, a pattern lock screen, or a character code lock screen, and the second authentication interface includes an input portion capable of receiving the second authentication information input by the user.
211: whether the second authentication information is authenticated.
If yes, go to step 209; if not, go to step 212.
In the embodiment of the present invention, after receiving the second authentication information, the terminal device matches the second authentication information with the authentication information of the authentication list in the terminal device system, and if the matching is successful, step 209 is executed; if the match fails, step 212 is performed.
212: and sending warning prompt information to a target terminal bound with the terminal equipment, and hiding or locking the application preset duration corresponding to the application icon.
In the embodiment of the present invention, since the authentication of the second authentication information fails in step 211, the terminal device sends a warning prompt message to other target terminals bound to the terminal device, where the warning prompt message is used to prompt the user that the locked application in the terminal device fails to authenticate multiple times, for example, "warning, that your application fails to unlock multiple times, please pay attention to protect own information and property security.
The embodiment of the invention also provides a terminal device, which is used for executing the unit of the method of any one of the previous claims. Specifically, referring to fig. 4, a schematic block diagram of a terminal device according to an embodiment of the present invention is provided. The terminal device of the present embodiment includes: a receiving unit 401, a lock control unit 402, a prompting unit 403, an application control unit 404, and an authentication unit 405.
The receiving unit 401 is configured to receive a first touch screen action, where the first touch screen action is to click an application icon a first preset number of times; receiving a second touch screen action, wherein the second touch screen action is to click an application icon for a second preset time; and receiving a third touch screen action, wherein the third touch screen action is to click the application icon for a third preset time.
The locking control unit 402 is configured to lock an application corresponding to the application icon according to the first touch screen action.
And the prompting unit 403 is configured to display a locking prompting message if the receiving unit receives the second touch screen action.
The application control unit 404 is configured to block the instruction of opening the application if the receiving unit receives the second touch screen action.
And the authentication unit 405 is configured to display a first authentication interface if the receiving unit receives the third touch screen action.
The user equipment described in fig. 4 is implemented, and when receiving different touch screen actions for the application icons, the terminal equipment can make different responses according to the touch screen actions, so that the application corresponding to the application icons can be simply and quickly locked, and the safety of information in the application can be effectively ensured through the equipment.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another terminal device according to an embodiment of the present invention. The terminal device shown in fig. 5 is obtained by optimizing the terminal device shown in fig. 4. In comparison with the terminal device shown in fig. 4, in the terminal device shown in fig. 5:
the locking control unit is further used for displaying setting prompt information if the receiving unit receives the first touch screen action for the first time, and locking an application corresponding to the application icon after the authentication unit receives the set first authentication information;
And if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
In the embodiment of the invention, the authentication unit is further used for receiving the first authentication information, and if the first authentication information does not pass the authentication, a second authentication interface is displayed; receiving second authentication information, wherein the second authentication information is different from the first authentication information in type;
and the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication.
In an embodiment of the present invention, the service device shown in fig. 5 may further include:
and the sending unit is used for sending warning prompt information to a target terminal bound with the terminal equipment if the second authentication information fails to pass, and the application control unit conceals the application corresponding to the application icon or the locking control unit locks the application preset duration corresponding to the application icon.
In the embodiment of the present invention, the application control unit is further configured to, after the authentication unit displays the first authentication interface, hide the application for a second preset duration if the receiving unit receives the information selected by the hidden application icon and the received first authentication information is authenticated, where the first authentication interface includes the hidden application icon.
The user equipment described in fig. 5 is implemented, and when receiving different touch screen actions for the application icons, the terminal equipment can make different responses according to the touch screen actions, so that the application corresponding to the application icons can be simply and quickly locked, and the safety of information in the application can be effectively ensured through the equipment. Further, when the authentication of the first authentication information fails, the user can perform the authentication of the second authentication information, the authentication interface can be a fingerprint lock screen, a pattern lock screen or a character code lock screen, and the like, and the two authentication modes are different, so that the user can obtain the second authentication opportunity under the condition that the first authentication fails, the probability of the user setting the locking code passing the authentication is improved, the safety of information in the locking application is also ensured, further, the first authentication interface contains a hidden application icon, and under special conditions, the user can hide the application after selecting the first authentication information, and the safety of the information in the application can be improved again by the method.
Referring to fig. 6, a schematic block diagram of a terminal device according to another embodiment of the present invention is provided. The terminal device in this embodiment as shown in the figure may include: one or more processors 601; one or more input devices 602, one or more output devices 603, a memory 604, and a communication interface 605. The processor 601, input device 602, output device 603, memory 604, and communication interface 605 described above are connected by bus 606. The memory 604 is used for storing a computer program comprising program instructions, the processor 601 is used for executing the program instructions stored in the memory 604, and the communication interface is used for communicating with a network element, wherein the network element comprises, for example, a virtual machine management center, a shared storage, etc.
An input device 602, configured to perform a function of the receiving unit, and configured to receive a first touch screen action, where the first touch screen action is clicking an application icon a first preset number of times; receiving a second touch screen action, wherein the second touch screen action is to click an application icon for a second preset time; and receiving a third touch screen action, wherein the third touch screen action is to click the application icon for a third preset time.
An output device 603, configured to perform a function of the authentication unit, and configured to display a first authentication interface if the input device 602 receives a third touch screen action; and is further configured to perform a function of the prompting unit, and to display a lock prompting message if the input device 602 receives the second touch screen action.
In the embodiment of the present invention, after the output device 603 displays the first authentication interface, if the first authentication information fails to pass the authentication, the output device 603 displays the second authentication interface.
Wherein the input device 602 is further configured to receive second authentication information, the second authentication information being of a different type than the first authentication information.
The processor 601 is configured to perform a function of the lock control unit, and lock an application corresponding to the application icon according to the first touch screen action if the input device 602 receives the first touch screen action; and also to perform the function of the application control unit for blocking the instruction to open the application if the input device 602 receives the second touch screen action.
After the input device 602 receives the first touch screen action, if the input device 602 receives the first touch screen action for the first time, the output device 603 displays setting prompt information, and locks an application corresponding to the application icon after the input device 602 receives the set authentication information; if the input device 602 does not first receive the first touch screen action, the processor 601 locks the application according to the first touch screen action.
Still further, if the second authentication information passes the authentication, the processor 601 opens the application corresponding to the application icon.
After the output device 603 displays the first authentication interface, if the input device receives the information selected by the hidden application icon and the received first authentication information passes the authentication, the processor 601 hides the application for a second preset duration, and the first authentication interface includes the hidden application icon.
The communication interface 605 is configured to perform a function of the sending unit, and if the second authentication information fails to pass, send a warning prompt message to the target terminal bound to the terminal device, where the processor 601 hides or locks the application preset duration corresponding to the application icon by the control unit.
It should be appreciated that in embodiments of the present invention, the processor 601 may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSPs), application specific integrated circuits (Application Specific Integrated Circuit, ASICs), off-the-shelf programmable gate arrays (Field-Programmable Gate Array, FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 602 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output device 630 may include a display (LCD, etc.), a speaker, etc.
The memory 604 may include read only memory and random access memory and provides instructions and data to the processor 601. A portion of memory 604 may also include non-volatile random access memory. For example, the memory 604 may also store information of device type.
In a specific implementation, the processor 601, the input device 602, and the output device 603 described in the embodiments of the present invention may execute the implementation described in the first embodiment and the second embodiment of the application locking method provided in the embodiments of the present invention, and may also execute the implementation of the terminal device described in the embodiments of the present invention, which is not described herein again.
In another embodiment of the present invention, a computer-readable storage medium is provided, the computer-readable storage medium storing a computer program comprising program instructions for execution by a processor.
The computer readable storage medium may be an internal storage unit of the terminal device of any of the foregoing embodiments, for example, a hard disk or a memory of the terminal device. The computer readable storage medium may also be an external storage device of the terminal device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal device. Further, the computer-readable storage medium may also include both an internal storage unit of the terminal device and an external storage device. The computer-readable storage medium is used to store a computer program and other programs and data required for the terminal device. The computer-readable storage medium may also be used to temporarily store data that has been output or is to be output.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps described in connection with the embodiments disclosed herein may be embodied in electronic hardware, in computer software, or in a combination of the two, and that the elements and steps of the examples have been generally described in terms of function in the foregoing description to clearly illustrate the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working procedures of the terminal device and unit described above may refer to the corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In several embodiments provided in the present application, it should be understood that the disclosed terminal device and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of elements is merely a logical functional division, and there may be additional divisions of actual implementation, e.g., multiple elements or components may be combined or integrated into another system, or some features may be omitted, or not performed. In addition, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices, or elements, or may be an electrical, mechanical, or other form of connection.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the embodiment of the present invention.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention is essentially or a part contributing to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.

Claims (7)

1. A method of application locking, comprising:
the terminal equipment receives a first touch screen action and locks an application corresponding to an application icon according to the first touch screen action;
if a second touch screen action is received, displaying locking prompt information and blocking an instruction for opening the application; and/or the number of the groups of groups,
if a third touch screen action is received, displaying a first authentication interface;
receiving first authentication information, and displaying a second authentication interface if the first authentication information fails to pass authentication;
receiving second authentication information through the second authentication interface, wherein the second authentication information is different from the first authentication information in type;
after the second authentication information passes the authentication, opening an application corresponding to the application icon;
after said displaying the first authentication interface, the method further comprises:
the first authentication interface comprises a hidden application icon, and if the hidden application icon is selected, the first authentication information is received;
and if the first authentication information passes the authentication, hiding the application for a second preset duration.
2. The method of claim 1, wherein the locking the application corresponding to the application icon according to the first touch screen action comprises:
If the terminal equipment receives the first touch screen action for the first time, displaying setting prompt information, and locking an application corresponding to the application icon after receiving the set authentication information; and/or the number of the groups of groups,
and if the terminal equipment does not receive the first touch screen action for the first time, the terminal equipment locks the application according to the first touch screen action.
3. The method according to claim 1, wherein the method further comprises:
and if the second authentication information does not pass the authentication, sending warning prompt information, and hiding or locking the application preset duration corresponding to the application icon.
4. A terminal device, comprising:
the receiving unit is used for receiving the first touch screen action, receiving the second touch screen action and/or receiving the third touch screen action;
the locking control unit is used for locking the application corresponding to the application icon according to the first touch screen action;
the prompting unit is used for displaying locking prompting information if the receiving unit receives the second touch screen action;
an application control unit, configured to block an instruction for opening the application if the receiving unit receives the second touch screen action;
The authentication unit is used for displaying a first authentication interface if the receiving unit receives the third touch screen action;
the authentication unit is further used for receiving first authentication information, and displaying a second authentication interface if the first authentication information fails to pass authentication; receiving second authentication information, wherein the second authentication information is different from the first authentication information in type;
the application control unit is used for opening the application corresponding to the application icon after the second authentication information passes the authentication;
the application control unit is further configured to, after the authentication unit displays the first authentication interface, hide the application for a second preset duration if the receiving unit receives the information selected by the hidden application icon and the received first authentication information is authenticated, where the first authentication interface includes the hidden application icon.
5. The terminal device of claim 4, wherein the terminal device,
the locking control unit is used for displaying setting prompt information by the prompt unit if the receiving unit receives the first touch screen action for the first time, and locking the application corresponding to the application icon after the authentication unit receives the set authentication information; and/or the number of the groups of groups,
And if the receiving unit does not receive the first touch screen action for the first time, locking the application according to the first touch screen action.
6. A terminal device comprising a processor, an input device, an output device and a memory, the processor, the input device, the output device and the memory being interconnected, wherein the memory is adapted to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1 to 3.
7. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of any of claims 1 to 3.
CN201780096367.XA 2017-08-29 2017-08-29 Application locking method, terminal equipment and computer readable medium Active CN111279339B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/099507 WO2019041136A1 (en) 2017-08-29 2017-08-29 Application locking method, terminal device, and computer readable medium

Publications (2)

Publication Number Publication Date
CN111279339A CN111279339A (en) 2020-06-12
CN111279339B true CN111279339B (en) 2023-07-21

Family

ID=65524783

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780096367.XA Active CN111279339B (en) 2017-08-29 2017-08-29 Application locking method, terminal equipment and computer readable medium

Country Status (2)

Country Link
CN (1) CN111279339B (en)
WO (1) WO2019041136A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110007821B (en) * 2019-03-28 2021-03-02 维沃移动通信有限公司 Operation method and terminal equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105718768A (en) * 2016-01-12 2016-06-29 广东欧珀移动通信有限公司 A method and device for preventing icon misoperation
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120074490A (en) * 2010-12-28 2012-07-06 삼성전자주식회사 Apparatus and method for displaying menu of portable terminal
CN105005436A (en) * 2015-06-26 2015-10-28 宇龙计算机通信科技(深圳)有限公司 Program processing method and mobile terminal
CN106446631A (en) * 2016-09-20 2017-02-22 深圳市金立通信设备有限公司 Method and terminal for checking screen lock notification information

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102375949A (en) * 2010-08-18 2012-03-14 Lg电子株式会社 Mobile terminal and method for controlling method thereof
CN103413072A (en) * 2013-07-27 2013-11-27 金硕澳门离岸商业服务有限公司 Application program protection method and device
CN104217151A (en) * 2014-09-11 2014-12-17 三星电子(中国)研发中心 Locking method for application of intelligent terminal and intelligent terminal
WO2016039529A1 (en) * 2014-09-11 2016-03-17 삼성전자 주식회사 Method for controlling lock status of application and electronic device supporting same
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105718768A (en) * 2016-01-12 2016-06-29 广东欧珀移动通信有限公司 A method and device for preventing icon misoperation
CN106228085A (en) * 2016-07-27 2016-12-14 维沃移动通信有限公司 The method for secret protection of application program and mobile terminal
CN106845211A (en) * 2016-12-16 2017-06-13 北京奇虎科技有限公司 Mobile terminal and its application start method and device

Also Published As

Publication number Publication date
WO2019041136A1 (en) 2019-03-07
CN111279339A (en) 2020-06-12

Similar Documents

Publication Publication Date Title
US9760707B2 (en) Unlocking electronic devices using touchscreen input gestures
US10846425B2 (en) Data protection based on user input during device boot-up, user login, and device shut-down states
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9740832B2 (en) Method, apparatus and system for access mode control of a device
US9038166B2 (en) Method and apparatus for authenticating password of user terminal
AU2011312743B2 (en) Multiple-access-level lock screen
US9357391B1 (en) Unlocking electronic devices with touchscreen input gestures
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
EP3376425A1 (en) User interface switching method and terminal
US20090227232A1 (en) Access Management
EP3161701B1 (en) Data protection system based on user input patterns on device
WO2016177000A1 (en) Method for entering operating system desktop and mobile intelligent terminal
CN106022077B (en) A kind of unlocking screen method and terminal
CN106815509B (en) Multimedia file protection method and device and electronic equipment
US8392992B1 (en) Method and apparatus for preventing sensitive data leakage due to input focus misappropriation
CN106355059A (en) Password input method and terminal
CN107766712A (en) Message prompt method, terminal and computer-readable medium
CN107368735B (en) Application installation method, mobile terminal and computer readable storage medium
CN108509808A (en) Application icon hiding method and device and terminal equipment
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
US20140059669A1 (en) Method and mobile terminal for enhancing the security of a mobile terminal
CN108520186A (en) Screen recording method, mobile terminal and computer readable storage medium
US11163883B2 (en) Enhancing security of a touch screen device
CN106599642A (en) Information leakage prevention method and electronic terminal
CN109800548B (en) Method and device for preventing personal information from being leaked

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant