CN102819714A - Terminal and safe control method of application program - Google Patents

Terminal and safe control method of application program Download PDF

Info

Publication number
CN102819714A
CN102819714A CN201210265241XA CN201210265241A CN102819714A CN 102819714 A CN102819714 A CN 102819714A CN 201210265241X A CN201210265241X A CN 201210265241XA CN 201210265241 A CN201210265241 A CN 201210265241A CN 102819714 A CN102819714 A CN 102819714A
Authority
CN
China
Prior art keywords
application program
program
user
new application
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201210265241XA
Other languages
Chinese (zh)
Other versions
CN102819714B (en
Inventor
林良水
文游
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210265241.XA priority Critical patent/CN102819714B/en
Publication of CN102819714A publication Critical patent/CN102819714A/en
Application granted granted Critical
Publication of CN102819714B publication Critical patent/CN102819714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Stored Programmes (AREA)

Abstract

The invention provides a terminal, which comprises a program division module and a program control module, wherein the original application program is divided into a plurality of new application programs and is displayed on an interface of the terminal, and the original application program is started when a user carries out preset operation on the plurality of new application programs on the interface. Correspondingly, the invention also provides a safe control method of the application program. According to the technical scheme, the application program which is hoped to be kept secretly by the user is divided into a plurality of programs; the original application program cannot be used when any part is independently operated, and the original application program can be started only when all corresponding programs are subjected to preset operation, thereby achieving the effect of concealing the original application program and enhancing the security and operation interest of a mobile terminal.

Description

Terminal and application security control method
Technical field
The present invention relates to application security control field, in particular to a kind of terminal and a kind of application security control method.
Background technology
On existing mobile phone, handle for the security technique of program and to have following three kinds of situation: 1, program does not have security set; 2, the mode of the program through hiding need to be keep secret is carried out that security set; 3, carry out security set through mode to the program encryption of need to be keep secret.
The research said method is not difficult to find that under said first kind of situation, the application program on the mobile phone terminal does not possess security; Under said second kind of situation, can reach certain security protection effect though hide the secret program of said need, for the cellphone subscriber; When he will use said program of being maintained secrecy; Need to make amendment to the setting of said mobile phone terminal through after some identification mode earlier, demonstrate and saidly can be carried out the operation to this program after the program of hiding, obviously this is for said cellphone subscriber person; More loaded down with trivial details in the operation, and inconvenient; Under said the third situation; Though the way of the program of said need to be keep secret being carried out security set through the mode of encrypting is safety relatively technically, for said cellphone subscriber operation also simpler than second kind of situation; This is for the people beyond the said cellphone subscriber; Do not have the fascination effect, promptly still can make other people see this program, and make attempt use the people of this application program to know that this program is encrypted.This need use for some said cellphone subscribers, but does not hope the application program (such as diary, financial records or the like) that other people see, has just lost meaning.
Therefore; Need a kind of new technical scheme; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other, to wherein arbitrarily a part separately during operation former application program all can't use, have only that former application program can be activated when all corresponding programs were operated; And then reaching the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
Summary of the invention
Technical matters to be solved by this invention is; A kind of new technical scheme is provided; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs that are mutually related, to wherein arbitrarily a part separately during operation former application program all can't use, have only that former application program can be activated when all corresponding programs were operated; And then reaching the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
In view of this, the present invention proposes a kind of terminal, comprising: program is cut apart module, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal; Program controling module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
In the present technique scheme; Cut apart module through said program said original program is divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplished the task of hiding said original application program; Through said program controling module, require said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished and making said user can simply directly on said interface, accomplish the task of starting said original program afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, when said program controling module is operated single or the new application program of part on said interface said user, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme, preferably, also comprise: key module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receives said user and inputs password and/or carry out the digital certificate checking, to start said original application program.
In the present technique scheme,, when the user operates said whole new application program corresponding to a certain original application program, need said user input password and/or carry out the digital certificate checking through introducing said key module.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said program is cut apart module said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; When said program controling module is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; When said program controling module is operated said all new application programs by predetermined manner on said interface said user; Start said original application program, wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
According to another aspect of the invention, also proposed a kind of application security control method, having comprised: step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal; Step 204 when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
In the present technique scheme; Through said original program being divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplish the task of hiding said original application program, having made said user can simply directly on said interface, accomplish the task of starting said original program through requiring said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, said step 204 also comprises: when said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme, preferably, said step 204 comprises: when the user operates said whole new application program corresponding to a certain original application program, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said step 202 comprises: said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; Said step 204 comprises: when said user operates said two new application programs on said interface, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; Said step 204 comprises: on said interface, when by predetermined manner said all new application program being operated, start said original application program said user; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Through above technical scheme; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other; Former application program all can't be used when operating wherein a part is independent arbitrarily; Have only that former application program can be activated when all corresponding programs were operated, and then reach the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
Description of drawings
Fig. 1 shows the block diagram at terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of application security control method according to an embodiment of the invention;
Fig. 3 shows the schematic flow sheet that application program is according to an embodiment of the invention cut apart;
Fig. 4 A to Fig. 4 C shows the interface synoptic diagram that application program is according to an embodiment of the invention cut apart;
Fig. 5 shows the schematic flow sheet of application program launching according to an embodiment of the invention;
Fig. 6 A to Fig. 6 B shows the interface synoptic diagram of application program launching according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the block diagram at terminal according to an embodiment of the invention.
As shown in Figure 1, the terminal 100 according to an embodiment of the invention, comprising: program is cut apart module 102, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal; Program controling module 104, the user on said interface when all new application programs are operated, start said original application program.
In the present technique scheme; Cut apart module 102 through said program said original program is divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplished the task of hiding said original application program; Through said program controling module 104, require said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished and making said user can simply directly on said interface, accomplish the task of starting said original program afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, when said program controling module 104 is operated single or the new application program of part on said interface said user, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module 104 is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme; Preferably, also comprise: key module 106, when said program is cut apart module 102 said original application program to be divided into a plurality of said new application programs or afterwards; Be respectively the different key of a plurality of said new application assigned; So that a plurality of said new application programs are encrypted, when a plurality of said keys all combine, can decipher the said original application program corresponding with a plurality of said new application programs.
In the present technique scheme; Encrypt through introducing 106 pairs of said new application assigned keys of said key module; So just can be when having a plurality of said original application program to be cut apart; Distinguish the corresponding relation between different new application programs and the different original application program exactly through the said key that distributes; And then guarantee that said program controling module 104 can judge accurately that whether said user operates the whole said new application program corresponding to a certain said original application program, guarantees the true(-)running of said terminal.
In technique scheme, preferably, when said key is operated, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said program is cut apart module 102 said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; When said program controling module 104 is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; When said program controling module 102 is operated said all new application programs by predetermined manner on said interface said user; Start said original application program, wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Fig. 2 shows the process flow diagram of application security control method according to an embodiment of the invention.
As shown in Figure 2, application security control method according to an embodiment of the invention, comprising: step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal; Step 204, the user on said interface when all new application programs are operated, start said original application program.
In the present technique scheme; Through said original program being divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplish the task of hiding said original application program, having made said user can simply directly on said interface, accomplish the task of starting said original program through requiring said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, said step 204 also comprises: when said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme; Preferably; Said step 202 comprises: when said original application program being divided into a plurality of said new application programs or afterwards, be respectively the different key of a plurality of said new application assigned, so that a plurality of said new application programs are encrypted; Said step 204 comprises: when a plurality of said keys all combine, and can be to the said original application program deciphering corresponding with a plurality of said new application programs.
In the present technique scheme; Through said new application assigned key is encrypted; So just can be when having a plurality of said original application program to be cut apart; Distinguish the corresponding relation between different new application programs and the different original application program exactly through the said key that distributes, and then guarantee accurately to judge that whether said user operates the whole said new application program corresponding to a certain said original application program, guarantees the true(-)running of said terminal.
In technique scheme, preferably, said step 204 comprises: when said key is operated, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said step 202 comprises: said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; Said step 204 comprises: when said user operates said two new application programs on said interface, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; Said step 204 comprises: on said interface, when by predetermined manner said all new application program being operated, start said original application program said user; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Fig. 3 shows the schematic flow sheet that application program is according to an embodiment of the invention cut apart.
As shown in Figure 3, the flow process cut apart of application program is following according to an embodiment of the invention:
Step 302; At the terminal applies interface (shown in Fig. 4 A); Long icon by (perhaps other preset modes of operation of user/terminal) program A; Deletion is provided for the user, moves, set up file, create outside the common function such as shortcut, also program dividing function (cutting apart shown in the interface 404 like program among Fig. 4 B) is provided to said user.
Step 304 if said user selects to delete said program A, is then deleted said program A, and gets into step 312.
Step 306, said user is dragged to program with said program A and cuts apart interface 404 (shown in arrow 402 among Fig. 4 B), program cutting operation interface occurs, and gets into step 310.
Step 308, if said user selects to move said program A, then the track according to user's operation moves said program A, and gets into step 312.
Step 310 in said program cutting operation interface, is provided with program icon, title (can manually be provided with, but also system default distributing) after cutting apart, and said program is cut apart.Cut apart finish after; Program A hides, and supposes said program A is divided into two new procedures B and C then said terminal applies interface generator program B and program C (the two is key each other); And said program B and said program C are two independent application icons in said terminal applies interface display; Shown in Fig. 4 C, when independent clickable icon B or icon C, program can't be moved.Said procedure is cut apart and is accomplished the laggard step 312 of going into.
Step 312 is returned the normal procedure tabulation, promptly said terminal applies interface.
Fig. 5 shows the schematic flow sheet of application program launching according to an embodiment of the invention.
As shown in Figure 5, the flow process of application program launching is following according to an embodiment of the invention:
Suppose that being operating as of said predetermined manner drags a new application program and cover other application programs; But the operation of said predetermined manner also can be for can be simultaneously or any other mode to operating corresponding to whole application programs newly of said original application program successively, and this hypothesis is not limited to the present invention.
Step 502, shown in Fig. 6 A, long by and drag icon B or C (continue the pairing program of this two icon of above-mentioned hypothesis key each other, and its corresponding original program being program A), get into step 504 or step 506 according to the result who moves.
Step 504 if said icon B or C are moved to blank space, then gets into step 514.
Step 506 if said icon B or C are moved and cover another icon C or B, shown in arrow 602 among Fig. 6 A, then gets into step 508.
Whether each other step 508 judges said icon B and said icon C key: if then get into step 512; If not, then get into step 510.
Step 510 is set up file automatically said icon B and icon C is put into wherein, and gets into step 514.
Step 512 is opened the said program B original program corresponding with said program C---program A, shown in Fig. 6 B, promptly directly moves said program A, said program A master interface 604 occurs.Wait to finish to get into step 514 behind the said program A.
Step 514 is returned the normal procedure tabulation, promptly said terminal applies interface.
More than be described with reference to the accompanying drawings technical scheme of the present invention.Through technical scheme of the present invention; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other; Former application program all can't be used when operating wherein a part is independent arbitrarily; Have only that former application program can be activated when all corresponding programs were operated, and then reach the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a terminal is characterized in that, comprising:
Program is cut apart module, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal;
Program controling module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
2. terminal according to claim 1 is characterized in that, when said program controling module is operated single or the new application program of part on said interface said user, does not start said original application program, and sends prompting.
3. terminal according to claim 1 is characterized in that, also comprises:
Key module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receives said user and inputs password and/or carry out the digital certificate checking, to start said original application program.
4. terminal according to claim 1 is characterized in that, said program is cut apart module said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program;
When said program controling module is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
5. according to each described terminal in the claim 1 to 4; It is characterized in that; When said program controling module is operated said a plurality of new application programs by predetermined manner on said interface said user; Start said original application program; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
6. an application security control method is characterized in that, comprising:
Step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal;
Step 204 when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
7. application security control method according to claim 6 is characterized in that, said step 204 also comprises:
When said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.
8. application security control method according to claim 6 is characterized in that, said step 204 comprises:
When the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receive said user and input password and/or carry out the digital certificate checking, to start said original application program.
9. application security control method according to claim 6 is characterized in that, said step 202 comprises:
Said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program;
Said step 204 comprises:
When said user operates said two new application programs, carry out master routine by said configuration file, to start said original application program on said interface.
10. according to each described application security control method in the claim 6 to 9, it is characterized in that said step 204 comprises:
Said user on said interface; When said a plurality of new application programs being operated by predetermined manner; Start said original application program; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
CN201210265241.XA 2012-07-27 2012-07-27 Terminal and application security control method Active CN102819714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210265241.XA CN102819714B (en) 2012-07-27 2012-07-27 Terminal and application security control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210265241.XA CN102819714B (en) 2012-07-27 2012-07-27 Terminal and application security control method

Publications (2)

Publication Number Publication Date
CN102819714A true CN102819714A (en) 2012-12-12
CN102819714B CN102819714B (en) 2015-11-18

Family

ID=47303824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210265241.XA Active CN102819714B (en) 2012-07-27 2012-07-27 Terminal and application security control method

Country Status (1)

Country Link
CN (1) CN102819714B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104049806A (en) * 2014-06-30 2014-09-17 广东欧珀移动通信有限公司 Touch terminal and control method and system of touch terminal
CN104951288A (en) * 2014-03-28 2015-09-30 上海斐讯数据通信技术有限公司 Application program managing method and system
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN108416209A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 program safety verification method, device and terminal device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097524A1 (en) * 2003-10-31 2005-05-05 Fujitsu Limited Information processing apparatus
CN101833464A (en) * 2010-04-16 2010-09-15 深圳市五巨科技有限公司 Method and device for sectionally loading application programs by mobile terminal
CN102236527A (en) * 2011-07-15 2011-11-09 Tcl集团股份有限公司 Method and device for unlocking touch screen and touch screen terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050097524A1 (en) * 2003-10-31 2005-05-05 Fujitsu Limited Information processing apparatus
CN101833464A (en) * 2010-04-16 2010-09-15 深圳市五巨科技有限公司 Method and device for sectionally loading application programs by mobile terminal
CN102236527A (en) * 2011-07-15 2011-11-09 Tcl集团股份有限公司 Method and device for unlocking touch screen and touch screen terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104951288A (en) * 2014-03-28 2015-09-30 上海斐讯数据通信技术有限公司 Application program managing method and system
CN104049806A (en) * 2014-06-30 2014-09-17 广东欧珀移动通信有限公司 Touch terminal and control method and system of touch terminal
CN104049806B (en) * 2014-06-30 2018-03-27 广东欧珀移动通信有限公司 A kind of touch control terminal and its control method and system
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN108416209A (en) * 2018-03-07 2018-08-17 北京元心科技有限公司 program safety verification method, device and terminal device
CN108416209B (en) * 2018-03-07 2021-10-22 北京元心科技有限公司 Program security verification method and device and terminal equipment

Also Published As

Publication number Publication date
CN102819714B (en) 2015-11-18

Similar Documents

Publication Publication Date Title
CN102375651A (en) Method for unlocking portable electronic equipment
CN102509055A (en) Mobile terminal and method for hiding programs of mobile terminal
CN102819702A (en) File encryption operation method and file encryption operation system
CN103686716B (en) Android access control system for enhancing confidentiality and integrality
CN104657674A (en) Isolation protection system and isolation protection method of private data in mobile phone
CN101916342A (en) Secure mobile storage device and method for realizing secure data exchange by using same
CN103763091B (en) A kind of application program encryption and decryption method and encryption, decryption device
CN104134022A (en) Information hiding and protecting method based on image
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN103324898A (en) Method for encrypting/decrypting display content in touch screen, and communication terminal
CN105653986B (en) A kind of data guard method and device based on microSD card
CN102136048A (en) Mobile phone Bluetooth-based ambient intelligent computer protection device and method
CN104270517A (en) Information encryption method and mobile terminal
CN105005731A (en) Data encryption and decryption methods and mobile terminal
CN105653969B (en) Data processing method, device and electronic equipment
CN103051809A (en) Mobile terminal and file security method and device thereof
CN102819714A (en) Terminal and safe control method of application program
CN103338445A (en) File encryption and decryption method and system
WO2018045767A1 (en) Terminal control method and apparatus, and user terminal
CN104270516A (en) Decryption method and mobile terminal
CN100594503C (en) Virtual machine system and safety input method thereof
CN105243331A (en) Encryption device and encryption method, and decryption device and decryption method
CN102868826B (en) Terminal and terminal data protection method
CN102495983A (en) Method for encrypting and decrypting data of intelligent mobile terminal in real time
CN104144411A (en) Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant