CN102819714A - Terminal and safe control method of application program - Google Patents
Terminal and safe control method of application program Download PDFInfo
- Publication number
- CN102819714A CN102819714A CN201210265241XA CN201210265241A CN102819714A CN 102819714 A CN102819714 A CN 102819714A CN 201210265241X A CN201210265241X A CN 201210265241XA CN 201210265241 A CN201210265241 A CN 201210265241A CN 102819714 A CN102819714 A CN 102819714A
- Authority
- CN
- China
- Prior art keywords
- application program
- program
- user
- new application
- original
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Stored Programmes (AREA)
Abstract
The invention provides a terminal, which comprises a program division module and a program control module, wherein the original application program is divided into a plurality of new application programs and is displayed on an interface of the terminal, and the original application program is started when a user carries out preset operation on the plurality of new application programs on the interface. Correspondingly, the invention also provides a safe control method of the application program. According to the technical scheme, the application program which is hoped to be kept secretly by the user is divided into a plurality of programs; the original application program cannot be used when any part is independently operated, and the original application program can be started only when all corresponding programs are subjected to preset operation, thereby achieving the effect of concealing the original application program and enhancing the security and operation interest of a mobile terminal.
Description
Technical field
The present invention relates to application security control field, in particular to a kind of terminal and a kind of application security control method.
Background technology
On existing mobile phone, handle for the security technique of program and to have following three kinds of situation: 1, program does not have security set; 2, the mode of the program through hiding need to be keep secret is carried out that security set; 3, carry out security set through mode to the program encryption of need to be keep secret.
The research said method is not difficult to find that under said first kind of situation, the application program on the mobile phone terminal does not possess security; Under said second kind of situation, can reach certain security protection effect though hide the secret program of said need, for the cellphone subscriber; When he will use said program of being maintained secrecy; Need to make amendment to the setting of said mobile phone terminal through after some identification mode earlier, demonstrate and saidly can be carried out the operation to this program after the program of hiding, obviously this is for said cellphone subscriber person; More loaded down with trivial details in the operation, and inconvenient; Under said the third situation; Though the way of the program of said need to be keep secret being carried out security set through the mode of encrypting is safety relatively technically, for said cellphone subscriber operation also simpler than second kind of situation; This is for the people beyond the said cellphone subscriber; Do not have the fascination effect, promptly still can make other people see this program, and make attempt use the people of this application program to know that this program is encrypted.This need use for some said cellphone subscribers, but does not hope the application program (such as diary, financial records or the like) that other people see, has just lost meaning.
Therefore; Need a kind of new technical scheme; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other, to wherein arbitrarily a part separately during operation former application program all can't use, have only that former application program can be activated when all corresponding programs were operated; And then reaching the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
Summary of the invention
Technical matters to be solved by this invention is; A kind of new technical scheme is provided; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs that are mutually related, to wherein arbitrarily a part separately during operation former application program all can't use, have only that former application program can be activated when all corresponding programs were operated; And then reaching the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
In view of this, the present invention proposes a kind of terminal, comprising: program is cut apart module, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal; Program controling module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
In the present technique scheme; Cut apart module through said program said original program is divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplished the task of hiding said original application program; Through said program controling module, require said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished and making said user can simply directly on said interface, accomplish the task of starting said original program afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, when said program controling module is operated single or the new application program of part on said interface said user, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme, preferably, also comprise: key module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receives said user and inputs password and/or carry out the digital certificate checking, to start said original application program.
In the present technique scheme,, when the user operates said whole new application program corresponding to a certain original application program, need said user input password and/or carry out the digital certificate checking through introducing said key module.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said program is cut apart module said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; When said program controling module is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; When said program controling module is operated said all new application programs by predetermined manner on said interface said user; Start said original application program, wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
According to another aspect of the invention, also proposed a kind of application security control method, having comprised: step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal; Step 204 when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
In the present technique scheme; Through said original program being divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplish the task of hiding said original application program, having made said user can simply directly on said interface, accomplish the task of starting said original program through requiring said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, said step 204 also comprises: when said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme, preferably, said step 204 comprises: when the user operates said whole new application program corresponding to a certain original application program, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said step 202 comprises: said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; Said step 204 comprises: when said user operates said two new application programs on said interface, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; Said step 204 comprises: on said interface, when by predetermined manner said all new application program being operated, start said original application program said user; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Through above technical scheme; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other; Former application program all can't be used when operating wherein a part is independent arbitrarily; Have only that former application program can be activated when all corresponding programs were operated, and then reach the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
Description of drawings
Fig. 1 shows the block diagram at terminal according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of application security control method according to an embodiment of the invention;
Fig. 3 shows the schematic flow sheet that application program is according to an embodiment of the invention cut apart;
Fig. 4 A to Fig. 4 C shows the interface synoptic diagram that application program is according to an embodiment of the invention cut apart;
Fig. 5 shows the schematic flow sheet of application program launching according to an embodiment of the invention;
Fig. 6 A to Fig. 6 B shows the interface synoptic diagram of application program launching according to an embodiment of the invention.
Embodiment
In order more to be expressly understood above-mentioned purpose of the present invention, feature and advantage, the present invention is further described in detail below in conjunction with accompanying drawing and embodiment.
Set forth a lot of details in the following description so that make much of the present invention, still, the present invention can also adopt other to be different from other modes described here and implement, and therefore, the present invention is not limited to the restriction of following disclosed specific embodiment.
Fig. 1 shows the block diagram at terminal according to an embodiment of the invention.
As shown in Figure 1, the terminal 100 according to an embodiment of the invention, comprising: program is cut apart module 102, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal; Program controling module 104, the user on said interface when all new application programs are operated, start said original application program.
In the present technique scheme; Cut apart module 102 through said program said original program is divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplished the task of hiding said original application program; Through said program controling module 104, require said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished and making said user can simply directly on said interface, accomplish the task of starting said original program afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, when said program controling module 104 is operated single or the new application program of part on said interface said user, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module 104 is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme; Preferably, also comprise: key module 106, when said program is cut apart module 102 said original application program to be divided into a plurality of said new application programs or afterwards; Be respectively the different key of a plurality of said new application assigned; So that a plurality of said new application programs are encrypted, when a plurality of said keys all combine, can decipher the said original application program corresponding with a plurality of said new application programs.
In the present technique scheme; Encrypt through introducing 106 pairs of said new application assigned keys of said key module; So just can be when having a plurality of said original application program to be cut apart; Distinguish the corresponding relation between different new application programs and the different original application program exactly through the said key that distributes; And then guarantee that said program controling module 104 can judge accurately that whether said user operates the whole said new application program corresponding to a certain said original application program, guarantees the true(-)running of said terminal.
In technique scheme, preferably, when said key is operated, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said program is cut apart module 102 said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; When said program controling module 104 is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; When said program controling module 102 is operated said all new application programs by predetermined manner on said interface said user; Start said original application program, wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Fig. 2 shows the process flow diagram of application security control method according to an embodiment of the invention.
As shown in Figure 2, application security control method according to an embodiment of the invention, comprising: step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal; Step 204, the user on said interface when all new application programs are operated, start said original application program.
In the present technique scheme; Through said original program being divided into a plurality of new application programs; Said original application program promptly no longer is present on the interface at said terminal; So just at first accomplish the task of hiding said original application program, having made said user can simply directly on said interface, accomplish the task of starting said original program through requiring said user that whole said new application programs are operated to accomplish the startup for said original application program, just to have accomplished afterwards.So; People beyond the said user will can not know that said user installation has said original application program, and then, except said user; Other people also can't learn the Starting mode of said original application program, and this has just improved the security of said original application program greatly.
In technique scheme, preferably, said step 204 also comprises: when said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.In the present technique scheme; Because the All Files that said new application program does not all have said original application program; So the said new application program of single or part can't independent operating be accomplished the function of said former application program; Therefore, when said program controling module is operated independent or the said new application program of part said user, do not start said original application program.Further, in order to confuse the user of non-said holder terminal, can operate single or during the said new application program of part, send said prompting, can't open or damage like this program at it, etc.So just make said new application program can accomplish the task of the said original application program of protection better.
In technique scheme; Preferably; Said step 202 comprises: when said original application program being divided into a plurality of said new application programs or afterwards, be respectively the different key of a plurality of said new application assigned, so that a plurality of said new application programs are encrypted; Said step 204 comprises: when a plurality of said keys all combine, and can be to the said original application program deciphering corresponding with a plurality of said new application programs.
In the present technique scheme; Through said new application assigned key is encrypted; So just can be when having a plurality of said original application program to be cut apart; Distinguish the corresponding relation between different new application programs and the different original application program exactly through the said key that distributes, and then guarantee accurately to judge that whether said user operates the whole said new application program corresponding to a certain said original application program, guarantees the true(-)running of said terminal.
In technique scheme, preferably, said step 204 comprises: when said key is operated, need said user input password and/or carry out the digital certificate checking.In the present technique scheme, the mode through when said key is operated, requiring the input password and/or carry out the digital certificate checking can further improve the degree of protection to said original application program.
In technique scheme, preferably, said step 202 comprises: said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program; Said step 204 comprises: when said user operates said two new application programs on said interface, carry out master program file by said configuration file, to start said original application program.
In the present technique scheme; Said original application program is divided into master program file and configuration file is fairly simple effective dividing method; What the new application program that forms after cutting apart like this was corresponding is master program file that can't normally move owing to lack necessary configuration file and the configuration file that itself can't move, and so just can guarantee that said new application program can't isolated operation.And when said user operates two said new application programs together, thereby said master routine has formed said original application program again through reading said configuration file, and then accomplish the startup of said original application program.
In technique scheme; Preferably; Said step 204 comprises: on said interface, when by predetermined manner said all new application program being operated, start said original application program said user; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
In the present technique scheme; The mode of operation that said user is able to start said original application program must be can be simultaneously or the mode to operating corresponding to whole application programs newly of said original application program successively; Therefore, said predetermined manner comprises at least a in the following mode of operation that meets this condition: choose said all new application program simultaneously, drag the track of single touch operation that a new application program covers other application programs, said user through said all new application programs.
Fig. 3 shows the schematic flow sheet that application program is according to an embodiment of the invention cut apart.
As shown in Figure 3, the flow process cut apart of application program is following according to an embodiment of the invention:
Step 310 in said program cutting operation interface, is provided with program icon, title (can manually be provided with, but also system default distributing) after cutting apart, and said program is cut apart.Cut apart finish after; Program A hides, and supposes said program A is divided into two new procedures B and C then said terminal applies interface generator program B and program C (the two is key each other); And said program B and said program C are two independent application icons in said terminal applies interface display; Shown in Fig. 4 C, when independent clickable icon B or icon C, program can't be moved.Said procedure is cut apart and is accomplished the laggard step 312 of going into.
Step 312 is returned the normal procedure tabulation, promptly said terminal applies interface.
Fig. 5 shows the schematic flow sheet of application program launching according to an embodiment of the invention.
As shown in Figure 5, the flow process of application program launching is following according to an embodiment of the invention:
Suppose that being operating as of said predetermined manner drags a new application program and cover other application programs; But the operation of said predetermined manner also can be for can be simultaneously or any other mode to operating corresponding to whole application programs newly of said original application program successively, and this hypothesis is not limited to the present invention.
Step 504 if said icon B or C are moved to blank space, then gets into step 514.
Step 506 if said icon B or C are moved and cover another icon C or B, shown in arrow 602 among Fig. 6 A, then gets into step 508.
Whether each other step 508 judges said icon B and said icon C key: if then get into step 512; If not, then get into step 510.
Step 510 is set up file automatically said icon B and icon C is put into wherein, and gets into step 514.
Step 512 is opened the said program B original program corresponding with said program C---program A, shown in Fig. 6 B, promptly directly moves said program A, said program A master interface 604 occurs.Wait to finish to get into step 514 behind the said program A.
Step 514 is returned the normal procedure tabulation, promptly said terminal applies interface.
More than be described with reference to the accompanying drawings technical scheme of the present invention.Through technical scheme of the present invention; Can the user be hoped that the application program of maintaining secrecy is divided into a plurality of programs of key each other; Former application program all can't be used when operating wherein a part is independent arbitrarily; Have only that former application program can be activated when all corresponding programs were operated, and then reach the effect of hiding former application program, the security that strengthens mobile phone terminal is interesting with operation.
The above is merely the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various changes and variation.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (10)
1. a terminal is characterized in that, comprising:
Program is cut apart module, and original application program is divided into a plurality of new application programs, and is presented on the interface at terminal;
Program controling module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
2. terminal according to claim 1 is characterized in that, when said program controling module is operated single or the new application program of part on said interface said user, does not start said original application program, and sends prompting.
3. terminal according to claim 1 is characterized in that, also comprises:
Key module when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receives said user and inputs password and/or carry out the digital certificate checking, to start said original application program.
4. terminal according to claim 1 is characterized in that, said program is cut apart module said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program;
When said program controling module is operated said two new application programs on said interface said user, carry out master program file by said configuration file, to start said original application program.
5. according to each described terminal in the claim 1 to 4; It is characterized in that; When said program controling module is operated said a plurality of new application programs by predetermined manner on said interface said user; Start said original application program; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
6. an application security control method is characterized in that, comprising:
Step 202 is divided into a plurality of new application programs with original application program, and is presented on the interface at terminal;
Step 204 when the user carries out predetermined registration operation to said a plurality of new application programs on said interface, starts said original application program.
7. application security control method according to claim 6 is characterized in that, said step 204 also comprises:
When said user operates single or the new application program of part on said interface, do not start said original application program, and send prompting.
8. application security control method according to claim 6 is characterized in that, said step 204 comprises:
When the user carries out predetermined registration operation to said a plurality of new application programs on said interface, receive said user and input password and/or carry out the digital certificate checking, to start said original application program.
9. application security control method according to claim 6 is characterized in that, said step 202 comprises:
Said original application program is divided into two new application programs corresponding to the master routine and the configuration file of said original application program;
Said step 204 comprises:
When said user operates said two new application programs, carry out master routine by said configuration file, to start said original application program on said interface.
10. according to each described application security control method in the claim 6 to 9, it is characterized in that said step 204 comprises:
Said user on said interface; When said a plurality of new application programs being operated by predetermined manner; Start said original application program; Wherein, the operation of said predetermined manner comprises following at least a: choose said all new application program simultaneously, drag the said all new application programs of track process that a new application program covers other application programs, said user's single touch operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210265241.XA CN102819714B (en) | 2012-07-27 | 2012-07-27 | Terminal and application security control method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210265241.XA CN102819714B (en) | 2012-07-27 | 2012-07-27 | Terminal and application security control method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102819714A true CN102819714A (en) | 2012-12-12 |
CN102819714B CN102819714B (en) | 2015-11-18 |
Family
ID=47303824
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210265241.XA Active CN102819714B (en) | 2012-07-27 | 2012-07-27 | Terminal and application security control method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102819714B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104049806A (en) * | 2014-06-30 | 2014-09-17 | 广东欧珀移动通信有限公司 | Touch terminal and control method and system of touch terminal |
CN104951288A (en) * | 2014-03-28 | 2015-09-30 | 上海斐讯数据通信技术有限公司 | Application program managing method and system |
CN106156646A (en) * | 2015-04-03 | 2016-11-23 | 北京搜狗科技发展有限公司 | A kind of information call method and electronic equipment |
CN108416209A (en) * | 2018-03-07 | 2018-08-17 | 北京元心科技有限公司 | program safety verification method, device and terminal device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050097524A1 (en) * | 2003-10-31 | 2005-05-05 | Fujitsu Limited | Information processing apparatus |
CN101833464A (en) * | 2010-04-16 | 2010-09-15 | 深圳市五巨科技有限公司 | Method and device for sectionally loading application programs by mobile terminal |
CN102236527A (en) * | 2011-07-15 | 2011-11-09 | Tcl集团股份有限公司 | Method and device for unlocking touch screen and touch screen terminal |
-
2012
- 2012-07-27 CN CN201210265241.XA patent/CN102819714B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050097524A1 (en) * | 2003-10-31 | 2005-05-05 | Fujitsu Limited | Information processing apparatus |
CN101833464A (en) * | 2010-04-16 | 2010-09-15 | 深圳市五巨科技有限公司 | Method and device for sectionally loading application programs by mobile terminal |
CN102236527A (en) * | 2011-07-15 | 2011-11-09 | Tcl集团股份有限公司 | Method and device for unlocking touch screen and touch screen terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104951288A (en) * | 2014-03-28 | 2015-09-30 | 上海斐讯数据通信技术有限公司 | Application program managing method and system |
CN104049806A (en) * | 2014-06-30 | 2014-09-17 | 广东欧珀移动通信有限公司 | Touch terminal and control method and system of touch terminal |
CN104049806B (en) * | 2014-06-30 | 2018-03-27 | 广东欧珀移动通信有限公司 | A kind of touch control terminal and its control method and system |
CN106156646A (en) * | 2015-04-03 | 2016-11-23 | 北京搜狗科技发展有限公司 | A kind of information call method and electronic equipment |
CN106156646B (en) * | 2015-04-03 | 2020-09-22 | 北京搜狗科技发展有限公司 | Information calling method and electronic equipment |
CN108416209A (en) * | 2018-03-07 | 2018-08-17 | 北京元心科技有限公司 | program safety verification method, device and terminal device |
CN108416209B (en) * | 2018-03-07 | 2021-10-22 | 北京元心科技有限公司 | Program security verification method and device and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN102819714B (en) | 2015-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102375651A (en) | Method for unlocking portable electronic equipment | |
CN102509055A (en) | Mobile terminal and method for hiding programs of mobile terminal | |
CN102819702A (en) | File encryption operation method and file encryption operation system | |
CN103686716B (en) | Android access control system for enhancing confidentiality and integrality | |
CN104657674A (en) | Isolation protection system and isolation protection method of private data in mobile phone | |
CN101916342A (en) | Secure mobile storage device and method for realizing secure data exchange by using same | |
CN103763091B (en) | A kind of application program encryption and decryption method and encryption, decryption device | |
CN104134022A (en) | Information hiding and protecting method based on image | |
US9378344B2 (en) | Method and apparatus for protecting information based on data card | |
CN103324898A (en) | Method for encrypting/decrypting display content in touch screen, and communication terminal | |
CN105653986B (en) | A kind of data guard method and device based on microSD card | |
CN102136048A (en) | Mobile phone Bluetooth-based ambient intelligent computer protection device and method | |
CN104270517A (en) | Information encryption method and mobile terminal | |
CN105005731A (en) | Data encryption and decryption methods and mobile terminal | |
CN105653969B (en) | Data processing method, device and electronic equipment | |
CN103051809A (en) | Mobile terminal and file security method and device thereof | |
CN102819714A (en) | Terminal and safe control method of application program | |
CN103338445A (en) | File encryption and decryption method and system | |
WO2018045767A1 (en) | Terminal control method and apparatus, and user terminal | |
CN104270516A (en) | Decryption method and mobile terminal | |
CN100594503C (en) | Virtual machine system and safety input method thereof | |
CN105243331A (en) | Encryption device and encryption method, and decryption device and decryption method | |
CN102868826B (en) | Terminal and terminal data protection method | |
CN102495983A (en) | Method for encrypting and decrypting data of intelligent mobile terminal in real time | |
CN104144411A (en) | Encryption and decryption terminal and encryption and decryption method applied to encryption terminal and decryption terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |