Application program encrypting method and user terminal

An encryption method and user terminal technology, applied in the field of application program encryption method and user terminal, can solve the problems of time-consuming, cumbersome and complicated encryption methods, etc., and achieve the effect of convenient encryption

Inactive Publication Date: 2015-12-30
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, the above encryption method is too complicated and time-consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program encrypting method and user terminal
  • Application program encrypting method and user terminal
  • Application program encrypting method and user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0056] The embodiment of the invention discloses an application program encryption method and a user terminal, which can quickly and conveniently encrypt the application program. Each will be described in detail below.

[0057] See figure 1 , figure 1 It is a schematic flowchart of an application program encryption method disclosed in an embodiment of the present invention. Such as figure 1 As shown, the application encryption method may inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses an application program encrypting method and a user terminal. The method comprises steps as follows: a target pressure value of touch operation on an icon of a target application program is detected; whether the target pressure value is larger than a preset pressure value is judged; when the target pressure value is larger than the preset pressure value, first fingerprint information input during touch operation is acquired; the first fingerprint information is used for encrypting the target application program. Accordingly, with the adoption of the application program encrypting method and the user terminal, the application program can be encrypted quickly and conveniently.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an application program encryption method and a user terminal. Background technique [0002] In order to meet the different application needs of users, a variety of applications have emerged as the times require, and their types mainly include instant messaging applications, multimedia applications, reading applications, camera applications, and payment applications. After these application programs are installed on smart terminals (such as smart phones, PADs, etc.), users can use these application programs to listen to songs, watch movies, read books, etc., thereby making the user's leisure life more abundant and convenient. [0003] At present, in order to prevent the privacy information and property of the smart terminal user from being stolen, the user often encrypts some applications on the smart terminal, so that when the encrypted application is started, the applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/51
CPCG06F21/32G06F21/51H04L9/3231G06V40/70G06V40/1365G06F3/04817H04L9/3247
Inventor 张海平王作鹏
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products