Unlock instant, AI-driven research and patent intelligence for your innovation.

A management method for a terminal and its application

A technology of terminal application and management method, which is applied in the field of terminal and application management, and can solve the problems of no icon arrangement and impracticability

Active Publication Date: 2021-08-03
ZTE CORP
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing technology is to use third-party software for encryption. If this software is uninstalled, this function will not be realized
The security zone is set as a system-level function, and the software starts to encrypt, and the icons are not rearranged. For example, if multiple software that requires secure access are set, it is difficult to remember which is encrypted and which is not.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A management method for a terminal and its application
  • A management method for a terminal and its application
  • A management method for a terminal and its application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solution and advantages of the present invention more clear, the embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other.

[0032] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways than described here. Therefore, the protection scope of the present invention is not limited by the specific implementation disclosed below. Example limitations.

[0033] The terminal and terminal application encryption and decryption methods described in some embodiments of the present invention are described below with reference to the accompanying drawings.

[0034] figure 1 It is...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a terminal application management method. The method includes: detecting an input pressure value of a first position, and when the pressure value of the first position is greater than a preset first pressure threshold, triggering selection of a safe area Operation: Detect the input pressure value of the second position, when the pressure value of the second position is greater than the preset second pressure threshold, determine the selected safe area; encrypt the application in the safe area, the present invention It is possible to implement area-divided encryption for terminal applications.

Description

technical field [0001] The invention relates to the technical field of electronic equipment, in particular to a terminal and a method for managing applications thereof. Background technique [0002] Current terminal devices generally have the functions of fingerprint identification and password unlocking, but after fingerprint identification or password unlocking, all applications in the terminal may be used indiscriminately, for example, when others borrow mobile phones to make calls or play games, Others may view your WeChat, SMS, QQ, Alipay and other information, resulting in a great potential security risk for information leakage. [0003] In the existing technology, the security identification of the terminal is one-time. When entering the terminal desktop, all icons can be accessed. However, some software in the terminal requires higher-level security verification, such as personal privacy software, and others are unnecessary. Verification, such as weather, calendar, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/36G06F21/51G06F3/0487
CPCG06F3/0487G06F21/36G06F21/51G06F3/041
Inventor 范钊
Owner ZTE CORP