CN104732157B - A kind of application hides, deployment method and device - Google Patents
A kind of application hides, deployment method and device Download PDFInfo
- Publication number
- CN104732157B CN104732157B CN201510148437.4A CN201510148437A CN104732157B CN 104732157 B CN104732157 B CN 104732157B CN 201510148437 A CN201510148437 A CN 201510148437A CN 104732157 B CN104732157 B CN 104732157B
- Authority
- CN
- China
- Prior art keywords
- type
- information
- application
- application icon
- active user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
This application discloses a kind of the hiding of application, deployment method and device, one of which methods to include:Active user is obtained to instruct the object run of first kind application icon;According to preset instruction type, the type of the object run instruction is analyzed;In the case where the type of object run instruction is the second class instruction type, according to the correspondence for pre-establishing application icon and Second Type application, one or more Second Type applications corresponding with the first kind application icon are determined;In the Second Type pre-established using in the correspondence with operational order, in the application of one or more of Second Types, Second Type application corresponding with object run instruction is opened.The application user can need hiding application on concealed terminal, and not influence the normal use of the application, so the safety of terminal in use can be improved, and promote the use feeling of user.
Description
Technical field
This application involves field of communication technology more particularly to a kind of applications to hide, deployment method and device.
Background technology
Along with the rapid development of electronic technology, the development speed of terminal is getting faster.Currently, can be installed in terminal more
Kind application, people can open application execution respective operations.Such as:It records in the notepad appli-cation of terminal and plans recently,
Receipts and expenditures matters are recorded in this application of keeping accounts, and are contacted, etc. or, carrying out with friend linking up in social networking application.In terminal
Research process in, inventor find:Stronger and stronger with the function of terminal, user gradually has on concealed terminal display interface
The demand of application icon.
Such as:For Alipay application in terminal display interface, there is user's private information involved in Alipay application, so
User wishes can to hide the icon of Alipay application, and Alipay application is opened to prevent other people.For another example:For terminal display interface
On calendar application, since the frequency of use of calendar application is less, user wish hide calendar application icon, to show
Interface provides position for other application icon.
Currently, there is no application drawing calibration methods on concealed terminal in the prior art, so needing a kind of technology hand now
Section carrys out the application on concealed terminal, but does not influence the normal use of application, to improve the safety of terminal in use,
And promote the use feeling of user.
Invention content
Technical solution provided by the invention needs hiding application according to user on user demand concealed terminal, and hiding needs
It wants not influence the normal use hidden be hidden application while hiden application, improves terminal using in the process
Safety
Technological means provided by the present application is as follows:
A kind of deployment method of application, including:
Active user is obtained to instruct the object run of first kind application icon;
According to preset instruction type, the type of the object run instruction is analyzed;
In the case where the type of object run instruction is the second class instruction type, according to pre-establishing application icon
With the correspondence of Second Type application, determine that one or more Second Types corresponding with the first kind application icon are answered
With;Wherein, what one or more of Second Types were applied applies entrance, is hidden under the first kind application icon,
And the application icon of one or more of Second Type applications is in hidden state;
In the correspondence that the Second Type pre-established applies with operational order, in one or more of second classes
In type application, Second Type application corresponding with object run instruction is opened.
Preferably, described in the correspondence that the Second Type pre-established applies with operational order, one
Or in multiple Second Type applications, Second Type application corresponding with object run instruction is opened, including:
In the Second Type using in the correspondence with operational order, determine that one or more of Second Types are answered
With the corresponding all operational orders of intended application set;
In all operational orders, judges whether there is and instruct consistent operational order with the object run;
If so, opening one or more Second Type applications corresponding with the operational order;
If nothing exits the program.
Preferably, the object run, which instructs, includes:
The intended application icon first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;
Or
The intended application icon first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;
Or
The intended application icon first kind application icon is clicked, meanwhile, press key in volume;Or
The intended application icon first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the intended application icon first kind application icon.
Preferably, in the case where object run instruction includes characteristics of human body's information of active user, then in institute
It states in all operational orders, judges whether there is and instruct consistent operational order with the object run, including:
In the default characteristics of human body's information for including in all operational orders, the characteristics of human body of active user is judged whether there is
The consistent default characteristic information of information.
Preferably, default characteristics of human body's information includes the preset fingerprint information and/or pre-set image letter
Breath and/or the preset sound information;In the default characteristics of human body's information for including in all operational orders then, judge whether
The default characteristic information for having characteristics of human body's information of active user consistent, including:
After the finger print information for acquiring the active user using finger print acquisition module, the fingerprint of the active user is judged
Whether information is consistent with preset fingerprint information;And/or
After the image information for acquiring the active user using image capture module, the image of the active user is judged
Whether information is consistent with pre-set image information;And/or
After the acoustic information for acquiring the active user using sound acquisition module, the sound of the active user is judged
Whether information is consistent with preset sound information.
A kind of hidden method of application, including:
Determine first kind application icon and it is to be concealed under the first kind application icon one or more the
Two type applications;
Corresponding operational order is arranged to the application of each Second Type, and the Second Type is applied into corresponding behaviour
Make instruction to be bound;
The first kind application icon and the application of one or more of Second Types are bound;
Delete the application icon of one or more of Second Type applications.
A kind of device for opening of application, including:
Acquiring unit obtains active user for obtaining active user to the object run instruction of first kind application icon
Object run instruction to intended application icon first kind application icon in first kind set of applications;Wherein, described first
Type application set includes one or more first kind applications, each corresponding application icon of first kind application;
Analytic unit, for according to preset instruction type, analyzing the type of the object run instruction;
First determination unit is used in the case where the type that the object run instructs is the second class instruction type, root
According to the correspondence for pre-establishing application icon and Second Type application, determine and the first kind application icon corresponding one
A or multiple Second Type applications;Wherein, entrance is applied in one or more of Second Types application, is hidden in described the
Under one type application icon, and, the application icon of one or more of Second Type applications is in hidden state;
Opening unit, used in the Second Type pre-established using correspondence with operational order, described one
In a or multiple Second Type applications, Second Type application corresponding with object run instruction is opened.
Preferably, the opening unit includes:
Second determination unit, for, using in the correspondence with operational order, determining described one in the Second Type
A or multiple Second Types apply corresponding all operational orders;
Judging unit instructs unanimously in all operational orders, judging whether there is with the object run
Operational order;
Second opening unit instructs consistent operational order for having in all operational orders with the object run
In the case of, open one or more Second Type applications corresponding with the operational order;
Unit is exited, for the case where nothing instructs consistent operational order with the object run in all operational orders
Under, it exits the program.
Preferably, the object run, which instructs, includes:
The intended application icon first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;
Or
The intended application icon first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;
Or
The intended application icon first kind application icon is clicked, meanwhile, press key in volume;Or
The intended application icon first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the intended application icon first kind application icon.
Preferably, in the case where object run instruction includes characteristics of human body's information of active user, then judge
Unit, specifically for include in all operational orders default characteristics of human body's information in, judge whether there is the people of active user
The consistent default characteristic information of body characteristics information.
Preferably, default characteristics of human body's information includes the preset fingerprint information and/or pre-set image letter
Breath and/or the preset sound information;The then judging unit, including:
First judging unit, for after the finger print information for acquiring the active user using finger print acquisition module, judging
Whether the finger print information of the active user is consistent with preset fingerprint information;And/or
Second judgment unit, for after the image information for acquiring the active user using image capture module, judging
Whether the image information of the active user is consistent with pre-set image information;And/or
Third judging unit, for after the acoustic information for acquiring the active user using sound acquisition module, judging
Whether the acoustic information of the active user is consistent with preset sound information.
A kind of concealing device of application, including:
Third determination unit, for determining first kind application icon and to be concealed in the first kind application drawing
One or more Second Type applications under mark;
Binding unit for corresponding operational order to be arranged to the application of each Second Type, and the Second Type is answered
It is bound with corresponding operational order;The first kind application icon is answered with one or more of Second Types
With binding;
Deleting unit, the application icon for deleting one or more of Second Type applications.
Compared with prior art, the application has the following advantages:
The application is directed to method part, provides two independent claims:The hidden method of application icon, and, application drawing
Target deployment method.Two independent claims include corresponding technical characteristic:There are one being hidden under first kind application icon
Or multiple Second Type application icons.So having unicity between two independent claims.
In the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application drawing
Under mark.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, just opening the
Two type applications.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence
The normal use of the application so the safety of terminal in use can be improved, and promotes the use feeling of user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of application hidden method flow diagram disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow diagram using deployment method disclosed in the embodiment of the present application;
Fig. 3 is a kind of flow diagram using deployment method disclosed in the embodiment of the present application;
Fig. 4 is a kind of flow diagram using deployment method scene embodiment disclosed in the embodiment of the present application;
Fig. 5 is hidden with icon before icon hiding in a kind of application deployment method scene embodiment disclosed in the embodiment of the present application
Schematic diagram behind Tibetan;
Fig. 6 is a kind of structural schematic diagram using device for opening disclosed in the embodiment of the present application;
Fig. 7 is a kind of schematic diagram using opening unit in device for opening disclosed in the embodiment of the present application;
Fig. 8 is a kind of schematic diagram using judging unit in device for opening disclosed in the embodiment of the present application;
Fig. 9 is a kind of application concealing device flow diagram disclosed in the embodiment of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
In order to facilitate subsequent descriptions, the icon that user need not temporarily hide is set as first kind application drawing by the application
Mark, application corresponding with first kind application icon are known as first kind application.User is intended to hiding icon at present and is set as
Two type application icons, application corresponding with Second Type application icon are known as Second Type application.
Currently, being equipped with numerous applications in terminal, application can be:QQ, wechat, microblogging, calendar, etc. application programs.It answers
It is shown in a manner of application icon used in display interface.After user clicks application icon, the application of terminal recognition user click
Icon, and enter in application corresponding with the application icon.So the application icon of terminal display interface, can be used as to enter and answer
Entrance.
The application introduces the hiding process of application icon first, i.e.,:The application that one or more Second Types are applied is entered
Mouthful, the process being hidden under first kind application icon.As shown in Figure 1, specifically hiding process includes step S101~S104:
Step S101:Determine first kind application icon and it is to be concealed under the first kind application icon one
A or multiple Second Type applications.
First, in terminal display interface include multiple application icons, user is in the icon that need not temporarily hide, selection
One icon is as first kind application icon.One or more applications to be concealed can be hidden under first kind application icon
Using entrance.
Then, the one or more Second Types received under the first kind application icon to be hidden in of user's selection are answered
With.
Step S102:Corresponding operational order is arranged to the application of each Second Type, and by the Second Type apply with
Its corresponding operational order is bound.
If after Second Type application is hidden under first kind application icon, it may appear that such situation:The first kind
Application icon is applied as the first kind simultaneously and what Second Type was applied applies entrance.In such cases, if in user couple
After first kind application icon executes operational order, just there is terminal and do not know enter first kind application, or enter
The problem of Second Type is applied.
It is uncertain into the problem of that application to occur terminal in order to prevent, the operational order of first kind application will be entered
It is set as first kind instruction type, it is the second class instruction type that will enter Second Type application settings.When user is to the first kind
The type of the operational order of application icon is first kind instruction type, then enters the first kind corresponding with first kind application icon
Type application;When user is the second class instruction type to the type of the operational order of first kind application icon, then enter the second class
Type application.
When have multiple Second Types to be concealed under first kind icon in application, in order to determine enter that Second Type
Using after determining the second class instruction type, for each Second Type application settings one to be concealed under the first application icon
A operational order, and Second Type is bound using corresponding operational order, referred to operation with building Second Type and applying
The correspondence of order.
When user wants to open a Second Type being hidden under first kind application icon in application, only needing to first
The execution of type application icon applies corresponding operational order with the Second Type.It is understood that each second class
The operational order of the corresponding operational order of type application, multiple Second Type applications both may be the same or different.
Step S103:The first kind application icon and the application of one or more of Second Types are bound.
First kind application icon (hiden application icon) and one or more Second Type applications are determined in step S101
After (application to be concealed), you can by first kind application icon, with all Second Types to be concealed under first kind icon
The application entrance of application is bound;To build the correspondence of first kind application icon and Second Type application.So as to follow-up
In the process, the function that operation first kind application icon enters Second Type application may be implemented.
Step S104:Delete the application icon of one or more of Second Type applications.
After by first kind application icon and Second Type application binding, terminal can be from first kind application drawing
Mark enters Second Type application.Then by the one or more second with the binding of first kind application icon in terminal display interface
The application icon of type application is deleted, to realize the purpose for the icon for hiding Second Type application in terminal display interface.
After executing the step S101~step S104, first kind application icon and Second Type application are just constructed
Correspondence, and, structure Second Type is using correspondence with operational order.It is deleting and first kind application icon
After the application icon of one or more Second Types application of binding, nothing is tied up with first kind application icon in terminal display interface
The application icon of fixed one or more Second Type application, completes one or more Second Type application first kind applications
The process being hidden under first kind application icon.
For other first kind application icons, and, other Second Type applications to be concealed, mistake that can be as shown in Figure 1
Cheng Jianli hides relationship, by other Second Type applications to be concealed, is hidden under other first kind application icons, specifically holds
Row process no longer repeats one by one.
After first carrying out above-mentioned hiding process in advance, the specific implementation procedure that the application opens application is described below.The application
A kind of deployment method of application is provided, the controller of terminal is applied to, as shown in Fig. 2, including step S201~S204:
Step S201:Active user is obtained to instruct the object run of first kind application icon.
Terminal receives the application icon that need not be hidden at present that active user selects on display interface, and should
Application icon is as first kind application icon.Then user is obtained to first kind application icon performance objective operational order.
Step S202:According to preset instruction type, the type of the object run instruction is analyzed.
Preset instruction type includes:First kind instruction type and the second class instruction type.Wherein, the first instruction
Type is:The instruction type applied into the first kind;Second class instruction type is:Into being hidden in first kind application icon
Under Second Type application instruction type.
Preset first kind instruction type specifically has:Click the first kind application icon.
Preset second class instruction type specifically has:(1) first kind application icon is clicked, meanwhile, acquisition
Characteristics of human body's information of active user;(2) first kind application icon is double-clicked, meanwhile, the human body for acquiring active user is special
Reference ceases;(3) first kind application icon is clicked, meanwhile, press key in volume;(4) first kind application is clicked
Icon, meanwhile, press volume lower key;(5) first kind application icon is clicked three times.
It is understood that preset first kind instruction type and preset second class instruction type can be with
Including other instruction types, will not enumerate herein.
In this step, terminal combines the type of preset instruction type analysis object run instruction, determines target
The type of operational order is first kind instruction type, or, the second class instruction type.After the type of analysis object run instruction,
There will be two kinds of situations, and both of these case is described in detail below:
The first situation:Object run instruction is first kind instruction type;
For the first situation, due to being concealed with the application entrance of Second Type application, institute under first kind application icon
With the first kind application icon entrance is applied using what entrance and Second Type were applied for first kind application simultaneously.User is defeated
The operational order entered is first kind instruction type, so being answered at this time into the first kind corresponding with first kind application icon
With.
The second situation:Object run instruction is the second class instruction type;
For the second situation, first kind application icon applies entrance and Second Type for first kind application simultaneously
Entrance is applied in application.And operational order type input by user is the second class instruction type, so meeting certain condition
Afterwards, can enter in the Second Type application being hidden under first kind application icon.
The first above-mentioned situation is relatively simple, and the execution of the second situation is complex.Therefore subsequent step will be to second
Kind situation is described in detail.
Step S203:In the case where the type of object run instruction is the second class instruction type, according to building in advance
The correspondence of vertical application icon and Second Type application, determines one or more corresponding with the first kind application icon
Second Type application;Wherein, what one or more of Second Types were applied applies entrance, is hidden in the first kind and answers
With under icon, and, the application icon of one or more of Second Types applications is in hidden state.
Under the second situation of step S202, the first kind application icon based on Fig. 1 structures and Second Type application
Corresponding hiding relationship, after the first kind application icon for obtaining user's operation, you can lookup is hidden in first kind application
One or more Second Type applications under icon.
Step S204:In the Second Type pre-established is using correspondence with operational order, one or
In multiple Second Type applications, Second Type application corresponding with object run instruction is opened.
After the implementation procedure of Fig. 1, Second Type is just built with using the correspondence with operational order, wherein each
Second Type application corresponds to an operational order.
The specific implementation procedure of step S204 is described below, as shown in figure 3, including the following steps S301~S304:
Step S301:In the Second Type using in the correspondence with operational order, determine one or more of
Second Type applies corresponding all operational orders.
After step S203 determines one or more Second Types application to be concealed under first kind application, according to the
The correspondence of two type applications and operational order determines that each Second Type applies corresponding operational order.All second classes
Type applies corresponding operational order, i.e., all operational orders.
Step S302:In all operational orders, judges whether there is and instruct consistent operation with the object run
Instruction;If so, then entering step S303, S304 is otherwise entered step.
In the case where object run instruction type is the second class instruction type, first kind application is hidden in order to protect
The safety that Second Type is applied under icon, it is also necessary to judge whether object run instruction is correct;If target instruction target word is correct, just may be used
To open the Second Type application being hidden under first kind application icon, Second Type application otherwise cannot be opened.
Wherein, the Second Type application being hidden under first kind application icon is opened, specially:If referring in object run
A corresponding hiding Second Type application is enabled, then opens a Second Type application.If object run instruction correspondence is multiple hidden
Multiple Second Type applications are then opened in the Second Type application of Tibetan.
As it can be seen that judging whether correct process is for object run instruction:In all operational orders, target is judged whether there is
The consistent operational order of operational order;If so, then proving that object run instruction is correct, if it is not, then proving that object run refers to
It enables incorrect.
By step S202 to the specific descriptions of preset second class instruction type it is known that the object run refers to
Order may include:
1) first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;(2) institute is double-clicked
First kind application icon is stated, meanwhile, acquire characteristics of human body's information of active user;(3) first kind application drawing is clicked
Mark, meanwhile, press key in volume;(4) first kind application icon is clicked, meanwhile, press volume lower key;(5) point three times
Hit the first kind application icon.It is understood that object run instruction is in preset second class instruction type
It is any.
It since there are many situations for object run instruction, but can substantially be divided into two classes, include characteristics of human body's letter in a kind of
Breath does not include characteristics of human body's information in another kind of.So judge object run instruction whether correct process, can be attributed to
Lower two kinds of situations:
The first situation:Object run instruction includes characteristics of human body's information of active user.
In the case where object run instruction includes characteristics of human body's information of active user, then in all behaviour
In instructing, judges whether there is and instruct consistent operational order with the object run, including:Include in all operational orders
Default characteristics of human body's information in, judge whether there is the default characteristic information consistent with characteristics of human body's information of active user.
Wherein, default characteristics of human body's information includes the preset fingerprint information and/or the pre-set image information,
And/or the preset sound information;It certainly can also be including other characteristics of human body's information, such as human eye iris etc., herein no longer
It enumerates.
By taking characteristics of human body's information includes finger print information, image information or acoustic information as an example, to referring in all operations
In order, the process for instructing consistent operational order with the object run is judged whether there is, is described in detail:
(1) it is directed to the case where characteristics of human body's information is finger print information, the current use is being acquired using finger print acquisition module
After the finger print information at family, judge whether the finger print information of the active user and preset fingerprint information are consistent.If consistent, then it represents that
Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders
Make to instruct consistent operational order.
Preferably, the finger print acquisition module is set to the back side of terminal display screen, so as to facilitate user hand-held
When terminal, user's touch fingerprint acquisition module can be facilitated.
(2) it is directed to the case where characteristics of human body's information is image information, the current use is being acquired using image capture module
After the image information at family, judge whether the image information of the active user and pre-set image information are consistent.If consistent, then it represents that
Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders
Make to instruct consistent operational order.
In the case of preferred, the image information of active user can be the facial image of active user;By active user's
The pre-set image information of image information and default characteristics of human body's information carries out Characteristic Contrast.
(3) it is directed to the case where characteristics of human body's information is acoustic information, the current use is being acquired using sound acquisition module
After the acoustic information at family, judge whether the acoustic information of the active user and preset sound information are consistent.If consistent, then it represents that
Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders
Make to instruct consistent operational order.
When characteristics of human body's information is image information and/or acoustic information, process technically may be implemented, but due to acquisition
Image and sound accuracy rate it is not high, cause the accuracy rate of secondary verification process not high.I.e.:Due to acquiring the figure of active user
As information may be inconsistent with the shooting position of pre-set image information, or local environment when the acoustic information of acquisition active user
It is more noisy, lead to have the case where noise in acoustic information, and there is the case where holder is mistaken for eavesdropper;So phase
The finger print information accuracy that active user is acquired for is higher.
The above is being discussed in detail for the first situation, and the realization method of the second situation is described below:
The second situation:Characteristics of human body's information of active user is not included in object run instruction.
The object run instruction in include active user characteristics of human body's information in the case of, due to instruction with
The information that family changes and changes directly is judged whether there is and is instructed with the object run so in all operational order
Consistent operational order.If consistent, then it represents that have in all operational orders and instruct consistent operational order with object run;
Otherwise indicate that nothing instructs consistent operational order with object run in all operational orders.
Then the step S303 of Fig. 3 is executed:Open one or more Second Type applications corresponding with the operational order;
Consistent operational order is instructed with object run, then it represents that object run instructs just if had in all operational orders
Really.One or more Second Type applications corresponding with object run instruction are obtained, one or more Second Types are then opened
Using.
Step S304:It exits the program.
If consistent operational order is not instructed in all operational orders with object run, then it represents that object run instructs
Mistake exits the program at this time.
The above journey is to open the specific implementation procedure for being hidden in the application under first kind application icon, by above-mentioned interior
Hold it is found that in the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application icon
Under.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, second is just opened
Type application.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence this
The normal use of application so the safety of terminal in use can be improved, and promotes the use feeling of user.
The scene embodiment of the application is described below:
User is installed in terminal there are one privacy application billing this application, it is undesirable to which other people check the interior of book keeping operation this application
Hold.Book keeping operation this application can be encrypted according to mode in the prior art to solve.But which people cannot thoroughly, it is complete
The purpose of protection privacy application is played entirely, because other people are still able to see the figure of book keeping operation this application in terminal display interface
Mark.So user wishes to hide the application icon of book keeping operation this application, in case other people spy upon the content in book keeping operation this application.
By taking user is hidden in book keeping operation this application under calendar application as an example, hiding, opening and closing to book keeping operation this application
Process be described in detail, as shown in figure 4, including the following steps S401~S403:
Step S401:By being hidden under the application icon of calendar using entrance for this application of keeping accounts.
This application of keeping accounts is the privacy application of user, and calendar is common application, and the present embodiment is hidden with this application that will keep accounts
Under the application icon of calendar.In order to not influence the use of calendar application, meanwhile, also for the safety for ensureing book keeping operation this application
Property, set a kind of operational order for book keeping operation this application.
Setting operation instruction detailed process include:Start finger print acquisition module, acquires the fingerprint of active user, and will work as
The fingerprint of preceding user is preserved into security module;Subsequently to open use during book keeping operation this application.
By the fingerprint of keep accounts this application, active user and calendar application binding, the correspondence between three is established.So
Afterwards, deletion book keeping operation this application is in the application icon of display interface, the purpose for this application of keeping accounts to which realization is hiding.
Fig. 5 is referred to, the result schematic diagram before being executed for this step and after executing.
Step S402:Open the book keeping operation this application being hidden under calendar application icon.
After step S401 hides book keeping operation this application, is introduced in this step and how to open book keeping operation this application and calendar is answered
With.If user clicks directly on the application icon of calendar, enter calendar application.
If active user presses the finger of advance acquisition fingerprint on finger print acquisition module, terminal acquires user fingerprints letter
Breath, and the finger print information currently acquired and pre-stored finger print information are compared;If the two unanimously if indicate that user is
Validated user.If fingerprint is inconsistent, expression user is disabled user, then enters common application, or exit the program.
It after determining that user is validated user, prompts the user with and whether enters privacy mode, if user confirms into hidden
Private pattern then enters book keeping operation this application.User can use each function in book keeping operation this application.
Step S403:Close book keeping operation this application.
Application program is beaten back out in the interface point of book keeping operation this application, you can exits book keeping operation this application.In order to continue protection note
Account book application, after exiting book keeping operation this application, the calendar for continuing display and book keeping operation this application binding in terminal display interface is answered
With, do not show always book keeping operation this application icon.
Device embodiment corresponding with deployment method is applied is described below, as shown in fig. 6, this application provides a kind of applications
Opening side's device, including:
Acquiring unit 61 answers the object run instruction first kind of first kind application icon for obtaining active user
Use icon.
Analytic unit 62, for according to preset instruction type, analyzing the type of the object run instruction.
First determination unit 63 is used in the case where the type that the object run instructs is the second class instruction type,
According to the correspondence for pre-establishing application icon and Second Type application, determination is corresponding with the first kind application icon
One or more Second Type applications;Wherein, what one or more of Second Types were applied applies entrance, is hidden in described
Under first kind application icon, and, the application icon of one or more of Second Type applications is in hidden state.
Opening unit 64, used in the Second Type pre-established using correspondence with operational order, described
In one or more Second Type applications, Second Type application corresponding with object run instruction is opened.
Wherein, as shown in fig. 7, the opening unit 64 includes:
Second determination unit 71, described in the correspondence that the Second Type applies with operational order, determining
One or more Second Types apply corresponding all operational orders;
Judging unit 72, it is consistent with object run instruction in all operational orders, judging whether there is
Operational order;
Second opening unit 73 instructs consistent operational order for having in all operational orders with the object run
In the case of, open one or more Second Type applications corresponding with the operational order;
Exit unit 74, in all operational orders without the feelings for instructing with the object run consistent operational order
Under condition, exit the program.
Wherein, in the case where object run instruction includes characteristics of human body's information of active user, judging unit
72, specifically for include in all operational orders default characteristics of human body's information in, judge whether there is the human body of active user
The consistent default characteristic information of characteristic information.
As shown in figure 8, default characteristics of human body's information includes the preset fingerprint information and/or the pre-set image
Information and/or the preset sound information;The then judging unit 72, including:
First judging unit 81, for after the finger print information for acquiring the active user using finger print acquisition module, sentencing
Whether the finger print information and preset fingerprint information of the disconnected active user be consistent;And/or
Second judgment unit 82, for after the image information for acquiring the active user using image capture module, sentencing
Whether the image information and pre-set image information of the disconnected active user be consistent;And/or
Third judging unit 83, for after the acoustic information for acquiring the active user using sound acquisition module, sentencing
Whether the acoustic information and preset sound information of the disconnected active user be consistent.
In opening side's device of application provided by the present application, the object run instruction specifically includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
As shown in figure 9, this application provides a kind of concealing devices of application, including:
Third determination unit 91, for determining first kind application icon and to be concealed in the first kind application
One or more Second Type applications under icon;
Binding unit 92, for being arranged corresponding operational order to the application of each Second Type, and by the Second Type
It is bound using corresponding operational order;By the first kind application icon and one or more of Second Types
Using binding;
Deleting unit 93, the application icon for deleting one or more of Second Type applications.
In the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application drawing
Under mark.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, just opening the
Two type applications.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence
The normal use of the application so the safety of terminal in use can be improved, and promotes the use feeling of user.
If the function described in the present embodiment method is realized in the form of SFU software functional unit and as independent product pin
It sells or in use, can be stored in a computing device read/write memory medium.Based on this understanding, the embodiment of the present application
The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, this is soft
Part product is stored in a storage medium, including some instructions are used so that computing device (can be personal computer,
Server, mobile computing device or network equipment etc.) execute all or part of step of each embodiment the method for the application
Suddenly.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), is deposited mobile hard disk at random
The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic disc or CD.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with it is other
The difference of embodiment, just to refer each other for same or similar part between each embodiment.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the application.
Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein
General Principle can in other embodiments be realized in the case where not departing from spirit herein or range.Therefore, the application
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest range caused.
Claims (8)
1. a kind of deployment method of application, which is characterized in that including:
Active user is obtained to instruct the object run of first kind application icon;
According to preset instruction type, the type of the object run instruction is analyzed;
In the case where the type of object run instruction is the second class instruction type, according to pre-establishing application icon and the
The correspondence of two type applications determines one or more Second Type applications corresponding with the first kind application icon;
Wherein, what one or more of Second Types were applied applies entrance, is hidden under the first kind application icon, and,
The application icon of one or more of Second Type applications is in hidden state;
In the Second Type pre-established using in the correspondence with operational order, answered in one or more of Second Types
In, Second Type application corresponding with object run instruction is opened;
Wherein, described in the correspondence that the Second Type pre-established applies with operational order, one or more of
In Second Type application, Second Type application corresponding with object run instruction is opened, including:
In the correspondence that the Second Type applies with operational order, one or more of Second Types applications pair are determined
All operational orders answered;
In all operational orders, judges whether there is and instruct consistent operational order with the object run;
If so, opening one or more Second Type applications corresponding with the operational order;
If nothing exits the program.
2. the method as described in claim 1, which is characterized in that the object run, which instructs, includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
3. method as claimed in claim 2, which is characterized in that the object run instruction include active user human body
In the case of characteristic information, then in all operational orders, judges whether there is and instruct consistent behaviour with the object run
It instructs, including:
In the default characteristics of human body's information for including in all operational orders, characteristics of human body's information of active user is judged whether there is
Consistent default characteristic information.
4. method as claimed in claim 3, which is characterized in that default characteristics of human body's information includes preset fingerprint information,
And/or pre-set image information and/or preset sound information;The default characteristics of human body's information for including in all operational orders then
In, the consistent default characteristic information of characteristics of human body's information of active user is judged whether there is, including:
After the finger print information for acquiring the active user using finger print acquisition module, the finger print information of the active user is judged
It is whether consistent with preset fingerprint information;And/or
After the image information for acquiring the active user using image capture module, the image information of the active user is judged
It is whether consistent with pre-set image information;And/or
After the acoustic information for acquiring the active user using sound acquisition module, the acoustic information of the active user is judged
It is whether consistent with preset sound information.
5. a kind of device for opening of application, which is characterized in that including:
Acquiring unit instructs first kind application drawing for obtaining active user to the object run of first kind application icon
Mark;
Analytic unit, for according to preset instruction type, analyzing the type of the object run instruction;
First determination unit is used in the case where the type that the object run instructs is the second class instruction type, according to pre-
First establish the correspondence of application icon and Second Type application, determine one corresponding with the first kind application icon or
Multiple Second Type applications;Wherein, what one or more of Second Types were applied applies entrance, is hidden in the first kind
Under type application icon, and, the application icon of one or more of Second Type applications is in hidden state;
Opening unit, used in the Second Type pre-established using correspondence with operational order, one or
In multiple Second Type applications, Second Type application corresponding with object run instruction is opened;
Wherein, the opening unit includes:
Second determination unit, used in the Second Type using correspondence with operational order, determine it is one or
Multiple Second Types apply corresponding all operational orders;
Judging unit, in all operational orders, judging whether there is and instructing consistent operation with the object run
Instruction;
Second opening unit, for there is the case where instructing consistent operational order with the object run in all operational orders
Under, open one or more Second Type applications corresponding with the operational order;
Unit is exited, in the case of in all operational orders without consistent operational order is instructed with the object run,
It exits the program.
6. device as claimed in claim 5, which is characterized in that the object run, which instructs, includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
7. device as claimed in claim 6, which is characterized in that the object run instruction include active user human body
In the case of characteristic information, then judging unit, specifically for include in all operational orders default characteristics of human body's information in,
Judge whether there is the consistent default characteristic information of characteristics of human body's information of active user.
8. device as claimed in claim 7, which is characterized in that default characteristics of human body's information includes preset fingerprint information,
And/or pre-set image information and/or preset sound information;The then judging unit, including:
First judging unit, for after the finger print information for acquiring the active user using finger print acquisition module, described in judgement
Whether the finger print information of active user is consistent with preset fingerprint information;And/or
Second judgment unit, for after the image information for acquiring the active user using image capture module, described in judgement
Whether the image information of active user is consistent with pre-set image information;And/or
Third judging unit, for after the acoustic information for acquiring the active user using sound acquisition module, described in judgement
Whether the acoustic information of active user is consistent with preset sound information.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510148437.4A CN104732157B (en) | 2015-03-31 | 2015-03-31 | A kind of application hides, deployment method and device |
PCT/CN2015/077991 WO2016155072A1 (en) | 2015-03-31 | 2015-04-30 | Method and apparatus for hiding and opening applications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510148437.4A CN104732157B (en) | 2015-03-31 | 2015-03-31 | A kind of application hides, deployment method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104732157A CN104732157A (en) | 2015-06-24 |
CN104732157B true CN104732157B (en) | 2018-09-07 |
Family
ID=53456037
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510148437.4A Active CN104732157B (en) | 2015-03-31 | 2015-03-31 | A kind of application hides, deployment method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104732157B (en) |
WO (1) | WO2016155072A1 (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105404443B (en) * | 2015-10-27 | 2019-02-01 | 努比亚技术有限公司 | Using starting method and device |
CN105549810A (en) * | 2015-10-28 | 2016-05-04 | 东莞酷派软件技术有限公司 | Application icon processing method and device, and terminal |
CN105930145B (en) * | 2016-04-12 | 2020-07-17 | Oppo广东移动通信有限公司 | Information hiding method and mobile terminal |
CN106066950A (en) * | 2016-05-23 | 2016-11-02 | 广东欧珀移动通信有限公司 | Application program image target processing method and system |
CN106484231A (en) * | 2016-09-30 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application hides |
CN107423585A (en) * | 2017-07-31 | 2017-12-01 | 上海爱优威软件开发有限公司 | The concealed application method and system of a kind of application |
CN108052248A (en) * | 2017-11-30 | 2018-05-18 | 维沃移动通信有限公司 | The startup method, apparatus and mobile terminal of a kind of application program |
CN108229149B (en) * | 2017-12-29 | 2020-11-06 | 北京安云世纪科技有限公司 | Data protection method and device |
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
CN108563932B (en) * | 2018-04-10 | 2020-01-10 | Oppo广东移动通信有限公司 | Application control method and device, readable storage medium and terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102509055A (en) * | 2011-11-24 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for hiding programs of mobile terminal |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN103793657A (en) * | 2014-02-18 | 2014-05-14 | 北京网秦天下科技有限公司 | System and method used for hiding application on mobile terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102655542A (en) * | 2011-03-01 | 2012-09-05 | 联想(北京)有限公司 | Method and terminal for switching terminal statuses |
CN104424444B (en) * | 2013-09-06 | 2019-04-23 | 中兴通讯股份有限公司 | Hidden folder processing method, device and terminal |
-
2015
- 2015-03-31 CN CN201510148437.4A patent/CN104732157B/en active Active
- 2015-04-30 WO PCT/CN2015/077991 patent/WO2016155072A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102509055A (en) * | 2011-11-24 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for hiding programs of mobile terminal |
CN103616986A (en) * | 2013-11-30 | 2014-03-05 | 广东欧珀移动通信有限公司 | Method and system for displaying and hiding application icons and mobile terminal |
CN103793657A (en) * | 2014-02-18 | 2014-05-14 | 北京网秦天下科技有限公司 | System and method used for hiding application on mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104732157A (en) | 2015-06-24 |
WO2016155072A1 (en) | 2016-10-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104732157B (en) | A kind of application hides, deployment method and device | |
CN110647730B (en) | Single channel input multi-factor authentication via separate processing paths | |
AU2021254670B2 (en) | Systems and methods for providing security via interactive media | |
EP4250679A2 (en) | User interfaces for peer-to-peer transfers | |
CN105760737A (en) | Control method for applications and terminal | |
WO2016149208A1 (en) | Selectively providing personal information and access to functionality on lock screen based on biometric user authentication | |
CN104778416B (en) | A kind of information concealing method and terminal | |
CN105205379A (en) | Control method and device for terminal application and terminal | |
CN105930145A (en) | Information hiding method and mobile terminal | |
WO2019129042A1 (en) | Dual account application switching method and related equipment | |
CN105718779B (en) | A kind of application program login method and user terminal | |
CN105912896A (en) | Application switching method and terminal | |
CN106778151A (en) | Method for identifying ID and device based on person's handwriting | |
CN107483704A (en) | A kind of private space method to set up and terminal device | |
CN106098069A (en) | A kind of identity identifying method and terminal unit | |
CN109493079A (en) | Payment authentication method and equipment | |
WO2017049732A1 (en) | User data protection method and terminal | |
CN105656873B (en) | A kind of access control method and device | |
CN105930068B (en) | The quick control method of personal hot spot and device | |
CN109753148A (en) | A kind of control method, device and the controlling terminal of VR equipment | |
US9979814B2 (en) | Detecting driving and modifying access to a user device | |
WO2016180234A1 (en) | Method and apparatus for building secure environment | |
CN106372472A (en) | Application operation method and application operation device | |
CN108073425A (en) | A kind of application program launching method and mobile terminal | |
CN109800548A (en) | A kind of method and apparatus preventing leakage of personal information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |