Nothing Special   »   [go: up one dir, main page]

CN108563933A - Control method, device, storage medium and the mobile terminal of application program - Google Patents

Control method, device, storage medium and the mobile terminal of application program Download PDF

Info

Publication number
CN108563933A
CN108563933A CN201810354166.1A CN201810354166A CN108563933A CN 108563933 A CN108563933 A CN 108563933A CN 201810354166 A CN201810354166 A CN 201810354166A CN 108563933 A CN108563933 A CN 108563933A
Authority
CN
China
Prior art keywords
target object
password
mobile terminal
hiding
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810354166.1A
Other languages
Chinese (zh)
Inventor
贾利敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810354166.1A priority Critical patent/CN108563933A/en
Publication of CN108563933A publication Critical patent/CN108563933A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the present application discloses control method, device, storage medium and the mobile terminal of application program.This method includes:When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;If identifying that the input password is stealth mode password, solve lock screen and shown, and controls the mobile terminal and be hidden target object is set;If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shows the hiding target object.The embodiment of the present application is by using above-mentioned technical proposal; both it is possible to prevente effectively from other people spy upon the application program related content more concealed into customer mobile terminal; protect privacy of user; simply and quickly the icon or content of hiding application program can also be shown; it is user-friendly, preferably meet user demand.

Description

Control method, device, storage medium and the mobile terminal of application program
Technical field
The invention relates to the control method of field of computer technology more particularly to application program, device, storages to be situated between Matter and mobile terminal.
Background technology
With the fast development of electronic technology and the increasingly raising of people's living standard, smart mobile phone, tablet computer etc. are eventually End has become an essential part in people's life.
Various application programs (Application Software, APP) are provided in terminal, user can correspond to Various operations are carried out with program, to meet the better demand of user.
However, many application programs are related to individual privacy in terminal, user is not intended to be seen by other people, need to this The related content (icon of such as application program) of a little application programs is hidden setting, i.e., does not believe the correlation of these application programs Breath is directly displayed in terminal screen.Meanwhile these application programs being hidden need still meet normally making for user With.Therefore, most important is become to the control of application program in terminal.
Invention content
The embodiment of the present application provides control method, device, storage medium and the mobile terminal of application program, can be to application Program is controlled, and user demand is met.
In a first aspect, the embodiment of the present application provides a kind of control method of application program, including:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown The hiding target object.
Second aspect, the embodiment of the present application provide a kind of control device of application program, including:
Password acquisition module is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining user Input password;
If normal mode display module solves lock screen for identifying that the input password is normal mode password Into normal displaying mode;
Target object hidden module is set, if for identifying that the input password is stealth mode password, is unlocked Screen is shown, and is controlled the mobile terminal and be hidden target object is set;
Target object display module is hidden, if being directed to the enabled instruction for hiding target object for detecting, executes mirror Power operation, and when authenticating successfully, show the hiding target object.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey Sequence realizes the control method of the application program as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of mobile terminal, including memory, processor and are stored in storage It can realize on device and when the computer program of processor operation, the processor execute the computer program as the application is real Apply the control method of the application program described in example.
The control program of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed, And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding Application program icon or content shown, it is user-friendly, preferably meet user demand.
Description of the drawings
Fig. 1 is a kind of flow diagram of the control method of application program provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the control method of another application program provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the control method of another application program provided by the embodiments of the present application;
Fig. 4 is a kind of structure diagram of the control device of application program provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of another mobile terminal provided by the embodiments of the present application.
Specific implementation mode
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating , illustrate only for ease of description, in attached drawing and the relevant part of the application rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation The processing can be terminated when completion, it is also possible to the additional step being not included in attached drawing.The processing can be with Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of the control method of application program provided by the embodiments of the present application, and the present embodiment can The case where application program of more privacy is hidden suitable for mobile terminal, this method can be by the controls of application program Device executes, and wherein the device can generally be integrated in the terminal by software and or hardware realization.As shown in Figure 1, should Method includes:
Step 101, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
Illustratively, the mobile terminal in the embodiment of the present application may include the mobile devices such as mobile phone and tablet computer.
Wherein, when detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained, to open The dynamic unlocking screen event to mobile terminal, and according to the application program in the input cipher control mobile terminal of user.
Illustratively, when detecting that user is in the mobile terminal of screen lock state using screen, mobile terminal is characterized Unlocking screen event is triggered.When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained. Wherein, the input password of user can be any in finger-print cipher, numerical ciphers, graphical passwords and speech cipher, this Application embodiment does not limit the form of expression for inputting password.
If step 102 identifies that the input password is normal mode password, solves lock screen and enter normal display mould Formula.
In the embodiment of the present application, the input password of user is identified, however, it is determined that the input password for going out user is normal mode Password then controls mobile terminal screen unlock, and enters the normal displaying mode of mobile terminal desktop.Wherein, mould is normally shown Formula includes that the whole application programs installed in mobile terminal are normally shown, when the user clicks using appointing in the application program of installation Meaning one when, can click directly on the icon of application program, open the application program.It is understood that working as mobile terminal Lock screen is solved, when into normal displaying mode, user can directly grasp all application programs installed in mobile terminal Make.For example, when mobile terminal is in normal displaying mode, user can execute the application program of mobile terminal startup, unloading And a series of operation such as upgrading.
If step 103 identifies that the input password is stealth mode password, solves lock screen and shown, and control It makes the mobile terminal and is hidden target object is set.
Wherein, setting target object may include the icon of application program or the content of application program.It is understood that User needs in advance to needing hiding object to set in mobile terminal, i.e., user needs to needing to hide in mobile terminal The icon of application program or the content of mobile process set.Illustratively, the attribute for needing hiding object is carried out Setting, such as will need the attribute of hiding object to be set as 1, the attribute for the object that need not be hidden is set as 0.For example, needing The object to be hidden is the icon of application program A, then carries out attribute setup to the icon of application program A, such as add label 1, And attribute setup, or addition label 0 are not done to the icon of other application programs that need not be hidden.And it will be after setting attribute Hidden object is as setting target object.
In the embodiment of the present application, it if identifying that the input password of user is stealth mode password, controls mobile whole End solution lock screen, into desktop display interface, and controls the setting target object in mobile terminal and is hidden.Illustratively, Application program in mobile terminal includes application program A, application program B, application program C, application program D, application program E and answers With program F, setting target object includes the icon b of the icon a and application program B of application program A, if the input password of user is Stealth mode password then controls mobile terminal solution lock screen, and control icon a and icon b hides, i.e., invisible to user, The icon e of the icon c of application program C, the icon d of application program D, application program E are then only shown in the desktop of mobile terminal And the icon f of application program F.
Stealth mode password and normal mode password are the preset password of user, it is to be understood that stealth mode Password and normal mode password enter different dispaly states to control mobile terminal, and two different passwords being arranged. When the input password of user is normal mode password, control mobile terminal solution lock screen enters normal displaying mode, works as user Input password be stealth mode password when, control mobile terminal solution lock screen enter stealth mode, will also set target pair As being hidden.Wherein, stealth mode password and normal mode password are two different passwords, but stealth mode password and The password type of normal mode password may be the same or different.For example, stealth mode password and normal mode password can be with It is finger-print cipher, and stealth mode password is set as the finger print information of the right hand index finger of user, and normal mode password is arranged For the finger print information of the right hand middle finger of user.For another example, stealth mode password is numerical ciphers, and normal mode password is that figure is close Code.It should be noted that the embodiment of the present application does not limit the password type of stealth mode password and normal mode password.
If step 104, detecting for the enabled instruction for hiding target object, execute authentication operations, and authentication at When work(, the hiding target object is shown.
In the embodiment of the present application, it is stealth mode password in the input password of user, controls mobile terminal solution lock screen And will setting target object hide namely the desktop of mobile terminal in do not show setting target object after, if detecting for hidden When hiding the enabled instruction of target object, authentication operations are executed, and when authenticating successfully, shows that this hides target object.Wherein, hidden It hides target object and can be understood as the setting target object after hiding, the setting target object after will also hiding is as hiding mesh Mark object.When detect for hide target object enabled instruction when, execute authentication operations, for example, prompt user input with This hides the corresponding setting up password of target object.Wherein, when carrying out authentication operations, the setting up password of input can be that number is close Any one in code, graphical passwords, finger-print cipher and speech cipher, setting up password class of the embodiment of the present application to authentication operations Type does not limit.When setting up password input by user is correct, expression authenticates successfully, then shows and hide target object.It is exemplary , include in movement by the icon of the application program after authenticating successfully when hiding the icon that target object is application program On terminal desktop;When it is the content in application program to hide target object, after authenticating successfully, in the application program Appearance is shown on mobile terminal desktop.Optionally, when showing that this hides target object, it can also start and hide target pair with this As associated application program.
The control method of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed, And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding Application program icon or content shown, it is user-friendly, preferably meet user demand.
In some embodiments, it detects for the enabled instruction for hiding target object, including:Detect other application journey Sequence calls the call instruction for hiding application program associated by target object;Or it receives to be sent to associated by hiding target object and answer With the notification message of program.The advantages of this arrangement are as follows can the simply and quickly icon to hiding application program or interior Appearance is shown, user-friendly, preferably meets user demand.
In the embodiment of the present application, other applications can be understood as removing in mobile terminal and are associated with hiding target object Application program except application program, namely user input password be stealth mode password when, icon is still in movement The application program that terminal desktop is normally shown.Illustratively, target object is hidden for the icon a of application program A, and application program The icon c of C does not hide, when user is during using application program C, calls application program A, then it represents that detects for answering With the enabled instruction of program A, and after authenticating successfully, the icon a of display application program A.For example, application program-Alipay Icon is to hide target object, during user uses this application program of Taobao, in payment, needs to call Alipay Shopping payment is carried out, then is shown the corresponding icon of Alipay this application program on the table, and starts Alipay this is answered Use program.
Illustratively, when receive be sent to the notification message of application program associated by hiding target object when, characterization inspection It measures for the enabled instruction for hiding target object.It is understood that being closed if receiving and being sent to hiding target object Then include on mobile terminal desktop by hiding target object when joining the notification message of application program.For example, hiding target object For the icon of this application program of wechat, then when the message for receiving the transmission of other mobile terminals, and when authenticating successfully, by wechat Icon be shown on the desktop of mobile terminal.It, can in time, fast in this way during ensureing effective protection privacy of user Ground will be notified with the relevant content of the associated application program of hiding target object to user.
In some embodiments, it if identifying that the input password is stealth mode password, solves lock screen and is shown Show, and controls the mobile terminal and be hidden target object is set, including:If identifying that the input password is hiding Pattern password then solves lock screen and is shown, and monitors the hiding instruction input by user;According to pre-stored hiding finger The correspondence with setting object is enabled, determines at least one setting target object corresponding with the hiding instruction;Described in control The setting target object is hidden by mobile terminal.The advantages of this arrangement are as follows can effectively refine to setting target The hiding Control granularity of object, preferably meets user demand.
In the embodiment of the present application, when the input password of user is stealth mode password, mobile terminal solution screen locking is controlled Curtain carries out desktop dispaly state, and user's input is prompted to hide instruction.According to hiding instruction input by user, mobile terminal is controlled In hide the corresponding setting target object of instruction with this and be hidden.For example, according to pre-stored hiding instruction and setting pair The correspondence of elephant determines corresponding with hiding instruction at least one setting target object, and control the setting target object into Row is hidden.It is understood that hiding instruction input by user is different, the hiding setting target object of mobile terminal control is not Together.Wherein, the instruction type for hiding instruction may include phonetic order, literal order and gesture instruction, the embodiment of the present application pair The instruction type for hiding instruction does not limit.
Illustratively, it is gesture instruction to hide instruction, the correspondence packet of pre-stored hiding instruction and setting object It includes:The object that sets corresponding with " to hook " gesture as the icon a of application program A, it is corresponding with " circle " gesture set object as The icon c of the icon b and application program C of application program B, the object that sets corresponding with " cross " gesture is the figure of application program D Mark d.It can be understood that when it is " to hooking " gesture to hide instruction, namely detect touch of the user in mobile terminal On screen when input " to hooking " gesture, the icon a of control application program A hides;When it is " circle " gesture to hide instruction, Ye Jijian User is measured when inputting " circle " gesture on the touch screen of mobile terminal, the icon b and application program C of control application program B Icon c hide;When it is " cross " gesture to hide instruction, namely detect that user inputs on the touch screen of mobile terminal When " cross " gesture, the icon d of control application program D hides.Again illustrative, it is literal order, literal order to hide instruction Packet name information including application program, then according to the packet name information of input, by the icon of application program corresponding with packet name information Or content is hidden.For example, hiding instruction input by user is " Alipay ", then the icon of Alipay is hidden.
In some embodiments, after showing the hiding target object, further include:Obtain the hiding target object Do not operate duration;When the hiding target object is not when operating duration more than predetermined threshold value, cancellation shows the hiding mesh Mark object.It is understood that when detecting that, for the enabled instruction for hiding target object, and when authenticating successfully, display should Target object is hidden, it in this way can be after the closing of hiding target object, if user thinks to be on hiding target pair again at once When as associated application program, facilitate user that can simply and quickly find startup entrance.And if user to display after When hiding target object is not carried out any operation for a long time, in order to protect privacy of user, this can be hidden to target object again It is automatic to hide, namely when hiding when not operating duration more than predetermined threshold value of target object, cancel and show that this hides target object. Illustratively, predetermined threshold value is 20 minutes, and user is to hiding a length of 30 minutes when not operating of target object, namely will be hidden It hides user in 30 minutes after target object is shown and does not carry out any operation to hiding target object, then, it can cancel at this time Show this hide target object, also will this hide target object hide again.
In some embodiments, it if identifying that the input password is normal mode password, solves lock screen and enters just Normal display pattern, including:If identifying that the input password is normal mode password, camera is opened;It is taken the photograph based on described As head obtains the target facial image of the user;If the target facial image is matched with default facial image, screen locking is solved Curtain enters normal displaying mode.The advantages of this arrangement are as follows can further verify user's by the facial image of shooting Identity information ensures that active user is mobile terminal affiliated user, or ensures that active user is to have operating rights to mobile terminal The user of limit improves the protection to the privacy information in mobile terminal.
Wherein, camera may include 2D cameras (i.e. common camera) and 3D cameras.It is understood that passing through The image that 2D cameras obtain is two-dimensional image.And 3D cameras are properly termed as 3D sensors.3D cameras with it is common Camera difference lies in, 3D cameras can not only obtain flat image, can also obtain the depth information of reference object, It is exactly the positions and dimensions information of three-dimensional.The embodiment of the present application does not limit the type of camera.
Illustratively, when mobile terminal by illegal molecule in use, illegal molecule be easy to by the illegal route obtain move The normal mode password of dynamic terminal, invades the privacy of user described in mobile terminal.Therefore, in order to effectively avoid the hair of such case It is raw, in the embodiment of the present application, when it is normal mode password to identify the input password of user, open taking the photograph in mobile terminal As head, is shot based on camera, obtain the target facial image of active user.And the target facial image of acquisition is carried out Identification, judges whether to be matched with default facial image, if successful match, shows that active user is mobile terminal affiliated use Family, or show active user be to mobile terminal have operating right user, at this point, control mobile terminal solution lock screen into Enter normal displaying mode.
In some embodiments, it if identifying that the input password is normal mode password, solves lock screen and enters just Normal display pattern, including:If identifying that the input password is normal mode password, the current of the mobile terminal is obtained Time and/or current location;When the current time is in preset time period and/or the current location is predeterminated position, Solution lock screen enters normal displaying mode.
Illustratively, when the input password of user is normal mode password, the current time of mobile terminal is obtained, and sentence Whether disconnected current time is in preset time period.For example, preset time period may include 0:00-6:00,12:00-13:00 and 18:00-22:00, if current time is 20:00, i.e. current time is in preset time period, then controls mobile terminal solution screen locking Curtain enters normal displaying mode.It is understood that preset time period is user alone or there is no make when stranger With the period of mobile terminal mobile terminal solution screen locking can be controlled at this point, when the input password of user is normal mode password Curtain enters normal displaying mode, in case the relevant content of application program with more privacy is arrived by other people snooping, it can be preferably Protect the privacy of user.
It is again illustrative, when the input password of user is normal mode password, the current location of mobile terminal is obtained, and Judge whether current location is in predeterminated position.For example, predeterminated position may include family and company, if current location is user's Family, i.e., user is around the household of user oneself currently just in own home, need not be related to the application program of more privacy Content is hidden, then controls mobile terminal solution lock screen and enter normal displaying mode.It is understood that predeterminated position is to use Family is alone or there is no the positions using mobile terminal when stranger, at this point, when the input password of user is normal mode When formula password, mobile terminal solution lock screen can be controlled and enter normal displaying mode, in order to avoid the application program phase with more privacy The content of pass is spied upon by other people and is arrived, and the privacy of user can be preferably protected.
It is illustrative again, when the input password of user is normal mode password, obtain mobile terminal current time and Current location, and judge whether current time is in whether in preset time period and current location is in predeterminated position.When current Between in the preset time period and current location is predeterminated position, at this point, when the input password of user is normal mode password, Mobile terminal solution lock screen can be controlled and enter normal displaying mode, can be had by the verification of time and position double factor The privacy of effect protection user.
Fig. 2 is the flow diagram of the control method of application program provided by the embodiments of the present application, and this method includes as follows Step:
Step 201, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
It is still stealth mode password that step 202, identification input password, which are normal mode password, if input password is normal Pattern password, thens follow the steps 207, if input password is stealth mode password, thens follow the steps 203, if input password is neither It is stealth mode password, nor stealth mode password, thens follow the steps 208.
Step 203, solution lock screen are shown, and are controlled mobile terminal and be hidden target object is set.
Wherein, the icon or the content in application program that setting target object may include application program.
If step 204 detects that other applications call the call instruction for hiding application program associated by target object, Authentication operations are then executed, and when authenticating successfully, shows and hide target object.
Step 205 obtains and hides target object and do not operate duration.
Step 206, when hide target object do not operate duration more than predetermined threshold value when, cancel display hide target pair As.
Step 207, solution lock screen enter normal displaying mode.
Step 208 keeps mobile terminal to be in screen lock state.
The control method of the application program provided in the embodiment of the present application, if identifying that the input password is to hide mould Formula password then solves lock screen and is shown, and controls the mobile terminal and be hidden target object is set, when detecting it He hides the call instruction of application program associated by target object at application call, or receives and be sent to hiding target object The notification message of associated application program, and when authenticating successfully, show the hiding target object, if to hiding target object When not operating duration more than predetermined threshold value, cancels display and hide target object, it can also be simply and quickly to hiding application journey The icon or content of sequence are shown, user-friendly, and are not being grasped for a long time to the hiding target object after display When making, cancels the display to hiding target object, protect the privacy of user in time.
Fig. 3 is the flow diagram of the control method of application program provided by the embodiments of the present application, and this method includes as follows Step:
Step 301, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
It is still stealth mode password that step 302, identification input password, which are normal mode password, if input password is normal Pattern password, thens follow the steps 309, if input password is stealth mode password, thens follow the steps 303, if input password is neither It is stealth mode password, nor stealth mode password, thens follow the steps 312.
Step 303, solution lock screen are shown, and monitor hiding instruction input by user.
Step 304, according to it is pre-stored it is hiding instruction with setting object correspondence, determination it is corresponding with hiding instruction At least one setting target object.
Wherein, the icon or the content in application program that setting target object may include application program.
Step 305, control mobile terminal are hidden target object is set.
If step 306, detecting for the enabled instruction for hiding target object, execute authentication operations, and authentication at When work(, shows and hide target object.
Wherein, it detects for the enabled instruction for hiding target object, may include:Detect that other applications are called Hide the call instruction of application program associated by target object;Or it receives and is sent to application program associated by hiding target object Notification message.
Step 307 obtains and hides target object and do not operate duration.
Step 308, when hide target object do not operate duration more than predetermined threshold value when, cancel display hide target pair As.
Step 309 opens camera, and the target facial image of user is obtained based on camera.
Step 310 judges whether target facial image matches with default facial image, if so, 311 are thened follow the steps, it is no Then, step 312 is executed.
Step 311, solution lock screen enter normal displaying mode.
Step 312 keeps mobile terminal to be in screen lock state.
The control method of the application program provided in the embodiment of the present application, if identifying that the input password is normal mode Formula password then opens camera and obtains the target facial image of user, and matched with default facial image in target facial image When success, solution lock screen is shown, ensures that active user is mobile terminal affiliated user, is improved to the privacy in mobile terminal The protection of information.If identifying that the input password is stealth mode password, according to hiding instruction input by user, Control setting target object corresponding with hiding instruction is hidden, and has effectively refined the hiding control grain to setting target object Degree, can preferably meet user demand.
Fig. 4 is a kind of structure diagram of the control device of application program provided by the embodiments of the present application, which can be by soft Part and/or hardware realization, are typically integrated in mobile terminal, can be by the control method of executing application come to application program It is controlled.As shown in figure 4, the device includes:
Password acquisition module 401 is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining and using The input password at family;
If normal mode display module 402 solves screen locking for identifying that the input password is normal mode password Curtain enters normal displaying mode;
Target object hidden module 403 is set, if for identifying that the input password is stealth mode password, is solved Lock screen is shown, and is controlled the mobile terminal and be hidden target object is set;
Target object display module 404 is hidden, if being directed to the enabled instruction for hiding target object for detecting, is executed Authentication operations, and when authenticating successfully, show the hiding target object.
The control device of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed, And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding Application program icon or content shown, it is user-friendly, preferably meet user demand.
Optionally, the icon or the content in application program that the setting target object includes application program.
Optionally, it detects for the enabled instruction for hiding target object, including:
Detect that other applications call the call instruction for hiding application program associated by target object;Or
Receive the notification message for being sent to application program associated by hiding target object.
Optionally, target object hidden module is set, is used for:
If identifying that the input password is stealth mode password, solves lock screen and shown, and monitor the use The hiding instruction of family input;
According to the correspondence of pre-stored hiding instruction and setting object, determination is corresponding extremely with the hiding instruction Few setting target object;
The mobile terminal is controlled to be hidden the setting target object.
Optionally, after showing the hiding target object, further include:
Duration acquisition module is not operated, and duration is not operated for obtain the hiding target object;
Display suppression module, for when the hiding target object is not when operating duration more than predetermined threshold value, cancellation to be aobvious Show the hiding target object.
Optionally, normal mode display module is used for:
If identifying that the input password is normal mode password, camera is opened;
The target facial image of the user is obtained based on the camera;
If the target facial image is matched with default facial image, solves lock screen and enter normal displaying mode.
Optionally, normal mode display module is used for:
If identify the input password be normal mode password, obtain the mobile terminal current time and/ Or current location;
When it is predeterminated position that the current time, which is in preset time period and/or the current location, solution lock screen into Enter normal displaying mode.
The embodiment of the present application also provides a kind of storage medium including computer executable instructions, and the computer is executable It instructs and includes for the control method of executing application, this method when being executed by computer processor:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown The hiding target object.
Storage medium --- any various types of memory devices or storage device.Term " storage medium " is intended to wrap It includes:Install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as DRAM, DDRRAM, SRAM, EDORAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium (example Such as hard disk or optical storage);The memory component etc. of register or other similar types.Storage medium can further include other types Memory or combinations thereof.In addition, storage medium can be located at program in the first computer system being wherein performed, or It can be located in different second computer systems, second computer system is connected to the first meter by network (such as internet) Calculation machine system.Second computer system can provide program instruction to the first computer for executing.Term " storage medium " can To include two or more that may reside in different location (such as in different computer systems by network connection) Storage medium.Storage medium can store the program instruction that can be executed by one or more processors and (such as be implemented as counting Calculation machine program).
Certainly, a kind of storage medium including computer executable instructions that the embodiment of the present application is provided, computer The control for the application program that executable instruction is not limited to the described above operates, and the application any embodiment can also be performed and provided Application program control method in relevant operation.
The embodiment of the present application provides a kind of mobile terminal, and provided by the embodiments of the present application answer can be integrated in the mobile terminal With the control device of program.Fig. 5 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application.Mobile terminal 500 May include:Memory 501, locating module 502, processor 503 and storage on a memory and can processor operation meter Calculation machine program, the processor 503 realizes the application program as described in the embodiment of the present application when executing the computer program Control method.
Mobile terminal provided by the embodiments of the present application, both it is possible to prevente effectively from other people spy upon into customer mobile terminal more Concealed application program related content protects privacy of user, can also simply and quickly the icon to hiding application program or Content is shown, user-friendly, preferably meets user demand.
Fig. 6 is the structural schematic diagram of another mobile terminal provided by the embodiments of the present application, which may include: Shell (not shown), memory 601, central processing unit (central processing unit, CPU) 602 (are also known as located Manage device, hereinafter referred to as CPU), circuit board (not shown) and power circuit (not shown).The circuit board is placed in institute State the space interior that shell surrounds;The CPU602 and the memory 601 are arranged on the circuit board;The power supply electricity Road, for being each circuit or the device power supply of the mobile terminal;The memory 601, for storing executable program generation Code;The CPU602 is run and the executable journey by reading the executable program code stored in the memory 601 The corresponding computer program of sequence code, to realize following steps:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown The hiding target object.
The mobile terminal further includes:Peripheral Interface 603, RF (Radio Frequency, radio frequency) circuit 605, audio-frequency electric Road 606, loud speaker 611, power management chip 608, input/output (I/O) subsystem 609, other input/control devicess 610, Touch screen 612, other input/control devicess 610 and outside port 604, these components pass through one or more communication bus Or signal wire 607 communicates.
It should be understood that diagram mobile terminal 600 is only an example of mobile terminal, and mobile terminal 600 Can have than shown in the drawings more or less component, can combine two or more components, or can be with It is configured with different components.Various parts shown in the drawings can be including one or more signal processings and/or special It is realized in the combination of hardware, software or hardware and software including integrated circuit.
Just the mobile terminal provided in this embodiment for application program controlling is described in detail below, and the movement is whole End is by taking mobile phone as an example.
Memory 601, the memory 601 can be by access such as CPU602, Peripheral Interfaces 603, and the memory 601 can Can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory, Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU602 and deposited by Peripheral Interface 603, the Peripheral Interface 603 Reservoir 601.
I/O subsystems 609, the I/O subsystems 609 can be by the input/output peripherals in equipment, such as touch screen 612 With other input/control devicess 610, it is connected to Peripheral Interface 603.I/O subsystems 609 may include 6091 He of display controller One or more input controllers 6092 for controlling other input/control devicess 610.Wherein, one or more input controls Device 6092 processed receives electric signal from other input/control devicess 610 or sends electric signal to other input/control devicess 610, Other input/control devicess 610 may include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour Vertical pole clicks idler wheel.It is worth noting that input controller 6092 can with it is following any one connect:Keyboard, infrared port, The indicating equipment of USB interface and such as mouse.
Touch screen 612, the touch screen 612 are the input interface and output interface between customer mobile terminal and user, Visual output is shown to user, visual output may include figure, text, icon, video etc..
Display controller 6091 in I/O subsystems 609 receives electric signal from touch screen 612 or is sent out to touch screen 612 Electric signals.Touch screen 612 detects the contact on touch screen, and the contact detected is converted to and is shown by display controller 6091 The interaction of user interface object on touch screen 612, that is, realize human-computer interaction, the user interface being shown on touch screen 612 Object can be the icon of running game, be networked to the icon etc. of corresponding network.It is worth noting that equipment can also include light Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuits 605 are mainly used for establishing the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuits 605 receive and send RF letters Number, RF signals are also referred to as electromagnetic signal, and RF circuits 605 convert electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications Number, and communicated with mobile communications network and other equipment by the electromagnetic signal.RF circuits 605 may include being used for Execute the known circuit of these functions comprising but it is not limited to antenna system, RF transceivers, one or more amplifiers, tuning Device, one or more oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, Yong Hubiao Know module (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 606 is mainly used for receiving audio data from Peripheral Interface 603, which is converted to telecommunications Number, and the electric signal is sent to loud speaker 611.
Loud speaker 611, the voice signal for receiving mobile phone from wireless network by RF circuits 605, is reduced to sound And play the sound to user.
Power management chip 608, the hardware for being connected by CPU602, I/O subsystem and Peripheral Interface are powered And power management.
Control device, storage medium and the mobile terminal of the application program provided in above-described embodiment can perform the application and appoint The control method for the application program that meaning embodiment is provided has and executes the corresponding function module of this method and advantageous effect.Not The technical detail of detailed description in the above-described embodiments, reference can be made to the control for the application program that the application any embodiment is provided Method.
Note that above are only preferred embodiment and the institute's application technology principle of the application.It will be appreciated by those skilled in the art that The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation, The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out to the application by above example It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also May include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.

Claims (10)

1. a kind of control method of application program, which is characterized in that including:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solve lock screen and shown, and controls described mobile whole Setting target object is hidden by end;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, described in display Hide target object.
2. according to the method described in claim 1, it is characterized in that, it is described setting target object include application program icon, Or the content in application program.
3. method according to claim 1 or 2, which is characterized in that it detects for the enabled instruction for hiding target object, Including:
Detect that other applications call the call instruction for hiding application program associated by target object;Or
Receive the notification message for being sent to application program associated by hiding target object.
4. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that stealth mode is close Code, then solve lock screen and shown, and controls the mobile terminal and be hidden target object is set, including:
If identifying that the input password is stealth mode password, solves lock screen and shown, and it is defeated to monitor the user The hiding instruction entered;
According to the correspondence of pre-stored hiding instruction and setting object, determine and the hiding instruction corresponding at least one A setting target object;
The mobile terminal is controlled to be hidden the setting target object.
5. according to the method described in claim 1, it is characterized in that, after showing the hiding target object, further include:
Obtain the hiding target object does not operate duration;
When the hiding target object is not when operating duration more than predetermined threshold value, cancellation shows the hiding target object.
6. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that normal mode is close Code, then solve lock screen and enter normal displaying mode, including:
If identifying that the input password is normal mode password, camera is opened;
The target facial image of the user is obtained based on the camera;
If the target facial image is matched with default facial image, solves lock screen and enter normal displaying mode.
7. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that normal mode is close Code, then solve lock screen and enter normal displaying mode, including:
If identifying that the input password is normal mode password, obtains the current time of the mobile terminal and/or work as Front position;
When the current time is in preset time period and/or the current location is predeterminated position, solution lock screen enters just Normal display pattern.
8. a kind of control device of application program, which is characterized in that including:
Password acquisition module is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining the defeated of user Enter password;
If normal mode display module solves lock screen entrance for identifying that the input password is normal mode password Normal displaying mode;
Target object hidden module is set, if for identifying that the input password is stealth mode password, solves lock screen It is shown, and controls the mobile terminal and be hidden target object is set;
Target object display module is hidden, if being directed to the enabled instruction for hiding target object for detecting, executes authentication behaviour Make, and when authenticating successfully, shows the hiding target object.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The control method of the application program as described in any in claim 1-7 is realized when row.
10. a kind of mobile terminal, which is characterized in that including memory, processor and storage are on a memory and can be in processor The computer program of operation realizes answering as described in claim 1-7 is any when the processor executes the computer program With the control method of program.
CN201810354166.1A 2018-04-19 2018-04-19 Control method, device, storage medium and the mobile terminal of application program Pending CN108563933A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810354166.1A CN108563933A (en) 2018-04-19 2018-04-19 Control method, device, storage medium and the mobile terminal of application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810354166.1A CN108563933A (en) 2018-04-19 2018-04-19 Control method, device, storage medium and the mobile terminal of application program

Publications (1)

Publication Number Publication Date
CN108563933A true CN108563933A (en) 2018-09-21

Family

ID=63535960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810354166.1A Pending CN108563933A (en) 2018-04-19 2018-04-19 Control method, device, storage medium and the mobile terminal of application program

Country Status (1)

Country Link
CN (1) CN108563933A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110263589A (en) * 2019-05-31 2019-09-20 重庆爱奇艺智能科技有限公司 A kind of method and apparatus for realizing private space
CN110851031A (en) * 2019-10-22 2020-02-28 维沃移动通信有限公司 Display control method and electronic equipment
CN111125800A (en) * 2019-12-31 2020-05-08 维沃移动通信有限公司 Icon display method and electronic equipment
CN111475067A (en) * 2020-03-30 2020-07-31 维沃移动通信有限公司 Message indication method and electronic equipment
CN111782494A (en) * 2020-06-24 2020-10-16 上海闻泰信息技术有限公司 Application software control method and device, computer equipment and storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium
CN112364322A (en) * 2020-11-09 2021-02-12 深圳供电局有限公司 Safety verification system and method for instant communication tool
CN112446034A (en) * 2019-09-04 2021-03-05 中兴通讯股份有限公司 Data hiding management method and device, terminal and computer readable medium
CN113378216A (en) * 2021-05-29 2021-09-10 深圳市得一微电子有限责任公司 eMMC control method, system and storage medium thereof
CN113835809A (en) * 2021-09-24 2021-12-24 深圳集智数字科技有限公司 Hiding processing method and device
EP3961440A4 (en) * 2019-05-24 2022-06-15 Huawei Technologies Co., Ltd. Login method for intelligent terminal, and electronic device
WO2023240436A1 (en) * 2022-06-14 2023-12-21 Citrix Systems, Inc. Device access control
CN117478665A (en) * 2023-12-27 2024-01-30 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003006160A (en) * 2001-06-19 2003-01-10 Ntt Docomo Inc Method of presenting information, communication system, portable communication terminal and server
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN104077510A (en) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 Unlocking device and method thereof
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN105391859A (en) * 2015-11-09 2016-03-09 小米科技有限责任公司 Switching method and apparatus of scene modes
CN105844124A (en) * 2015-06-30 2016-08-10 维沃移动通信有限公司 Processing method and device for password data
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility
CN106446695A (en) * 2015-08-04 2017-02-22 中兴通讯股份有限公司 Application management method and device
CN106485121A (en) * 2016-09-29 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application management
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106778138A (en) * 2016-12-27 2017-05-31 东华互联宜家数据服务有限公司 The control method and device of software license limit
CN106778124A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The application method and device of a kind of hiden application
CN106990903A (en) * 2017-03-21 2017-07-28 北京小米移动软件有限公司 Display and the method and device of hide application program
CN107087068A (en) * 2017-04-18 2017-08-22 广东小天才科技有限公司 Mobile terminal operation mode switching method and device
CN107609368A (en) * 2017-08-09 2018-01-19 百度在线网络技术(北京)有限公司 Safety protecting method, device, equipment and the computer-readable storage medium of application program
CN107798254A (en) * 2017-11-30 2018-03-13 努比亚技术有限公司 A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN107818247A (en) * 2017-11-24 2018-03-20 维沃移动通信有限公司 A kind of mobile terminal unlocking method and mobile terminal

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003006160A (en) * 2001-06-19 2003-01-10 Ntt Docomo Inc Method of presenting information, communication system, portable communication terminal and server
CN1553316A (en) * 2003-03-12 2004-12-08 中兴通讯股份有限公司 Universal locking system of windows applied programm interface and method thereof
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN104077510A (en) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 Unlocking device and method thereof
CN104751068A (en) * 2013-12-26 2015-07-01 珠海金山办公软件有限公司 File protection method and device
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN105844124A (en) * 2015-06-30 2016-08-10 维沃移动通信有限公司 Processing method and device for password data
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN106446695A (en) * 2015-08-04 2017-02-22 中兴通讯股份有限公司 Application management method and device
CN105391859A (en) * 2015-11-09 2016-03-09 小米科技有限责任公司 Switching method and apparatus of scene modes
CN105933327A (en) * 2016-06-08 2016-09-07 北京奇虎科技有限公司 Application unlocking method, device and facility
CN106716429A (en) * 2016-08-31 2017-05-24 深圳前海达闼云端智能科技有限公司 Monitoring method and device, and electronic equipment
CN106485121A (en) * 2016-09-29 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application management
CN106778124A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The application method and device of a kind of hiden application
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment
CN106778138A (en) * 2016-12-27 2017-05-31 东华互联宜家数据服务有限公司 The control method and device of software license limit
CN106990903A (en) * 2017-03-21 2017-07-28 北京小米移动软件有限公司 Display and the method and device of hide application program
CN107087068A (en) * 2017-04-18 2017-08-22 广东小天才科技有限公司 Mobile terminal operation mode switching method and device
CN107609368A (en) * 2017-08-09 2018-01-19 百度在线网络技术(北京)有限公司 Safety protecting method, device, equipment and the computer-readable storage medium of application program
CN107818247A (en) * 2017-11-24 2018-03-20 维沃移动通信有限公司 A kind of mobile terminal unlocking method and mobile terminal
CN107798254A (en) * 2017-11-30 2018-03-13 努比亚技术有限公司 A kind of method for secret protection, mobile terminal and computer-readable recording medium

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3961440A4 (en) * 2019-05-24 2022-06-15 Huawei Technologies Co., Ltd. Login method for intelligent terminal, and electronic device
CN110263589A (en) * 2019-05-31 2019-09-20 重庆爱奇艺智能科技有限公司 A kind of method and apparatus for realizing private space
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium
CN112446034A (en) * 2019-09-04 2021-03-05 中兴通讯股份有限公司 Data hiding management method and device, terminal and computer readable medium
CN110851031A (en) * 2019-10-22 2020-02-28 维沃移动通信有限公司 Display control method and electronic equipment
CN111125800A (en) * 2019-12-31 2020-05-08 维沃移动通信有限公司 Icon display method and electronic equipment
CN111475067A (en) * 2020-03-30 2020-07-31 维沃移动通信有限公司 Message indication method and electronic equipment
CN111782494A (en) * 2020-06-24 2020-10-16 上海闻泰信息技术有限公司 Application software control method and device, computer equipment and storage medium
CN111866272A (en) * 2020-06-30 2020-10-30 维沃移动通信有限公司 Control method and device of electronic equipment
CN112364322A (en) * 2020-11-09 2021-02-12 深圳供电局有限公司 Safety verification system and method for instant communication tool
CN112364322B (en) * 2020-11-09 2023-10-31 深圳供电局有限公司 Safety verification system and method for instant messaging tool
CN113378216A (en) * 2021-05-29 2021-09-10 深圳市得一微电子有限责任公司 eMMC control method, system and storage medium thereof
CN113835809A (en) * 2021-09-24 2021-12-24 深圳集智数字科技有限公司 Hiding processing method and device
CN113835809B (en) * 2021-09-24 2024-05-17 深圳须弥云图空间科技有限公司 Hiding method and device
WO2023240436A1 (en) * 2022-06-14 2023-12-21 Citrix Systems, Inc. Device access control
CN117478665A (en) * 2023-12-27 2024-01-30 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium
CN117478665B (en) * 2023-12-27 2024-06-14 珠海格力电器股份有限公司 Terminal remote management method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
EP3232299B1 (en) Physical key component, terminal, and touch response method and device
US20170372298A1 (en) Method and apparatus for activating virtual card
US20170053149A1 (en) Method and apparatus for fingerprint identification
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN105574378A (en) Terminal control method and terminal control device
KR20140051470A (en) Mobile terminal and operating method for the same
KR20150080736A (en) Method for executing a function and Electronic device using the same
CN108076426A (en) Terminal tracing method, apparatus, storage medium and terminal device
CN107643871A (en) Control method for screen display, device, storage medium and mobile terminal
CN105930707A (en) Method and device for switching systems
CN109002340A (en) A kind of screen locking method and electronic equipment
CN106681717B (en) Terminal application program management method and device and electronic equipment
WO2020001385A1 (en) Electronic apparatus and application program control method
US20150294108A1 (en) Method and apparatus for managing authentication
CN103442141A (en) Method for having access to safe mode in one-touch mode
CN106355141A (en) Portable electronic device and operation method thereof
CN108268763A (en) terminal control method, device, storage medium and terminal
EP3403210B1 (en) User interface for a mobile device
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
CN106372479A (en) Mobile terminal and method of controlling the same
CN108551521A (en) A kind of log-on message reminding method and mobile terminal
US20170205983A1 (en) User interface for a mobile device
CN107045604A (en) Information processing method and device
CN106126082A (en) Control the method for terminal, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921

RJ01 Rejection of invention patent application after publication