CN108563933A - Control method, device, storage medium and the mobile terminal of application program - Google Patents
Control method, device, storage medium and the mobile terminal of application program Download PDFInfo
- Publication number
- CN108563933A CN108563933A CN201810354166.1A CN201810354166A CN108563933A CN 108563933 A CN108563933 A CN 108563933A CN 201810354166 A CN201810354166 A CN 201810354166A CN 108563933 A CN108563933 A CN 108563933A
- Authority
- CN
- China
- Prior art keywords
- target object
- password
- mobile terminal
- hiding
- application program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000003860 storage Methods 0.000 title claims abstract description 22
- 230000001960 triggered effect Effects 0.000 claims abstract description 17
- 230000001815 facial effect Effects 0.000 claims description 19
- 238000004590 computer program Methods 0.000 claims description 7
- 230000006399 behavior Effects 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 13
- 230000002093 peripheral effect Effects 0.000 description 9
- 238000012545 processing Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 241000406668 Loxodonta cyclotis Species 0.000 description 1
- 230000033228 biological regulation Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000001629 suppression Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the present application discloses control method, device, storage medium and the mobile terminal of application program.This method includes:When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;If identifying that the input password is stealth mode password, solve lock screen and shown, and controls the mobile terminal and be hidden target object is set;If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shows the hiding target object.The embodiment of the present application is by using above-mentioned technical proposal; both it is possible to prevente effectively from other people spy upon the application program related content more concealed into customer mobile terminal; protect privacy of user; simply and quickly the icon or content of hiding application program can also be shown; it is user-friendly, preferably meet user demand.
Description
Technical field
The invention relates to the control method of field of computer technology more particularly to application program, device, storages to be situated between
Matter and mobile terminal.
Background technology
With the fast development of electronic technology and the increasingly raising of people's living standard, smart mobile phone, tablet computer etc. are eventually
End has become an essential part in people's life.
Various application programs (Application Software, APP) are provided in terminal, user can correspond to
Various operations are carried out with program, to meet the better demand of user.
However, many application programs are related to individual privacy in terminal, user is not intended to be seen by other people, need to this
The related content (icon of such as application program) of a little application programs is hidden setting, i.e., does not believe the correlation of these application programs
Breath is directly displayed in terminal screen.Meanwhile these application programs being hidden need still meet normally making for user
With.Therefore, most important is become to the control of application program in terminal.
Invention content
The embodiment of the present application provides control method, device, storage medium and the mobile terminal of application program, can be to application
Program is controlled, and user demand is met.
In a first aspect, the embodiment of the present application provides a kind of control method of application program, including:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting
Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown
The hiding target object.
Second aspect, the embodiment of the present application provide a kind of control device of application program, including:
Password acquisition module is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining user
Input password;
If normal mode display module solves lock screen for identifying that the input password is normal mode password
Into normal displaying mode;
Target object hidden module is set, if for identifying that the input password is stealth mode password, is unlocked
Screen is shown, and is controlled the mobile terminal and be hidden target object is set;
Target object display module is hidden, if being directed to the enabled instruction for hiding target object for detecting, executes mirror
Power operation, and when authenticating successfully, show the hiding target object.
The third aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer journey
Sequence realizes the control method of the application program as described in the embodiment of the present application when the program is executed by processor.
Fourth aspect, the embodiment of the present application provide a kind of mobile terminal, including memory, processor and are stored in storage
It can realize on device and when the computer program of processor operation, the processor execute the computer program as the application is real
Apply the control method of the application program described in example.
The control program of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal
When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just
Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal
Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed,
And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived
Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding
Application program icon or content shown, it is user-friendly, preferably meet user demand.
Description of the drawings
Fig. 1 is a kind of flow diagram of the control method of application program provided by the embodiments of the present application;
Fig. 2 is the flow diagram of the control method of another application program provided by the embodiments of the present application;
Fig. 3 is the flow diagram of the control method of another application program provided by the embodiments of the present application;
Fig. 4 is a kind of structure diagram of the control device of application program provided by the embodiments of the present application;
Fig. 5 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application;
Fig. 6 is the structural schematic diagram of another mobile terminal provided by the embodiments of the present application.
Specific implementation mode
Further illustrate the technical solution of the application below with reference to the accompanying drawings and specific embodiments.It is appreciated that
It is that specific embodiment described herein is used only for explaining the application, rather than the restriction to the application.It further needs exist for illustrating
, illustrate only for ease of description, in attached drawing and the relevant part of the application rather than entire infrastructure.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although each step is described as the processing of sequence, many of which by flow chart
Step can be implemented concurrently, concomitantly or simultaneously.In addition, the sequence of each step can be rearranged.When its operation
The processing can be terminated when completion, it is also possible to the additional step being not included in attached drawing.The processing can be with
Corresponding to method, function, regulation, subroutine, subprogram etc..
Fig. 1 is a kind of flow diagram of the control method of application program provided by the embodiments of the present application, and the present embodiment can
The case where application program of more privacy is hidden suitable for mobile terminal, this method can be by the controls of application program
Device executes, and wherein the device can generally be integrated in the terminal by software and or hardware realization.As shown in Figure 1, should
Method includes:
Step 101, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
Illustratively, the mobile terminal in the embodiment of the present application may include the mobile devices such as mobile phone and tablet computer.
Wherein, when detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained, to open
The dynamic unlocking screen event to mobile terminal, and according to the application program in the input cipher control mobile terminal of user.
Illustratively, when detecting that user is in the mobile terminal of screen lock state using screen, mobile terminal is characterized
Unlocking screen event is triggered.When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained.
Wherein, the input password of user can be any in finger-print cipher, numerical ciphers, graphical passwords and speech cipher, this
Application embodiment does not limit the form of expression for inputting password.
If step 102 identifies that the input password is normal mode password, solves lock screen and enter normal display mould
Formula.
In the embodiment of the present application, the input password of user is identified, however, it is determined that the input password for going out user is normal mode
Password then controls mobile terminal screen unlock, and enters the normal displaying mode of mobile terminal desktop.Wherein, mould is normally shown
Formula includes that the whole application programs installed in mobile terminal are normally shown, when the user clicks using appointing in the application program of installation
Meaning one when, can click directly on the icon of application program, open the application program.It is understood that working as mobile terminal
Lock screen is solved, when into normal displaying mode, user can directly grasp all application programs installed in mobile terminal
Make.For example, when mobile terminal is in normal displaying mode, user can execute the application program of mobile terminal startup, unloading
And a series of operation such as upgrading.
If step 103 identifies that the input password is stealth mode password, solves lock screen and shown, and control
It makes the mobile terminal and is hidden target object is set.
Wherein, setting target object may include the icon of application program or the content of application program.It is understood that
User needs in advance to needing hiding object to set in mobile terminal, i.e., user needs to needing to hide in mobile terminal
The icon of application program or the content of mobile process set.Illustratively, the attribute for needing hiding object is carried out
Setting, such as will need the attribute of hiding object to be set as 1, the attribute for the object that need not be hidden is set as 0.For example, needing
The object to be hidden is the icon of application program A, then carries out attribute setup to the icon of application program A, such as add label 1,
And attribute setup, or addition label 0 are not done to the icon of other application programs that need not be hidden.And it will be after setting attribute
Hidden object is as setting target object.
In the embodiment of the present application, it if identifying that the input password of user is stealth mode password, controls mobile whole
End solution lock screen, into desktop display interface, and controls the setting target object in mobile terminal and is hidden.Illustratively,
Application program in mobile terminal includes application program A, application program B, application program C, application program D, application program E and answers
With program F, setting target object includes the icon b of the icon a and application program B of application program A, if the input password of user is
Stealth mode password then controls mobile terminal solution lock screen, and control icon a and icon b hides, i.e., invisible to user,
The icon e of the icon c of application program C, the icon d of application program D, application program E are then only shown in the desktop of mobile terminal
And the icon f of application program F.
Stealth mode password and normal mode password are the preset password of user, it is to be understood that stealth mode
Password and normal mode password enter different dispaly states to control mobile terminal, and two different passwords being arranged.
When the input password of user is normal mode password, control mobile terminal solution lock screen enters normal displaying mode, works as user
Input password be stealth mode password when, control mobile terminal solution lock screen enter stealth mode, will also set target pair
As being hidden.Wherein, stealth mode password and normal mode password are two different passwords, but stealth mode password and
The password type of normal mode password may be the same or different.For example, stealth mode password and normal mode password can be with
It is finger-print cipher, and stealth mode password is set as the finger print information of the right hand index finger of user, and normal mode password is arranged
For the finger print information of the right hand middle finger of user.For another example, stealth mode password is numerical ciphers, and normal mode password is that figure is close
Code.It should be noted that the embodiment of the present application does not limit the password type of stealth mode password and normal mode password.
If step 104, detecting for the enabled instruction for hiding target object, execute authentication operations, and authentication at
When work(, the hiding target object is shown.
In the embodiment of the present application, it is stealth mode password in the input password of user, controls mobile terminal solution lock screen
And will setting target object hide namely the desktop of mobile terminal in do not show setting target object after, if detecting for hidden
When hiding the enabled instruction of target object, authentication operations are executed, and when authenticating successfully, shows that this hides target object.Wherein, hidden
It hides target object and can be understood as the setting target object after hiding, the setting target object after will also hiding is as hiding mesh
Mark object.When detect for hide target object enabled instruction when, execute authentication operations, for example, prompt user input with
This hides the corresponding setting up password of target object.Wherein, when carrying out authentication operations, the setting up password of input can be that number is close
Any one in code, graphical passwords, finger-print cipher and speech cipher, setting up password class of the embodiment of the present application to authentication operations
Type does not limit.When setting up password input by user is correct, expression authenticates successfully, then shows and hide target object.It is exemplary
, include in movement by the icon of the application program after authenticating successfully when hiding the icon that target object is application program
On terminal desktop;When it is the content in application program to hide target object, after authenticating successfully, in the application program
Appearance is shown on mobile terminal desktop.Optionally, when showing that this hides target object, it can also start and hide target pair with this
As associated application program.
The control method of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal
When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just
Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal
Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed,
And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived
Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding
Application program icon or content shown, it is user-friendly, preferably meet user demand.
In some embodiments, it detects for the enabled instruction for hiding target object, including:Detect other application journey
Sequence calls the call instruction for hiding application program associated by target object;Or it receives to be sent to associated by hiding target object and answer
With the notification message of program.The advantages of this arrangement are as follows can the simply and quickly icon to hiding application program or interior
Appearance is shown, user-friendly, preferably meets user demand.
In the embodiment of the present application, other applications can be understood as removing in mobile terminal and are associated with hiding target object
Application program except application program, namely user input password be stealth mode password when, icon is still in movement
The application program that terminal desktop is normally shown.Illustratively, target object is hidden for the icon a of application program A, and application program
The icon c of C does not hide, when user is during using application program C, calls application program A, then it represents that detects for answering
With the enabled instruction of program A, and after authenticating successfully, the icon a of display application program A.For example, application program-Alipay
Icon is to hide target object, during user uses this application program of Taobao, in payment, needs to call Alipay
Shopping payment is carried out, then is shown the corresponding icon of Alipay this application program on the table, and starts Alipay this is answered
Use program.
Illustratively, when receive be sent to the notification message of application program associated by hiding target object when, characterization inspection
It measures for the enabled instruction for hiding target object.It is understood that being closed if receiving and being sent to hiding target object
Then include on mobile terminal desktop by hiding target object when joining the notification message of application program.For example, hiding target object
For the icon of this application program of wechat, then when the message for receiving the transmission of other mobile terminals, and when authenticating successfully, by wechat
Icon be shown on the desktop of mobile terminal.It, can in time, fast in this way during ensureing effective protection privacy of user
Ground will be notified with the relevant content of the associated application program of hiding target object to user.
In some embodiments, it if identifying that the input password is stealth mode password, solves lock screen and is shown
Show, and controls the mobile terminal and be hidden target object is set, including:If identifying that the input password is hiding
Pattern password then solves lock screen and is shown, and monitors the hiding instruction input by user;According to pre-stored hiding finger
The correspondence with setting object is enabled, determines at least one setting target object corresponding with the hiding instruction;Described in control
The setting target object is hidden by mobile terminal.The advantages of this arrangement are as follows can effectively refine to setting target
The hiding Control granularity of object, preferably meets user demand.
In the embodiment of the present application, when the input password of user is stealth mode password, mobile terminal solution screen locking is controlled
Curtain carries out desktop dispaly state, and user's input is prompted to hide instruction.According to hiding instruction input by user, mobile terminal is controlled
In hide the corresponding setting target object of instruction with this and be hidden.For example, according to pre-stored hiding instruction and setting pair
The correspondence of elephant determines corresponding with hiding instruction at least one setting target object, and control the setting target object into
Row is hidden.It is understood that hiding instruction input by user is different, the hiding setting target object of mobile terminal control is not
Together.Wherein, the instruction type for hiding instruction may include phonetic order, literal order and gesture instruction, the embodiment of the present application pair
The instruction type for hiding instruction does not limit.
Illustratively, it is gesture instruction to hide instruction, the correspondence packet of pre-stored hiding instruction and setting object
It includes:The object that sets corresponding with " to hook " gesture as the icon a of application program A, it is corresponding with " circle " gesture set object as
The icon c of the icon b and application program C of application program B, the object that sets corresponding with " cross " gesture is the figure of application program D
Mark d.It can be understood that when it is " to hooking " gesture to hide instruction, namely detect touch of the user in mobile terminal
On screen when input " to hooking " gesture, the icon a of control application program A hides;When it is " circle " gesture to hide instruction, Ye Jijian
User is measured when inputting " circle " gesture on the touch screen of mobile terminal, the icon b and application program C of control application program B
Icon c hide;When it is " cross " gesture to hide instruction, namely detect that user inputs on the touch screen of mobile terminal
When " cross " gesture, the icon d of control application program D hides.Again illustrative, it is literal order, literal order to hide instruction
Packet name information including application program, then according to the packet name information of input, by the icon of application program corresponding with packet name information
Or content is hidden.For example, hiding instruction input by user is " Alipay ", then the icon of Alipay is hidden.
In some embodiments, after showing the hiding target object, further include:Obtain the hiding target object
Do not operate duration;When the hiding target object is not when operating duration more than predetermined threshold value, cancellation shows the hiding mesh
Mark object.It is understood that when detecting that, for the enabled instruction for hiding target object, and when authenticating successfully, display should
Target object is hidden, it in this way can be after the closing of hiding target object, if user thinks to be on hiding target pair again at once
When as associated application program, facilitate user that can simply and quickly find startup entrance.And if user to display after
When hiding target object is not carried out any operation for a long time, in order to protect privacy of user, this can be hidden to target object again
It is automatic to hide, namely when hiding when not operating duration more than predetermined threshold value of target object, cancel and show that this hides target object.
Illustratively, predetermined threshold value is 20 minutes, and user is to hiding a length of 30 minutes when not operating of target object, namely will be hidden
It hides user in 30 minutes after target object is shown and does not carry out any operation to hiding target object, then, it can cancel at this time
Show this hide target object, also will this hide target object hide again.
In some embodiments, it if identifying that the input password is normal mode password, solves lock screen and enters just
Normal display pattern, including:If identifying that the input password is normal mode password, camera is opened;It is taken the photograph based on described
As head obtains the target facial image of the user;If the target facial image is matched with default facial image, screen locking is solved
Curtain enters normal displaying mode.The advantages of this arrangement are as follows can further verify user's by the facial image of shooting
Identity information ensures that active user is mobile terminal affiliated user, or ensures that active user is to have operating rights to mobile terminal
The user of limit improves the protection to the privacy information in mobile terminal.
Wherein, camera may include 2D cameras (i.e. common camera) and 3D cameras.It is understood that passing through
The image that 2D cameras obtain is two-dimensional image.And 3D cameras are properly termed as 3D sensors.3D cameras with it is common
Camera difference lies in, 3D cameras can not only obtain flat image, can also obtain the depth information of reference object,
It is exactly the positions and dimensions information of three-dimensional.The embodiment of the present application does not limit the type of camera.
Illustratively, when mobile terminal by illegal molecule in use, illegal molecule be easy to by the illegal route obtain move
The normal mode password of dynamic terminal, invades the privacy of user described in mobile terminal.Therefore, in order to effectively avoid the hair of such case
It is raw, in the embodiment of the present application, when it is normal mode password to identify the input password of user, open taking the photograph in mobile terminal
As head, is shot based on camera, obtain the target facial image of active user.And the target facial image of acquisition is carried out
Identification, judges whether to be matched with default facial image, if successful match, shows that active user is mobile terminal affiliated use
Family, or show active user be to mobile terminal have operating right user, at this point, control mobile terminal solution lock screen into
Enter normal displaying mode.
In some embodiments, it if identifying that the input password is normal mode password, solves lock screen and enters just
Normal display pattern, including:If identifying that the input password is normal mode password, the current of the mobile terminal is obtained
Time and/or current location;When the current time is in preset time period and/or the current location is predeterminated position,
Solution lock screen enters normal displaying mode.
Illustratively, when the input password of user is normal mode password, the current time of mobile terminal is obtained, and sentence
Whether disconnected current time is in preset time period.For example, preset time period may include 0:00-6:00,12:00-13:00 and
18:00-22:00, if current time is 20:00, i.e. current time is in preset time period, then controls mobile terminal solution screen locking
Curtain enters normal displaying mode.It is understood that preset time period is user alone or there is no make when stranger
With the period of mobile terminal mobile terminal solution screen locking can be controlled at this point, when the input password of user is normal mode password
Curtain enters normal displaying mode, in case the relevant content of application program with more privacy is arrived by other people snooping, it can be preferably
Protect the privacy of user.
It is again illustrative, when the input password of user is normal mode password, the current location of mobile terminal is obtained, and
Judge whether current location is in predeterminated position.For example, predeterminated position may include family and company, if current location is user's
Family, i.e., user is around the household of user oneself currently just in own home, need not be related to the application program of more privacy
Content is hidden, then controls mobile terminal solution lock screen and enter normal displaying mode.It is understood that predeterminated position is to use
Family is alone or there is no the positions using mobile terminal when stranger, at this point, when the input password of user is normal mode
When formula password, mobile terminal solution lock screen can be controlled and enter normal displaying mode, in order to avoid the application program phase with more privacy
The content of pass is spied upon by other people and is arrived, and the privacy of user can be preferably protected.
It is illustrative again, when the input password of user is normal mode password, obtain mobile terminal current time and
Current location, and judge whether current time is in whether in preset time period and current location is in predeterminated position.When current
Between in the preset time period and current location is predeterminated position, at this point, when the input password of user is normal mode password,
Mobile terminal solution lock screen can be controlled and enter normal displaying mode, can be had by the verification of time and position double factor
The privacy of effect protection user.
Fig. 2 is the flow diagram of the control method of application program provided by the embodiments of the present application, and this method includes as follows
Step:
Step 201, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
It is still stealth mode password that step 202, identification input password, which are normal mode password, if input password is normal
Pattern password, thens follow the steps 207, if input password is stealth mode password, thens follow the steps 203, if input password is neither
It is stealth mode password, nor stealth mode password, thens follow the steps 208.
Step 203, solution lock screen are shown, and are controlled mobile terminal and be hidden target object is set.
Wherein, the icon or the content in application program that setting target object may include application program.
If step 204 detects that other applications call the call instruction for hiding application program associated by target object,
Authentication operations are then executed, and when authenticating successfully, shows and hide target object.
Step 205 obtains and hides target object and do not operate duration.
Step 206, when hide target object do not operate duration more than predetermined threshold value when, cancel display hide target pair
As.
Step 207, solution lock screen enter normal displaying mode.
Step 208 keeps mobile terminal to be in screen lock state.
The control method of the application program provided in the embodiment of the present application, if identifying that the input password is to hide mould
Formula password then solves lock screen and is shown, and controls the mobile terminal and be hidden target object is set, when detecting it
He hides the call instruction of application program associated by target object at application call, or receives and be sent to hiding target object
The notification message of associated application program, and when authenticating successfully, show the hiding target object, if to hiding target object
When not operating duration more than predetermined threshold value, cancels display and hide target object, it can also be simply and quickly to hiding application journey
The icon or content of sequence are shown, user-friendly, and are not being grasped for a long time to the hiding target object after display
When making, cancels the display to hiding target object, protect the privacy of user in time.
Fig. 3 is the flow diagram of the control method of application program provided by the embodiments of the present application, and this method includes as follows
Step:
Step 301, when detecting that the unlocking screen event of mobile terminal is triggered, obtain the input password of user.
It is still stealth mode password that step 302, identification input password, which are normal mode password, if input password is normal
Pattern password, thens follow the steps 309, if input password is stealth mode password, thens follow the steps 303, if input password is neither
It is stealth mode password, nor stealth mode password, thens follow the steps 312.
Step 303, solution lock screen are shown, and monitor hiding instruction input by user.
Step 304, according to it is pre-stored it is hiding instruction with setting object correspondence, determination it is corresponding with hiding instruction
At least one setting target object.
Wherein, the icon or the content in application program that setting target object may include application program.
Step 305, control mobile terminal are hidden target object is set.
If step 306, detecting for the enabled instruction for hiding target object, execute authentication operations, and authentication at
When work(, shows and hide target object.
Wherein, it detects for the enabled instruction for hiding target object, may include:Detect that other applications are called
Hide the call instruction of application program associated by target object;Or it receives and is sent to application program associated by hiding target object
Notification message.
Step 307 obtains and hides target object and do not operate duration.
Step 308, when hide target object do not operate duration more than predetermined threshold value when, cancel display hide target pair
As.
Step 309 opens camera, and the target facial image of user is obtained based on camera.
Step 310 judges whether target facial image matches with default facial image, if so, 311 are thened follow the steps, it is no
Then, step 312 is executed.
Step 311, solution lock screen enter normal displaying mode.
Step 312 keeps mobile terminal to be in screen lock state.
The control method of the application program provided in the embodiment of the present application, if identifying that the input password is normal mode
Formula password then opens camera and obtains the target facial image of user, and matched with default facial image in target facial image
When success, solution lock screen is shown, ensures that active user is mobile terminal affiliated user, is improved to the privacy in mobile terminal
The protection of information.If identifying that the input password is stealth mode password, according to hiding instruction input by user,
Control setting target object corresponding with hiding instruction is hidden, and has effectively refined the hiding control grain to setting target object
Degree, can preferably meet user demand.
Fig. 4 is a kind of structure diagram of the control device of application program provided by the embodiments of the present application, which can be by soft
Part and/or hardware realization, are typically integrated in mobile terminal, can be by the control method of executing application come to application program
It is controlled.As shown in figure 4, the device includes:
Password acquisition module 401 is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining and using
The input password at family;
If normal mode display module 402 solves screen locking for identifying that the input password is normal mode password
Curtain enters normal displaying mode;
Target object hidden module 403 is set, if for identifying that the input password is stealth mode password, is solved
Lock screen is shown, and is controlled the mobile terminal and be hidden target object is set;
Target object display module 404 is hidden, if being directed to the enabled instruction for hiding target object for detecting, is executed
Authentication operations, and when authenticating successfully, show the hiding target object.
The control device of the application program provided in the embodiment of the present application, in the unlocking screen event for detecting mobile terminal
When being triggered, the input password of user is obtained, if identifying that input password is normal mode password, lock screen is solved and enters just
Normal display pattern;If identifying that input password is stealth mode password, solves lock screen and shown, and control mobile terminal
Setting target object is hidden, and if detect for the enabled instruction for hiding target object, authentication operations are executed,
And when authenticating successfully, shows and hide target object.By using above-mentioned technical proposal, both it is possible to prevente effectively from other people snooping are arrived
Application program related content more concealed in customer mobile terminal, protects privacy of user, can also be simply and quickly to hiding
Application program icon or content shown, it is user-friendly, preferably meet user demand.
Optionally, the icon or the content in application program that the setting target object includes application program.
Optionally, it detects for the enabled instruction for hiding target object, including:
Detect that other applications call the call instruction for hiding application program associated by target object;Or
Receive the notification message for being sent to application program associated by hiding target object.
Optionally, target object hidden module is set, is used for:
If identifying that the input password is stealth mode password, solves lock screen and shown, and monitor the use
The hiding instruction of family input;
According to the correspondence of pre-stored hiding instruction and setting object, determination is corresponding extremely with the hiding instruction
Few setting target object;
The mobile terminal is controlled to be hidden the setting target object.
Optionally, after showing the hiding target object, further include:
Duration acquisition module is not operated, and duration is not operated for obtain the hiding target object;
Display suppression module, for when the hiding target object is not when operating duration more than predetermined threshold value, cancellation to be aobvious
Show the hiding target object.
Optionally, normal mode display module is used for:
If identifying that the input password is normal mode password, camera is opened;
The target facial image of the user is obtained based on the camera;
If the target facial image is matched with default facial image, solves lock screen and enter normal displaying mode.
Optionally, normal mode display module is used for:
If identify the input password be normal mode password, obtain the mobile terminal current time and/
Or current location;
When it is predeterminated position that the current time, which is in preset time period and/or the current location, solution lock screen into
Enter normal displaying mode.
The embodiment of the present application also provides a kind of storage medium including computer executable instructions, and the computer is executable
It instructs and includes for the control method of executing application, this method when being executed by computer processor:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting
Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown
The hiding target object.
Storage medium --- any various types of memory devices or storage device.Term " storage medium " is intended to wrap
It includes:Install medium, such as CD-ROM, floppy disk or magnetic tape equipment;Computer system memory or random access memory, such as
DRAM, DDRRAM, SRAM, EDORAM, blue Bath (Rambus) RAM etc.;Nonvolatile memory, such as flash memory, magnetic medium (example
Such as hard disk or optical storage);The memory component etc. of register or other similar types.Storage medium can further include other types
Memory or combinations thereof.In addition, storage medium can be located at program in the first computer system being wherein performed, or
It can be located in different second computer systems, second computer system is connected to the first meter by network (such as internet)
Calculation machine system.Second computer system can provide program instruction to the first computer for executing.Term " storage medium " can
To include two or more that may reside in different location (such as in different computer systems by network connection)
Storage medium.Storage medium can store the program instruction that can be executed by one or more processors and (such as be implemented as counting
Calculation machine program).
Certainly, a kind of storage medium including computer executable instructions that the embodiment of the present application is provided, computer
The control for the application program that executable instruction is not limited to the described above operates, and the application any embodiment can also be performed and provided
Application program control method in relevant operation.
The embodiment of the present application provides a kind of mobile terminal, and provided by the embodiments of the present application answer can be integrated in the mobile terminal
With the control device of program.Fig. 5 is a kind of structural schematic diagram of mobile terminal provided by the embodiments of the present application.Mobile terminal 500
May include:Memory 501, locating module 502, processor 503 and storage on a memory and can processor operation meter
Calculation machine program, the processor 503 realizes the application program as described in the embodiment of the present application when executing the computer program
Control method.
Mobile terminal provided by the embodiments of the present application, both it is possible to prevente effectively from other people spy upon into customer mobile terminal more
Concealed application program related content protects privacy of user, can also simply and quickly the icon to hiding application program or
Content is shown, user-friendly, preferably meets user demand.
Fig. 6 is the structural schematic diagram of another mobile terminal provided by the embodiments of the present application, which may include:
Shell (not shown), memory 601, central processing unit (central processing unit, CPU) 602 (are also known as located
Manage device, hereinafter referred to as CPU), circuit board (not shown) and power circuit (not shown).The circuit board is placed in institute
State the space interior that shell surrounds;The CPU602 and the memory 601 are arranged on the circuit board;The power supply electricity
Road, for being each circuit or the device power supply of the mobile terminal;The memory 601, for storing executable program generation
Code;The CPU602 is run and the executable journey by reading the executable program code stored in the memory 601
The corresponding computer program of sequence code, to realize following steps:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solves lock screen and shown, and control the shifting
Dynamic terminal is hidden target object is set;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, shown
The hiding target object.
The mobile terminal further includes:Peripheral Interface 603, RF (Radio Frequency, radio frequency) circuit 605, audio-frequency electric
Road 606, loud speaker 611, power management chip 608, input/output (I/O) subsystem 609, other input/control devicess 610,
Touch screen 612, other input/control devicess 610 and outside port 604, these components pass through one or more communication bus
Or signal wire 607 communicates.
It should be understood that diagram mobile terminal 600 is only an example of mobile terminal, and mobile terminal 600
Can have than shown in the drawings more or less component, can combine two or more components, or can be with
It is configured with different components.Various parts shown in the drawings can be including one or more signal processings and/or special
It is realized in the combination of hardware, software or hardware and software including integrated circuit.
Just the mobile terminal provided in this embodiment for application program controlling is described in detail below, and the movement is whole
End is by taking mobile phone as an example.
Memory 601, the memory 601 can be by access such as CPU602, Peripheral Interfaces 603, and the memory 601 can
Can also include nonvolatile memory to include high-speed random access memory, such as one or more disk memory,
Flush memory device or other volatile solid-state parts.
The peripheral hardware that outputs and inputs of equipment can be connected to CPU602 and deposited by Peripheral Interface 603, the Peripheral Interface 603
Reservoir 601.
I/O subsystems 609, the I/O subsystems 609 can be by the input/output peripherals in equipment, such as touch screen 612
With other input/control devicess 610, it is connected to Peripheral Interface 603.I/O subsystems 609 may include 6091 He of display controller
One or more input controllers 6092 for controlling other input/control devicess 610.Wherein, one or more input controls
Device 6092 processed receives electric signal from other input/control devicess 610 or sends electric signal to other input/control devicess 610,
Other input/control devicess 610 may include physical button (pressing button, rocker buttons etc.), dial, slide switch, behaviour
Vertical pole clicks idler wheel.It is worth noting that input controller 6092 can with it is following any one connect:Keyboard, infrared port,
The indicating equipment of USB interface and such as mouse.
Touch screen 612, the touch screen 612 are the input interface and output interface between customer mobile terminal and user,
Visual output is shown to user, visual output may include figure, text, icon, video etc..
Display controller 6091 in I/O subsystems 609 receives electric signal from touch screen 612 or is sent out to touch screen 612
Electric signals.Touch screen 612 detects the contact on touch screen, and the contact detected is converted to and is shown by display controller 6091
The interaction of user interface object on touch screen 612, that is, realize human-computer interaction, the user interface being shown on touch screen 612
Object can be the icon of running game, be networked to the icon etc. of corresponding network.It is worth noting that equipment can also include light
Mouse, light mouse are the extensions for the touch sensitive surface for not showing the touch sensitive surface visually exported, or formed by touch screen.
RF circuits 605 are mainly used for establishing the communication of mobile phone and wireless network (i.e. network side), realize mobile phone and wireless network
The data receiver of network and transmission.Such as transmitting-receiving short message, Email etc..Specifically, RF circuits 605 receive and send RF letters
Number, RF signals are also referred to as electromagnetic signal, and RF circuits 605 convert electrical signals to electromagnetic signal or electromagnetic signal is converted to telecommunications
Number, and communicated with mobile communications network and other equipment by the electromagnetic signal.RF circuits 605 may include being used for
Execute the known circuit of these functions comprising but it is not limited to antenna system, RF transceivers, one or more amplifiers, tuning
Device, one or more oscillators, digital signal processor, CODEC (COder-DECoder, coder) chipset, Yong Hubiao
Know module (Subscriber Identity Module, SIM) etc..
Voicefrequency circuit 606 is mainly used for receiving audio data from Peripheral Interface 603, which is converted to telecommunications
Number, and the electric signal is sent to loud speaker 611.
Loud speaker 611, the voice signal for receiving mobile phone from wireless network by RF circuits 605, is reduced to sound
And play the sound to user.
Power management chip 608, the hardware for being connected by CPU602, I/O subsystem and Peripheral Interface are powered
And power management.
Control device, storage medium and the mobile terminal of the application program provided in above-described embodiment can perform the application and appoint
The control method for the application program that meaning embodiment is provided has and executes the corresponding function module of this method and advantageous effect.Not
The technical detail of detailed description in the above-described embodiments, reference can be made to the control for the application program that the application any embodiment is provided
Method.
Note that above are only preferred embodiment and the institute's application technology principle of the application.It will be appreciated by those skilled in the art that
The application is not limited to specific embodiment described here, can carry out for a person skilled in the art it is various it is apparent variation,
The protection domain readjusted and substituted without departing from the application.Therefore, although being carried out to the application by above example
It is described in further detail, but the application is not limited only to above example, in the case where not departing from the application design, also
May include other more equivalent embodiments, and scope of the present application is determined by scope of the appended claims.
Claims (10)
1. a kind of control method of application program, which is characterized in that including:
When detecting that the unlocking screen event of mobile terminal is triggered, the input password of user is obtained;
If identifying that the input password is normal mode password, solves lock screen and enter normal displaying mode;
If identifying that the input password is stealth mode password, solve lock screen and shown, and controls described mobile whole
Setting target object is hidden by end;
If detecting for the enabled instruction for hiding target object, authentication operations are executed, and when authenticating successfully, described in display
Hide target object.
2. according to the method described in claim 1, it is characterized in that, it is described setting target object include application program icon,
Or the content in application program.
3. method according to claim 1 or 2, which is characterized in that it detects for the enabled instruction for hiding target object,
Including:
Detect that other applications call the call instruction for hiding application program associated by target object;Or
Receive the notification message for being sent to application program associated by hiding target object.
4. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that stealth mode is close
Code, then solve lock screen and shown, and controls the mobile terminal and be hidden target object is set, including:
If identifying that the input password is stealth mode password, solves lock screen and shown, and it is defeated to monitor the user
The hiding instruction entered;
According to the correspondence of pre-stored hiding instruction and setting object, determine and the hiding instruction corresponding at least one
A setting target object;
The mobile terminal is controlled to be hidden the setting target object.
5. according to the method described in claim 1, it is characterized in that, after showing the hiding target object, further include:
Obtain the hiding target object does not operate duration;
When the hiding target object is not when operating duration more than predetermined threshold value, cancellation shows the hiding target object.
6. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that normal mode is close
Code, then solve lock screen and enter normal displaying mode, including:
If identifying that the input password is normal mode password, camera is opened;
The target facial image of the user is obtained based on the camera;
If the target facial image is matched with default facial image, solves lock screen and enter normal displaying mode.
7. according to the method described in claim 1, it is characterized in that, if identifying that the input password is that normal mode is close
Code, then solve lock screen and enter normal displaying mode, including:
If identifying that the input password is normal mode password, obtains the current time of the mobile terminal and/or work as
Front position;
When the current time is in preset time period and/or the current location is predeterminated position, solution lock screen enters just
Normal display pattern.
8. a kind of control device of application program, which is characterized in that including:
Password acquisition module is inputted, for when detecting that the unlocking screen event of mobile terminal is triggered, obtaining the defeated of user
Enter password;
If normal mode display module solves lock screen entrance for identifying that the input password is normal mode password
Normal displaying mode;
Target object hidden module is set, if for identifying that the input password is stealth mode password, solves lock screen
It is shown, and controls the mobile terminal and be hidden target object is set;
Target object display module is hidden, if being directed to the enabled instruction for hiding target object for detecting, executes authentication behaviour
Make, and when authenticating successfully, shows the hiding target object.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The control method of the application program as described in any in claim 1-7 is realized when row.
10. a kind of mobile terminal, which is characterized in that including memory, processor and storage are on a memory and can be in processor
The computer program of operation realizes answering as described in claim 1-7 is any when the processor executes the computer program
With the control method of program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354166.1A CN108563933A (en) | 2018-04-19 | 2018-04-19 | Control method, device, storage medium and the mobile terminal of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810354166.1A CN108563933A (en) | 2018-04-19 | 2018-04-19 | Control method, device, storage medium and the mobile terminal of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108563933A true CN108563933A (en) | 2018-09-21 |
Family
ID=63535960
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810354166.1A Pending CN108563933A (en) | 2018-04-19 | 2018-04-19 | Control method, device, storage medium and the mobile terminal of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108563933A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110263589A (en) * | 2019-05-31 | 2019-09-20 | 重庆爱奇艺智能科技有限公司 | A kind of method and apparatus for realizing private space |
CN110851031A (en) * | 2019-10-22 | 2020-02-28 | 维沃移动通信有限公司 | Display control method and electronic equipment |
CN111125800A (en) * | 2019-12-31 | 2020-05-08 | 维沃移动通信有限公司 | Icon display method and electronic equipment |
CN111475067A (en) * | 2020-03-30 | 2020-07-31 | 维沃移动通信有限公司 | Message indication method and electronic equipment |
CN111782494A (en) * | 2020-06-24 | 2020-10-16 | 上海闻泰信息技术有限公司 | Application software control method and device, computer equipment and storage medium |
CN111866272A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Control method and device of electronic equipment |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
CN112364322A (en) * | 2020-11-09 | 2021-02-12 | 深圳供电局有限公司 | Safety verification system and method for instant communication tool |
CN112446034A (en) * | 2019-09-04 | 2021-03-05 | 中兴通讯股份有限公司 | Data hiding management method and device, terminal and computer readable medium |
CN113378216A (en) * | 2021-05-29 | 2021-09-10 | 深圳市得一微电子有限责任公司 | eMMC control method, system and storage medium thereof |
CN113835809A (en) * | 2021-09-24 | 2021-12-24 | 深圳集智数字科技有限公司 | Hiding processing method and device |
EP3961440A4 (en) * | 2019-05-24 | 2022-06-15 | Huawei Technologies Co., Ltd. | Login method for intelligent terminal, and electronic device |
WO2023240436A1 (en) * | 2022-06-14 | 2023-12-21 | Citrix Systems, Inc. | Device access control |
CN117478665A (en) * | 2023-12-27 | 2024-01-30 | 珠海格力电器股份有限公司 | Terminal remote management method and device, electronic equipment and readable storage medium |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003006160A (en) * | 2001-06-19 | 2003-01-10 | Ntt Docomo Inc | Method of presenting information, communication system, portable communication terminal and server |
CN1553316A (en) * | 2003-03-12 | 2004-12-08 | 中兴通讯股份有限公司 | Universal locking system of windows applied programm interface and method thereof |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN104077510A (en) * | 2013-09-25 | 2014-10-01 | 苏州天鸣信息科技有限公司 | Unlocking device and method thereof |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104951682A (en) * | 2015-06-05 | 2015-09-30 | 小米科技有限责任公司 | Privacy protection method and device |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
CN105391859A (en) * | 2015-11-09 | 2016-03-09 | 小米科技有限责任公司 | Switching method and apparatus of scene modes |
CN105844124A (en) * | 2015-06-30 | 2016-08-10 | 维沃移动通信有限公司 | Processing method and device for password data |
CN105933327A (en) * | 2016-06-08 | 2016-09-07 | 北京奇虎科技有限公司 | Application unlocking method, device and facility |
CN106446695A (en) * | 2015-08-04 | 2017-02-22 | 中兴通讯股份有限公司 | Application management method and device |
CN106485121A (en) * | 2016-09-29 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application management |
CN106611111A (en) * | 2016-12-12 | 2017-05-03 | 珠海市魅族科技有限公司 | Use control method and apparatus for terminal equipment |
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN106778138A (en) * | 2016-12-27 | 2017-05-31 | 东华互联宜家数据服务有限公司 | The control method and device of software license limit |
CN106778124A (en) * | 2016-11-25 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | The application method and device of a kind of hiden application |
CN106990903A (en) * | 2017-03-21 | 2017-07-28 | 北京小米移动软件有限公司 | Display and the method and device of hide application program |
CN107087068A (en) * | 2017-04-18 | 2017-08-22 | 广东小天才科技有限公司 | Mobile terminal operation mode switching method and device |
CN107609368A (en) * | 2017-08-09 | 2018-01-19 | 百度在线网络技术(北京)有限公司 | Safety protecting method, device, equipment and the computer-readable storage medium of application program |
CN107798254A (en) * | 2017-11-30 | 2018-03-13 | 努比亚技术有限公司 | A kind of method for secret protection, mobile terminal and computer-readable recording medium |
CN107818247A (en) * | 2017-11-24 | 2018-03-20 | 维沃移动通信有限公司 | A kind of mobile terminal unlocking method and mobile terminal |
-
2018
- 2018-04-19 CN CN201810354166.1A patent/CN108563933A/en active Pending
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003006160A (en) * | 2001-06-19 | 2003-01-10 | Ntt Docomo Inc | Method of presenting information, communication system, portable communication terminal and server |
CN1553316A (en) * | 2003-03-12 | 2004-12-08 | 中兴通讯股份有限公司 | Universal locking system of windows applied programm interface and method thereof |
CN102880837A (en) * | 2012-08-24 | 2013-01-16 | 腾讯科技(深圳)有限公司 | Method for improving security of mobile terminal and mobile terminal |
CN104077510A (en) * | 2013-09-25 | 2014-10-01 | 苏州天鸣信息科技有限公司 | Unlocking device and method thereof |
CN104751068A (en) * | 2013-12-26 | 2015-07-01 | 珠海金山办公软件有限公司 | File protection method and device |
CN104951682A (en) * | 2015-06-05 | 2015-09-30 | 小米科技有限责任公司 | Privacy protection method and device |
CN105844124A (en) * | 2015-06-30 | 2016-08-10 | 维沃移动通信有限公司 | Processing method and device for password data |
CN105025165A (en) * | 2015-07-06 | 2015-11-04 | 北京乐动卓越科技有限公司 | Interface unlocking method and system corresponding to multiple passwords |
CN106446695A (en) * | 2015-08-04 | 2017-02-22 | 中兴通讯股份有限公司 | Application management method and device |
CN105391859A (en) * | 2015-11-09 | 2016-03-09 | 小米科技有限责任公司 | Switching method and apparatus of scene modes |
CN105933327A (en) * | 2016-06-08 | 2016-09-07 | 北京奇虎科技有限公司 | Application unlocking method, device and facility |
CN106716429A (en) * | 2016-08-31 | 2017-05-24 | 深圳前海达闼云端智能科技有限公司 | Monitoring method and device, and electronic equipment |
CN106485121A (en) * | 2016-09-29 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application management |
CN106778124A (en) * | 2016-11-25 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | The application method and device of a kind of hiden application |
CN106611111A (en) * | 2016-12-12 | 2017-05-03 | 珠海市魅族科技有限公司 | Use control method and apparatus for terminal equipment |
CN106778138A (en) * | 2016-12-27 | 2017-05-31 | 东华互联宜家数据服务有限公司 | The control method and device of software license limit |
CN106990903A (en) * | 2017-03-21 | 2017-07-28 | 北京小米移动软件有限公司 | Display and the method and device of hide application program |
CN107087068A (en) * | 2017-04-18 | 2017-08-22 | 广东小天才科技有限公司 | Mobile terminal operation mode switching method and device |
CN107609368A (en) * | 2017-08-09 | 2018-01-19 | 百度在线网络技术(北京)有限公司 | Safety protecting method, device, equipment and the computer-readable storage medium of application program |
CN107818247A (en) * | 2017-11-24 | 2018-03-20 | 维沃移动通信有限公司 | A kind of mobile terminal unlocking method and mobile terminal |
CN107798254A (en) * | 2017-11-30 | 2018-03-13 | 努比亚技术有限公司 | A kind of method for secret protection, mobile terminal and computer-readable recording medium |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3961440A4 (en) * | 2019-05-24 | 2022-06-15 | Huawei Technologies Co., Ltd. | Login method for intelligent terminal, and electronic device |
CN110263589A (en) * | 2019-05-31 | 2019-09-20 | 重庆爱奇艺智能科技有限公司 | A kind of method and apparatus for realizing private space |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
CN112446034A (en) * | 2019-09-04 | 2021-03-05 | 中兴通讯股份有限公司 | Data hiding management method and device, terminal and computer readable medium |
CN110851031A (en) * | 2019-10-22 | 2020-02-28 | 维沃移动通信有限公司 | Display control method and electronic equipment |
CN111125800A (en) * | 2019-12-31 | 2020-05-08 | 维沃移动通信有限公司 | Icon display method and electronic equipment |
CN111475067A (en) * | 2020-03-30 | 2020-07-31 | 维沃移动通信有限公司 | Message indication method and electronic equipment |
CN111782494A (en) * | 2020-06-24 | 2020-10-16 | 上海闻泰信息技术有限公司 | Application software control method and device, computer equipment and storage medium |
CN111866272A (en) * | 2020-06-30 | 2020-10-30 | 维沃移动通信有限公司 | Control method and device of electronic equipment |
CN112364322A (en) * | 2020-11-09 | 2021-02-12 | 深圳供电局有限公司 | Safety verification system and method for instant communication tool |
CN112364322B (en) * | 2020-11-09 | 2023-10-31 | 深圳供电局有限公司 | Safety verification system and method for instant messaging tool |
CN113378216A (en) * | 2021-05-29 | 2021-09-10 | 深圳市得一微电子有限责任公司 | eMMC control method, system and storage medium thereof |
CN113835809A (en) * | 2021-09-24 | 2021-12-24 | 深圳集智数字科技有限公司 | Hiding processing method and device |
CN113835809B (en) * | 2021-09-24 | 2024-05-17 | 深圳须弥云图空间科技有限公司 | Hiding method and device |
WO2023240436A1 (en) * | 2022-06-14 | 2023-12-21 | Citrix Systems, Inc. | Device access control |
CN117478665A (en) * | 2023-12-27 | 2024-01-30 | 珠海格力电器股份有限公司 | Terminal remote management method and device, electronic equipment and readable storage medium |
CN117478665B (en) * | 2023-12-27 | 2024-06-14 | 珠海格力电器股份有限公司 | Terminal remote management method and device, electronic equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108563933A (en) | Control method, device, storage medium and the mobile terminal of application program | |
EP3232299B1 (en) | Physical key component, terminal, and touch response method and device | |
US20170372298A1 (en) | Method and apparatus for activating virtual card | |
US20170053149A1 (en) | Method and apparatus for fingerprint identification | |
CN107862194B (en) | A kind of method, device and mobile terminal of safety verification | |
CN105574378A (en) | Terminal control method and terminal control device | |
KR20140051470A (en) | Mobile terminal and operating method for the same | |
KR20150080736A (en) | Method for executing a function and Electronic device using the same | |
CN108076426A (en) | Terminal tracing method, apparatus, storage medium and terminal device | |
CN107643871A (en) | Control method for screen display, device, storage medium and mobile terminal | |
CN105930707A (en) | Method and device for switching systems | |
CN109002340A (en) | A kind of screen locking method and electronic equipment | |
CN106681717B (en) | Terminal application program management method and device and electronic equipment | |
WO2020001385A1 (en) | Electronic apparatus and application program control method | |
US20150294108A1 (en) | Method and apparatus for managing authentication | |
CN103442141A (en) | Method for having access to safe mode in one-touch mode | |
CN106355141A (en) | Portable electronic device and operation method thereof | |
CN108268763A (en) | terminal control method, device, storage medium and terminal | |
EP3403210B1 (en) | User interface for a mobile device | |
EP2927834A1 (en) | Information processing apparatus, information processing method, and recording medium | |
CN106372479A (en) | Mobile terminal and method of controlling the same | |
CN108551521A (en) | A kind of log-on message reminding method and mobile terminal | |
US20170205983A1 (en) | User interface for a mobile device | |
CN107045604A (en) | Information processing method and device | |
CN106126082A (en) | Control the method for terminal, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180921 |
|
RJ01 | Rejection of invention patent application after publication |