CN104732157B - A kind of application hides, deployment method and device - Google Patents

A kind of application hides, deployment method and device Download PDF

Info

Publication number
CN104732157B
CN104732157B CN201510148437.4A CN201510148437A CN104732157B CN 104732157 B CN104732157 B CN 104732157B CN 201510148437 A CN201510148437 A CN 201510148437A CN 104732157 B CN104732157 B CN 104732157B
Authority
CN
China
Prior art keywords
type
information
application
application icon
active user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510148437.4A
Other languages
Chinese (zh)
Other versions
CN104732157A (en
Inventor
刘岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Technology Shenzhen Co Ltd
Original Assignee
Coolpad Software Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Technology Shenzhen Co Ltd filed Critical Coolpad Software Technology Shenzhen Co Ltd
Priority to CN201510148437.4A priority Critical patent/CN104732157B/en
Priority to PCT/CN2015/077991 priority patent/WO2016155072A1/en
Publication of CN104732157A publication Critical patent/CN104732157A/en
Application granted granted Critical
Publication of CN104732157B publication Critical patent/CN104732157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

This application discloses a kind of the hiding of application, deployment method and device, one of which methods to include:Active user is obtained to instruct the object run of first kind application icon;According to preset instruction type, the type of the object run instruction is analyzed;In the case where the type of object run instruction is the second class instruction type, according to the correspondence for pre-establishing application icon and Second Type application, one or more Second Type applications corresponding with the first kind application icon are determined;In the Second Type pre-established using in the correspondence with operational order, in the application of one or more of Second Types, Second Type application corresponding with object run instruction is opened.The application user can need hiding application on concealed terminal, and not influence the normal use of the application, so the safety of terminal in use can be improved, and promote the use feeling of user.

Description

A kind of application hides, deployment method and device
Technical field
This application involves field of communication technology more particularly to a kind of applications to hide, deployment method and device.
Background technology
Along with the rapid development of electronic technology, the development speed of terminal is getting faster.Currently, can be installed in terminal more Kind application, people can open application execution respective operations.Such as:It records in the notepad appli-cation of terminal and plans recently, Receipts and expenditures matters are recorded in this application of keeping accounts, and are contacted, etc. or, carrying out with friend linking up in social networking application.In terminal Research process in, inventor find:Stronger and stronger with the function of terminal, user gradually has on concealed terminal display interface The demand of application icon.
Such as:For Alipay application in terminal display interface, there is user's private information involved in Alipay application, so User wishes can to hide the icon of Alipay application, and Alipay application is opened to prevent other people.For another example:For terminal display interface On calendar application, since the frequency of use of calendar application is less, user wish hide calendar application icon, to show Interface provides position for other application icon.
Currently, there is no application drawing calibration methods on concealed terminal in the prior art, so needing a kind of technology hand now Section carrys out the application on concealed terminal, but does not influence the normal use of application, to improve the safety of terminal in use, And promote the use feeling of user.
Invention content
Technical solution provided by the invention needs hiding application according to user on user demand concealed terminal, and hiding needs It wants not influence the normal use hidden be hidden application while hiden application, improves terminal using in the process Safety
Technological means provided by the present application is as follows:
A kind of deployment method of application, including:
Active user is obtained to instruct the object run of first kind application icon;
According to preset instruction type, the type of the object run instruction is analyzed;
In the case where the type of object run instruction is the second class instruction type, according to pre-establishing application icon With the correspondence of Second Type application, determine that one or more Second Types corresponding with the first kind application icon are answered With;Wherein, what one or more of Second Types were applied applies entrance, is hidden under the first kind application icon, And the application icon of one or more of Second Type applications is in hidden state;
In the correspondence that the Second Type pre-established applies with operational order, in one or more of second classes In type application, Second Type application corresponding with object run instruction is opened.
Preferably, described in the correspondence that the Second Type pre-established applies with operational order, one Or in multiple Second Type applications, Second Type application corresponding with object run instruction is opened, including:
In the Second Type using in the correspondence with operational order, determine that one or more of Second Types are answered With the corresponding all operational orders of intended application set;
In all operational orders, judges whether there is and instruct consistent operational order with the object run;
If so, opening one or more Second Type applications corresponding with the operational order;
If nothing exits the program.
Preferably, the object run, which instructs, includes:
The intended application icon first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user; Or
The intended application icon first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user; Or
The intended application icon first kind application icon is clicked, meanwhile, press key in volume;Or
The intended application icon first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the intended application icon first kind application icon.
Preferably, in the case where object run instruction includes characteristics of human body's information of active user, then in institute It states in all operational orders, judges whether there is and instruct consistent operational order with the object run, including:
In the default characteristics of human body's information for including in all operational orders, the characteristics of human body of active user is judged whether there is The consistent default characteristic information of information.
Preferably, default characteristics of human body's information includes the preset fingerprint information and/or pre-set image letter Breath and/or the preset sound information;In the default characteristics of human body's information for including in all operational orders then, judge whether The default characteristic information for having characteristics of human body's information of active user consistent, including:
After the finger print information for acquiring the active user using finger print acquisition module, the fingerprint of the active user is judged Whether information is consistent with preset fingerprint information;And/or
After the image information for acquiring the active user using image capture module, the image of the active user is judged Whether information is consistent with pre-set image information;And/or
After the acoustic information for acquiring the active user using sound acquisition module, the sound of the active user is judged Whether information is consistent with preset sound information.
A kind of hidden method of application, including:
Determine first kind application icon and it is to be concealed under the first kind application icon one or more the Two type applications;
Corresponding operational order is arranged to the application of each Second Type, and the Second Type is applied into corresponding behaviour Make instruction to be bound;
The first kind application icon and the application of one or more of Second Types are bound;
Delete the application icon of one or more of Second Type applications.
A kind of device for opening of application, including:
Acquiring unit obtains active user for obtaining active user to the object run instruction of first kind application icon Object run instruction to intended application icon first kind application icon in first kind set of applications;Wherein, described first Type application set includes one or more first kind applications, each corresponding application icon of first kind application;
Analytic unit, for according to preset instruction type, analyzing the type of the object run instruction;
First determination unit is used in the case where the type that the object run instructs is the second class instruction type, root According to the correspondence for pre-establishing application icon and Second Type application, determine and the first kind application icon corresponding one A or multiple Second Type applications;Wherein, entrance is applied in one or more of Second Types application, is hidden in described the Under one type application icon, and, the application icon of one or more of Second Type applications is in hidden state;
Opening unit, used in the Second Type pre-established using correspondence with operational order, described one In a or multiple Second Type applications, Second Type application corresponding with object run instruction is opened.
Preferably, the opening unit includes:
Second determination unit, for, using in the correspondence with operational order, determining described one in the Second Type A or multiple Second Types apply corresponding all operational orders;
Judging unit instructs unanimously in all operational orders, judging whether there is with the object run Operational order;
Second opening unit instructs consistent operational order for having in all operational orders with the object run In the case of, open one or more Second Type applications corresponding with the operational order;
Unit is exited, for the case where nothing instructs consistent operational order with the object run in all operational orders Under, it exits the program.
Preferably, the object run, which instructs, includes:
The intended application icon first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user; Or
The intended application icon first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user; Or
The intended application icon first kind application icon is clicked, meanwhile, press key in volume;Or
The intended application icon first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the intended application icon first kind application icon.
Preferably, in the case where object run instruction includes characteristics of human body's information of active user, then judge Unit, specifically for include in all operational orders default characteristics of human body's information in, judge whether there is the people of active user The consistent default characteristic information of body characteristics information.
Preferably, default characteristics of human body's information includes the preset fingerprint information and/or pre-set image letter Breath and/or the preset sound information;The then judging unit, including:
First judging unit, for after the finger print information for acquiring the active user using finger print acquisition module, judging Whether the finger print information of the active user is consistent with preset fingerprint information;And/or
Second judgment unit, for after the image information for acquiring the active user using image capture module, judging Whether the image information of the active user is consistent with pre-set image information;And/or
Third judging unit, for after the acoustic information for acquiring the active user using sound acquisition module, judging Whether the acoustic information of the active user is consistent with preset sound information.
A kind of concealing device of application, including:
Third determination unit, for determining first kind application icon and to be concealed in the first kind application drawing One or more Second Type applications under mark;
Binding unit for corresponding operational order to be arranged to the application of each Second Type, and the Second Type is answered It is bound with corresponding operational order;The first kind application icon is answered with one or more of Second Types With binding;
Deleting unit, the application icon for deleting one or more of Second Type applications.
Compared with prior art, the application has the following advantages:
The application is directed to method part, provides two independent claims:The hidden method of application icon, and, application drawing Target deployment method.Two independent claims include corresponding technical characteristic:There are one being hidden under first kind application icon Or multiple Second Type application icons.So having unicity between two independent claims.
In the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application drawing Under mark.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, just opening the Two type applications.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence The normal use of the application so the safety of terminal in use can be improved, and promotes the use feeling of user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of application hidden method flow diagram disclosed in the embodiment of the present application;
Fig. 2 is a kind of flow diagram using deployment method disclosed in the embodiment of the present application;
Fig. 3 is a kind of flow diagram using deployment method disclosed in the embodiment of the present application;
Fig. 4 is a kind of flow diagram using deployment method scene embodiment disclosed in the embodiment of the present application;
Fig. 5 is hidden with icon before icon hiding in a kind of application deployment method scene embodiment disclosed in the embodiment of the present application Schematic diagram behind Tibetan;
Fig. 6 is a kind of structural schematic diagram using device for opening disclosed in the embodiment of the present application;
Fig. 7 is a kind of schematic diagram using opening unit in device for opening disclosed in the embodiment of the present application;
Fig. 8 is a kind of schematic diagram using judging unit in device for opening disclosed in the embodiment of the present application;
Fig. 9 is a kind of application concealing device flow diagram disclosed in the embodiment of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation describes, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
In order to facilitate subsequent descriptions, the icon that user need not temporarily hide is set as first kind application drawing by the application Mark, application corresponding with first kind application icon are known as first kind application.User is intended to hiding icon at present and is set as Two type application icons, application corresponding with Second Type application icon are known as Second Type application.
Currently, being equipped with numerous applications in terminal, application can be:QQ, wechat, microblogging, calendar, etc. application programs.It answers It is shown in a manner of application icon used in display interface.After user clicks application icon, the application of terminal recognition user click Icon, and enter in application corresponding with the application icon.So the application icon of terminal display interface, can be used as to enter and answer Entrance.
The application introduces the hiding process of application icon first, i.e.,:The application that one or more Second Types are applied is entered Mouthful, the process being hidden under first kind application icon.As shown in Figure 1, specifically hiding process includes step S101~S104:
Step S101:Determine first kind application icon and it is to be concealed under the first kind application icon one A or multiple Second Type applications.
First, in terminal display interface include multiple application icons, user is in the icon that need not temporarily hide, selection One icon is as first kind application icon.One or more applications to be concealed can be hidden under first kind application icon Using entrance.
Then, the one or more Second Types received under the first kind application icon to be hidden in of user's selection are answered With.
Step S102:Corresponding operational order is arranged to the application of each Second Type, and by the Second Type apply with Its corresponding operational order is bound.
If after Second Type application is hidden under first kind application icon, it may appear that such situation:The first kind Application icon is applied as the first kind simultaneously and what Second Type was applied applies entrance.In such cases, if in user couple After first kind application icon executes operational order, just there is terminal and do not know enter first kind application, or enter The problem of Second Type is applied.
It is uncertain into the problem of that application to occur terminal in order to prevent, the operational order of first kind application will be entered It is set as first kind instruction type, it is the second class instruction type that will enter Second Type application settings.When user is to the first kind The type of the operational order of application icon is first kind instruction type, then enters the first kind corresponding with first kind application icon Type application;When user is the second class instruction type to the type of the operational order of first kind application icon, then enter the second class Type application.
When have multiple Second Types to be concealed under first kind icon in application, in order to determine enter that Second Type Using after determining the second class instruction type, for each Second Type application settings one to be concealed under the first application icon A operational order, and Second Type is bound using corresponding operational order, referred to operation with building Second Type and applying The correspondence of order.
When user wants to open a Second Type being hidden under first kind application icon in application, only needing to first The execution of type application icon applies corresponding operational order with the Second Type.It is understood that each second class The operational order of the corresponding operational order of type application, multiple Second Type applications both may be the same or different.
Step S103:The first kind application icon and the application of one or more of Second Types are bound.
First kind application icon (hiden application icon) and one or more Second Type applications are determined in step S101 After (application to be concealed), you can by first kind application icon, with all Second Types to be concealed under first kind icon The application entrance of application is bound;To build the correspondence of first kind application icon and Second Type application.So as to follow-up In the process, the function that operation first kind application icon enters Second Type application may be implemented.
Step S104:Delete the application icon of one or more of Second Type applications.
After by first kind application icon and Second Type application binding, terminal can be from first kind application drawing Mark enters Second Type application.Then by the one or more second with the binding of first kind application icon in terminal display interface The application icon of type application is deleted, to realize the purpose for the icon for hiding Second Type application in terminal display interface.
After executing the step S101~step S104, first kind application icon and Second Type application are just constructed Correspondence, and, structure Second Type is using correspondence with operational order.It is deleting and first kind application icon After the application icon of one or more Second Types application of binding, nothing is tied up with first kind application icon in terminal display interface The application icon of fixed one or more Second Type application, completes one or more Second Type application first kind applications The process being hidden under first kind application icon.
For other first kind application icons, and, other Second Type applications to be concealed, mistake that can be as shown in Figure 1 Cheng Jianli hides relationship, by other Second Type applications to be concealed, is hidden under other first kind application icons, specifically holds Row process no longer repeats one by one.
After first carrying out above-mentioned hiding process in advance, the specific implementation procedure that the application opens application is described below.The application A kind of deployment method of application is provided, the controller of terminal is applied to, as shown in Fig. 2, including step S201~S204:
Step S201:Active user is obtained to instruct the object run of first kind application icon.
Terminal receives the application icon that need not be hidden at present that active user selects on display interface, and should Application icon is as first kind application icon.Then user is obtained to first kind application icon performance objective operational order.
Step S202:According to preset instruction type, the type of the object run instruction is analyzed.
Preset instruction type includes:First kind instruction type and the second class instruction type.Wherein, the first instruction Type is:The instruction type applied into the first kind;Second class instruction type is:Into being hidden in first kind application icon Under Second Type application instruction type.
Preset first kind instruction type specifically has:Click the first kind application icon.
Preset second class instruction type specifically has:(1) first kind application icon is clicked, meanwhile, acquisition Characteristics of human body's information of active user;(2) first kind application icon is double-clicked, meanwhile, the human body for acquiring active user is special Reference ceases;(3) first kind application icon is clicked, meanwhile, press key in volume;(4) first kind application is clicked Icon, meanwhile, press volume lower key;(5) first kind application icon is clicked three times.
It is understood that preset first kind instruction type and preset second class instruction type can be with Including other instruction types, will not enumerate herein.
In this step, terminal combines the type of preset instruction type analysis object run instruction, determines target The type of operational order is first kind instruction type, or, the second class instruction type.After the type of analysis object run instruction, There will be two kinds of situations, and both of these case is described in detail below:
The first situation:Object run instruction is first kind instruction type;
For the first situation, due to being concealed with the application entrance of Second Type application, institute under first kind application icon With the first kind application icon entrance is applied using what entrance and Second Type were applied for first kind application simultaneously.User is defeated The operational order entered is first kind instruction type, so being answered at this time into the first kind corresponding with first kind application icon With.
The second situation:Object run instruction is the second class instruction type;
For the second situation, first kind application icon applies entrance and Second Type for first kind application simultaneously Entrance is applied in application.And operational order type input by user is the second class instruction type, so meeting certain condition Afterwards, can enter in the Second Type application being hidden under first kind application icon.
The first above-mentioned situation is relatively simple, and the execution of the second situation is complex.Therefore subsequent step will be to second Kind situation is described in detail.
Step S203:In the case where the type of object run instruction is the second class instruction type, according to building in advance The correspondence of vertical application icon and Second Type application, determines one or more corresponding with the first kind application icon Second Type application;Wherein, what one or more of Second Types were applied applies entrance, is hidden in the first kind and answers With under icon, and, the application icon of one or more of Second Types applications is in hidden state.
Under the second situation of step S202, the first kind application icon based on Fig. 1 structures and Second Type application Corresponding hiding relationship, after the first kind application icon for obtaining user's operation, you can lookup is hidden in first kind application One or more Second Type applications under icon.
Step S204:In the Second Type pre-established is using correspondence with operational order, one or In multiple Second Type applications, Second Type application corresponding with object run instruction is opened.
After the implementation procedure of Fig. 1, Second Type is just built with using the correspondence with operational order, wherein each Second Type application corresponds to an operational order.
The specific implementation procedure of step S204 is described below, as shown in figure 3, including the following steps S301~S304:
Step S301:In the Second Type using in the correspondence with operational order, determine one or more of Second Type applies corresponding all operational orders.
After step S203 determines one or more Second Types application to be concealed under first kind application, according to the The correspondence of two type applications and operational order determines that each Second Type applies corresponding operational order.All second classes Type applies corresponding operational order, i.e., all operational orders.
Step S302:In all operational orders, judges whether there is and instruct consistent operation with the object run Instruction;If so, then entering step S303, S304 is otherwise entered step.
In the case where object run instruction type is the second class instruction type, first kind application is hidden in order to protect The safety that Second Type is applied under icon, it is also necessary to judge whether object run instruction is correct;If target instruction target word is correct, just may be used To open the Second Type application being hidden under first kind application icon, Second Type application otherwise cannot be opened.
Wherein, the Second Type application being hidden under first kind application icon is opened, specially:If referring in object run A corresponding hiding Second Type application is enabled, then opens a Second Type application.If object run instruction correspondence is multiple hidden Multiple Second Type applications are then opened in the Second Type application of Tibetan.
As it can be seen that judging whether correct process is for object run instruction:In all operational orders, target is judged whether there is The consistent operational order of operational order;If so, then proving that object run instruction is correct, if it is not, then proving that object run refers to It enables incorrect.
By step S202 to the specific descriptions of preset second class instruction type it is known that the object run refers to Order may include:
1) first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;(2) institute is double-clicked First kind application icon is stated, meanwhile, acquire characteristics of human body's information of active user;(3) first kind application drawing is clicked Mark, meanwhile, press key in volume;(4) first kind application icon is clicked, meanwhile, press volume lower key;(5) point three times Hit the first kind application icon.It is understood that object run instruction is in preset second class instruction type It is any.
It since there are many situations for object run instruction, but can substantially be divided into two classes, include characteristics of human body's letter in a kind of Breath does not include characteristics of human body's information in another kind of.So judge object run instruction whether correct process, can be attributed to Lower two kinds of situations:
The first situation:Object run instruction includes characteristics of human body's information of active user.
In the case where object run instruction includes characteristics of human body's information of active user, then in all behaviour In instructing, judges whether there is and instruct consistent operational order with the object run, including:Include in all operational orders Default characteristics of human body's information in, judge whether there is the default characteristic information consistent with characteristics of human body's information of active user.
Wherein, default characteristics of human body's information includes the preset fingerprint information and/or the pre-set image information, And/or the preset sound information;It certainly can also be including other characteristics of human body's information, such as human eye iris etc., herein no longer It enumerates.
By taking characteristics of human body's information includes finger print information, image information or acoustic information as an example, to referring in all operations In order, the process for instructing consistent operational order with the object run is judged whether there is, is described in detail:
(1) it is directed to the case where characteristics of human body's information is finger print information, the current use is being acquired using finger print acquisition module After the finger print information at family, judge whether the finger print information of the active user and preset fingerprint information are consistent.If consistent, then it represents that Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders Make to instruct consistent operational order.
Preferably, the finger print acquisition module is set to the back side of terminal display screen, so as to facilitate user hand-held When terminal, user's touch fingerprint acquisition module can be facilitated.
(2) it is directed to the case where characteristics of human body's information is image information, the current use is being acquired using image capture module After the image information at family, judge whether the image information of the active user and pre-set image information are consistent.If consistent, then it represents that Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders Make to instruct consistent operational order.
In the case of preferred, the image information of active user can be the facial image of active user;By active user's The pre-set image information of image information and default characteristics of human body's information carries out Characteristic Contrast.
(3) it is directed to the case where characteristics of human body's information is acoustic information, the current use is being acquired using sound acquisition module After the acoustic information at family, judge whether the acoustic information of the active user and preset sound information are consistent.If consistent, then it represents that Have in all operational orders and instructs consistent operational order with object run;Otherwise indicate that nothing is grasped with target in all operational orders Make to instruct consistent operational order.
When characteristics of human body's information is image information and/or acoustic information, process technically may be implemented, but due to acquisition Image and sound accuracy rate it is not high, cause the accuracy rate of secondary verification process not high.I.e.:Due to acquiring the figure of active user As information may be inconsistent with the shooting position of pre-set image information, or local environment when the acoustic information of acquisition active user It is more noisy, lead to have the case where noise in acoustic information, and there is the case where holder is mistaken for eavesdropper;So phase The finger print information accuracy that active user is acquired for is higher.
The above is being discussed in detail for the first situation, and the realization method of the second situation is described below:
The second situation:Characteristics of human body's information of active user is not included in object run instruction.
The object run instruction in include active user characteristics of human body's information in the case of, due to instruction with The information that family changes and changes directly is judged whether there is and is instructed with the object run so in all operational order Consistent operational order.If consistent, then it represents that have in all operational orders and instruct consistent operational order with object run; Otherwise indicate that nothing instructs consistent operational order with object run in all operational orders.
Then the step S303 of Fig. 3 is executed:Open one or more Second Type applications corresponding with the operational order;
Consistent operational order is instructed with object run, then it represents that object run instructs just if had in all operational orders Really.One or more Second Type applications corresponding with object run instruction are obtained, one or more Second Types are then opened Using.
Step S304:It exits the program.
If consistent operational order is not instructed in all operational orders with object run, then it represents that object run instructs Mistake exits the program at this time.
The above journey is to open the specific implementation procedure for being hidden in the application under first kind application icon, by above-mentioned interior Hold it is found that in the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application icon Under.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, second is just opened Type application.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence this The normal use of application so the safety of terminal in use can be improved, and promotes the use feeling of user.
The scene embodiment of the application is described below:
User is installed in terminal there are one privacy application billing this application, it is undesirable to which other people check the interior of book keeping operation this application Hold.Book keeping operation this application can be encrypted according to mode in the prior art to solve.But which people cannot thoroughly, it is complete The purpose of protection privacy application is played entirely, because other people are still able to see the figure of book keeping operation this application in terminal display interface Mark.So user wishes to hide the application icon of book keeping operation this application, in case other people spy upon the content in book keeping operation this application.
By taking user is hidden in book keeping operation this application under calendar application as an example, hiding, opening and closing to book keeping operation this application Process be described in detail, as shown in figure 4, including the following steps S401~S403:
Step S401:By being hidden under the application icon of calendar using entrance for this application of keeping accounts.
This application of keeping accounts is the privacy application of user, and calendar is common application, and the present embodiment is hidden with this application that will keep accounts Under the application icon of calendar.In order to not influence the use of calendar application, meanwhile, also for the safety for ensureing book keeping operation this application Property, set a kind of operational order for book keeping operation this application.
Setting operation instruction detailed process include:Start finger print acquisition module, acquires the fingerprint of active user, and will work as The fingerprint of preceding user is preserved into security module;Subsequently to open use during book keeping operation this application.
By the fingerprint of keep accounts this application, active user and calendar application binding, the correspondence between three is established.So Afterwards, deletion book keeping operation this application is in the application icon of display interface, the purpose for this application of keeping accounts to which realization is hiding.
Fig. 5 is referred to, the result schematic diagram before being executed for this step and after executing.
Step S402:Open the book keeping operation this application being hidden under calendar application icon.
After step S401 hides book keeping operation this application, is introduced in this step and how to open book keeping operation this application and calendar is answered With.If user clicks directly on the application icon of calendar, enter calendar application.
If active user presses the finger of advance acquisition fingerprint on finger print acquisition module, terminal acquires user fingerprints letter Breath, and the finger print information currently acquired and pre-stored finger print information are compared;If the two unanimously if indicate that user is Validated user.If fingerprint is inconsistent, expression user is disabled user, then enters common application, or exit the program.
It after determining that user is validated user, prompts the user with and whether enters privacy mode, if user confirms into hidden Private pattern then enters book keeping operation this application.User can use each function in book keeping operation this application.
Step S403:Close book keeping operation this application.
Application program is beaten back out in the interface point of book keeping operation this application, you can exits book keeping operation this application.In order to continue protection note Account book application, after exiting book keeping operation this application, the calendar for continuing display and book keeping operation this application binding in terminal display interface is answered With, do not show always book keeping operation this application icon.
Device embodiment corresponding with deployment method is applied is described below, as shown in fig. 6, this application provides a kind of applications Opening side's device, including:
Acquiring unit 61 answers the object run instruction first kind of first kind application icon for obtaining active user Use icon.
Analytic unit 62, for according to preset instruction type, analyzing the type of the object run instruction.
First determination unit 63 is used in the case where the type that the object run instructs is the second class instruction type, According to the correspondence for pre-establishing application icon and Second Type application, determination is corresponding with the first kind application icon One or more Second Type applications;Wherein, what one or more of Second Types were applied applies entrance, is hidden in described Under first kind application icon, and, the application icon of one or more of Second Type applications is in hidden state.
Opening unit 64, used in the Second Type pre-established using correspondence with operational order, described In one or more Second Type applications, Second Type application corresponding with object run instruction is opened.
Wherein, as shown in fig. 7, the opening unit 64 includes:
Second determination unit 71, described in the correspondence that the Second Type applies with operational order, determining One or more Second Types apply corresponding all operational orders;
Judging unit 72, it is consistent with object run instruction in all operational orders, judging whether there is Operational order;
Second opening unit 73 instructs consistent operational order for having in all operational orders with the object run In the case of, open one or more Second Type applications corresponding with the operational order;
Exit unit 74, in all operational orders without the feelings for instructing with the object run consistent operational order Under condition, exit the program.
Wherein, in the case where object run instruction includes characteristics of human body's information of active user, judging unit 72, specifically for include in all operational orders default characteristics of human body's information in, judge whether there is the human body of active user The consistent default characteristic information of characteristic information.
As shown in figure 8, default characteristics of human body's information includes the preset fingerprint information and/or the pre-set image Information and/or the preset sound information;The then judging unit 72, including:
First judging unit 81, for after the finger print information for acquiring the active user using finger print acquisition module, sentencing Whether the finger print information and preset fingerprint information of the disconnected active user be consistent;And/or
Second judgment unit 82, for after the image information for acquiring the active user using image capture module, sentencing Whether the image information and pre-set image information of the disconnected active user be consistent;And/or
Third judging unit 83, for after the acoustic information for acquiring the active user using sound acquisition module, sentencing Whether the acoustic information and preset sound information of the disconnected active user be consistent.
In opening side's device of application provided by the present application, the object run instruction specifically includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
As shown in figure 9, this application provides a kind of concealing devices of application, including:
Third determination unit 91, for determining first kind application icon and to be concealed in the first kind application One or more Second Type applications under icon;
Binding unit 92, for being arranged corresponding operational order to the application of each Second Type, and by the Second Type It is bound using corresponding operational order;By the first kind application icon and one or more of Second Types Using binding;
Deleting unit 93, the application icon for deleting one or more of Second Type applications.
In the embodiment of the present application, user is needed to hiding Second Type application in advance, is hidden in first kind application drawing Under mark.Only in the operational order to first kind application icon, when meeting the condition for opening Second Type application, just opening the Two type applications.So the embodiment of the present application can either be on concealed terminal user need hiding application icon, and do not influence The normal use of the application so the safety of terminal in use can be improved, and promotes the use feeling of user.
If the function described in the present embodiment method is realized in the form of SFU software functional unit and as independent product pin It sells or in use, can be stored in a computing device read/write memory medium.Based on this understanding, the embodiment of the present application The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, this is soft Part product is stored in a storage medium, including some instructions are used so that computing device (can be personal computer, Server, mobile computing device or network equipment etc.) execute all or part of step of each embodiment the method for the application Suddenly.And storage medium above-mentioned includes:USB flash disk, read-only memory (ROM, Read-Only Memory), is deposited mobile hard disk at random The various media that can store program code such as access to memory (RAM, Random Access Memory), magnetic disc or CD.
Each embodiment is described by the way of progressive in this specification, the highlights of each of the examples are with it is other The difference of embodiment, just to refer each other for same or similar part between each embodiment.
The foregoing description of the disclosed embodiments enables professional and technical personnel in the field to realize or use the application. Various modifications to these embodiments will be apparent to those skilled in the art, as defined herein General Principle can in other embodiments be realized in the case where not departing from spirit herein or range.Therefore, the application It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest range caused.

Claims (8)

1. a kind of deployment method of application, which is characterized in that including:
Active user is obtained to instruct the object run of first kind application icon;
According to preset instruction type, the type of the object run instruction is analyzed;
In the case where the type of object run instruction is the second class instruction type, according to pre-establishing application icon and the The correspondence of two type applications determines one or more Second Type applications corresponding with the first kind application icon; Wherein, what one or more of Second Types were applied applies entrance, is hidden under the first kind application icon, and, The application icon of one or more of Second Type applications is in hidden state;
In the Second Type pre-established using in the correspondence with operational order, answered in one or more of Second Types In, Second Type application corresponding with object run instruction is opened;
Wherein, described in the correspondence that the Second Type pre-established applies with operational order, one or more of In Second Type application, Second Type application corresponding with object run instruction is opened, including:
In the correspondence that the Second Type applies with operational order, one or more of Second Types applications pair are determined All operational orders answered;
In all operational orders, judges whether there is and instruct consistent operational order with the object run;
If so, opening one or more Second Type applications corresponding with the operational order;
If nothing exits the program.
2. the method as described in claim 1, which is characterized in that the object run, which instructs, includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
3. method as claimed in claim 2, which is characterized in that the object run instruction include active user human body In the case of characteristic information, then in all operational orders, judges whether there is and instruct consistent behaviour with the object run It instructs, including:
In the default characteristics of human body's information for including in all operational orders, characteristics of human body's information of active user is judged whether there is Consistent default characteristic information.
4. method as claimed in claim 3, which is characterized in that default characteristics of human body's information includes preset fingerprint information, And/or pre-set image information and/or preset sound information;The default characteristics of human body's information for including in all operational orders then In, the consistent default characteristic information of characteristics of human body's information of active user is judged whether there is, including:
After the finger print information for acquiring the active user using finger print acquisition module, the finger print information of the active user is judged It is whether consistent with preset fingerprint information;And/or
After the image information for acquiring the active user using image capture module, the image information of the active user is judged It is whether consistent with pre-set image information;And/or
After the acoustic information for acquiring the active user using sound acquisition module, the acoustic information of the active user is judged It is whether consistent with preset sound information.
5. a kind of device for opening of application, which is characterized in that including:
Acquiring unit instructs first kind application drawing for obtaining active user to the object run of first kind application icon Mark;
Analytic unit, for according to preset instruction type, analyzing the type of the object run instruction;
First determination unit is used in the case where the type that the object run instructs is the second class instruction type, according to pre- First establish the correspondence of application icon and Second Type application, determine one corresponding with the first kind application icon or Multiple Second Type applications;Wherein, what one or more of Second Types were applied applies entrance, is hidden in the first kind Under type application icon, and, the application icon of one or more of Second Type applications is in hidden state;
Opening unit, used in the Second Type pre-established using correspondence with operational order, one or In multiple Second Type applications, Second Type application corresponding with object run instruction is opened;
Wherein, the opening unit includes:
Second determination unit, used in the Second Type using correspondence with operational order, determine it is one or Multiple Second Types apply corresponding all operational orders;
Judging unit, in all operational orders, judging whether there is and instructing consistent operation with the object run Instruction;
Second opening unit, for there is the case where instructing consistent operational order with the object run in all operational orders Under, open one or more Second Type applications corresponding with the operational order;
Unit is exited, in the case of in all operational orders without consistent operational order is instructed with the object run, It exits the program.
6. device as claimed in claim 5, which is characterized in that the object run, which instructs, includes:
The first kind application icon is clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is double-clicked, meanwhile, acquire characteristics of human body's information of active user;Or
The first kind application icon is clicked, meanwhile, press key in volume;Or
The first kind application icon is clicked, meanwhile, press volume lower key;Or
Three hit the first kind application icon.
7. device as claimed in claim 6, which is characterized in that the object run instruction include active user human body In the case of characteristic information, then judging unit, specifically for include in all operational orders default characteristics of human body's information in, Judge whether there is the consistent default characteristic information of characteristics of human body's information of active user.
8. device as claimed in claim 7, which is characterized in that default characteristics of human body's information includes preset fingerprint information, And/or pre-set image information and/or preset sound information;The then judging unit, including:
First judging unit, for after the finger print information for acquiring the active user using finger print acquisition module, described in judgement Whether the finger print information of active user is consistent with preset fingerprint information;And/or
Second judgment unit, for after the image information for acquiring the active user using image capture module, described in judgement Whether the image information of active user is consistent with pre-set image information;And/or
Third judging unit, for after the acoustic information for acquiring the active user using sound acquisition module, described in judgement Whether the acoustic information of active user is consistent with preset sound information.
CN201510148437.4A 2015-03-31 2015-03-31 A kind of application hides, deployment method and device Active CN104732157B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510148437.4A CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device
PCT/CN2015/077991 WO2016155072A1 (en) 2015-03-31 2015-04-30 Method and apparatus for hiding and opening applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510148437.4A CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device

Publications (2)

Publication Number Publication Date
CN104732157A CN104732157A (en) 2015-06-24
CN104732157B true CN104732157B (en) 2018-09-07

Family

ID=53456037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510148437.4A Active CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device

Country Status (2)

Country Link
CN (1) CN104732157B (en)
WO (1) WO2016155072A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404443B (en) * 2015-10-27 2019-02-01 努比亚技术有限公司 Using starting method and device
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN105930145B (en) * 2016-04-12 2020-07-17 Oppo广东移动通信有限公司 Information hiding method and mobile terminal
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN108052248A (en) * 2017-11-30 2018-05-18 维沃移动通信有限公司 The startup method, apparatus and mobile terminal of a kind of application program
CN108229149B (en) * 2017-12-29 2020-11-06 北京安云世纪科技有限公司 Data protection method and device
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN108563932B (en) * 2018-04-10 2020-01-10 Oppo广东移动通信有限公司 Application control method and device, readable storage medium and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN104424444B (en) * 2013-09-06 2019-04-23 中兴通讯股份有限公司 Hidden folder processing method, device and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal

Also Published As

Publication number Publication date
CN104732157A (en) 2015-06-24
WO2016155072A1 (en) 2016-10-06

Similar Documents

Publication Publication Date Title
CN104732157B (en) A kind of application hides, deployment method and device
CN110647730B (en) Single channel input multi-factor authentication via separate processing paths
AU2021254670B2 (en) Systems and methods for providing security via interactive media
EP4250679A2 (en) User interfaces for peer-to-peer transfers
CN104811551B (en) A kind of terminal screen control method and terminal
CN104866752B (en) A kind of application guard method and user terminal
CN105760737A (en) Control method for applications and terminal
CN106492461A (en) A kind of implementation method of augmented reality AR game and device, user terminal
EP3271853A1 (en) Selectively providing personal information and access to functionality on lock screen based on biometric user authentication
CN104778416B (en) A kind of information concealing method and terminal
CN105205379A (en) Control method and device for terminal application and terminal
CN105930145A (en) Information hiding method and mobile terminal
WO2017008676A1 (en) Application authority configuration method and apparatus, and electronic device
CN105718779B (en) A kind of application program login method and user terminal
CN104363205B (en) Using login method and device
CN105701420B (en) A kind of management method and terminal of user data
CN106778151A (en) Method for identifying ID and device based on person's handwriting
CN106098069A (en) A kind of identity identifying method and terminal unit
CN107483704A (en) A kind of private space method to set up and terminal device
WO2017049732A1 (en) User data protection method and terminal
CN107820232A (en) A kind of method and user equipment for controlling user equipment binding microphone apparatus
CN105656873B (en) A kind of access control method and device
CN105930068B (en) The quick control method of personal hot spot and device
CN105207979B (en) A kind of user authentication method and device based on user's input feature vector
CN105095731B (en) A kind of solution screen locking method and user terminal based on more head portrait images

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant