CN107317926A - The method and device of hiden application - Google Patents

The method and device of hiden application Download PDF

Info

Publication number
CN107317926A
CN107317926A CN201710477010.8A CN201710477010A CN107317926A CN 107317926 A CN107317926 A CN 107317926A CN 201710477010 A CN201710477010 A CN 201710477010A CN 107317926 A CN107317926 A CN 107317926A
Authority
CN
China
Prior art keywords
user
application
fingerprint
touch
application icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710477010.8A
Other languages
Chinese (zh)
Inventor
叶争清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Priority to CN201710477010.8A priority Critical patent/CN107317926A/en
Publication of CN107317926A publication Critical patent/CN107317926A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72469User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)

Abstract

The present invention provides a kind of method and device of hiden application, and method includes:The touch fingerprint button operation of user is received, and touch time and touch number of times are detected;If it is that twice, current touch fingerprint is compared with default unblock fingerprint more than first threshold or touch number of times to detect the touch time;If the current touch fingerprint is consistent with the unblock fingerprint, seek the opinion of whether the user shows hiden application, if receiving the confirmation request of user, the application icon of all applications being hidden is included in main interface again.By realizing the display to hiden application to user fingerprints identification, it ensure that user needs the crypticity of hiding application, so as to protect the privacy of user.

Description

The method and device of hiden application
Technical field
The present invention relates to field of mobile terminals, more particularly to a kind of method and device of hiden application.
Background technology
With development in science and technology, mobile terminal is widely used in daily life, therefore installs in the terminal various Using also increasingly increasing.Many applications may relate to the privacy of user, or due to some are personal, user be not desired to by Certain application is placed in the main interface of mobile terminal.
Prior art provides a solution, i.e., by the way that by third-party hiding software, user is not desired into displaying Using being hidden.
But, it will be often easy to be found or cracked by other people, and pass through using being hidden by the above method Third party software is hidden, and often takes the internal memory of customer mobile terminal.
The content of the invention
The present invention provides a kind of method and device of hiden application, by realizing user fingerprints identification to hiden application Display, ensure that user needs the crypticity of hiding application, so as to protect the privacy of user.
The first aspect of the invention is to provide a kind of method of hiden application, including:The touch fingerprint for receiving user is pressed Button is operated, and touch time and touch number of times are detected;If detecting the touch time more than first threshold or touching number of times Twice, then current touch fingerprint to be compared with default unblock fingerprint;If the current touch fingerprint and the unblock Fingerprint is consistent, then seeks the opinion of whether the user shows hiden application, will be all hidden if receiving the confirmation request of user The application icon of the application of Tibetan is shown in main interface again.
Another aspect of the present invention is to provide a kind of device of hiden application, including:Receiving module, for receiving user Touch fingerprint button operation, and to the touch time and touch number of times detect;Detection module, if for detecting during touch Between exceed first threshold or touch number of times for twice, then current touch fingerprint is compared with the default fingerprint that unlocks;First Module is seeked the opinion of, if consistent with the unblock fingerprint for the current touch fingerprint, seeks the opinion of whether the user shows hidden Application is hidden, if receiving the confirmation request of user, the application icon of all applications being hidden is included in main interface again On.
The method and device for the hiden application that the present invention is provided, by by the unblock for touching fingerprint and mobile terminal of user Fingerprint seeks the opinion of request compared to pair, and in the case of comparing successfully to user's transmission, has confirmed that whether user needs display hidden Application is hidden, to prevent user wants hiding application from being cracked or being checked by other people, ensure that user needs hiding application Crypticity, so as to protect the privacy of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention one is provided;
Fig. 2 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention two is provided;
Fig. 3 is the structural representation of the device for the hiden application that the embodiment of the present invention three is provided;
Fig. 4 is the structural representation of the device for the hiden application that the embodiment of the present invention four is provided.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention one is provided, as shown in figure 1, this method Including:
101st, the touch fingerprint button operation of user is received, and touch time and touch number of times are detected.
In the present embodiment, when receiving the operation of user's touch fingerprint, then further acquisition user, which touches, refers to The time of line button and number of times, and the time and number of times of user's touch fingerprint button are detected.
If the 102, detecting the touch time more than first threshold or touching number of times for twice, by current touch fingerprint with Default unblock fingerprint is compared.
In the present embodiment, after being detected to the time of the touch fingerprint button of user and number of times, if detection To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, then active user is touched into fingerprint The fingerprint of button and the unblock fingerprint of mobile terminal are compared.Wherein, first threshold can voluntarily be set for user.
As a kind of enforceable mode, a fingerprint different from terminal unlocking fingerprint can be also pre-set, in detection To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, by active user touch fingerprint press The fingerprint of button is compared from the fingerprints different with terminal unlocking fingerprint pre-set.
If the 103, the current touch fingerprint is consistent with the unblock fingerprint, seeks the opinion of the user and whether show and hidden Using if receiving the confirmation request of user, by the application icon of all applications being hidden again including in main interface.
In the present embodiment, if detecting active user touches the fingerprint of fingerprint button and the unblock fingerprint of mobile terminal Unanimously, then pushed to user and seek the opinion of request, whether to seek the opinion of user to being shown with hiding application, if receiving user's Confirm to indicate, then include all hiden applications in main interface.Further, if receive user deny indicate, Hiden application is not handled.
Further, after current touch fingerprint is compared with default unblock fingerprint described in 102, in addition to:
If the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
Further, when the unblock fingerprint for detecting fingerprint and mobile terminal that active user touches fingerprint button differs Cause, then prove that the user does not check the authority of hiden application, then in order to ensure the safety of user's hiden application, then not to hidden Application is hidden to be handled.
Illustrated, if being provided with a certain social networking application in user terminal, but in the social networking application, related to practical application And to the privacy of user, so that user is not desired to include it to be found by other people in main interface, now, user is carried out hidden Hide.When user calls this to apply, first, user is touched in the main interface unlocked with the finger of preset fingerprint information Fingerprint button, if detect user touch fingerprint button time more than two seconds, or user touch fingerprint button number of times be When twice, whether the fingerprint of detection user's touch key-press and the unblock fingerprint or default finger-print cipher of terminal are consistent, if one Cause, now, ejection circle's user oriented seeks the opinion of whether discharge hiden application, will be with hidden after the confirmation instruction for receiving user The application of Tibetan is shown in main interface.If detect user touch fingerprint button fingerprint and mobile phone terminal unblock fingerprint or Default finger-print cipher is inconsistent, then in order to protect the application of user safe, does not then handle it.
The method for the hiden application that the present embodiment is provided, by by the unblock fingerprint for touching fingerprint and mobile terminal of user Request is seeked the opinion of to user's transmission compared to pair, and in the case of comparing successfully, has confirmed that whether user needs display is hiding should With the application hidden with preventing user from wanting is cracked or checked by other people, ensure that user needs the hidden of hiding application Secret property, so as to protect the privacy of user.
Fig. 2 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention two is provided, as shown in Fig. 2 implementing On the basis of example one, before 101, in addition to:
201st, the duration of user's long-press application icon is obtained.
If the 202, the duration exceed Second Threshold, seek the opinion of the user whether hide the application icon it is corresponding should With.
If the 203, the user confirms to hide, the corresponding application of the application icon is hidden.
In the present embodiment, when detecting the operation of user's click application icon, user is obtained first and clicks on application icon Duration, if the duration that user clicks on application icon is very short, possible user only wishes to open a certain application, rather than to this Operated using other are carried out.If the duration for detecting user's long-press application icon exceedes Second Threshold, send and levy to user Whether inquiry is hidden to the corresponding application of the application icon, when receiving the hiding instruction of user, then by the application icon Corresponding application is hidden.Wherein Second Threshold can manually be set for user, or the Default Value inside mobile terminal, This is not restricted by the present invention.
Still illustrated with practical application, when user want to be involved in the application that privacy is not desired to be shown in main interface carry out it is hidden When Tibetan, long-press is to be concealed first applies corresponding application icon, if detecting the time of user's long-press icon more than two seconds When, then interface is ejected to seek the opinion of whether user is hidden the application, should if the confirmation for receiving user is indicated Deleted using corresponding application icon from main interface, reached the purpose of hiden application.
Specifically, after 202, in addition to:
If the duration exceed the Second Threshold, seek the opinion of the user whether unload the application icon it is corresponding should With;
If the user confirms unloading, the corresponding application of the application icon is unloaded.
As a kind of enforceable mode, if the duration for detecting user's long-press application icon exceedes Second Threshold, Send to seek the opinion of to user and whether the corresponding application of the application icon is unloaded, when the unloading for receiving user is indicated, then The corresponding application of the application icon is unloaded.
Optionally, support to hide and support the embodiment of unloading can be combined to implement.For example, when detecting user's long-press When the duration of application icon exceedes Second Threshold, it can push and unload and hiding option to user by way of tab, Assuming that user's selection is hidden, then processing is hidden, if selection unloading, corresponding to carry out unloading processing.In practical application, when treating When processing application is applied for system, then do not support to carry out unloading operation to the application, accordingly, without the choosing for pushing unloading .
Further, if the user confirms to hide in step 203, the corresponding application of the application icon, tool are hidden Body includes:
If the user confirms to hide, by the data information memory of the application to back-end data, and main interface is deleted On the application icon.
In the present embodiment, if receiving the hiding instruction of user, and the corresponding application progress of the application icon is hidden After Tibetan, also need to be stored the corresponding data message of application to be concealed to back-end data, and delete answering on homepage Use icon.
The method provided by present embodiment, the corresponding data message of application to be concealed is stored, Neng Goubao Card user terminal data is not lost in, and deletes the application icon on homepage, and can realize will be using being hidden.So as to ensure User terminal data can be realized in the case of not being lost in be hidden to application.
The method for the hiden application that the present embodiment is provided, by recognizing the duration of user's long-press application icon, and to user Transmission seeks the opinion of request and determines whether to be hidden application, and the data message of hiden application is stored to protect user profile Do not lose, the icon for deleting main interface is hidden with realizing to application, so as to ensure that user needs the hidden of hiding application Secret property, so as to protect the privacy of user.
Fig. 3 is the structural representation of the device for the hiden application that the embodiment of the present invention three is provided, as shown in figure 3, the device Including:
Receiving module 31, the touch fingerprint button for receiving user is operated, and is carried out to touching the time and touching number of times Detection.
Detection module 32, if being twice, by currently for detecting the touch time more than first threshold or touch number of times Fingerprint is touched to be compared with default unblock fingerprint.
First seeks the opinion of module 33, if consistent with the unblock fingerprint using the current touch fingerprint, seeks the opinion of the use Whether family shows hiden application, if receiving the confirmation request of user, by the application drawing indicated weight of all applications being hidden Newly it is shown in main interface.
In the present embodiment, it is when receiving module 31, which receives user, touches the operation of fingerprint, then further to obtain User touches time and the number of times of fingerprint button, and the time and number of times of user's touch fingerprint button are detected.In detection After module 32 is detected to the time of the touch fingerprint button of user and number of times, if detecting user touches fingerprint button Time exceed first threshold, or touch number of times for twice when, then by active user touch fingerprint button fingerprint and mobile terminal Unblock fingerprint be compared.Wherein, first threshold can voluntarily be set for user.
As a kind of enforceable mode, a fingerprint different from terminal unlocking fingerprint can be also pre-set, in detection To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, by active user touch fingerprint press The fingerprint of button is compared from the fingerprints different with terminal unlocking fingerprint pre-set.
If first, which seeks the opinion of module 33, detects the fingerprint of active user's touch fingerprint button and the unblock fingerprint of mobile terminal Unanimously, then pushed to user and seek the opinion of request, whether to seek the opinion of user to being shown with hiding application, if receiving user's Confirm to indicate, then include all hiden applications in main interface.Further, if receive user deny indicate, Hiden application is not handled.
Further, described device also includes comparing module, specifically for by current touch fingerprint and default unblock After fingerprint is compared, if the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
Specifically, touching the fingerprint of fingerprint button and the unblock fingerprint of mobile terminal when comparing module detects active user It is inconsistent, then prove that the user does not check the authority of hiden application, then it is in order to ensure the safety of user's hiden application, then not right Hiden application is handled.
Illustrated, if being provided with a certain social networking application in user terminal, but in the social networking application, related to practical application And to the privacy of user, so that user is not desired to include it to be found by other people in main interface, now, user is carried out hidden Hide.When user calls this to apply, first, user is touched in the main interface unlocked with the finger of preset fingerprint information Fingerprint button, if detect user touch fingerprint button time more than two seconds, or user touch fingerprint button number of times be When twice, whether the fingerprint of detection user's touch key-press and the unblock fingerprint or default finger-print cipher of terminal are consistent, if one Cause, now, ejection circle's user oriented seeks the opinion of whether discharge hiden application, will be with hidden after the confirmation instruction for receiving user The application of Tibetan is shown in main interface.If detect user touch fingerprint button fingerprint and mobile phone terminal unblock fingerprint or Default finger-print cipher is inconsistent, then in order to protect the application of user safe, does not then handle it.
The device for the hiden application that the present embodiment is provided, by by the unblock fingerprint for touching fingerprint and mobile terminal of user Request is seeked the opinion of to user's transmission compared to pair, and in the case of comparing successfully, has confirmed that whether user needs display is hiding should With the application hidden with preventing user from wanting is cracked or checked by other people, ensure that user needs the hidden of hiding application Secret property, so as to protect the privacy of user.
Fig. 4 is the structural representation of the device for the hiden application that the embodiment of the present invention four is provided, as shown in figure 4, implementing On the basis of example three, described device also includes:
Acquisition module 41, for receiving the touch fingerprint button operation of user, and enters to touch time and touch number of times Before row detection, the duration of user's long-press application icon is obtained.
Second seeks the opinion of module 42, if exceeding Second Threshold for the duration, seeks the opinion of whether the user hides described The corresponding application of application icon.
Hidden module 43, if confirming to hide for the user, hides the corresponding application of the application icon.
In the present embodiment, when detecting the operation of user's click application icon, acquisition module 41 obtains user's point first The duration of application icon is hit, if the duration that user clicks on application icon is very short, possible user only wishes to open a certain application, Rather than other operations are carried out to the application.If second, which seeks the opinion of module 42, detects the duration of user's long-press application icon more than During two threshold values, then seek the opinion of and whether the corresponding application of the application icon is hidden to user's transmission, when hidden module 43 is received To user hiding instruction when, then the corresponding application of the application icon is hidden.Wherein Second Threshold can be manual for user Set, or the Default Value inside mobile terminal, this is not restricted by the present invention.
Still illustrated with practical application, when user want to be involved in the application that privacy is not desired to be shown in main interface carry out it is hidden When Tibetan, long-press is to be concealed first applies corresponding application icon, if detecting the time of user's long-press icon more than two seconds When, then interface is ejected to seek the opinion of whether user is hidden the application, should if the confirmation for receiving user is indicated Deleted using corresponding application icon from main interface, reached the purpose of hiden application.
Further, described device also includes:
3rd seeks the opinion of module, for after the duration of user's long-press application icon is obtained, if the duration exceedes The Second Threshold, then seek the opinion of whether the user unloads the corresponding application of the application icon;
Unload module, if confirming to unload for the user, unloads the corresponding application of the application icon.
As a kind of enforceable mode, if the 3rd seeks the opinion of module and detects the duration of user's long-press application icon more than During two threshold values, then sent to user and seek the opinion of and whether the corresponding application of the application icon is unloaded, when receiving unloading for user When carrying instruction, then the corresponding application of the application icon is unloaded.
Optionally, support to hide and support the embodiment of unloading can be combined to implement.For example, when detecting user's long-press When the duration of application icon exceedes Second Threshold, it can push and unload and hiding option to user by way of tab, Assuming that user's selection is hidden, then processing is hidden, if selection unloading, corresponding to carry out unloading processing.In practical application, when treating When processing application is applied for system, then do not support to carry out unloading operation to the application, accordingly, without the choosing for pushing unloading .
Further, hidden module 43, can specifically include:
Memory cell, if confirming to hide for the user, by the data information memory of the application to back-end data, And delete the application icon in main interface.
In the present embodiment, if hidden module 43 receives the hiding instruction of user, and the application icon is corresponding After being hidden, memory cell also needs to be stored the corresponding data message of application to be concealed to back-end data, And delete the application icon on homepage.
The method provided by present embodiment, the corresponding data message of application to be concealed is stored, Neng Goubao Card user terminal data is not lost in, and deletes the application icon on homepage, and can realize will be using being hidden.So as to ensure User terminal data can be realized in the case of not being lost in be hidden to application.
The device for the hiden application that the present embodiment is provided, by recognizing the duration of user's long-press application icon, and to user Transmission seeks the opinion of request and determines whether to be hidden application, and the data message of hiden application is stored to protect user profile Do not lose, the icon for deleting main interface is hidden with realizing to application, so as to ensure that user needs the hidden of hiding application Secret property, so as to protect the privacy of user.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the device of foregoing description Specific work process, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey Sequence upon execution, performs the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. a kind of method of hiden application, it is characterised in that including:
The touch fingerprint button operation of user is received, and touch time and touch number of times are detected;
If it is twice, by current touch fingerprint and default solution more than first threshold or touch number of times to detect the touch time Lock fingerprint is compared;
If the current touch fingerprint is consistent with the unblock fingerprint, seek the opinion of whether the user shows hiden application, if The confirmation request of user is received, then is included the application icon of all applications being hidden in main interface again.
2. it is according to the method described in claim 1, it is characterised in that the touch fingerprint button operation for receiving user, and right Before touch time and touch number of times are detected, in addition to:
Obtain the duration of user's long-press application icon;
If the duration exceedes Second Threshold, seek the opinion of whether the user hides the corresponding application of the application icon;
If the user confirms to hide, the corresponding application of the application icon is hidden.
3. method according to claim 2, it is characterised in that the duration of acquisition user's long-press application icon it Afterwards, in addition to:
If the duration exceedes the Second Threshold, seek the opinion of whether the user unloads the corresponding application of the application icon;
If the user confirms unloading, the corresponding application of the application icon is unloaded.
4. method according to claim 2, it is characterised in that if the user confirms to hide, hide described answer With the corresponding application of icon, including:
If the user confirms to hide, by the data information memory of the application to back-end data, and delete in main interface The application icon.
5. the method according to any one of claim 1-4, it is characterised in that it is described by current touch fingerprint with it is default After unblock fingerprint is compared, in addition to:
If the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
6. a kind of device of hiden application, it is characterised in that including:
Receiving module, the touch fingerprint button for receiving user is operated, and touch time and touch number of times are detected;
Detection module, if being that twice, current touch is referred to for detecting the touch time more than first threshold or touch number of times Line is compared with default unblock fingerprint;
First seeks the opinion of module, if consistent with the unblock fingerprint for the current touch fingerprint, whether seeks the opinion of the user Hiden application is shown, if receiving the confirmation request of user, the application icon of all applications being hidden is shown again In main interface.
7. device according to claim 6, it is characterised in that described device also includes:
Acquisition module, for receiving the touch fingerprint button operation of user, and is detected to touch time and touch number of times Before, the duration of user's long-press application icon is obtained;
Second seeks the opinion of module, if exceeding Second Threshold for the duration, seeks the opinion of whether the user hides the application drawing The corresponding application of mark;
Hidden module, if confirming to hide for the user, hides the corresponding application of the application icon.
8. device according to claim 7, it is characterised in that described device also includes:
3rd seeks the opinion of module, for after the duration of user's long-press application icon is obtained, if the duration is more than described Second Threshold, then seek the opinion of whether the user unloads the corresponding application of the application icon;
Unload module, if confirming to unload for the user, unloads the corresponding application of the application icon.
9. device according to claim 7, it is characterised in that the hidden module, including:
Memory cell, if confirming to hide for the user, by the data information memory of the application to back-end data, and is deleted Except the application icon in main interface.
10. the device according to any one of claim 6-9, it is characterised in that described device also includes:
Comparing module, for after current touch fingerprint is compared with default unblock fingerprint, if the current touch Fingerprint and the unblock fingerprint are inconsistent, then without processing.
CN201710477010.8A 2017-06-21 2017-06-21 The method and device of hiden application Pending CN107317926A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710477010.8A CN107317926A (en) 2017-06-21 2017-06-21 The method and device of hiden application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710477010.8A CN107317926A (en) 2017-06-21 2017-06-21 The method and device of hiden application

Publications (1)

Publication Number Publication Date
CN107317926A true CN107317926A (en) 2017-11-03

Family

ID=60182063

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710477010.8A Pending CN107317926A (en) 2017-06-21 2017-06-21 The method and device of hiden application

Country Status (1)

Country Link
CN (1) CN107317926A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542305A (en) * 2018-11-23 2019-03-29 Oppo广东移动通信有限公司 Application control method and relevant apparatus
WO2019174155A1 (en) * 2018-03-15 2019-09-19 平安科技(深圳)有限公司 Display method for application icon, and terminal device
WO2020108133A1 (en) * 2018-11-30 2020-06-04 华为技术有限公司 Biological recognition interaction method, graphical interaction interface, and related apparatus
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320898A (en) * 2015-09-30 2016-02-10 联想(北京)有限公司 Information processing method and system
CN105912185A (en) * 2015-11-03 2016-08-31 乐视移动智能信息技术(北京)有限公司 Method and device for unloading application program, and terminal device
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
US20170083227A1 (en) * 2015-09-23 2017-03-23 Quixey, Inc. Hidden Application Icons

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083227A1 (en) * 2015-09-23 2017-03-23 Quixey, Inc. Hidden Application Icons
CN105320898A (en) * 2015-09-30 2016-02-10 联想(北京)有限公司 Information processing method and system
CN105912185A (en) * 2015-11-03 2016-08-31 乐视移动智能信息技术(北京)有限公司 Method and device for unloading application program, and terminal device
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
不详: "《防止误删iOS图标》", 《电脑报》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019174155A1 (en) * 2018-03-15 2019-09-19 平安科技(深圳)有限公司 Display method for application icon, and terminal device
CN109542305A (en) * 2018-11-23 2019-03-29 Oppo广东移动通信有限公司 Application control method and relevant apparatus
WO2020108133A1 (en) * 2018-11-30 2020-06-04 华为技术有限公司 Biological recognition interaction method, graphical interaction interface, and related apparatus
US11500534B2 (en) 2018-11-30 2022-11-15 Huawei Technologies Co., Ltd. Biometric recognition interaction method, graphics interaction interface, and related apparatus
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium

Similar Documents

Publication Publication Date Title
EP3314493B1 (en) Method and apparatus for enabling the touchscreen display of a mobile device
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN104679387B (en) A kind of method for protecting privacy and terminal
CN107317926A (en) The method and device of hiden application
CN103376932B (en) Anti-misoperation system and method
CN104049806B (en) A kind of touch control terminal and its control method and system
WO2017045386A1 (en) Fingerprint recognition method and device for touch screen, and touch screen
CN105159531A (en) Application starting method and mobile terminal
CN105159547B (en) A kind of man-machine interaction method and user terminal
CN106709034A (en) File protection method and apparatus, and terminal
CN105760737A (en) Control method for applications and terminal
CN107037885A (en) A kind of Terminal fingerprints unlocking method and device
CN104866752B (en) A kind of application guard method and user terminal
CN107995973A (en) A kind of information processing method and device
CN104933339A (en) Unlocking control method and mobile terminal
CN105005724B (en) A kind of solution screen locking method and communicating terminal based on password
WO2018107396A1 (en) Fingerprint recognition method and terminal device
CN105338172A (en) Fingerprint dialing method and apparatus
CN105912896A (en) Application switching method and terminal
CN107085791A (en) A kind of electric paying method and terminal
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN104933340B (en) The sending method and mobile terminal of a kind of message
CN104809373A (en) Terminal unlocking method
CN106385507A (en) Prompting method of social application, prompting device and terminal
CN105703909A (en) Authentication method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171103