CN112631478A - Hidden application display method and device, electronic equipment and storage medium - Google Patents

Hidden application display method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112631478A
CN112631478A CN202011633707.8A CN202011633707A CN112631478A CN 112631478 A CN112631478 A CN 112631478A CN 202011633707 A CN202011633707 A CN 202011633707A CN 112631478 A CN112631478 A CN 112631478A
Authority
CN
China
Prior art keywords
user
information
application icon
receiving
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011633707.8A
Other languages
Chinese (zh)
Inventor
陈海波
周如磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Deep Blue Technology Shanghai Co Ltd
Original Assignee
Deep Blue Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deep Blue Technology Shanghai Co Ltd filed Critical Deep Blue Technology Shanghai Co Ltd
Priority to CN202011633707.8A priority Critical patent/CN112631478A/en
Publication of CN112631478A publication Critical patent/CN112631478A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0483Interaction with page-structured environments, e.g. book metaphor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a hidden application display method and device, electronic equipment and a computer readable storage medium. The method comprises the following steps: acquiring biological characteristic information of a user, and binding the biological characteristic information with an application icon selected by the user; receiving a first operation of the user, and hiding the application icon; receiving a second operation of the user, wherein the second operation is an unlocking operation of the user; receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user; and responding to the third operation, and displaying the application icon. According to the method and the device, the icons needing to be hidden can be encrypted through the user, then the hidden application icons are displayed through receiving the specific characteristic information of the user after the terminal is unlocked, and certain applications can be prevented from being opened by others and randomly browsed, so that the privacy of the user is protected to a certain extent.

Description

Hidden application display method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of terminal technologies, and in particular, to a hidden application display method and apparatus, an electronic device, and a computer-readable storage medium.
Background
The internet has entered into a mature era, and the communication between the network and the user is more and more emphasized, so that the intelligent mobile terminal gradually becomes a necessary product for most network citizens, and various corresponding application programs are generated. However, because the shortcut icon of the existing application program is generally directly displayed in the main interface of the mobile terminal, for example, all apps are displayed on the interface after the mobile phone is unlocked, and there are no excessive security measures, there is a security problem that the privacy of the user is revealed because the application program may be opened, browsed or operated by others.
In the prior art, in order to solve the above problems, a password is usually set for an operating system of a mobile terminal to prevent malicious use and view of an application program of the mobile terminal, so as to protect the privacy of the application program; however, if the mobile terminal is in the unlocked state, the application program is still exposed in the main interface of the mobile terminal all the time, and if the mobile terminal is acquired by other people at this time, the problem that the privacy and the security of the mobile terminal cannot be guaranteed still exists.
Disclosure of Invention
The application aims to provide a hidden application display method, a hidden application display device, an electronic device and a computer readable storage medium, and after a terminal is unlocked, a hidden application icon is displayed by receiving specific characteristic information of a user, so that the privacy of the user is protected.
The purpose of the application is realized by adopting the following technical scheme:
in a first aspect, the present application provides a hidden application display method, including:
acquiring biological characteristic information of a user, and binding the biological characteristic information with an application icon selected by the user;
receiving a first operation of the user, and hiding the application icon;
receiving a second operation of the user, wherein the second operation is an unlocking operation of the user;
receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user;
and responding to the third operation, and displaying the application icon.
The technical scheme has the advantages that the user encrypts the icon to be hidden, and then displays the hidden application icon by receiving the specific characteristic information of the user after the terminal is unlocked, so that certain applications can be prevented from being opened by others and randomly browsed, and the privacy of the user is protected to a certain extent.
In some optional embodiments, the biometric information comprises at least one of:
finger fingerprint information of the user;
the facial feature information of the user comprises eye blinking frequency information and mouth opening action information;
the iris characteristic information of the user comprises eye blinking time information.
The technical scheme has the advantages that the biological characteristic information of the user, such as fingerprint information, facial characteristic information and iris characteristic information, of the hidden application icon can be opened, and the possibility that the hidden application icon is opened maliciously is reduced to a certain extent.
In some optional embodiments, the biometric information is finger fingerprint information of the user;
the responding to the third operation, displaying the biological characteristic information of the application icon, including:
and receiving the stay time of the finger fingerprint information of the user, and if the stay time is greater than or equal to a first preset time length, displaying the application icon.
The technical scheme has the advantages that the time length of the finger fingerprint of the user staying at the terminal is judged, if the time length exceeds the first preset time length, the application icon is displayed, and the situation that the user accidentally opens and hides the application icon can be avoided to a certain extent through the setting.
In some optional embodiments, the biometric information is eye blink number information in the facial feature information of the user;
the displaying the application icon in response to the third operation includes:
and receiving and identifying eye feature information in the user face feature information, recording the eye blinking frequency information, comparing the eye blinking frequency information with a preset frequency, and displaying the application icon if the eye blinking frequency is greater than or equal to the preset frequency.
The technical scheme has the advantages that the number of times of continuous eye blinking of the user is judged and recorded, if the number of times is larger than or equal to the preset number of times, the application icon is displayed, and the situation that the user accidentally opens and hides the application icon can be avoided to a certain extent by the aid of the arrangement.
In some optional embodiments, the biometric information is mouth opening action information in facial feature information of the user;
the displaying the application icon in response to the third operation includes:
receiving and identifying the mouth characteristic information in the user face characteristic information, judging whether the mouth is in an open state, recording the time length in the open state, and displaying the application icon if the time length is greater than or equal to a second preset time length.
The beneficial effects of this technical scheme lie in, judge whether user's mouth opens to and the record is opened long, if it is long to exceed the second and predetermine long, then show the application icon, this kind of setting can avoid the unexpected condition of opening and hiding the application icon of user to a certain extent.
In some optional embodiments, the biometric information is eye blink number information in iris feature information of the user;
the displaying the application icon in response to the third operation includes:
and receiving and identifying the iris characteristic information of the user, recording the flicker frequency of the iris, and displaying the application icon if the flicker frequency is within a preset range.
The technical scheme has the advantages that the flickering frequency of the iris of the user is judged and recorded, if the flickering frequency is within the preset range, the application icon is displayed, and the situation that the user accidentally opens and hides the application icon can be avoided to a certain extent through the arrangement.
In some optional embodiments, the second operation comprises at least one of:
an unlocking operation by finger pressing;
unlocking operation of the facial features;
and unlocking the iris feature.
The technical scheme has the advantages that the second operation is the operation of opening the terminal interface by the user, the unlocking operation is carried out through the biological characteristic information of the user, and the information leakage in the user terminal equipment can be protected to a certain extent.
In some optional embodiments, the hiding the application icon includes at least one of:
receiving information that the user presses the application icon and selects to hide the virtual control, so as to hide the application icon;
and receiving a screen-off instruction to hide the application icon.
The technical scheme has the advantages that the application icons can be hidden by pressing the virtual space through the user during the hiding process of the application icons and can also be hidden by turning off the screen, the setting mode provides flexible selection for the user, and the situation that the user forgets to hide the application icons after using the terminal is avoided.
In a second aspect, the present application provides a hidden application display device, comprising:
the acquisition module is used for acquiring the biological characteristic information of the user and binding the biological characteristic information with the application icon selected by the user;
the receiving module is used for receiving the first operation of the user and hiding the application icon; receiving a second operation of the user, wherein the second operation is an unlocking operation of the user; receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user;
and the display module is used for responding to the third operation and displaying the application icon.
In some optional embodiments, the biometric information comprises at least one of:
finger fingerprint information of the user;
the facial feature information of the user comprises eye blinking frequency information and mouth opening action information;
the iris characteristic information of the user comprises eye blinking time information.
In some optional embodiments, the biometric information is finger fingerprint information of the user;
the display module is used for receiving the stay time of the finger fingerprint information of the user, comparing the stay time with the preset time, and displaying the application icon if the stay time is greater than or equal to the preset time.
In some optional embodiments, the biometric information is eye blink number information in the facial feature information of the user;
the display module is used for receiving and identifying eye feature information in the user face feature information, recording the eye blinking frequency information, comparing the eye blinking frequency information with the preset frequency, and displaying the application icon if the eye blinking frequency is larger than or equal to the preset frequency.
In some optional embodiments, the biometric information is mouth opening action information in facial feature information of the user;
the display module is used for receiving and identifying the mouth characteristic information in the user face characteristic information, judging whether the mouth is in an open state or not, recording the time length in the open state, and displaying the application icon if the time length is greater than or equal to the preset time length.
In some optional embodiments, the biometric information is eye blink number information in iris feature information of the user;
the display module is used for receiving and identifying the iris characteristic information of the user, recording the flicker frequency of the iris, and displaying the application icon if the flicker frequency is within a preset range.
In some optional embodiments, the second operation comprises at least one of:
an unlocking operation by finger pressing; unlocking operation of the facial features; and unlocking the iris feature.
In some optional embodiments, the receiving module is configured to receive information that the user presses the application icon and selects to hide the virtual control, so as to hide the application icon; and/or receiving a screen-off instruction to hide the application icon.
In a third aspect, the present application provides an electronic device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of any of the above methods when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of any of the methods described above.
Drawings
The present application is further described below with reference to the drawings and examples.
Fig. 1 is a schematic flowchart of a hidden application display method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of an application icon hiding process provided in an embodiment of the present application;
FIG. 3 is a flow chart illustrating a third operation of the present application according to an embodiment of the present application;
FIG. 4 is a flow chart illustrating a third operation of the present application according to an embodiment of the present application;
FIG. 5 is a flow chart illustrating a third operation provided by an embodiment of the present application;
FIG. 6 is a flow chart illustrating a third operation provided by an embodiment of the present application;
fig. 7 is a schematic structural diagram of a hidden application display device according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of a program product for implementing a hidden application display method according to an embodiment of the present application.
Detailed Description
The present application is further described with reference to the accompanying drawings and the detailed description, and it should be noted that, in the present application, the embodiments or technical features described below may be arbitrarily combined to form a new embodiment without conflict.
Referring to fig. 1, an embodiment of the present application provides a hidden application display method, which includes steps S101 to S104.
Step S101: and acquiring the biological characteristic information of the user, and binding the biological characteristic information with the application icon selected by the user. Specifically, the user biometric information is body characteristics such as fingerprint information and iris information, the terminal device may collect the user biometric information under the control of the user, and bind the biometric information with the selected application icon under the further control of the user, and may bind one piece of biometric information with a plurality of application icons, and also bind a plurality of pieces of biometric information with a plurality of corresponding application icons, which is not limited specifically.
Step S102: and receiving a first operation of the user, and hiding the application icon. Specifically, after the biometric information of the user is collected and bound with the selected application icon, the operation can be performed according to the operation of the user, the operation can be performed by pressing the virtual space for the user, selecting a corresponding operation instruction, and hiding the application icon selected by the user after receiving the instruction of the user.
In a specific implementation, referring to fig. 2, the step S102 may include steps S1021 to S1022.
Step S1021: and receiving the information that the user presses the application icon and selects to hide the virtual control so as to hide the application icon. Specifically, after the user does not need to use the hidden application icon, the virtual control can be manually pressed, so that the application icon is hidden.
Step S1022: and receiving a screen-off instruction to hide the application icon. Specifically, the application icon may be automatically hidden after receiving a screen-off instruction of the terminal.
Therefore, the application icon can be hidden by pressing the virtual space by the user and can also be hidden by turning off the screen, the setting mode provides the user with flexible selection, and the situation that the user forgets to hide the application icon after using the terminal is avoided.
Step S103: and receiving a second operation of the user, wherein the second operation is an unlocking operation of the user. Specifically, after an unlocking instruction of a user is received, the terminal is lightened, the main interface is displayed, and the application icons which are not hidden in the main interface are displayed.
Step S104: and receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user. Specifically, when the user needs to call out the hidden application icon, the previously stored biometric information needs to be sent to the terminal.
Step S105: and responding to the third operation, and displaying the application icon. Specifically, the terminal receives the biometric information sent by the user, identifies the biometric information, and displays the hidden application icon corresponding to the biometric information if the biometric information is correct.
Therefore, the user encrypts the icon to be hidden, and then displays the hidden application icon by receiving the specific characteristic information of the user after the terminal is unlocked, and the mode can prevent certain applications from being opened by others and randomly browsed, so that the privacy of the user is protected to a certain extent.
In a specific implementation, the biometric information includes at least one of: finger fingerprint information of the user; the facial feature information of the user comprises eye blinking frequency information and mouth opening action information; the iris characteristic information of the user comprises eye blinking time information. Specifically, the hidden application icon can be opened and the biological characteristic information of the user can be opened, and the biological characteristic information is the fingerprint information, the facial characteristic information and the iris characteristic information which are specific to the user, so that the possibility that the hidden icon is opened maliciously is reduced to a certain extent.
In a specific implementation, referring to fig. 3, the step S105 may include a step S1051.
When the biometric information is the finger fingerprint information of the user; step S1051: and receiving the stay time of the finger fingerprint information of the user, and if the stay time is greater than or equal to a first preset time length, displaying the application icon. Specifically, by judging the time length of the finger fingerprint of the user staying at the terminal, if the time length exceeds the first preset time length, the application icon is displayed, and the setting can avoid the condition that the user accidentally opens the hidden application icon to a certain extent.
In a specific implementation, referring to fig. 4, the step S105 may include a step S1052.
When the biometric information is eye blink number information in the facial feature information of the user. Step S1052: and receiving and identifying eye feature information in the user face feature information, recording the eye blinking frequency information, comparing the eye blinking frequency information with a preset frequency, and displaying the application icon if the eye blinking frequency is greater than or equal to the preset frequency. Specifically, the application icon is displayed by judging and recording the continuous blinking times of the eyes of the user, and if the times are larger than or equal to the preset times, the situation that the hidden application icon is opened by the user accidentally can be avoided to a certain extent.
In a specific implementation, referring to fig. 5, the step S105 may include a step S1053.
When the biometric information is mouth opening action information in the facial feature information of the user. Step S1053: receiving and identifying the mouth characteristic information in the user face characteristic information, judging whether the mouth is in an open state, recording the time length in the open state, and displaying the application icon if the time length is greater than or equal to a second preset time length. Specifically, whether the mouth of the user is opened or not is judged, the opening duration is recorded, if the duration exceeds the second preset duration, the application icon is displayed, and the situation that the user accidentally opens and hides the application icon can be avoided to a certain extent through the setting.
In a specific implementation, referring to fig. 6, the step S105 may include a step S1054.
When the biological characteristic information is the information of the eye blinking number in the iris characteristic information of the user. Step S1054: and receiving and identifying the iris characteristic information of the user, recording the flicker frequency of the iris, and displaying the application icon if the flicker frequency is within a preset range. Specifically, by judging and recording the flicker frequency of the iris of the user, if the flicker frequency is within a preset range, the application icon is displayed, and the setting can avoid the situation that the user accidentally opens and hides the application icon to a certain extent.
In a specific implementation, the second operation includes at least one of: an unlocking operation by finger pressing; unlocking operation of the facial features; and unlocking the iris feature. Specifically, the second operation is an operation of opening a terminal interface by a user, and an unlocking operation can be performed through the user biological characteristic information, for example, the unlocking operation is performed through the finger pressing of the user, the unlocking operation is performed through the facial characteristic, or the unlocking operation is performed through the iris characteristic of the user, and the method can also protect the information leakage in the user terminal equipment to a certain extent.
Referring to fig. 7, an embodiment of the present application further provides a hidden application display apparatus, and a specific implementation manner of the hidden application display apparatus is consistent with the implementation manner and the achieved technical effect described in the embodiment of the foregoing method, and details are not repeated.
The device comprises: an obtaining module 401, configured to obtain biometric information of a user, and bind the biometric information with an application icon selected by the user; a receiving module 402, configured to receive a first operation of the user and hide the application icon; receiving a second operation of the user, wherein the second operation is an unlocking operation of the user; receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user; a display module 403, configured to display the application icon in response to the third operation.
In a specific implementation, the biometric information includes at least one of: finger fingerprint information of the user; the facial feature information of the user comprises eye blinking frequency information and mouth opening action information; the iris characteristic information of the user comprises eye blinking time information.
In a specific implementation, the biometric information is finger fingerprint information of the user; the display module 403 is configured to receive the staying time of the user finger fingerprint information, compare the staying time with a preset time, and display the application icon if the staying time is greater than or equal to the preset time.
In a specific implementation, the biometric information is eye blink number information in the facial feature information of the user; the display module 403 is configured to receive and identify eye feature information in the user face feature information, record information of blinking times of the eye, compare the information with preset times, and display the application icon if the blinking times of the eye is greater than or equal to the preset times.
In a specific implementation, the biometric information is mouth opening action information in the facial feature information of the user; the display module 403 is configured to receive and identify mouth feature information in the user facial feature information, determine whether the mouth is in an open state, record a duration of the open state, and display the application icon if the duration is greater than or equal to a preset duration.
In a specific implementation, the biometric information is eye blink number information in iris feature information of the user; the display module 403 is configured to receive and identify iris feature information of the user, record a flicker frequency of the iris, and display the application icon if the flicker frequency is within a preset range.
In a specific implementation, the second operation includes at least one of: an unlocking operation by finger pressing; unlocking operation of the facial features; and unlocking the iris feature.
In a specific implementation, the receiving module 402 is configured to receive information that the user presses the application icon and selects to hide the virtual control, so as to hide the application icon; and/or receiving a screen-off instruction to hide the application icon.
Referring to fig. 8, an embodiment of the present application further provides an electronic device 200, where the electronic device 200 includes at least one memory 210, at least one processor 220, and a bus 230 connecting different platform systems.
The memory 210 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)211 and/or cache memory 212, and may further include Read Only Memory (ROM) 213.
The memory 210 further stores a computer program, and the computer program can be executed by the processor 220, so that the processor 220 executes the step of hiding the application display method in the embodiment of the present application, and a specific implementation manner of the method is consistent with the implementation manner and the achieved technical effect described in the embodiment of the method, and some contents are not described again.
Memory 210 may also include a program/utility 214 having a set (at least one) of program modules 215, including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Accordingly, processor 220 may execute the computer programs described above, as well as may execute programs/utilities 214.
Bus 230 may be a local bus representing one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or any other type of bus structure.
The electronic device 200 may also communicate with one or more external devices 240, such as a keyboard, pointing device, Bluetooth device, etc., and may also communicate with one or more devices capable of interacting with the electronic device 200, and/or with any devices (e.g., routers, modems, etc.) that enable the electronic device 200 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 250. Also, the electronic device 200 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 260. The network adapter 260 may communicate with other modules of the electronic device 200 via the bus 230. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 200, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage platforms, to name a few.
The embodiment of the present application further provides a computer-readable storage medium, where the computer-readable storage medium is used for storing a computer program, and when the computer program is executed, the step of hiding the application display method in the embodiment of the present application is implemented, and a specific implementation manner of the step is consistent with the implementation manner and the achieved technical effect described in the embodiment of the foregoing method, and some contents are not described again.
Fig. 9 shows a program product 300 provided by the present embodiment for implementing the method, which may employ a portable compact disc read only memory (CD-ROM) and include program codes, and may be run on a terminal device, such as a personal computer. However, the program product 300 of the present invention is not so limited, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. Program product 300 may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The foregoing description and drawings are only for purposes of illustrating the preferred embodiments of the present application and are not intended to limit the present application, which is, therefore, to the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present application.

Claims (18)

1. A hidden application display method, comprising:
acquiring biological characteristic information of a user, and binding the biological characteristic information with an application icon selected by the user;
receiving a first operation of the user, and hiding the application icon;
receiving a second operation of the user, wherein the second operation is an unlocking operation of the user;
receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user;
and responding to the third operation, and displaying the application icon.
2. The hidden application display method of claim 1, wherein the biometric information comprises at least one of:
finger fingerprint information of the user;
the facial feature information of the user comprises eye blinking frequency information and mouth opening action information;
the iris characteristic information of the user comprises eye blinking time information.
3. The hidden-application display method according to claim 2, wherein the biometric information is finger fingerprint information of the user;
the displaying the application icon in response to the third operation includes:
and receiving the stay time of the finger fingerprint information of the user, and if the stay time is greater than or equal to a first preset time length, displaying the application icon.
4. The hidden-application display method according to claim 2, wherein the biometric information is eye blink number information in the facial feature information of the user;
the displaying the application icon in response to the third operation includes:
and receiving and identifying eye feature information in the user face feature information, recording the eye blinking frequency information, comparing the eye blinking frequency information with a preset frequency, and displaying the application icon if the eye blinking frequency is greater than or equal to the preset frequency.
5. The hidden-application display method according to claim 2, wherein the biometric information is mouth opening action information in facial feature information of the user;
the displaying the application icon in response to the third operation includes:
receiving and identifying the mouth characteristic information in the user face characteristic information, judging whether the mouth is in an open state, recording the time length in the open state, and displaying the application icon if the time length is greater than or equal to a second preset time length.
6. The hidden-application display method according to claim 2, wherein the biometric information is eye blink number information in iris feature information of the user;
the displaying the application icon in response to the third operation includes:
and receiving and identifying the iris characteristic information of the user, recording the flicker frequency of the iris, and displaying the application icon if the flicker frequency is within a preset range.
7. The hidden application display method of claim 1, wherein the second operation comprises at least one of:
an unlocking operation by finger pressing;
unlocking operation of the facial features;
and unlocking the iris feature.
8. The hidden application display method according to claim 1, wherein the hiding the application icon includes at least one of:
receiving information that the user presses the application icon and selects to hide the virtual control, so as to hide the application icon;
and receiving a screen-off instruction to hide the application icon.
9. A hidden application display device, the device comprising:
the acquisition module is used for acquiring the biological characteristic information of the user and binding the biological characteristic information with the application icon selected by the user;
the receiving module is used for receiving the first operation of the user and hiding the application icon; receiving a second operation of the user, wherein the second operation is an unlocking operation of the user; receiving a third operation of the user, wherein the third operation is an operation of displaying the biological characteristic information by the user;
and the display module is used for responding to the third operation and displaying the application icon.
10. The hidden application display device of claim 9, wherein the biometric information comprises at least one of:
finger fingerprint information of the user;
the facial feature information of the user comprises eye blinking frequency information and mouth opening action information;
the iris characteristic information of the user comprises eye blinking time information.
11. The hidden-application display device of claim 10, wherein the biometric information is finger print information of the user;
the display module is used for receiving the stay time of the finger fingerprint information of the user, comparing the stay time with the preset time, and displaying the application icon if the stay time is greater than or equal to the preset time.
12. The hidden-application display device of claim 10, wherein the biometric information is eye blink number information in facial feature information of the user;
the display module is used for receiving and identifying eye feature information in the user face feature information, recording the eye blinking frequency information, comparing the eye blinking frequency information with the preset frequency, and displaying the application icon if the eye blinking frequency is larger than or equal to the preset frequency.
13. The hidden-application display device according to claim 10, wherein the biometric information is mouth opening action information in facial feature information of the user;
the display module is used for receiving and identifying the mouth characteristic information in the user face characteristic information, judging whether the mouth is in an open state or not, recording the time length in the open state, and displaying the application icon if the time length is greater than or equal to the preset time length.
14. The hidden-application display device of claim 10, wherein the biometric information is eye blink number information in iris feature information of the user;
the display module is used for receiving and identifying the iris characteristic information of the user, recording the flicker frequency of the iris, and displaying the application icon if the flicker frequency is within a preset range.
15. The hidden-application display device of claim 9, wherein the second operation comprises at least one of:
an unlocking operation by finger pressing; unlocking operation of the facial features; and unlocking the iris feature.
16. The hidden application display device according to claim 9, wherein the receiving module is configured to receive information that the user presses the application icon and selects a hidden virtual control to hide the application icon; and/or receiving a screen-off instruction to hide the application icon.
17. An electronic device, characterized in that the electronic device comprises a memory storing a computer program and a processor implementing the steps of the method according to any of claims 1-8 when the processor executes the computer program.
18. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
CN202011633707.8A 2020-12-31 2020-12-31 Hidden application display method and device, electronic equipment and storage medium Pending CN112631478A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011633707.8A CN112631478A (en) 2020-12-31 2020-12-31 Hidden application display method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011633707.8A CN112631478A (en) 2020-12-31 2020-12-31 Hidden application display method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112631478A true CN112631478A (en) 2021-04-09

Family

ID=75289893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011633707.8A Pending CN112631478A (en) 2020-12-31 2020-12-31 Hidden application display method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112631478A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113805751A (en) * 2021-09-23 2021-12-17 上海闻泰信息技术有限公司 Application opening method and device, electronic equipment, storage medium and program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
US20170083711A1 (en) * 2015-09-23 2017-03-23 Quixey, Inc. Hidden Application Icons
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
CN107563158A (en) * 2017-08-30 2018-01-09 努比亚技术有限公司 Show hiden application figure calibration method, equipment and computer-readable recording medium
CN109189397A (en) * 2018-08-17 2019-01-11 奇酷互联网络科技(深圳)有限公司 The method, apparatus of mobile terminal and intelligent display hiden application
CN110554817A (en) * 2019-08-23 2019-12-10 珠海格力电器股份有限公司 desktop icon display control method and device, readable medium and computing equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170083711A1 (en) * 2015-09-23 2017-03-23 Quixey, Inc. Hidden Application Icons
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN107145797A (en) * 2017-05-03 2017-09-08 北京小米移动软件有限公司 Display control method, device and the terminal device of application icon
CN107563158A (en) * 2017-08-30 2018-01-09 努比亚技术有限公司 Show hiden application figure calibration method, equipment and computer-readable recording medium
CN109189397A (en) * 2018-08-17 2019-01-11 奇酷互联网络科技(深圳)有限公司 The method, apparatus of mobile terminal and intelligent display hiden application
CN110554817A (en) * 2019-08-23 2019-12-10 珠海格力电器股份有限公司 desktop icon display control method and device, readable medium and computing equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113805751A (en) * 2021-09-23 2021-12-17 上海闻泰信息技术有限公司 Application opening method and device, electronic equipment, storage medium and program product

Similar Documents

Publication Publication Date Title
CN103593238A (en) Method and device for controlling invocation of application programming interfaces
WO2016127426A1 (en) Method and apparatus for displaying application and picture, and electronic device
US11650828B2 (en) System and method for device interoperability and synchronization
CN106156619A (en) Application safety means of defence and device
JP2007316637A (en) Screensaver for individual application program
CN106844181A (en) Method, system and mobile terminal for recording user behavior
CN106844182B (en) Method, system and mobile terminal for recording user behavior
CN106778295B (en) File storage method, file display method, file storage device, file display device and terminal
CN102736954A (en) Addressing system degradation by application disabling
CN105556534A (en) Electronic device and method for suggesting response manual in occurrence of denial
CN112631478A (en) Hidden application display method and device, electronic equipment and storage medium
CN107423585A (en) The concealed application method and system of a kind of application
WO2014092319A1 (en) Method and device for managing and controlling applications of mobile terminal and recording medium in which program for executing method therefor is recorded
CN112463266A (en) Execution policy generation method and device, electronic equipment and storage medium
US11520938B2 (en) Root level controls to enable privacy mode for device cameras
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
JP2019117483A (en) Information processing device, control method, and program
CN106203148B (en) Unauthorized data access blocking method and computing device with unauthorized data access blocking function
JP5429906B2 (en) Mobile terminal, program, and control method.
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
US11797706B2 (en) Mobile device network traffic modification and user based restrictions on data access
CN107392066A (en) Protect method, mobile terminal and the computer-readable recording medium of data safety
CN113238691A (en) Application icon management method and device and electronic equipment
CN107316197A (en) A kind of payment protection method, mobile terminal and computer-readable recording medium
CN112820001A (en) Control method and device of intelligent door lock, intelligent door lock and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210409

RJ01 Rejection of invention patent application after publication