Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, be fully described by, it is clear that described embodiment be only the present invention a part of embodiment rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation
The every other embodiment obtained under property work premise, broadly falls into the scope of protection of the invention.
See Fig. 1, be the schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention, at this
In inventive embodiments, the method comprises the following steps:
S101: obtain the application produced and hide hiding protection instruction included in Action Events.
Concrete, the clicking operation of terminal monitoring user, when detecting that user clicks on terminal and arranges interface or answer
With when arranging the setting options being similar to " secret protection " on interface, the most described terminal gets answering of generation
Use hiding Action Events.
As a kind of possible embodiment, in described terminal, mounted application program itself can be provided with class
Being similar to the setting options of " secret protection ", user clicks on " secret protection " option in described application, institute
State terminal and the hiding protection instruction of this application while hiding Action Events application being detected, can be got.
Concrete, when described terminal gets described hiding protection instruction, prompting user inputs identity authenticating password;
Described terminal receives described Hidden Authentication password and verifies it, if when being proved to be successful, performs step
S102, if authentication failed, prompting user re-enters Hidden Authentication password.Wherein, input Hidden Authentication mouth
The mode of order includes gesture touch manner, cipher instruction mode, whipping DeviceMode and phonetic order mode etc.,
It should be noted that concrete selection mode needs described terminal to possess corresponding function, and user can set in advance
Put the encrypted ones of hiden application.
As a kind of possible embodiment, the system of described terminal arranges and is provided with one on interface and is similar to
The setting options of " secret protection ", and under this option, show all application programs in described terminal,
Such as: " information ", " browser ", " radio " and " picture library " etc. are applied.Concrete, when user clicks on
When described system arranges " secret protection " option on interface, described terminal detects that operation thing is hidden in application
Part, just prompting user inputs Hidden Authentication password;Described terminal receives described Hidden Authentication password and enters it
Row checking, ejects the submenu under described " secret protection " option, shows described terminal when being proved to be successful
On all application programs, when user clicks on application to be hidden on described submenu, described terminal is i.e.
Described application can be got and hide hiding protection instruction included in Action Events.
S102: determine the application of described hiding protection instruction.
Concrete, determine that user specifies application to be hidden, wherein, in step according to described hiding protection instruction
In the first possible embodiment of rapid S101, determine that the application of described hiding protection instruction is for working as
Before be user-operably the application program of use;In the embodiment that the second of step S101 is possible,
The application determining described hiding protection instruction is to be hidden selected in described submenu of user
Application program.
S103: determine application entrance corresponding to described application and its apply in system list of application described
Installation instruction information, described installation instruction information includes bag name and the class name of described application.
Concrete, after described terminal determines the application that user is to be hidden, further determine that institute according to described application
State the application entrance corresponding to specified application and the described installation instruction letter applied in system list of application
Breath, described installation instruction information includes bag name and the class name of described application, and wherein, application entrance should for entering
All visual interfaces of application, including application icon, control or linkable system path etc.;Bag name and
The exclusive identification code being combined as application program of class name, if the bag name of certain application known and class name can obtain this
Application icon and show this application;The registration table that described system list of application is similar on computer.Such as:
Application program is similar to the Bao Mingke of " information " and thinks: com.android.mms, and class name can be: com.
android.mms.ui.ConversationList;Application program is similar to the Bao Mingke of " browser " and thinks: co
M.android.browser, class name can be: com.android.browser.BrowserActivity;Application program
The Bao Mingke being similar to " radio " thinks: com.huawei.android.FMRadio, and class name can be: c
om.huawei.android.FMRadio.FMRadioMainActivity;Application program is similar to " picture library "
Bao Mingke thinks: com.android.gallery3d, and class name can be: com.android.gallery3d.app.Gal
lery.What deserves to be explained is, different vendor to realizing the application of similar or identical function, its application name,
Bag name is the most identical with the name of class name, above-mentioned is merely illustrative, and practical situation includes that this is illustrated
Bright situation but be not limited thereto situation.
S104: delete described application entrance and described installation instruction information.
Concrete, after described terminal determines the application that user is to be hidden, record the application entrance of described application
Positional information, such as: the positional information of the application entrance being similar to the application program of " information " is main interface
The first row first row of view, the positional information of the application entrance being similar to the application program of " browser " is
The first row secondary series of main interface view, is similar to the position of the application entrance of the application program of " radio "
Information is the first row the 3rd row of main interface view, is similar to the application entrance of the application program of " picture library "
Positional information is the second row first row of main interface view.Described terminal is according to fixed application entrance and peace
Dress instruction information, deletes described application entrance and described installation instruction information.
As a kind of possible embodiment, described terminal is after deleting described application entrance, when detecting
State application when being cancelled hiding, according to the positional information of described application, show the application entrance of described application,
And the installation of described application is indicated in information writing system list of application.Concrete, described terminal takes
Instruction is hidden in blanking, and prompting user inputs recovery certification password;Described terminal receives described recovery certification password also
Verifying it, when being proved to be successful, user clicks on the described application needing to unhide, described terminal
Just the application that the instruction that unhides described in can determine that is to be unhided;Described terminal is according to having recorded
Positional information unhides the application of instruction described in showing, and by installation instruction corresponding for described application
In information writing system list of application.Concrete, the system of described terminal arranges and is provided with a class on interface
It is similar to the setting options of " display application ", and the submenu under this option shows in described terminal
The application icon hidden.When user clicks on described " display application " option, terminal detects that cancellation is hidden
Hiding instruction, prompting user inputs recovery certification password;And by described input recover certification password with preset
Encrypted ones is compared;If recovery certification password and the encrypted ones unhided preset of described input
Unanimously, user clicks on, in the submenu under " display application " option, the application needing to unhide, described
Terminal determine described in the unhide application of instruction be user's application of unhiding of selection.Wherein,
Can give tacit consent to and select all to show can also select to show one of them by user to all hiding application are unified
Or multiple hide application;According to the positional information recorded show described in the application that unhides, and will
In the installation instruction information writing system list of application that described application is corresponding.Wherein, described default cancellation is hidden
The encrypted ones hidden can be identical with the encrypted ones of described default hiden application, it is also possible to different, user
Can arrange voluntarily.As a kind of possible embodiment, described " display application " option and described " privacy
Protection " option can correspond to same option, and meanwhile, all application in described terminal are shown in this
Under the submenu of option, wherein, the application that in the submenu under described option, prominent mark has been hidden, side
Just user selects the application needing to unhide.
As a kind of possible embodiment, when described terminal detects the action deleting application entrance, institute
State terminal and obtain other the application entrance on visual interface, and the most again show after it is ranked up.Change
Sentence is talked about, and when described terminal detects the action deleting application entrance, refreshes the visual interface of described terminal.
Implement the embodiment of the present invention, when terminal gets and hides protection instruction, determine that described hiding protection refers to
Application specified by order, the application entrance of described application and the instruction information of the installation in system list of application thereof,
Delete described application entrance and described installation instruction information.Thus really hide the application that user selects to hide,
Improve safety, and simple to operate.
See Fig. 2, be another schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention,
In embodiments of the present invention, the method comprises the following steps:
S201: obtain the application produced and hide hiding protection instruction included in Action Events, point out user
Input Hidden Authentication password.
Concrete, the clicking operation of terminal monitoring user, when the application getting generation is hidden in Action Events
When included hiding protection instructs, prompting user inputs Hidden Authentication password, wherein, inputs Hidden Authentication
The mode of password includes gesture touch manner, cipher instruction mode, whipping DeviceMode and phonetic order mode,
It should be noted that concrete selection mode needs described terminal to possess corresponding function.
S202: receive described Hidden Authentication password and verify it, is testing described Hidden Authentication password
When demonstrate,proving successfully, determine the application of described hiding protection instruction.
Concrete, terminal receives the Hidden Authentication password of user's input, and by the Hidden Authentication mouth of described input
The encrypted ones of the hiden application making and presetting is compared, if the Hidden Authentication password of described input is with default
The encrypted ones of hiden application consistent, it is determined that the application of described hiding protection instruction.
S203: determine application entrance and its installation instruction in system list of application of described application correspondence
Information, described installation instruction information includes bag name and the class name of described application.
Concrete, after described terminal determines the application that user is to be hidden, further determine that institute according to described application
State the application entrance corresponding to specified application and the described installation instruction letter applied in system list of application
Breath, described installation instruction information includes bag name and the class name of described application, and wherein, application entrance should for entering
All visual interfaces of application, including application icon, control or linkable system path etc.;Bag name and
The exclusive identification code being combined as application program of class name, if the bag name of certain application known and class name can obtain this
Application icon and show this application;The registration table that described system list of application is similar on computer.
S204: record the positional information of the application entrance of described application.
Concrete, after described terminal determines the application that user is to be hidden, record corresponding the answering of fixed application
With the positional information of entrance, such as, the first row first row of main interface view.
S205: delete described application entrance and described installation instruction information.
Concrete, according to fixed application entrance and installation instruction information, delete described application entrance and institute
State installation instruction information.
S206: show again after the application entrance of other on terminal visual interface is ranked up.
Concrete, when described terminal detects the action deleting application entrance, obtaining described terminal can visual field
Other application entrance on face, and the most again show after it is ranked up.In other words, when described end
When end detects the action deleting application entrance, refresh the visual interface in described terminal, with keep described can
Visual interface neat.
S207: when detect unhide instruction time, show that described cancellation is hidden according to the positional information recorded
Hide the application of instruction, and the installation of described application is indicated in information writing system list of application.
Concrete, described terminal gets when unhiding instruction, and prompting user inputs recovery certification password;
Described terminal receives described recovery certification password and verifies it, and when being proved to be successful, user clicks on to be needed
Application to be unhided, described terminal just can determine that described in the unhide application of instruction be user
Select the application unhided;Described terminal according to the positional information recorded show described in unhide instruction
Specified application, and by installation instruction information writing system list of application corresponding for described application.
Implementing the embodiment of the present invention, when terminal detects and hides protection instruction, prompting user inputs to hide and recognizes
Card password, if detecting, the Hidden Authentication password that user inputs is correct, determines described hiding protection instruction indication
Fixed application, the application entrance of described application and the instruction information of the installation in system list of application thereof, delete
Described application entrance and described installation instruction information, and refresh the visual interface of terminal.Thus really hide and use
Family selects the application hidden, and improves safety, and simple to operate.
See Fig. 3, be the structural representation of a kind of terminal of the embodiment of the present invention, in embodiments of the present invention,
This terminal 1 includes: the first acquiring unit 101, first determines unit 102, second determine unit 103 and hidden
Hide unit 104.
First acquiring unit 101, hides hiding protection included in Action Events for obtaining the application of generation
Instruction.
First determines unit 102, for determining the application of described hiding protection instruction.
Second determines unit 103, for determining that the described application entrance applying correspondence and its arrange in system application
Installation instruction information in table, described installation instruction information includes bag name and the class name of described application.
Hidden unit 104, is used for deleting described application entrance and described installation instruction information.
Implement the embodiment of the present invention, when terminal gets and hides protection instruction, determine that described hiding protection refers to
Application specified by order, the application entrance of described application and the instruction information of the installation in system list of application thereof,
Delete described application entrance and described installation instruction information.Thus really hide the application that user selects to hide,
Improve safety, and simple to operate.
See Fig. 4, be another structural representation of a kind of terminal of the embodiment of the present invention, in the embodiment of the present invention
In, this terminal 2 includes: the first acquiring unit 201, first determine unit 202, second determine unit 203,
Hidden unit 204, record unit 205, refresh unit 206, display unit 207, second acquisition unit 208,
Second Tip element the 209, second authentication unit 300 and the 3rd determines unit 301.
First acquiring unit 201, hides hiding protection included in Action Events for obtaining the application of generation
Instruction.
First determines unit 202, for determining the application of described hiding protection instruction.
Second determines unit 203, for determining that the described application entrance applying correspondence and its arrange in system application
Installation instruction information in table, described installation instruction information includes bag name and the class name of described application.
Hidden unit 204, is used for deleting described application entrance and described installation instruction information.
Record unit 205, for recording the positional information of the application entrance of described application.
Refresh unit 206, shows after being ranked up the application entrance of other on terminal visual interface again
Show.
Display unit 207, for when described application is cancelled hiding, according to described positional information, shows institute
State the application entrance of application, and the installation of described application is indicated in information writing system list of application.
Second acquisition unit 208, for obtaining the protection instruction that unhides for described application.
Second Tip element 209, is used for pointing out user to input recovery certification password.
Second authentication unit 300, is used for receiving described recovery certification password and verifying it.
3rd determines unit 301, if for being proved to be successful, it is determined that described application is cancelled hiding.
Wherein, the first acquiring unit 201 comprises the steps that hiding protection instruction acquiring unit 211, first points out single
Unit 212 and the first authentication unit 213, see Fig. 5, be the first acquiring unit in embodiment of the present invention Fig. 4
One of which structural representation.
Hiding and protect instruction acquiring unit 211, the application being used for obtaining generation is hidden included by Action Events
Hide protection instruction.
First Tip element 212, is used for pointing out user to input Hidden Authentication password.
First authentication unit 213, is used for receiving described Hidden Authentication password and verifying it.
Implementing the embodiment of the present invention, when terminal detects and hides protection instruction, prompting user inputs to hide and recognizes
Card password, if detecting, the Hidden Authentication password that user inputs is correct, determines described hiding protection instruction indication
Fixed application, the application entrance of described application and the instruction information of the installation in system list of application thereof, delete
Described application entrance and described installation instruction information, and refresh the visual interface of terminal.Thus really hide and use
Family selects the application hidden, and improves safety, and simple to operate.
Unit in all embodiments of the invention or subelement, can pass through universal integrated circuit, such as CPU
(Central Processing Unit, central processing unit), or by ASIC (Application Specific
Integrated Circuit, special IC) realize.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit or subelement in embodiment of the present invention device can merge according to actual needs, divide and
Delete.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method,
Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating
In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.
Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory,
Or random store-memory body (Random Access Memory, RAM) etc. ROM).
Above disclosed be only present pre-ferred embodiments, certainly can not with this limit the present invention it
Interest field, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment,
And according to the equivalent variations that the claims in the present invention are made, still fall within the scope that invention is contained.