CN103810437B - A kind of method of hide application program and terminal - Google Patents

A kind of method of hide application program and terminal Download PDF

Info

Publication number
CN103810437B
CN103810437B CN201410077255.8A CN201410077255A CN103810437B CN 103810437 B CN103810437 B CN 103810437B CN 201410077255 A CN201410077255 A CN 201410077255A CN 103810437 B CN103810437 B CN 103810437B
Authority
CN
China
Prior art keywords
application
entrance
hiding
hidden
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410077255.8A
Other languages
Chinese (zh)
Other versions
CN103810437A (en
Inventor
李利童
王延毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201410077255.8A priority Critical patent/CN103810437B/en
Publication of CN103810437A publication Critical patent/CN103810437A/en
Application granted granted Critical
Publication of CN103810437B publication Critical patent/CN103810437B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Telephone Function (AREA)

Abstract

A kind of method that the embodiment of the invention discloses hide application program, including: obtain the application produced and hide hiding protection instruction included in Action Events;Determine the application of described hiding protection instruction;Determining application entrance and its installation instruction information in system list of application of described application correspondence, described installation instruction information includes bag name and the class name of described application;Delete described application entrance and described installation instruction information.The embodiment of the invention also discloses a kind of terminal.Use the embodiment of the present invention, can realize user selects the application hidden be hidden, improve safety, and simple to operate.

Description

A kind of method of hide application program and terminal
Technical field
The present invention relates to communication technique field, particularly relate to method and the terminal of a kind of hide application program.
Background technology
Along with the technology of intelligent terminal develops, the multi-functional shiftings such as the mobile phone of application program, panel computer are installed Dynamic terminal is widely used, and correspondingly, user the most increasingly payes attention to secret protection.Generally, user When using mobile terminal, know some application program in personal terminal in order to avoid other people, need this A little application hides.Application is hidden the application shortcut hands typically will hidden by prior art Dynamic immigration is difficult in the file that be the user discover that by other, the method complex operation and can not be from truly Realize application to be hidden is hidden.
Summary of the invention
Embodiments provide method and the terminal of a kind of hide application program, it is achieved user is selected hidden The application hidden is hidden, and improves safety, and simple to operate.
The embodiment of the present invention provides a kind of method of hide application program, including:
Obtain the application produced and hide hiding protection instruction included in Action Events;
Determine the application of described hiding protection instruction;
Determine application entrance and its installation instruction information in system list of application of described application correspondence, Described installation instruction information includes bag name and the class name of described application;
Delete described application entrance and described installation instruction information.
Accordingly, the embodiment of the present invention additionally provides a kind of terminal, including:
First acquiring unit, refers to for obtaining included hiding protection in the hiding Action Events of the application of generation Order;
First determines unit, for determining the application of described hiding protection instruction;
Second determines unit, is used for determining the application entrance of described application correspondence and it is at system list of application In installation instruction information, described installation instruction information includes bag name and the class name of described application;
Hidden unit, is used for deleting described application entrance and described installation instruction information.
Implement the embodiment of the present invention, when terminal gets and hides protection instruction, determine that described hiding protection refers to Application specified by order, the application entrance of described application and its installation instruction letter in system list of application Breath, deletes described application entrance and described installation instruction information.Use the embodiment of the present invention, use can be hidden Family selects the application hidden, and improves safety, and simple to operate.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, institute in embodiment being described below The accompanying drawing used is needed to be briefly described, it should be apparent that, the accompanying drawing in describing below is the one of the present invention A little embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, also Other accompanying drawing can be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention;
Fig. 2 is another schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of terminal of the embodiment of the present invention;
Fig. 4 is another structural representation of a kind of terminal of the embodiment of the present invention.
Fig. 5 is the one of which structural representation of the first acquiring unit in embodiment of the present invention Fig. 4.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, be fully described by, it is clear that described embodiment be only the present invention a part of embodiment rather than Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creation The every other embodiment obtained under property work premise, broadly falls into the scope of protection of the invention.
See Fig. 1, be the schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention, at this In inventive embodiments, the method comprises the following steps:
S101: obtain the application produced and hide hiding protection instruction included in Action Events.
Concrete, the clicking operation of terminal monitoring user, when detecting that user clicks on terminal and arranges interface or answer With when arranging the setting options being similar to " secret protection " on interface, the most described terminal gets answering of generation Use hiding Action Events.
As a kind of possible embodiment, in described terminal, mounted application program itself can be provided with class Being similar to the setting options of " secret protection ", user clicks on " secret protection " option in described application, institute State terminal and the hiding protection instruction of this application while hiding Action Events application being detected, can be got. Concrete, when described terminal gets described hiding protection instruction, prompting user inputs identity authenticating password; Described terminal receives described Hidden Authentication password and verifies it, if when being proved to be successful, performs step S102, if authentication failed, prompting user re-enters Hidden Authentication password.Wherein, input Hidden Authentication mouth The mode of order includes gesture touch manner, cipher instruction mode, whipping DeviceMode and phonetic order mode etc., It should be noted that concrete selection mode needs described terminal to possess corresponding function, and user can set in advance Put the encrypted ones of hiden application.
As a kind of possible embodiment, the system of described terminal arranges and is provided with one on interface and is similar to The setting options of " secret protection ", and under this option, show all application programs in described terminal, Such as: " information ", " browser ", " radio " and " picture library " etc. are applied.Concrete, when user clicks on When described system arranges " secret protection " option on interface, described terminal detects that operation thing is hidden in application Part, just prompting user inputs Hidden Authentication password;Described terminal receives described Hidden Authentication password and enters it Row checking, ejects the submenu under described " secret protection " option, shows described terminal when being proved to be successful On all application programs, when user clicks on application to be hidden on described submenu, described terminal is i.e. Described application can be got and hide hiding protection instruction included in Action Events.
S102: determine the application of described hiding protection instruction.
Concrete, determine that user specifies application to be hidden, wherein, in step according to described hiding protection instruction In the first possible embodiment of rapid S101, determine that the application of described hiding protection instruction is for working as Before be user-operably the application program of use;In the embodiment that the second of step S101 is possible, The application determining described hiding protection instruction is to be hidden selected in described submenu of user Application program.
S103: determine application entrance corresponding to described application and its apply in system list of application described Installation instruction information, described installation instruction information includes bag name and the class name of described application.
Concrete, after described terminal determines the application that user is to be hidden, further determine that institute according to described application State the application entrance corresponding to specified application and the described installation instruction letter applied in system list of application Breath, described installation instruction information includes bag name and the class name of described application, and wherein, application entrance should for entering All visual interfaces of application, including application icon, control or linkable system path etc.;Bag name and The exclusive identification code being combined as application program of class name, if the bag name of certain application known and class name can obtain this Application icon and show this application;The registration table that described system list of application is similar on computer.Such as: Application program is similar to the Bao Mingke of " information " and thinks: com.android.mms, and class name can be: com. android.mms.ui.ConversationList;Application program is similar to the Bao Mingke of " browser " and thinks: co M.android.browser, class name can be: com.android.browser.BrowserActivity;Application program The Bao Mingke being similar to " radio " thinks: com.huawei.android.FMRadio, and class name can be: c om.huawei.android.FMRadio.FMRadioMainActivity;Application program is similar to " picture library " Bao Mingke thinks: com.android.gallery3d, and class name can be: com.android.gallery3d.app.Gal lery.What deserves to be explained is, different vendor to realizing the application of similar or identical function, its application name, Bag name is the most identical with the name of class name, above-mentioned is merely illustrative, and practical situation includes that this is illustrated Bright situation but be not limited thereto situation.
S104: delete described application entrance and described installation instruction information.
Concrete, after described terminal determines the application that user is to be hidden, record the application entrance of described application Positional information, such as: the positional information of the application entrance being similar to the application program of " information " is main interface The first row first row of view, the positional information of the application entrance being similar to the application program of " browser " is The first row secondary series of main interface view, is similar to the position of the application entrance of the application program of " radio " Information is the first row the 3rd row of main interface view, is similar to the application entrance of the application program of " picture library " Positional information is the second row first row of main interface view.Described terminal is according to fixed application entrance and peace Dress instruction information, deletes described application entrance and described installation instruction information.
As a kind of possible embodiment, described terminal is after deleting described application entrance, when detecting State application when being cancelled hiding, according to the positional information of described application, show the application entrance of described application, And the installation of described application is indicated in information writing system list of application.Concrete, described terminal takes Instruction is hidden in blanking, and prompting user inputs recovery certification password;Described terminal receives described recovery certification password also Verifying it, when being proved to be successful, user clicks on the described application needing to unhide, described terminal Just the application that the instruction that unhides described in can determine that is to be unhided;Described terminal is according to having recorded Positional information unhides the application of instruction described in showing, and by installation instruction corresponding for described application In information writing system list of application.Concrete, the system of described terminal arranges and is provided with a class on interface It is similar to the setting options of " display application ", and the submenu under this option shows in described terminal The application icon hidden.When user clicks on described " display application " option, terminal detects that cancellation is hidden Hiding instruction, prompting user inputs recovery certification password;And by described input recover certification password with preset Encrypted ones is compared;If recovery certification password and the encrypted ones unhided preset of described input Unanimously, user clicks on, in the submenu under " display application " option, the application needing to unhide, described Terminal determine described in the unhide application of instruction be user's application of unhiding of selection.Wherein, Can give tacit consent to and select all to show can also select to show one of them by user to all hiding application are unified Or multiple hide application;According to the positional information recorded show described in the application that unhides, and will In the installation instruction information writing system list of application that described application is corresponding.Wherein, described default cancellation is hidden The encrypted ones hidden can be identical with the encrypted ones of described default hiden application, it is also possible to different, user Can arrange voluntarily.As a kind of possible embodiment, described " display application " option and described " privacy Protection " option can correspond to same option, and meanwhile, all application in described terminal are shown in this Under the submenu of option, wherein, the application that in the submenu under described option, prominent mark has been hidden, side Just user selects the application needing to unhide.
As a kind of possible embodiment, when described terminal detects the action deleting application entrance, institute State terminal and obtain other the application entrance on visual interface, and the most again show after it is ranked up.Change Sentence is talked about, and when described terminal detects the action deleting application entrance, refreshes the visual interface of described terminal.
Implement the embodiment of the present invention, when terminal gets and hides protection instruction, determine that described hiding protection refers to Application specified by order, the application entrance of described application and the instruction information of the installation in system list of application thereof, Delete described application entrance and described installation instruction information.Thus really hide the application that user selects to hide, Improve safety, and simple to operate.
See Fig. 2, be another schematic flow sheet of the method for a kind of hide application program of the embodiment of the present invention, In embodiments of the present invention, the method comprises the following steps:
S201: obtain the application produced and hide hiding protection instruction included in Action Events, point out user Input Hidden Authentication password.
Concrete, the clicking operation of terminal monitoring user, when the application getting generation is hidden in Action Events When included hiding protection instructs, prompting user inputs Hidden Authentication password, wherein, inputs Hidden Authentication The mode of password includes gesture touch manner, cipher instruction mode, whipping DeviceMode and phonetic order mode, It should be noted that concrete selection mode needs described terminal to possess corresponding function.
S202: receive described Hidden Authentication password and verify it, is testing described Hidden Authentication password When demonstrate,proving successfully, determine the application of described hiding protection instruction.
Concrete, terminal receives the Hidden Authentication password of user's input, and by the Hidden Authentication mouth of described input The encrypted ones of the hiden application making and presetting is compared, if the Hidden Authentication password of described input is with default The encrypted ones of hiden application consistent, it is determined that the application of described hiding protection instruction.
S203: determine application entrance and its installation instruction in system list of application of described application correspondence Information, described installation instruction information includes bag name and the class name of described application.
Concrete, after described terminal determines the application that user is to be hidden, further determine that institute according to described application State the application entrance corresponding to specified application and the described installation instruction letter applied in system list of application Breath, described installation instruction information includes bag name and the class name of described application, and wherein, application entrance should for entering All visual interfaces of application, including application icon, control or linkable system path etc.;Bag name and The exclusive identification code being combined as application program of class name, if the bag name of certain application known and class name can obtain this Application icon and show this application;The registration table that described system list of application is similar on computer.
S204: record the positional information of the application entrance of described application.
Concrete, after described terminal determines the application that user is to be hidden, record corresponding the answering of fixed application With the positional information of entrance, such as, the first row first row of main interface view.
S205: delete described application entrance and described installation instruction information.
Concrete, according to fixed application entrance and installation instruction information, delete described application entrance and institute State installation instruction information.
S206: show again after the application entrance of other on terminal visual interface is ranked up.
Concrete, when described terminal detects the action deleting application entrance, obtaining described terminal can visual field Other application entrance on face, and the most again show after it is ranked up.In other words, when described end When end detects the action deleting application entrance, refresh the visual interface in described terminal, with keep described can Visual interface neat.
S207: when detect unhide instruction time, show that described cancellation is hidden according to the positional information recorded Hide the application of instruction, and the installation of described application is indicated in information writing system list of application.
Concrete, described terminal gets when unhiding instruction, and prompting user inputs recovery certification password; Described terminal receives described recovery certification password and verifies it, and when being proved to be successful, user clicks on to be needed Application to be unhided, described terminal just can determine that described in the unhide application of instruction be user Select the application unhided;Described terminal according to the positional information recorded show described in unhide instruction Specified application, and by installation instruction information writing system list of application corresponding for described application.
Implementing the embodiment of the present invention, when terminal detects and hides protection instruction, prompting user inputs to hide and recognizes Card password, if detecting, the Hidden Authentication password that user inputs is correct, determines described hiding protection instruction indication Fixed application, the application entrance of described application and the instruction information of the installation in system list of application thereof, delete Described application entrance and described installation instruction information, and refresh the visual interface of terminal.Thus really hide and use Family selects the application hidden, and improves safety, and simple to operate.
See Fig. 3, be the structural representation of a kind of terminal of the embodiment of the present invention, in embodiments of the present invention, This terminal 1 includes: the first acquiring unit 101, first determines unit 102, second determine unit 103 and hidden Hide unit 104.
First acquiring unit 101, hides hiding protection included in Action Events for obtaining the application of generation Instruction.
First determines unit 102, for determining the application of described hiding protection instruction.
Second determines unit 103, for determining that the described application entrance applying correspondence and its arrange in system application Installation instruction information in table, described installation instruction information includes bag name and the class name of described application.
Hidden unit 104, is used for deleting described application entrance and described installation instruction information.
Implement the embodiment of the present invention, when terminal gets and hides protection instruction, determine that described hiding protection refers to Application specified by order, the application entrance of described application and the instruction information of the installation in system list of application thereof, Delete described application entrance and described installation instruction information.Thus really hide the application that user selects to hide, Improve safety, and simple to operate.
See Fig. 4, be another structural representation of a kind of terminal of the embodiment of the present invention, in the embodiment of the present invention In, this terminal 2 includes: the first acquiring unit 201, first determine unit 202, second determine unit 203, Hidden unit 204, record unit 205, refresh unit 206, display unit 207, second acquisition unit 208, Second Tip element the 209, second authentication unit 300 and the 3rd determines unit 301.
First acquiring unit 201, hides hiding protection included in Action Events for obtaining the application of generation Instruction.
First determines unit 202, for determining the application of described hiding protection instruction.
Second determines unit 203, for determining that the described application entrance applying correspondence and its arrange in system application Installation instruction information in table, described installation instruction information includes bag name and the class name of described application.
Hidden unit 204, is used for deleting described application entrance and described installation instruction information.
Record unit 205, for recording the positional information of the application entrance of described application.
Refresh unit 206, shows after being ranked up the application entrance of other on terminal visual interface again Show.
Display unit 207, for when described application is cancelled hiding, according to described positional information, shows institute State the application entrance of application, and the installation of described application is indicated in information writing system list of application.
Second acquisition unit 208, for obtaining the protection instruction that unhides for described application.
Second Tip element 209, is used for pointing out user to input recovery certification password.
Second authentication unit 300, is used for receiving described recovery certification password and verifying it.
3rd determines unit 301, if for being proved to be successful, it is determined that described application is cancelled hiding.
Wherein, the first acquiring unit 201 comprises the steps that hiding protection instruction acquiring unit 211, first points out single Unit 212 and the first authentication unit 213, see Fig. 5, be the first acquiring unit in embodiment of the present invention Fig. 4 One of which structural representation.
Hiding and protect instruction acquiring unit 211, the application being used for obtaining generation is hidden included by Action Events Hide protection instruction.
First Tip element 212, is used for pointing out user to input Hidden Authentication password.
First authentication unit 213, is used for receiving described Hidden Authentication password and verifying it.
Implementing the embodiment of the present invention, when terminal detects and hides protection instruction, prompting user inputs to hide and recognizes Card password, if detecting, the Hidden Authentication password that user inputs is correct, determines described hiding protection instruction indication Fixed application, the application entrance of described application and the instruction information of the installation in system list of application thereof, delete Described application entrance and described installation instruction information, and refresh the visual interface of terminal.Thus really hide and use Family selects the application hidden, and improves safety, and simple to operate.
Unit in all embodiments of the invention or subelement, can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or by ASIC (Application Specific Integrated Circuit, special IC) realize.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit or subelement in embodiment of the present invention device can merge according to actual needs, divide and Delete.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, Can be by computer program and complete to instruct relevant hardware, described program can be stored in a calculating In machine read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method. Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, Or random store-memory body (Random Access Memory, RAM) etc. ROM).
Above disclosed be only present pre-ferred embodiments, certainly can not with this limit the present invention it Interest field, one of ordinary skill in the art will appreciate that all or part of flow process realizing above-described embodiment, And according to the equivalent variations that the claims in the present invention are made, still fall within the scope that invention is contained.

Claims (8)

1. the method for a hide application program, it is characterised in that including:
Obtain the application produced and hide hiding protection instruction included in Action Events;
Prompting user inputs Hidden Authentication password;
Receive described Hidden Authentication password and it is verified;
When to described Hidden Authentication password authentication success, determine the application of described hiding protection instruction, Described application is the application that user is operating or the application chosen in options menu;
Determine application entrance and its installation instruction information in system list of application of described application correspondence, Described installation instruction information includes bag name and the class name of described application;
Delete described application entrance and described installation instruction information.
2. the method for claim 1, it is characterised in that described determine described hiding protection instruction institute After the application specified, also include:
Record the positional information of the application entrance of described application;
After described deletion described application entrance and described installation instruction information, also include:
When described application is cancelled hiding, according to described positional information, show the application entrance of described application, And the installation of described application is indicated in information writing system list of application.
3. method as claimed in claim 2, it is characterised in that described when described application is cancelled hiding, According to described positional information, show the application entrance of described application, and the installation of described application is indicated information Before in writing system list of application, including:
Obtain the protection instruction that unhides for described application;
Prompting user inputs recovery certification password;
Receive described recovery certification password and it is verified;
If being proved to be successful, it is determined that described application is cancelled hiding.
4. the method for claim 1, it is characterised in that described deletion described application entrance and described After instruction information is installed, also include:
Show again after the application entrance of other on terminal visual interface is ranked up.
5. a terminal, it is characterised in that including:
First acquiring unit, refers to for obtaining included hiding protection in the hiding Action Events of the application of generation Order;
First determines unit, and for determining the application of described hiding protection instruction, described application is for using The application applied or choose in options menu that family is operating;
Second determines unit, is used for determining the application entrance of described application correspondence and it is at system list of application In installation instruction information, described installation instruction information includes bag name and the class name of described application;
Hidden unit, is used for deleting described application entrance and described installation instruction information;
Wherein, described first acquiring unit includes:
Hide protection instruction acquiring unit, hide in Action Events included hidden for obtaining the application of generation Hide protection instruction;
First Tip element, is used for pointing out user to input Hidden Authentication password;
First authentication unit, is used for receiving described Hidden Authentication password and verifying it;
Described first determines unit, is additionally operable to when to described Hidden Authentication password authentication success, determines described Hide the application of protection instruction.
6. terminal as claimed in claim 5, it is characterised in that also include:
Record unit, for recording the positional information of the application entrance of described application;
Display unit, for when described application is cancelled hiding, according to described positional information, display is described The application entrance of application, and the installation of described application is indicated in information writing system list of application.
7. terminal as claimed in claim 6, it is characterised in that also include:
Second acquisition unit, for obtaining the protection instruction that unhides for described application;
Second Tip element, is used for pointing out user to input recovery certification password;
Second authentication unit, is used for receiving described recovery certification password and verifying it;
3rd determines unit, if for being proved to be successful, it is determined that described application is cancelled hiding.
8. terminal as claimed in claim 5, it is characterised in that also include:
Refresh unit, shows after being ranked up the application entrance of other on terminal visual interface again.
CN201410077255.8A 2014-03-04 2014-03-04 A kind of method of hide application program and terminal Active CN103810437B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410077255.8A CN103810437B (en) 2014-03-04 2014-03-04 A kind of method of hide application program and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410077255.8A CN103810437B (en) 2014-03-04 2014-03-04 A kind of method of hide application program and terminal

Publications (2)

Publication Number Publication Date
CN103810437A CN103810437A (en) 2014-05-21
CN103810437B true CN103810437B (en) 2016-12-07

Family

ID=50707188

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410077255.8A Active CN103810437B (en) 2014-03-04 2014-03-04 A kind of method of hide application program and terminal

Country Status (1)

Country Link
CN (1) CN103810437B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103984885B (en) * 2014-05-30 2017-05-17 广东欧珀移动通信有限公司 Application program hiding method applied to touch screen terminal and touch screen terminal
CN104376268B (en) * 2014-11-26 2017-11-10 北京奇虎科技有限公司 Using method for hidden controlling and device
CN106156573A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN104793849A (en) * 2015-04-30 2015-07-22 努比亚技术有限公司 Application icon display method and device
CN104850799B (en) * 2015-05-27 2018-11-16 努比亚技术有限公司 The method and mobile terminal of a kind of data in hiding mobile terminal
CN105224171B (en) * 2015-09-22 2019-08-02 小米科技有限责任公司 Icon display method, device and terminal
CN105335662A (en) * 2015-09-30 2016-02-17 北京金山安全软件有限公司 Method, device and equipment for hiding information
CN106909808B (en) * 2015-12-22 2020-07-07 北京奇虎科技有限公司 Method and device for hiding desktop icon of application
CN107025097A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 A kind of control method of end application, device and terminal
CN105867982B (en) * 2016-04-19 2019-06-14 奇酷软件(深圳)有限公司 Progress control method, operation control system and the mobile terminal of social application program
CN105956444A (en) * 2016-05-04 2016-09-21 北京奇虎科技有限公司 Private application display method and device and terminal equipment
CN106203174A (en) * 2016-07-26 2016-12-07 北京金山安全软件有限公司 Application information processing method and device and electronic equipment
CN106485111B (en) * 2016-10-10 2020-01-14 Oppo广东移动通信有限公司 Method, device and terminal for hiding self-service application
CN107038619B (en) * 2017-02-09 2021-02-19 创新先进技术有限公司 Virtual resource management method and device
CN107341012A (en) * 2017-06-26 2017-11-10 上海传英信息技术有限公司 The display methods and display system of a kind of applying unit
CN107277626B (en) * 2017-08-09 2020-04-28 四川长虹电器股份有限公司 Method for realizing hidden pre-installation application in smart television
CN113110771A (en) * 2021-04-01 2021-07-13 Tcl通讯(宁波)有限公司 Desktop application icon display control method and device, terminal equipment and storage medium
CN114064177B (en) * 2021-11-16 2023-09-12 展讯通信(天津)有限公司 Application program hiding method and device, storage medium and terminal equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248438A (en) * 2005-06-24 2008-08-20 创新科技有限公司 A method and apparatus for protecting private information on a user apparatus
CN102082863A (en) * 2010-09-27 2011-06-01 上海先先信息科技有限公司 Terminal and software call method on same
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103176828A (en) * 2013-03-29 2013-06-26 北京奇虎科技有限公司 Method and device of deleting application program residual files

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101248438A (en) * 2005-06-24 2008-08-20 创新科技有限公司 A method and apparatus for protecting private information on a user apparatus
CN102082863A (en) * 2010-09-27 2011-06-01 上海先先信息科技有限公司 Terminal and software call method on same
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103176828A (en) * 2013-03-29 2013-06-26 北京奇虎科技有限公司 Method and device of deleting application program residual files

Also Published As

Publication number Publication date
CN103810437A (en) 2014-05-21

Similar Documents

Publication Publication Date Title
CN103810437B (en) A kind of method of hide application program and terminal
EP3182314B1 (en) Fingerprint identification method and apparatus
KR102299261B1 (en) Method of controlling lock state of applications and electronic device supporting the same
US9514297B2 (en) Systems and methods for gesture lock obfuscation
US9027117B2 (en) Multiple-access-level lock screen
CN105373737B (en) A kind of application encryption method and mobile terminal
CN104049897B (en) Touch panel device unlock method and device
TWI602123B (en) A method, device for system switch and terminal
CN104838352A (en) Action initiatiation in multi-face device
CN102880820A (en) Method for accessing application program of mobile terminal and mobile terminal
CN105760737A (en) Control method for applications and terminal
CN104424412A (en) Method for protecting information in intelligent terminal, page switching method and intelligent terminal
CN102968587B (en) A kind of electronic equipment and the method giving electronic equipment unlocking information for change
CN103699830A (en) Operating system unlocking method and operating system unlocking device
CN106485166A (en) Screenshotss method and apparatus for electric terminal
CN111344707A (en) Electronic device comprising a display and method of encrypting and decrypting information
CN105653924A (en) Touch screen operation method and device
CN105447357A (en) Application processing method and terminal
CN106203174A (en) Application information processing method and device and electronic equipment
CN104808933B (en) The solution lock control method and device of intelligent terminal
CN104750575B (en) The restoring method and device of a kind of mobile terminal operating system
CN106250757A (en) The control method of a kind of application program and mobile terminal
EP2360578B1 (en) A method for detecting user screens in mobile devices working under symbian operating system
CN106778344B (en) A kind of data permission control method and terminal
CN106227456A (en) A kind of login account management method based on touch-control and device, user terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20180428

Granted publication date: 20161207

PP01 Preservation of patent right
PD01 Discharge of preservation of patent

Date of cancellation: 20210428

Granted publication date: 20161207

PD01 Discharge of preservation of patent
TR01 Transfer of patent right

Effective date of registration: 20210608

Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703

Patentee after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong.

Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right