CN104008348B - application control method, device and terminal - Google Patents

application control method, device and terminal Download PDF

Info

Publication number
CN104008348B
CN104008348B CN201410155562.3A CN201410155562A CN104008348B CN 104008348 B CN104008348 B CN 104008348B CN 201410155562 A CN201410155562 A CN 201410155562A CN 104008348 B CN104008348 B CN 104008348B
Authority
CN
China
Prior art keywords
application
mark
unblock
preset password
default
Prior art date
Application number
CN201410155562.3A
Other languages
Chinese (zh)
Other versions
CN104008348A (en
Inventor
刘道宽
范典
张晔
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to CN201410155562.3A priority Critical patent/CN104008348B/en
Publication of CN104008348A publication Critical patent/CN104008348A/en
Application granted granted Critical
Publication of CN104008348B publication Critical patent/CN104008348B/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Abstract

The disclosure is directed to a kind of application control method and device, methods described includes:Obtain the trigger action of application identities;Unblock application is started according to the trigger action;Obtain the unlocking pin that the unblock application is received;Judge the unlocking pin whether with preset password group in preset password match, including at least there is two preset passwords in the preset password group;When a preset password match in the unlocking pin with preset password group, the hidden object corresponding with the unlocking pin is opened, the mark of the hidden object does not show.As the method does not directly display the mark of hidden object on the table, so during the normal using terminal of user, common people are generally difficult to recognize that user terminal is mounted with what kind of application program, and then some behaviors of user can be avoided to be spied upon, and improve the security of privacy.

Description

Application control method, device and terminal

Technical field

It relates to the communications field, more particularly to a kind of application control method, device and terminal.

Background technology

With the development of science and technology, smart machine has goed deep into people and has lived.The operation of many very privacies can also be led to Smart mobile phone realization is crossed, for example:Web bank is accessed by bank application, or, being managed money matters by application program of managing money matters Operation etc., although these application programs can improve security performance by arranging opening password, but common people are easy for Can spy upon and which application program, and the title or pattern by application program are installed on user's smart machine, for example:Rectify Application program just stuttered etc., has just revealed the privacy of user to a certain extent.

The content of the invention

To overcome problem present in correlation technique, the disclosure to provide a kind of application control method, device and terminal.

According to the first aspect of the embodiment of the present disclosure, there is provided a kind of application control method, including:

Obtain the trigger action of application identities;

Unblock application is started according to the trigger action;

Obtain the unlocking pin that the unblock application is received;

Judge the unlocking pin whether with preset password group in preset password match, in the preset password group at least Include two preset passwords;

When a preset password match in the unlocking pin with preset password group, open and the unlocking pin phase Corresponding hidden object, the mark of the hidden object do not show.

With reference in a first aspect, in first aspect in the first possible implementation, methods described also includes:

The associated with of hidden object is not shown in file manager.

With reference in a first aspect, in second possible implementation of first aspect, methods described also includes:

At least two objects are obtained, the object includes:File, file or application program;

Generate an application identities to be shown, and hide the mark of all objects, or, determining an object To show object, using the mark that mark is as application identities and is shown, remaining object is hidden for showing object;

In unblock application, the preset password corresponding with object each described is set;

It is determined that with the unblock using corresponding trigger action.

With reference to second possible implementation of first aspect, in first aspect in the third possible implementation, institute The mark for stating hiding remaining object includes:

Delete the mark of object or make the mark of the object transparent invisible.

With reference to second possible implementation of first aspect, in the 4th kind of possible implementation of first aspect, institute State when unblock arranges the preset password corresponding with object each described using in, also include:

Calling interface between the unblock application of the application identities and at least two object is set;

Or,

The calling interface shown between the unblock application of object and remaining object is set.

With reference to second possible implementation of first aspect, in the 5th kind of possible implementation of first aspect, institute Stating method also includes:

To default storage device send corresponding with least two object respectively unlocking pin and with the solution Lock is using corresponding trigger action;

The default storage device includes:Computer, mobile terminal, portable hard drive, SIM, USB flash disk and/or the network storage Platform.

It is with reference in a first aspect, in the 6th kind of possible implementation of first aspect, described to be opened according to the trigger action Dynamic unblock application, including:

Judge whether the trigger action is to pre-set operation, it is described to pre-set operation and include:Touch on touch-screen The moving direction of operation is equal to default moving direction;And/or, motion track is equal to default motion track;And/or, displacement Equal to default displacement, and/or, translational speed is equal to default translational speed, and/or, force dynamics is equal to default force power Degree, and/or, touch frequency is equal to default touch frequency, and, the dynamics that button is pressed is equal to default pressing dynamics;With/ Or, the frequency being pressed is equal to default compression frequency;And/or, it is programmable button to be pressed button, and/or, it is pressed by key mapping Predeterminable area in all buttons, and/or, the relative position concurrently or consecutively or between at least two buttons that are pressed of interval It is set to predeterminated position;

When the trigger action is to pre-set operation, start the unblock application.

According to the second aspect of the embodiment of the present disclosure, there is provided a kind of application program controlling device, including:

Operation acquiring unit, for obtaining the trigger action of application identities;

Unblock application control unit, for starting unblock application according to the trigger action;

Password acquiring unit, for obtaining the unlocking pin that the unblock application is received;

Password judging unit, for judge the unlocking pin whether with preset password group in preset password match, institute State to include at least in preset password group and there are two preset passwords;

Object control unit, for when a preset password match in the unlocking pin and preset password group, beating The hidden object corresponding with the unlocking pin is opened, the mark of the hidden object does not show.

With reference to second aspect, in second aspect in the first possible implementation, described device also includes:

Hidden unit, for the associated with for not showing hidden object in file manager.

With reference to second aspect, in second possible implementation of second aspect, described device also includes:

Object acquisition unit, for obtaining at least two objects, the object includes:File, file or application program;

Object handles unit, is shown for generating an application identities, and hides the mark of all objects, Or, determine object to show object, using it is described show object mark is as application identities and is shown, hide The mark of remaining object;

Preset password setting unit, for arranging the preset password corresponding with object each described in unblock application;

Operation determination unit, for determining with the unblock using corresponding trigger action.

With reference to second possible implementation of second aspect, in second aspect in the third possible implementation, institute Stating object handles unit includes:

Display unit, is shown for generating an application identities, or, using the mark for showing object as application Identify and shown;

Unit is deleted, for when one application identities of generation being shown, the mark of all objects being deleted or institute is made The mark for stating all objects is transparent invisible, or, when using it is described show object mark is as application identities and is shown When, the mark of remaining object is deleted or makes the mark of remaining object transparent invisible.

With reference to second possible implementation of second aspect, in the 4th kind of possible implementation of second aspect, institute Stating device also includes:

First calling interface setting unit, for arranging the tune between at least two object and system-level unblock application Use interface;

Or,

Second calling interface setting unit, for arranging described display between the unblock application of object and remaining object Calling interface.

With reference to second possible implementation of second aspect, in the 5th kind of possible implementation of second aspect, institute Stating device also includes:

Backup units, for sending unlocking pin corresponding with least two object respectively to default storage device And with the unblock using corresponding trigger action;

The default storage device includes:Computer, mobile terminal, portable hard drive, SIM, USB flash disk and/or the network storage Platform.

With reference to second aspect, in the 6th kind of possible implementation of second aspect, the unblock application control unit, bag Include:

Operation judging unit, for judging whether the trigger action is to pre-set operation, the behaviour for pre-setting Work includes:On touch-screen, the moving direction of touch operation is equal to default moving direction;And/or, motion track is equal to default movement Track;And/or, displacement is equal to default displacement, and/or, translational speed is equal to default translational speed, and/or, force Dynamics is equal to default force dynamics, and/or, touch frequency is equal to default touch frequency, and, the dynamics that button is pressed is equal to Default pressing dynamics;And/or, the frequency being pressed is equal to default compression frequency;And/or, it is programmable button to be pressed button, And/or, be pressed predeterminable area of the button in all buttons, and/or, concurrently or consecutively or interval be pressed at least two Relative position between individual button is predeterminated position;

Start control unit, for when the trigger action is to pre-set operation, starting the unblock application.

According to the third aspect of the embodiment of the present disclosure, there is provided a kind of terminal for application program controlling, including:

Processor;

For storing the memory of processor executable;

Wherein, the processor is configured to:

Obtain the trigger action of application identities;

Unblock application is started according to the trigger action;

Obtain the unlocking pin that the unblock application is received;

Judge the unlocking pin whether with preset password group in preset password match, in the preset password group at least Include two preset passwords;

When a preset password match in the unlocking pin with preset password group, open and the unlocking pin phase Corresponding hidden object, the mark of the hidden object do not show.

The technical scheme that embodiment of the disclosure is provided can include following beneficial effect:

The method that disclosure exemplary embodiment is provided, due to different default close in the preset password group of unblock application Object corresponding to code is hidden object, so during the normal use of terminal, the mark of these hidden objects all without It is displayed on the display interface of terminal, and when only in terminal display interface, application identities are triggered, according to the trigger action, Start unblock application, unlocking pin is received using unblock application, then the hidden object corresponding with the unlocking pin is opened, And then allow terminal to open hidden object.

Compared with correlation technique, as the method does not directly display the mark of hidden object on the table, so in user During normal using terminal, common people are generally difficult to recognize that user terminal is mounted with what kind of application program, and then Some behaviors of user can be avoided to be spied upon, improve the security of privacy.

It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.

Description of the drawings

During accompanying drawing herein is merged in specification and the part of this specification is constituted, show the enforcement for meeting the present invention Example, and be used for explaining the principle of the present invention together with specification.

Fig. 1 is a kind of flow chart of the application control method according to an exemplary embodiment.

Fig. 2 is a kind of scene graph according to an exemplary embodiment.

Fig. 3 is the flow chart of step S102 in Fig. 2.

Fig. 4 is a kind of flow chart of the application control method according to an exemplary embodiment.

Fig. 5 is a kind of flow chart of the application control method according to an exemplary embodiment.

Fig. 6 is a kind of block diagram of the application program controlling device according to an exemplary embodiment.

Fig. 7 is a kind of block diagram of the application program controlling device according to an exemplary embodiment.

Fig. 8 is a kind of block diagram of the terminal for application program controlling according to an exemplary embodiment.

Specific embodiment

Here in detail exemplary embodiment will be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.Conversely, they be only with as appended by The example of consistent apparatus and method in terms of some described in detail in claims, the present invention.

Fig. 1 is a kind of flow chart of the application control method according to an exemplary embodiment, as shown in figure 1, The application control method is used in terminal, comprises the following steps.

In step S101, the trigger action of application identities is obtained.

Application identities are the mark being displayed in terminal on display screen, and in the disclosed embodiments, application identities can be Icon, such as the mark of common application program, or the mark that can be slided, such as common slip unblock mark Deng.

As shown in Fig. 2 a kind of scene graph provided for the embodiment of the present disclosure, figure includes:Terminal 1 and application identities 2, should It is displayed on the display interface of terminal 1 with mark 2.

In step s 102, unblock application is started according to the trigger action.

After the trigger action of application identities is got, the solution corresponding with application identities can be started according to trigger action Lock application.

Unblock application can be common virtual digit and/or character keys and input frame, when user clicks on virtual number Word and/or character keys, it is possible in the corresponding numeral of input inframe input and/or character, in addition, unblock application can also be Pattern is unlocked or other unblocks of riddling, for example:Nine grids pattern is unlocked.In the disclosed embodiments, unblock application is chosen as nine Palace grid pattern unblock.

No matter which kind of mode unblock is applied using, and in disclosure exemplary embodiment, unblock application is all to there is two kinds Or two or more unlocking pins.

In the disclosed embodiments, as shown in figure 3, step S102 may comprise steps of.

In step S1021, judge whether the trigger action is to pre-set operation.

The input mode that can be supported according to terminal is different, can arrange it is different pre-set operation, for being provided with The terminal that touch-screen is arranged, pre-sets the moving direction that operation can be touch operation on touch-screen and is equal to default movement side Default motion track, displacement are equal to, motion track it are equal to default displacement, translational speed and is equal to default mobile speed Degree, force dynamics are equal to one or more combination that default force dynamics, touch frequency are equal in default touch frequency.

For the terminal with physical button, pre-set to operate to be equal to for the dynamics that button is pressed and preset Pressing dynamics, the frequency being pressed are programmable button, are pressed button and are located at and own equal to presetting compression frequency, being pressed button Predeterminable area in button, the relative position concurrently or consecutively or between at least two buttons that are pressed of interval are predeterminated position In one or more combination.

When the trigger action is to pre-set operation, in step S1022, start the unblock application, otherwise, knot Line journey.

In step s 103, obtain the unlocking pin that the unblock application is received.

The unlocking pin of receiving user's input in the unblock application interface that terminal starts, when unblock application is nine grids figure When case is unlocked, unlocking pin can be any one line between nine points in nine grids.

In step S104, judge the unlocking pin whether with preset password group in preset password match.

In above-mentioned steps S102, have been described above in disclosure exemplary embodiment, unblock application is to there are two kinds Or two or more unlocking pins, and unlock and can be stored in advance in preset password group using corresponding all unlocking pins It is interior.

In disclosure exemplary embodiment, the different preset passwords in preset password group can respectively with an object phase Correspondence, object can be for file, file or application program etc. here, and the corresponding preset password of different objects is differed. In addition, in the disclosed embodiments, the mark of the object corresponding from the different preset passwords in preset password group is not at end Show on the display interface at end, i.e., corresponding from the different preset passwords in preset password group object is hidden object.

So after the unlocking pin that unblock application is received is got, by judging whether the unlocking pin is default close Preset password in code character matches, and not only can judge whether the unlocking pin of user input is correct, but also can enter one Step judges the object corresponding with the unlocking pin of user input.

When a preset password match in the unlocking pin and preset password group, in step S105, open with The corresponding hidden object of the unlocking pin, the mark of the hidden object do not show, otherwise, terminates flow process.

As shown in Fig. 2 in figure application identities 2 entitled financing, you can with by Alipay, wechat pay and each bank Client etc. is arranged to hidden object, and the preset password of Alipay, wechat payment and each bank client is stored In preset password group, the application identities 2 in Fig. 2 are so clicked on as user, a unblock application will be shown, then user Interior input unlocking pin corresponding with hiden application is applied in the unblock, it is possible to open and the hiden application, and beating Associative operation is carried out in the hiden application opened.The mark of hidden object do not show and refers to and do not show in the display interface of terminal, For example:In terminal display interface, hidden object is designated transparence, is invisible to the naked eye, or, not existing in terminal display interface The mark of hidden object.

The method that disclosure exemplary embodiment is provided, due to different default close in the preset password group of unblock application Object corresponding to code is hidden object, so during the normal use of terminal, the mark of these hidden objects all without It is displayed on the display interface of terminal, and when only in terminal display interface, application identities are triggered, according to the trigger action, Start unblock application, unlocking pin is received using unblock application, then the hidden object corresponding with the unlocking pin is opened, And then allow terminal to open hidden object.

Compared with correlation technique, as the method does not directly display the mark of hidden object on the table, so in user During normal using terminal, common people are generally difficult to recognize that user terminal is mounted with what kind of application program, and then Some behaviors of user can be avoided to be spied upon, improve the security of privacy.

In addition, the method starts unblock application by the trigger action to application identities, and it is hidden from different in unblock input Hide the unlocking pin that the corresponding preset password of object matches, it is possible to directly open the hiden application so that hiding application , when opening, operating procedure is few, and easy to operate, easy to learn for program, reduces the difficulty that user safeguards privacy.

Additionally, for some are for electronic device skilled personnel, when by the mark of application program from terminal After display interface is hidden, these personnel can also be by finding the association of the application program that user hides in the manager of terminal File, this still can reveal the privacy of user to a certain extent.For this purpose, in disclosure exemplary embodiment, the method may be used also To comprise the following steps:

Step a1:The associated with of hidden object is not shown in file manager.

The associated with of hidden object is not shown, can be that the filename of the associated with file manager is deleted, Or, the filename of the associated with file manager can be arranged to the title of mess code or other None- identifieds, it is therefore an objective to Other users are allowed to see amended filename, it is impossible to set up and the relation between hidden object.

By the step, the personal secrets of user can be further improved, it is to avoid to electronic device skilled person Member spies upon the application program that user hides by file manager.

Fig. 4 is a kind of flow chart of the application control method according to an exemplary embodiment, as shown in figure 4, The application control method is used in terminal, comprises the following steps.

In step s 201, at least two objects are obtained.

In this step, at least two objects are obtained, acquisition object, example can be carried out by the mark of selection object Such as:After user opens to hide Options, can pass through to slide to choose the mark of at least two objects, or, clicking at least two The mark of individual object, obtains at least two objects.Furthermore it is also possible to acquisition object is carried out by the title of object, for example: After user opens to hide Options, the title of at least two objects can be input into obtain object.

In disclosure exemplary embodiment, the object includes:File, file or application program.

In step S202, generate an application identities and shown, and hide the mark of all objects.

In disclosure exemplary embodiment, a general mark can be selected to make as application identities and shown Show, and while being also hidden the mark of all objects so that the mark of all objects does not show in the display interface of terminal Show.For example:In Fig. 2, user have chosen the pattern of a moneybag as application program identification, and by Alipay, wechat pay and The mark such as each bank client is all hidden.So allow for final application identities are shown on the display interface of terminal, And not showing the mark of all objects, it is to avoid the mark of all objects is arrived and the problem of leakage privacy by other personnel's pry.

In step S203, the preset password corresponding with object each described is set in unblock application.

After step S202, can also the typing preset password corresponding with each object successively, it is and all default Password storage is used so as to follow-up in preset password group.

In step S204, it is determined that with the unblock using corresponding trigger action.

In this step, can be determined according to the use habit of user and corresponding trigger action is applied with unblock, for example: Some user's customs are long by application identities, control to start unblock application, and some users are then accustomed to double-clicking application identities to control Start unblock application, in addition, also application identities are set to slider bar or other removable marks by user, so should with unblock It is also possible to be slide etc. with corresponding trigger action.

According to the trigger action that user is determined in step S204, after step s 204, above-mentioned Fig. 1 examples can be carried out The step of property embodiment is provided S101~step S105.

The method provided in the embodiment of the present disclosure, generates application identities and is shown, and hides the mark of all objects, So allow for user and arbitrarily unrelated with hidden object mark can be set used as application identities, and then work as other personal observations Application identities on user terminal, also have no way of recognizing any information related to hidden object, improve the peace of privacy of user Quan Xing.

In disclosure another exemplary embodiment, in above-mentioned steps S204, it may also be determined that an object is aobvious Show object, using the mark that mark is as application identities and is shown, remaining object is hidden for showing object.

This mode is especially suitable for the less demanding application program of some personal secrets, for example:User will own The mark of chat software all hide, and using rice chat as showing object, and the mark of rice chat is made to enter as application identities Row shows, after user sees the mark of rice chat, is known that this corresponding hiden application of mark is all chat application, and user After surrounding people observes the display interface of user terminal, although it is observed that the mark of rice chat, but the QQ that hides, wechat etc. are chatted Its software but cannot observe, protect the privacy of user.

In disclosure another exemplary embodiment, after above-mentioned steps S202, the method can also include following step Suddenly.

Step b1:Calling interface between the unblock application of the application identities and at least two object is set.

Or, step b2:The calling interface shown between the unblock application of object and remaining object is set.

Arrange calling interface purpose be:After user is input into a unlocking pin in unblock application, can be by adjusting Opened with Interface Controller object corresponding with the unlocking pin.

This allows in actual applications, and different software is probably to be designed by different businessmans, and this allows for not It cannot be controlled with software each other, by taking step b1 as an example, after an application identities are generated, in order that the application mark The unblock application of knowledge can open different objects, need to arrange between the unblock application of application identities and at least two objects Calling interface.

In some special cases, if two software has same businessman's design, then may between the two softwares Just there is calling interface, for example:Between the QQ Games Softwares such as QQ MSNs and QQ fighting landlords, QQ mahjong, when After being logged on QQ MSNs and being recorded password, then corresponding QQ fighting landlords, QQ mahjong need not just input password Can also log in, this is just illustrated between this few money software already provided with calling interface.

Consider that the mobile terminal of user up till now is more, for example, common are mobile phone, Ipad etc., for different mobile ends End, user may be required for protecting privacy, then user is required for carrying out repeating setting between different mobile terminal Process;In addition, after user is configured according to the application control method on a mobile phone, when user changes mobile phone Afterwards, user can reinstall as needed and change the same software of front mobile phone, now, it is still necessary to the setting repeated by user Process.For this purpose, in disclosure another exemplary embodiment, as shown in figure 5, the method can also be comprised the following steps.

In step S205, unlocking pin corresponding with least two object respectively is sent to default storage device And with the unblock using corresponding trigger action.

Default storage device can include:In computer, mobile terminal, portable hard drive, SIM, USB flash disk and storage platform One or more combination.In the disclosed embodiments, illustrate by taking storage platform as an example, storage platform can be deposited for network cloud Storage space, such user can be stored in unlocking pin and trigger action in network cloud storage space by cloud account, this Sample is between the different mobile terminal of user, or, after user changes mobile terminal, can obtain from network cloud storage space The unlocking pin and trigger action of storage, so as to the setting process without the need for being repeated again so that user can conveniently, simply The setting up procedure of privacy is replicated on ground.

With regard to the step in above-described embodiment, the same steps between different embodiments can be used for reference mutually, different step Between arbitrarily can be combined, and the scheme that obtains still falls within the protection domain of the disclosure after combining.

Fig. 6 is a kind of application program controlling device block diagram according to an exemplary embodiment.With reference to Fig. 6, the device Including operation acquiring unit 11, unblock application control unit 12, password acquiring unit 13, password judging unit 14 and object control Unit 15.

The operation acquiring unit 11 is configured to the trigger action for obtaining application identities.

The unblock application control unit 12 is configured to start unblock application according to the trigger action.

In the disclosure, the unblock application control unit 12 can include:Operation judging unit and startup control unit, its In:

The operation judging unit is configured to judge whether the trigger action is to pre-set operation;

The operation for pre-setting can include:On touch-screen, the moving direction of touch operation is equal to default movement side To;Motion track is equal to default motion track, displacement and is equal to default displacement, translational speed equal to default mobile speed Degree, force dynamics are equal to one or more combination that default force dynamics, touch frequency are equal in default touch frequency, or, The operation for pre-setting can also include:The dynamics that button is pressed is equal to default pressing dynamics, the frequency being pressed etc. In default compression frequency, be pressed button for programmable button, be pressed predeterminable area of the button in all buttons, while or Relative position between at least two buttons that continuous or interval is pressed is one or more combination in predeterminated position;

When the startup control unit is configured as the trigger action to pre-set operation, starting the unblock should With.

The password acquiring unit 13 is configured to obtain the unlocking pin that the unblock application is received.

The password judging unit 14 be configured to judge the unlocking pin whether with preset password group in preset password Including at least in matching, the preset password group has two preset passwords.

The object control unit 15 is configured as a preset password in the unlocking pin and preset password group Timing, opens the hidden object corresponding with the unlocking pin, and the mark of the hidden object does not show.

The device that the embodiment of the present disclosure is provided, in the preset password group applied due to unblock, different preset passwords institute is right The object answered is hidden object, so during the normal use of terminal, the mark of these hidden objects is all without being displayed in On the display interface of terminal, and when only application identities are triggered in terminal display interface, according to the trigger action, start solution Lock application, receives unlocking pin using unblock application, then opens the hidden object corresponding with the unlocking pin, and then make Obtain terminal and can open hidden object.

Compared with correlation technique, as the device does not directly display the mark of hidden object on the table, so in user During normal using terminal, common people are generally difficult to recognize that user terminal is mounted with what kind of application program, and then Some behaviors of user can be avoided to be spied upon, improve the security of privacy.

In another embodiment of the disclosure, the application program controlling device can also include:Hidden unit.

The hidden unit is connected with the object control unit 15, for opening and unlocking pin when object control unit During corresponding hidden object, the associated with of hidden object is not shown in file manager.

In another embodiment of the disclosure, as shown in fig. 7, the application program controlling device can also include:Object acquisition Unit 21, object handles unit 22, preset password setting unit 23 and operation determination unit 24.

The object acquisition unit 21 is configured to obtain at least two objects, and the object includes:File, file are answered Use program;

The object handles unit 22 is configurable to generate an application identities and is shown, and hides all objects Mark, or, determine object to show object, using it is described show object mark is as application identities and is shown Show, hide the mark of remaining object;

In the disclosed embodiments, the object handles unit 22 can include:Display unit and deletion unit, wherein:

The display unit is configurable to generate an application identities and is shown, or, the mark for showing object is made For application identities and shown;

The deletion unit is configured as generating an application identities when being shown, the mark of all objects is deleted or Make the mark of all objects transparent invisible, or, when using it is described show object mark is as application identities and carries out During display, the mark of remaining object is deleted or makes the mark of remaining object transparent invisible.

The preset password setting unit 23 is configured to arrange corresponding with object each described pre- in unblock application If password;

The operation determination unit 24 is configured to determine that with the unblock using corresponding trigger action.When operation determines list Unit determines that operation acquiring unit 11 can just obtain the trigger action of application identities with after the corresponding trigger action of unblock.

In another embodiment of the disclosure, the application program controlling device can also include:With preset password setting unit The first calling interface setting unit being connected or the second calling interface setting unit, wherein:

The first calling interface setting unit is configured to setting at least two object and applies it with system-level unblock Between calling interface;

The second calling interface setting unit be configured to arrange the unblock for showing object using with remaining object Between calling interface.

In another embodiment of the disclosure, the application program controlling device can also include:With preset password setting unit, The backup units that operation determination unit is connected.

The backup units are configured to send solution corresponding with least two object respectively to default storage device Lock cipher and with the unblock using corresponding trigger action.

The default storage device includes:Computer, mobile terminal, portable hard drive, SIM, USB flash disk and/or the network storage Platform.

With regard to the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.

Fig. 8 is a kind of block diagram of the terminal 800 for application program controlling according to an exemplary embodiment.Example Such as, terminal 800 can be mobile phone, and computer, digital broadcast terminal, messaging devices, game console, flat board set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..

With reference to Fig. 8, terminal 800 can include following one or more assemblies:Process assembly 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, input/output(I/O)Interface 812, sensor cluster 814, and Communication component 816.

The integrated operation of 802 usual control terminal 800 of process assembly, such as with display, call, data communication, phase Machine operates and records the associated operation of operation.Process assembly 802 can refer to perform including one or more processors 820 Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more modules, just Interaction between process assembly 802 and other assemblies.For example, process assembly 802 can include multi-media module, many to facilitate Interaction between media component 808 and process assembly 802.

Memory 804 is configured to store various types of data to support the operation in equipment 800.These data are shown Example includes the instruction of any application program or method for operating in terminal 800, and contact data, telephone book data disappear Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM(SRAM), Electrically Erasable Read Only Memory(EEPROM), it is erasable to compile Journey read-only storage(EPROM), programmable read only memory(PROM), read-only storage(ROM), magnetic memory, flash Device, disk or CD.

Power supply module 806 provides electric power for the various assemblies of terminal 800.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute the component that electric power is associated with for terminal 800.

Multimedia groupware 808 is included in the screen of one output interface of offer between the terminal 800 and user.One In a little embodiments, screen can include liquid crystal display(LCD)And touch panel(TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and the touch or slide related duration and pressure.In certain embodiments, many matchmakers Body component 808 includes a front-facing camera and/or post-positioned pick-up head.When equipment 800 be in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and Post-positioned pick-up head can be a fixed optical lens system or have focusing and optical zoom capabilities.

Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind(MIC), when terminal 800 is in operator scheme, such as call model, logging mode and speech recognition mode, microphone is matched somebody with somebody It is set to reception external audio signal.The audio signal for being received can be further stored in memory 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.

, for interface is provided between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interfaces 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.

Sensor cluster 814 includes one or more sensors, and the state for various aspects are provided for terminal 800 is commented Estimate.For example, sensor cluster 814 can detect the opening/closed mode of equipment 800, and the relative positioning of component is for example described Display and keypad of the component for terminal 800, sensor cluster 814 can be with 800 1 components of detection terminal 800 or terminal Position change, user is presence or absence of with what terminal 800 was contacted, 800 orientation of terminal or acceleration/deceleration and terminal 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect when not having any physical contact The presence of object nearby.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.

Communication component 816 is configured to facilitate the communication of wired or wireless way between terminal 800 and other equipment.Terminal 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary enforcement In example, communication component 816 receives the broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication(NFC)Module, to promote junction service.Example Such as, RF identification can be based in NFC module(RFID)Technology, Infrared Data Association(IrDA)Technology, ultra broadband(UWB)Technology, Bluetooth(BT)Technology and other technologies are realizing.

In the exemplary embodiment, terminal 800 can be by one or more application specific integrated circuits(ASIC), numeral letter Number processor(DSP), digital signal processing appts(DSPD), PLD(PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, for performing said method.

In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete said method by the processor 820 of terminal 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory(RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..

A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of terminal During row so that terminal is able to carry out a kind of application control method, methods described includes:

Obtain the trigger action of application identities;

Unblock application is started according to the trigger action;

Obtain the unlocking pin that the unblock application is received;

Judge the unlocking pin whether with preset password group in preset password match, in the preset password group at least Include two preset passwords;

When a preset password match in the unlocking pin with preset password group, open and the unlocking pin phase Corresponding hidden object, the mark of the hidden object do not show.

Those skilled in the art will readily occur to its of the present invention after considering specification and putting into practice invention disclosed herein Its embodiment.The application is intended to any modification of the present invention, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.

It should be appreciated that the precision architecture for being described above and being shown in the drawings is the invention is not limited in, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is limited only by appended claim.

Claims (15)

1. a kind of application control method, it is characterised in that include:
Obtain the trigger action of application identities;
Unblock application is started according to the trigger action;
Obtain the unlocking pin that the unblock application is received;
Judge the unlocking pin whether with preset password group in preset password match, include at least in the preset password group There are two preset passwords;
When a preset password match in the unlocking pin with preset password group, open corresponding with the unlocking pin Hidden object, the mark of the hidden object do not show.
2. method according to claim 1, it is characterised in that methods described also includes:
The associated with of hidden object is not shown in file manager.
3. method according to claim 1, it is characterised in that methods described also includes:
At least two objects are obtained, the object includes:File, file or application program;
Generate an application identities to be shown, and hide the mark of all objects, or, determining that an object is aobvious Show object, using the mark that mark is as application identities and is shown, remaining object is hidden for showing object;
In unblock application, the preset password corresponding with object each described is set;
It is determined that with the unblock using corresponding trigger action.
4. method according to claim 3, it is characterised in that the mark for hiding remaining object includes:
Delete the mark of object or make the mark of the object transparent invisible.
5. method according to claim 3, it is characterised in that described to arrange and object phase each described in unblock application During corresponding preset password, also include:
Calling interface between the unblock application of the application identities and at least two object is set;
Or,
The calling interface shown between the unblock application of object and remaining object is set.
6. method according to claim 3, it is characterised in that methods described also includes:
Unlocking pin corresponding with least two object respectively is sent to default storage device and is answered with the unblock Use corresponding trigger action;
The default storage device includes:Computer, mobile terminal, portable hard drive, SIM, USB flash disk and/or second network storage platform.
7. method according to claim 1, it is characterised in that described that unblock application, bag are started according to the trigger action Include:
Judge whether the trigger action is to pre-set operation, it is described to pre-set operation and include:Touch operation on touch-screen Moving direction be equal to default moving direction;And/or, motion track is equal to default motion track;And/or, displacement is equal to Default displacement, and/or, translational speed is equal to default translational speed, and/or, force dynamics is equal to default force dynamics, And/or, touch frequency is equal to default touch frequency, and, the dynamics that button is pressed is equal to default pressing dynamics;And/or, quilt The frequency of pressing is equal to default compression frequency;And/or, it is programmable button to be pressed button, and/or, button is pressed positioned at institute The predeterminable area having in button, and/or, the relative position concurrently or consecutively or between at least two buttons that are pressed of interval is Predeterminated position;
When the trigger action is to pre-set operation, start the unblock application.
8. a kind of application program controlling device, it is characterised in that include:
Operation acquiring unit, for obtaining the trigger action of application identities;
Unblock application control unit, for starting unblock application according to the trigger action;
Password acquiring unit, for obtaining the unlocking pin that the unblock application is received;
Password judging unit, for judge the unlocking pin whether with preset password group in preset password match, it is described pre- If including at least in cipher code set has two preset passwords;
Object control unit, for when a preset password match in the unlocking pin and preset password group, open with The corresponding hidden object of the unlocking pin, the mark of the hidden object do not show.
9. device according to claim 8, it is characterised in that described device also includes:
Hidden unit, for the associated with for not showing hidden object in file manager.
10. device according to claim 8, it is characterised in that described device also includes:
Object acquisition unit, for obtaining at least two objects, the object includes:File, file or application program;
Object handles unit, is shown for generating an application identities, and is hidden the mark of all objects, or, really A fixed object to show object, using it is described show object mark is as application identities and is shown, hide residue Object mark;
Preset password setting unit, for arranging the preset password corresponding with object each described in unblock application;
Operation determination unit, for determining with the unblock using corresponding trigger action.
11. devices according to claim 10, it is characterised in that the object handles unit includes:
Display unit, is shown for generating an application identities, or, using the mark for showing object as application identities And shown;
Unit is deleted, for when one application identities of generation being shown, the mark of all objects being deleted or the institute is made Have the mark of object transparent invisible, or, when using the mark for showing object as application identities and when being shown, will The mark of remaining object is deleted or makes the mark of remaining object transparent invisible.
12. devices according to claim 10, it is characterised in that described device also includes:
First calling interface setting unit, connects for arranging calling between at least two object and system-level unblock application Mouthful;
Or,
Second calling interface setting unit, applies calling and remaining object between for arranging the unblock for showing object Interface.
13. devices according to claim 10, it is characterised in that described device also includes:
Backup units, for default storage device send corresponding with least two object respectively unlocking pin and With the unblock using corresponding trigger action;
The default storage device includes:Computer, mobile terminal, portable hard drive, SIM, USB flash disk and/or second network storage platform.
14. devices according to claim 8, it is characterised in that the unblock application control unit, including:
Operation judging unit, for judging whether the trigger action is to pre-set operation, the operation bag for pre-setting Include:On touch-screen, the moving direction of touch operation is equal to default moving direction;And/or, motion track is equal to default motion track; And/or, displacement is equal to default displacement, and/or, translational speed is equal to default translational speed, and/or, exert a force dynamics Equal to default force dynamics, and/or, touch frequency is equal to default touch frequency, and, the dynamics that button is pressed is equal to default Pressing dynamics;And/or, the frequency being pressed is equal to default compression frequency;And/or, it is programmable button to be pressed button, and/or, Predeterminable area of the button in all buttons is pressed, and/or, concurrently or consecutively or at least two buttons that are pressed of interval Between relative position be predeterminated position;
Start control unit, for when the trigger action is to pre-set operation, starting the unblock application.
15. a kind of terminals for application program controlling, it is characterised in that include:
Processor;
For storing the memory of processor executable;
Wherein, the processor is configured to:
Obtain the trigger action of application identities;
Unblock application is started according to the trigger action;
Obtain the unlocking pin that the unblock application is received;
Judge the unlocking pin whether with preset password group in preset password match, include at least in the preset password group There are two preset passwords;
When a preset password match in the unlocking pin with preset password group, open corresponding with the unlocking pin Hidden object, the mark of the hidden object do not show.
CN201410155562.3A 2014-04-17 2014-04-17 application control method, device and terminal CN104008348B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410155562.3A CN104008348B (en) 2014-04-17 2014-04-17 application control method, device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410155562.3A CN104008348B (en) 2014-04-17 2014-04-17 application control method, device and terminal

Publications (2)

Publication Number Publication Date
CN104008348A CN104008348A (en) 2014-08-27
CN104008348B true CN104008348B (en) 2017-03-29

Family

ID=51368998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410155562.3A CN104008348B (en) 2014-04-17 2014-04-17 application control method, device and terminal

Country Status (1)

Country Link
CN (1) CN104008348B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036165B (en) * 2014-05-23 2017-09-05 小米科技有限责任公司 Cipher processing method and device
CN104268460B (en) * 2014-09-25 2017-07-28 北京金山安全软件有限公司 The method, device and mobile terminal of password are set
CN105701395A (en) * 2014-11-28 2016-06-22 乐视移动智能信息技术(北京)有限公司 Safe processing method and device of mobile terminal
CN104539627B (en) * 2015-01-16 2017-02-22 努比亚技术有限公司 Safety access method, device and terminal
CN104615930A (en) * 2015-01-20 2015-05-13 深圳市金立通信设备有限公司 Terminal
CN106570386A (en) * 2015-10-09 2017-04-19 中兴通讯股份有限公司 Touch screen unlocking method and system
CN105528534A (en) * 2015-11-27 2016-04-27 东莞酷派软件技术有限公司 Method and terminal for data decryption
CN105528157B (en) * 2015-12-10 2019-10-25 Oppo广东移动通信有限公司 A kind of multimedia content management method and user terminal
CN105631370B (en) * 2015-12-22 2018-12-21 努比亚技术有限公司 Region screen locking method and mobile terminal
CN105938529A (en) * 2016-04-14 2016-09-14 北京小米移动软件有限公司 Page display method and apparatus
CN105867743A (en) * 2016-04-20 2016-08-17 上海斐讯数据通信技术有限公司 Application icon display controlling method and display controlling system
CN106096442B (en) * 2016-06-08 2019-07-23 北京小米移动软件有限公司 Applications trigger method and device
CN106446615A (en) * 2016-09-12 2017-02-22 Tcl集团股份有限公司 Method and device for hiding sensitive applications of intelligent terminal
CN106503520B (en) * 2016-10-18 2020-02-18 维沃移动通信有限公司 Content access method and mobile terminal
CN106874738B (en) * 2017-01-25 2020-03-17 Oppo广东移动通信有限公司 Response method for touch operation and mobile terminal
CN107577927A (en) * 2017-07-25 2018-01-12 深圳天珑无线科技有限公司 A kind of unlocking screen method, the device and intelligent terminal with store function
CN107608614A (en) * 2017-09-07 2018-01-19 北京小米移动软件有限公司 The startup method, apparatus and storage medium of application program
CN107888990B (en) * 2017-10-24 2020-04-10 武汉斗鱼网络科技有限公司 Hidden entry opening method and device in live broadcast

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916166A (en) * 2010-08-19 2010-12-15 中兴通讯股份有限公司 Method for starting application program and mobile terminal
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103605459A (en) * 2013-11-27 2014-02-26 福州瑞芯微电子有限公司 Fast application launching method and fast application launching terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916166A (en) * 2010-08-19 2010-12-15 中兴通讯股份有限公司 Method for starting application program and mobile terminal
CN103366107A (en) * 2013-06-27 2013-10-23 广东欧珀移动通信有限公司 Method, device and mobile phone for protecting access permission of application program
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103605459A (en) * 2013-11-27 2014-02-26 福州瑞芯微电子有限公司 Fast application launching method and fast application launching terminal

Also Published As

Publication number Publication date
CN104008348A (en) 2014-08-27

Similar Documents

Publication Publication Date Title
CN104866750B (en) Using startup method and apparatus
CN105122267B (en) Mobile computing device with a variety of access modules
EP2709031B1 (en) Gesture- and expression-based authentication
CN104850769B (en) Operation executes method and device
CN104125335B (en) Right management method, apparatus and system
CN103797752B (en) For providing certification to control the access of method and computer to(for) computer system
CN101496364B (en) System and method for enhancing safety of wireless network
CN104992091B (en) Access the method, apparatus and storage medium of terminal
CN104503688B (en) The control method and device of intelligent hardware devices
CN104008635B (en) Apparatus control method and device
CN103916233B (en) A kind of information ciphering method and device
CN104391635A (en) Device and method for unlocking screen
CN104966005B (en) A kind of access control method, and terminal device
CN102467462B (en) Method for protecting data stored in device and corresponding device
CN104798311A (en) Mobile terminal and control method thereof
CN103886237A (en) Control method and system for electronic device with fingerprint sensor and touch screen
CN103699825A (en) Display apparatus and method for operating the same
CN103914634A (en) Image encryption method, image encryption device and electronic device
CN104850827B (en) Fingerprint identification method and device
CN104601441B (en) For the authority control method and instant communication client of group chat
CN106028143A (en) Video live broadcasting method and device
CN104503689A (en) Method and device for displaying application interface
EP3261037A1 (en) Method and apparatus for activating virtual card
CN104951682A (en) Privacy protection method and device
CN104615920A (en) Notification message display method and device

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant