CN104732157A - Method and device for hiding and opening applications - Google Patents

Method and device for hiding and opening applications Download PDF

Info

Publication number
CN104732157A
CN104732157A CN201510148437.4A CN201510148437A CN104732157A CN 104732157 A CN104732157 A CN 104732157A CN 201510148437 A CN201510148437 A CN 201510148437A CN 104732157 A CN104732157 A CN 104732157A
Authority
CN
China
Prior art keywords
application
type
information
application icon
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510148437.4A
Other languages
Chinese (zh)
Other versions
CN104732157B (en
Inventor
刘岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Technology Shenzhen Co Ltd
Original Assignee
Coolpad Software Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Technology Shenzhen Co Ltd filed Critical Coolpad Software Technology Shenzhen Co Ltd
Priority to CN201510148437.4A priority Critical patent/CN104732157B/en
Priority to PCT/CN2015/077991 priority patent/WO2016155072A1/en
Publication of CN104732157A publication Critical patent/CN104732157A/en
Application granted granted Critical
Publication of CN104732157B publication Critical patent/CN104732157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a method and device for hiding and opening applications. The method includes the steps that a target operation instruction to first type application icons by a current user is acquired; the type of the target operation instruction is analyzed according to a preset instruction type; one or more second type applications corresponding to the first type application icons are determined according to the corresponding relation between a preset application icon and the second type applications under the condition that the target operation instruction is in the second instruction type; the second type applications corresponding to the target operation instruction are opened in one or more second type applications according to the corresponding relation of the pre-established second type applications and the operation instruction. By means of the method and device, the applications needing to be hidden by the user on a terminal can be hidden, normal use of the applications cannot be affected, the safety of the terminal in the using process can be improved, and the using experience of the user can be improved as well.

Description

A kind of application is hidden, deployment method and device
Technical field
The application relates to communication technical field, particularly relates to that a kind of application is hidden, deployment method and device.
Background technology
Developing rapidly along with electronic technology, the speed of development of terminal is more and more faster.At present, terminal can install multiple application, people can open application and perform respective operations.Such as: record in the notepad appli-cation of terminal and recently plan, in book keeping operation this application, record receipts and expenditures matters, or, in social activity application, carry out communication with friend contact, etc.In the research process of terminal, inventor find: along with terminal function from strength to strength, user has the demand of application icon on concealed terminal display interface gradually.
Such as: for Alipay application on terminal demonstration interface, include user's private information in Alipay application, so user wishes the icon can hiding Alipay application, in case other people open Alipay application.And for example: for the calendar application on terminal demonstration interface, because the frequency of utilization of calendar application is less, user wishes the application icon of hiding calendar, so that at display interface for other application icons provide position.
At present, do not have application drawing calibration method on concealed terminal in prior art, so a kind of technological means of needs carrys out the application on concealed terminal now, but do not affect the normal use of application, to improve terminal security in use, and the use sense promoting user is subject to.
Summary of the invention
Technical scheme provided by the invention, needs the application of hiding according to user on user's request concealed terminal, hides the normal use not affecting while needing hiden application and hide with being hidden application, improves the security of terminal in application use procedure
The technological means that the application provides is as follows:
A deployment method for application, comprising:
Obtain active user to the object run instruction of first kind application icon;
According to the instruction type preset, analyze the type of described object run instruction;
When the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state;
In the Second Type application of setting up in advance with the corresponding relation of operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction and apply.
Preferably, the described Second Type application setting up in advance, with the corresponding relation of operational order, in described one or more Second Type application, is opened the Second Type corresponding with described object run instruction and is applied, comprising:
In described Second Type application with the corresponding relation of operational order, determine all operations instruction that described one or more Second Type application target set of applications is corresponding;
In described all operations instruction, judge whether the operational order consistent with described object run instruction;
If had, open the one or more Second Types corresponding with described operational order and apply;
If nothing, then quit a program.
Preferably, described object run instruction comprises:
Click described intended application icon first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Double-click described intended application icon first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Click described intended application icon first kind application icon, meanwhile, key in pressing volume; Or
Click described intended application icon first kind application icon, meanwhile, key under pressing volume; Or
Three hit described intended application icon first kind application icon.
Preferably, when described object run instruction comprises characteristics of human body's information of active user, then in described all operations instruction, judge whether the operational order consistent with described object run instruction, comprising:
In the default characteristics of human body's information comprised in all operations instruction, judge whether the default characteristic information that characteristics of human body's information of active user is consistent.
Preferably, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; In the default characteristics of human body's information then comprised in all operations instruction, judge whether to comprise the default characteristic information that characteristics of human body's information of active user is consistent:
After utilizing finger print acquisition module to gather the finger print information of described active user, judge that whether the finger print information of described active user is consistent with preset fingerprint information; And/or
After utilizing image capture module to gather the image information of described active user, judge that whether the image information of described active user is consistent with pre-set image information; And/or
After utilizing sound acquisition module to gather the acoustic information of described active user, judge that whether the acoustic information of described active user is consistent with preset sound information.
A hidden method for application, comprising:
Determine first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed;
Corresponding operational order is arranged to each Second Type application, and the described Second Type application operational order corresponding with it is bound;
Described first kind application icon and described one or more Second Type are applied and binds;
Delete the application icon of described one or more Second Type application.
A device for opening for application, comprising:
Acquiring unit, obtains active user to the object run instruction of intended application icon first kind application icon in first kind set of applications for obtaining active user to the object run instruction of first kind application icon; Wherein, described first kind set of applications comprises the application of one or more first kind, the corresponding application icon of each first kind application;
Analytic unit, for according to the instruction type preset, analyzes the type of described object run instruction;
First determining unit, for when the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state;
Open unit, in the corresponding relation of the Second Type application of setting up in advance and operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction and apply.
Preferably, open unit described in comprise:
Second determining unit, in the corresponding relation of described Second Type application and operational order, determines all operations instruction that described one or more Second Type application is corresponding;
Judging unit, in described all operations instruction, judges whether the operational order consistent with described object run instruction;
Second opens unit, for there being the operational order consistent with described object run instruction in all operations instruction, opening the one or more Second Types corresponding with described operational order and applying;
Exit unit, in all operations instruction without consistent with described object run instruction operational order, quit a program.
Preferably, described object run instruction comprises:
Click described intended application icon first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Double-click described intended application icon first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Click described intended application icon first kind application icon, meanwhile, key in pressing volume; Or
Click described intended application icon first kind application icon, meanwhile, key under pressing volume; Or
Three hit described intended application icon first kind application icon.
Preferably, when described object run instruction comprises characteristics of human body's information of active user, then judging unit, specifically in default characteristics of human body's information of comprising in all operations instruction, judges whether the default characteristic information that characteristics of human body's information of active user is consistent.
Preferably, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; Then described judging unit, comprising:
First judging unit, for after utilizing finger print acquisition module to gather the finger print information of described active user, judges that whether the finger print information of described active user is consistent with preset fingerprint information; And/or
Second judging unit, for after utilizing image capture module to gather the image information of described active user, judges that whether the image information of described active user is consistent with pre-set image information; And/or
3rd judging unit, for after utilizing sound acquisition module to gather the acoustic information of described active user, judges that whether the acoustic information of described active user is consistent with preset sound information.
A concealing device for application, comprising:
3rd determining unit, for determining first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed;
Binding unit, for arranging corresponding operational order to each Second Type application, and binds the described Second Type application operational order corresponding with it; Described first kind application icon and described one or more Second Type are applied and binds;
Delete cells, for deleting the application icon of described one or more Second Type application.
Compared with prior art, the application has the following advantages:
The application, for method part, provides two independent claims: the hidden method of application icon, and, the deployment method of application icon.Two independent claims comprise corresponding technical characteristic: be concealed with one or more Second Type application icon under first kind application icon.So there is unicity between two independent claims.
In the embodiment of the present application, in advance user is needed the Second Type application of hiding, under being hidden in first kind application icon.Only at the operational order to first kind application icon, when meeting the condition opening Second Type application, just open Second Type application.So the embodiment of the present application the user on concealed terminal can either need the application icon hidden, and do not affect again the normal use of this application, so can improve terminal security in use, and the use sense promoting user is subject to.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present application or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the application, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the disclosed a kind of application hidden method schematic flow sheet of the embodiment of the present application;
Fig. 2 is a kind of schematic flow sheet applying deployment method disclosed in the embodiment of the present application;
Fig. 3 is a kind of schematic flow sheet applying deployment method disclosed in the embodiment of the present application;
Fig. 4 is a kind of schematic flow sheet applying deployment method scene embodiment disclosed in the embodiment of the present application;
Fig. 5 is a kind of schematic diagram applied in deployment method scene embodiment before icon hiding and after icon hiding disclosed in the embodiment of the present application;
Fig. 6 is a kind of structural representation applying device for opening disclosed in the embodiment of the present application;
Fig. 7 is a kind of disclosed in the embodiment of the present application applies in device for opening the schematic diagram opening unit;
Fig. 8 is a kind of schematic diagram applying judging unit in device for opening disclosed in the embodiment of the present application;
Fig. 9 is the disclosed a kind of application concealing device schematic flow sheet of the embodiment of the present application.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, be clearly and completely described the technical scheme in the embodiment of the present application, obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
Conveniently subsequent descriptions, user does not temporarily need the icon hidden to be set to first kind application icon by the application, and the application corresponding with first kind application icon is called that the first kind is applied.The icon of user at present for hiding is set to Second Type application icon, and the application corresponding with Second Type application icon is called that Second Type is applied.
At present, terminal is provided with numerous application, application can be: QQ, micro-letter, microblogging, and calendar, etc. application program.Be applied in display interface to show in the mode of application icon.After user clicks application icon, the application icon that terminal recognition user clicks, and enter in the application corresponding with this application icon.So the application icon at terminal demonstration interface, can as the entrance entering application.
First the application introduces the hiding process of application icon, that is: the application entrance applied by one or more Second Type, is hidden in the process under first kind application icon.As shown in Figure 1, concrete process of hiding comprises step S101 ~ S104:
Step S101: determine first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed.
First, terminal demonstration interface comprises multiple application icon, user is not temporarily needing in the icon hidden, and selects an icon as first kind application icon.The application entrance of one or more application to be concealed can be hidden under first kind application icon.
Then, applying for the one or more Second Types be hidden under first kind application icon of user's selection is received.
Step S102: corresponding operational order is arranged to each Second Type application, and the described Second Type application operational order corresponding with it is bound.
If Second Type application be hidden in after under first kind application icon, there will be such situation: first kind application icon is simultaneously as the application entrance that first kind application and Second Type are applied.In such cases, if after user is to the instruction of first kind application icon executable operations, just occurs that terminal is uncertain and should enter first kind application, still enter the problem of Second Type application.
In order to prevent the uncertain problem entering that application of terminal, the operational order entering first kind application is set as first kind instruction type, and will enter Second Type application settings is Equations of The Second Kind instruction type.When user is first kind instruction type to the type of the operational order of first kind application icon, then enters the first kind corresponding with first kind application icon and apply; When user is Equations of The Second Kind instruction type to the type of the operational order of first kind application icon, then enter Second Type application.
When there being multiple Second Type to be concealed to apply under first kind icon, in order to determine to enter the application of that Second Type, after determining Equations of The Second Kind instruction type, for each Second Type application settings operational order under the first application icon to be concealed, and by operational order binding corresponding with it for Second Type application, to build the corresponding relation of Second Type application and operational order.
When user wants to open the Second Type application be hidden under first kind application icon, only need to apply corresponding operational order to the execution of first kind application icon with this Second Type.Be understandable that, the corresponding operational order of each Second Type application, the operational order of multiple Second Type application both can be identical, also can be different.
Step S103: described first kind application icon and described one or more Second Type are applied and binds.
After step S101 determines first kind application icon (hiden application icon) and one or more Second Type application (application to be concealed), can by first kind application icon, with, the application entrance binding of all Second Type application under first kind icon to be concealed; To build the corresponding relation that first kind application icon and Second Type are applied.So that in subsequent process, can realize operating the function that first kind application icon enters Second Type application.
Step S104: the application icon deleting described one or more Second Type application.
After first kind application icon and Second Type being applied and binding, terminal just can enter Second Type application from first kind application icon.Then the application icon that one or more Second Types that terminal demonstration interface is bound with first kind application icon are applied is deleted, to realize the object of the icon hiding Second Type application on terminal demonstration interface.
After execution of step S101 ~ step S104, just construct the corresponding relation that first kind application icon and Second Type are applied, and, build the corresponding relation of Second Type application and operational order.After the application icon that the one or more Second Types deleted and first kind application icon is bound are applied, on terminal demonstration interface, nothing and first kind application icon bind the application icon that one or more Second Type is applied, and complete and one or more Second Type application first kind is applied the process be hidden under first kind application icon.
For other first kind application icons, and other Second Types to be concealed are applied, the relation of hiding can be set up by the process shown in Fig. 1, applied by other Second Types to be concealed, under being hidden in other first kind application icons, concrete implementation repeats no longer one by one.
After performing above-mentioned hiding process in advance, introduce the concrete implementation that the application opens application below.The application provides a kind of deployment method of application, is applied to the controller of terminal, as shown in Figure 2, comprises step S201 ~ S204:
Step S201: obtain active user to the object run instruction of first kind application icon.
Terminal receives the current application icon not needing to hide that active user selects on display interface, and using this application icon as first kind application icon.Then user is obtained to first kind application icon performance objective operational order.
Step S202: according to the instruction type preset, analyzes the type of described object run instruction.
The instruction type preset comprises: first kind instruction type and Equations of The Second Kind instruction type.Wherein, the first instruction type is: the instruction type entering first kind application; Equations of The Second Kind instruction type is: the instruction type entering the Second Type application be hidden under first kind application icon.
The first kind instruction type preset specifically has: click described first kind application icon.
The Equations of The Second Kind instruction type preset specifically has: (1) clicks described first kind application icon, meanwhile, gathers characteristics of human body's information of active user; (2) double-click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; (3) described first kind application icon is clicked, meanwhile, key in pressing volume; (4) described first kind application icon is clicked, meanwhile, key under pressing volume; Click described first kind application icon (5) three times.
Be understandable that, the first kind instruction type preset and the Equations of The Second Kind instruction type preset can also comprise other instruction types, will not enumerate at this.
In this step, terminal combines the type of the instruction type evaluating objects operational order preset, and determines that the type of object run instruction is first kind instruction type, or, Equations of The Second Kind instruction type.After the type of evaluating objects operational order, there will be two kinds of situations, is described in detail below to both of these case:
The first situation: object run instruction is first kind instruction type;
For the first situation, owing to being concealed with the application entrance of Second Type application under first kind application icon, so first kind application icon is the application entrance of first kind application and the application entrance of Second Type application simultaneously.The operational order of user's input is first kind instruction type, applies so now enter the first kind corresponding with first kind application icon.
The second situation: object run instruction is Equations of The Second Kind instruction type;
For the second situation, first kind application icon is the application entrance of first kind application and the application entrance of Second Type application simultaneously.And the operational order type of user's input is Equations of The Second Kind instruction type, so after meeting certain condition, can enter in the Second Type application be hidden under first kind application icon.
The first situation above-mentioned is comparatively simple, and the execution of the second situation is comparatively complicated.Therefore subsequent step will be described in detail to the second situation.
Step S203: when the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state.
In the second situation of step S202, the first kind application icon built based on Fig. 1 applies corresponding hiding relation with Second Type, after the first kind application icon obtaining user operation, the one or more Second Types application be hidden under first kind application icon can be searched.
Step S204: in the Second Type application of setting up in advance with the corresponding relation of operational order, in described one or more Second Type application, opens the Second Type corresponding with described object run instruction and applies.
After the implementation of Fig. 1, be just built with the corresponding relation of Second Type application and operational order, wherein, all corresponding operational order of each Second Type application.
Introduce the concrete implementation of step S204 below, as shown in Figure 3, comprise the following steps S301 ~ S304:
Step S301: in described Second Type application with the corresponding relation of operational order, determines all operations instruction that described one or more Second Type application is corresponding.
After step S203 determines the one or more Second Type application under first kind application to be concealed, according to the corresponding relation of Second Type application with operational order, determine the operational order that the application of each Second Type is corresponding.The operational order that all Second Type application are corresponding, i.e. all operations instruction.
Step S302: in described all operations instruction, judges whether the operational order consistent with described object run instruction; If had, then enter step S303, otherwise enter step S304.
When object run instruction type is Equations of The Second Kind instruction type, in order to protect the security being hidden in Second Type application under first kind application icon, also need to judge that whether object run instruction is correct; If target instruction target word is correct, just can opens the Second Type application be hidden under first kind application icon, otherwise Second Type application can not be opened.
Wherein, open the Second Type application be hidden under first kind application icon, be specially: if in the corresponding hiding Second Type application of object run instruction, then open a Second Type application.If the corresponding multiple hiding Second Type application of object run instruction, then open the application of multiple Second Type.
Visible, judge that the process whether object run instruction is correct is: in all operations instruction, judge whether the operational order that object run instruction is consistent; If had, then prove that object run instruction is correct, if not, then prove that object run instruction is incorrect.
Can be learnt the specific descriptions of the Equations of The Second Kind instruction type preset by step S202, described object run instruction can comprise:
1) click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; (2) double-click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; (3) described first kind application icon is clicked, meanwhile, key in pressing volume; (4) described first kind application icon is clicked, meanwhile, key under pressing volume; Click described first kind application icon (5) three times.Be understandable that, object run instruction is any one in the Equations of The Second Kind instruction type preset.
Because object run instruction has multiple situation, but substantially can be divided into two classes, include characteristics of human body's information in a class, in another kind of, do not comprise characteristics of human body's information.So judge the process whether object run instruction is correct, following two kinds of situations can be summed up as:
The first situation: object run instruction comprises characteristics of human body's information of active user.
When described object run instruction comprises characteristics of human body's information of active user, then in described all operations instruction, judge whether the operational order consistent with described object run instruction, comprise: in the default characteristics of human body's information comprised in all operations instruction, judge whether the default characteristic information consistent with characteristics of human body's information of active user.
Wherein, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; Certainly can also comprise other people body characteristics information, such as human eye iris etc., will not enumerate at this.
For characteristics of human body's packets of information containing finger print information, image information or acoustic information, in described all operations instruction, judge whether the process of the operational order consistent with described object run instruction, be described in detail:
(1) be the situation of finger print information for characteristics of human body's information, after utilizing finger print acquisition module to gather the finger print information of described active user, judge that whether the finger print information of described active user is consistent with preset fingerprint information.If consistent, then represent in all operations instruction have the operational order consistent with object run instruction; Otherwise represent in all operations instruction without the operational order consistent with object run instruction.
Preferably, described finger print acquisition module is arranged at the back side of terminal display screen, thus user can be facilitated when handheld terminal, and user can be facilitated to touch finger print acquisition module.
(2) be the situation of image information for characteristics of human body's information, after utilizing image capture module to gather the image information of described active user, judge that whether the image information of described active user is consistent with pre-set image information.If consistent, then represent in all operations instruction have the operational order consistent with object run instruction; Otherwise represent in all operations instruction without the operational order consistent with object run instruction.
In preferred situation, the image information of active user can be the facial image of active user; The pre-set image information of the image information of active user and default characteristics of human body's information is carried out Characteristic Contrast.
(3) be the situation of acoustic information for characteristics of human body's information, after utilizing sound acquisition module to gather the acoustic information of described active user, judge that whether the acoustic information of described active user is consistent with preset sound information.If consistent, then represent in all operations instruction have the operational order consistent with object run instruction; Otherwise represent in all operations instruction without the operational order consistent with object run instruction.
Characteristics of human body's information be image information and/or acoustic information time, technically can implementation procedure, but due to the accuracy rate of the image that gathers and sound not high, cause the accuracy rate of secondary proof procedure not high.That is: the image information owing to gathering active user may be inconsistent with the shooting position of pre-set image information, or residing environment is comparatively noisy when gathering the acoustic information of active user, cause the situation having noise in acoustic information, and occur that holder being takeed for is the situation stealing taker; So the finger print information accuracy gathering active user is comparatively speaking higher.
Foregoing is the detailed introduction of the first situation, introduces the implementation of the second situation below:
The second situation: the characteristics of human body's information not comprising active user in object run instruction.
When not comprising characteristics of human body's information of active user in described object run instruction, due to the information that instruction changes with user's change, so in described all operations instruction, directly judge whether the operational order consistent with described object run instruction.If consistent, then represent in all operations instruction have the operational order consistent with object run instruction; Otherwise represent in all operations instruction without the operational order consistent with object run instruction.
Then the step S303 of Fig. 3 is performed: open the one or more Second Types corresponding with described operational order and apply;
If have the operational order consistent with object run instruction in all operations instruction, then represent that object run instruction is correct.Obtain the one or more Second Types corresponding with object run instruction to apply, then open the application of one or more Second Type.
Step S304: quit a program.
If operational order not consistent with object run instruction in all operations instruction, then represent object run instruction errors, now quit a program.
Foregoing journey is open the concrete implementation of the application be hidden under first kind application icon, as shown in the above, in the embodiment of the present application, in advance user is needed the Second Type application of hiding, under being hidden in first kind application icon.Only at the operational order to first kind application icon, when meeting the condition opening Second Type application, just open Second Type application.So the embodiment of the present application the user on concealed terminal can either need the application icon hidden, and do not affect again the normal use of this application, so can improve terminal security in use, and the use sense promoting user is subject to.
Introduce a scene embodiment of the application below:
User is provided with a privacy application billing this application in terminal, does not wish that other people check the content of book keeping operation this application.Can conventionally in mode, book keeping operation this application is encrypted and is solved.But which people up hill and dale, fully can not play the object of protection privacy application, because other people still can see the icon of book keeping operation this application on terminal demonstration interface.So user wishes the application icon hiding book keeping operation this application, in order to avoid other people spy upon the content in book keeping operation this application.
Under being hidden in calendar application for user to book keeping operation this application, the process hidden, open and close of book keeping operation this application being described in detail, as shown in Figure 4, comprising the following steps S401 ~ S403:
Step S401: under the application entrance of book keeping operation this application is hidden in the application icon of calendar.
Book keeping operation this application be user privacy application, calendar is common application, the present embodiment with this application of keeping accounts, under being hidden in the application icon of calendar.In order to not affect the use of calendar application, meanwhile, also in order to ensure the security of book keeping operation this application, for book keeping operation this application sets a kind of operational order.
The detailed process of setting operation instruction comprises: start finger print acquisition module, gathers the fingerprint of active user, and is saved in security module by the fingerprint of active user; Open so that follow-up in book keeping operation this application process and use.
By the fingerprint of book keeping operation this application, active user and calendar application binding, set up the corresponding relation between three.Then, delete the application icon of book keeping operation this application at display interface, thus realize the object hiding book keeping operation this application.
Refer to Fig. 5, for this step performs front and after performing result schematic diagram.
Step S402: open the book keeping operation this application be hidden under calendar application icon.
After step S401 hides book keeping operation this application, introduce in this step and how to open book keeping operation this application, and calendar application.If user directly clicks the application icon of calendar, then enter calendar application.
If active user will gather the finger presses of fingerprint on finger print acquisition module in advance, terminal gathers user fingerprints information, and the finger print information of current collection and the finger print information prestored is contrasted; If both are consistent, represent that user is validated user.If fingerprint is inconsistent, expression user is disabled user, then enter common application, or quits a program.
After determining that user is validated user, whether enter privacy mode to user's prompting, if user confirms to enter privacy mode, then enter book keeping operation this application.User can use each function in book keeping operation this application.
Step S403: close book keeping operation this application.
Beat back out application program in the interface point of book keeping operation this application, book keeping operation this application can be exited.In order to continue protection book keeping operation this application, after exiting book keeping operation this application, continuing the calendar application that display is bound with book keeping operation this application in terminal demonstration interface, not showing the icon of book keeping operation this application all the time.
Introduce the device embodiment corresponding with application deployment method below, as shown in Figure 6, this application provides a kind of side's of opening device of application, comprising:
Acquiring unit 61, for obtaining the object run instruction first kind application icon of active user to first kind application icon.
Analytic unit 62, for according to the instruction type preset, analyzes the type of described object run instruction.
First determining unit 63, for when the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state.
Open unit 64, in the corresponding relation of the Second Type application of setting up in advance and operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction and apply.
Wherein, as shown in Figure 7, open unit 64 described in comprise:
Second determining unit 71, in the corresponding relation of described Second Type application and operational order, determines all operations instruction that described one or more Second Type application is corresponding;
Judging unit 72, in described all operations instruction, judges whether the operational order consistent with described object run instruction;
Second opens unit 73, for there being the operational order consistent with described object run instruction in all operations instruction, opening the one or more Second Types corresponding with described operational order and applying;
Exit unit 74, in all operations instruction without consistent with described object run instruction operational order, quit a program.
Wherein, when described object run instruction comprises characteristics of human body's information of active user, judging unit 72, specifically in default characteristics of human body's information of comprising in all operations instruction, judges whether the default characteristic information that characteristics of human body's information of active user is consistent.
As shown in Figure 8, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; Then described judging unit 72, comprising:
First judging unit 81, for after utilizing finger print acquisition module to gather the finger print information of described active user, judges that whether the finger print information of described active user is consistent with preset fingerprint information; And/or
Second judging unit 82, for after utilizing image capture module to gather the image information of described active user, judges that whether the image information of described active user is consistent with pre-set image information; And/or
3rd judging unit 83, for after utilizing sound acquisition module to gather the acoustic information of described active user, judges that whether the acoustic information of described active user is consistent with preset sound information.
In the side's of opening device of the application provided in the application, described object run instruction specifically comprises:
Click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Double-click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Click described first kind application icon, meanwhile, key in pressing volume; Or
Click described first kind application icon, meanwhile, key under pressing volume; Or
Three hit described first kind application icon.
As shown in Figure 9, this application provides a kind of concealing device of application, comprising:
3rd determining unit 91, for determining first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed;
Binding unit 92, for arranging corresponding operational order to each Second Type application, and binds the described Second Type application operational order corresponding with it; Described first kind application icon and described one or more Second Type are applied and binds;
Delete cells 93, for deleting the application icon of described one or more Second Type application.
In the embodiment of the present application, in advance user is needed the Second Type application of hiding, under being hidden in first kind application icon.Only at the operational order to first kind application icon, when meeting the condition opening Second Type application, just open Second Type application.So the embodiment of the present application the user on concealed terminal can either need the application icon hidden, and do not affect again the normal use of this application, so can improve terminal security in use, and the use sense promoting user is subject to.
If the function described in the present embodiment method using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computing equipment read/write memory medium.Based on such understanding, the part of the part that the embodiment of the present application contributes to prior art or this technical scheme can embody with the form of software product, this software product is stored in a storage medium, comprising some instructions in order to make a computing equipment (can be personal computer, server, mobile computing device or the network equipment etc.) perform all or part of step of method described in each embodiment of the application.And aforesaid storage medium comprises: USB flash disk, portable hard drive, ROM (read-only memory) (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. various can be program code stored medium.
In this instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiment, between each embodiment same or similar part mutually see.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the application.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein when not departing from the spirit or scope of the application, can realize in other embodiments.Therefore, the application can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (12)

1. a deployment method for application, is characterized in that, comprising:
Obtain active user to the object run instruction of first kind application icon;
According to the instruction type preset, analyze the type of described object run instruction;
When the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state;
In the Second Type application of setting up in advance with the corresponding relation of operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction and apply.
2. the method for claim 1, it is characterized in that, the described Second Type setting up in advance is applied in the corresponding relation with operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction to apply, comprising:
In described Second Type application with the corresponding relation of operational order, determine all operations instruction that described one or more Second Type application is corresponding;
In described all operations instruction, judge whether the operational order consistent with described object run instruction;
If had, open the one or more Second Types corresponding with described operational order and apply;
If nothing, then quit a program.
3. method as claimed in claim 2, it is characterized in that, described object run instruction comprises:
Click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Double-click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Click described first kind application icon, meanwhile, key in pressing volume; Or
Click described first kind application icon, meanwhile, key under pressing volume; Or
Three hit described first kind application icon.
4. method as claimed in claim 3, it is characterized in that, when described object run instruction comprises characteristics of human body's information of active user, then in described all operations instruction, judge whether the operational order consistent with described object run instruction, comprising:
In the default characteristics of human body's information comprised in all operations instruction, judge whether the default characteristic information that characteristics of human body's information of active user is consistent.
5. method as claimed in claim 4, it is characterized in that, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; In the default characteristics of human body's information then comprised in all operations instruction, judge whether to comprise the default characteristic information that characteristics of human body's information of active user is consistent:
After utilizing finger print acquisition module to gather the finger print information of described active user, judge that whether the finger print information of described active user is consistent with preset fingerprint information; And/or
After utilizing image capture module to gather the image information of described active user, judge that whether the image information of described active user is consistent with pre-set image information; And/or
After utilizing sound acquisition module to gather the acoustic information of described active user, judge that whether the acoustic information of described active user is consistent with preset sound information.
6. a hidden method for application, is characterized in that, comprising:
Determine first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed;
Corresponding operational order is arranged to each Second Type application, and the described Second Type application operational order corresponding with it is bound;
Described first kind application icon and described one or more Second Type are applied and binds;
Delete the application icon of described one or more Second Type application.
7. a device for opening for application, is characterized in that, comprising:
Acquiring unit, for obtaining the object run instruction first kind application icon of active user to first kind application icon;
Analytic unit, for according to the instruction type preset, analyzes the type of described object run instruction;
First determining unit, for when the type of described object run instruction is Equations of The Second Kind instruction type, according to the corresponding relation set up application icon and Second Type in advance and apply, determine that the one or more Second Types corresponding with described first kind application icon are applied; Wherein, the application entrance of described one or more Second Type application, under being all hidden in described first kind application icon, and the application icon of described one or more Second Type application is hidden state;
Open unit, in the corresponding relation of the Second Type application of setting up in advance and operational order, in described one or more Second Type application, open the Second Type corresponding with described object run instruction and apply.
8. device as claimed in claim 7, is characterized in that, described in open unit and comprise:
Second determining unit, in the corresponding relation of described Second Type application and operational order, determines all operations instruction that described one or more Second Type application is corresponding;
Judging unit, in described all operations instruction, judges whether the operational order consistent with described object run instruction;
Second opens unit, for there being the operational order consistent with described object run instruction in all operations instruction, opening the one or more Second Types corresponding with described operational order and applying;
Exit unit, in all operations instruction without consistent with described object run instruction operational order, quit a program.
9. device as claimed in claim 8, it is characterized in that, described object run instruction comprises:
Click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Double-click described first kind application icon, meanwhile, gather characteristics of human body's information of active user; Or
Click described first kind application icon, meanwhile, key in pressing volume; Or
Click described first kind application icon, meanwhile, key under pressing volume; Or
Three hit described first kind application icon.
10. device as claimed in claim 9, it is characterized in that, when described object run instruction comprises characteristics of human body's information of active user, then judging unit, specifically in default characteristics of human body's information of comprising in all operations instruction, judge whether the default characteristic information that characteristics of human body's information of active user is consistent.
11. devices as claimed in claim 10, is characterized in that, described default characteristics of human body's information comprises described preset fingerprint information, and/or described pre-set image information, and/or described preset sound information; Then described judging unit, comprising:
First judging unit, for after utilizing finger print acquisition module to gather the finger print information of described active user, judges that whether the finger print information of described active user is consistent with preset fingerprint information; And/or
Second judging unit, for after utilizing image capture module to gather the image information of described active user, judges that whether the image information of described active user is consistent with pre-set image information; And/or
3rd judging unit, for after utilizing sound acquisition module to gather the acoustic information of described active user, judges that whether the acoustic information of described active user is consistent with preset sound information.
The concealing device of 12. 1 kinds of application, is characterized in that, comprising:
3rd determining unit, for determining first kind application icon, and the one or more Second Type application under described first kind application icon to be concealed;
Binding unit, for arranging corresponding operational order to each Second Type application, and binds the described Second Type application operational order corresponding with it; Described first kind application icon and described one or more Second Type are applied and binds;
Delete cells, for deleting the application icon of described one or more Second Type application.
CN201510148437.4A 2015-03-31 2015-03-31 A kind of application hides, deployment method and device Active CN104732157B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510148437.4A CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device
PCT/CN2015/077991 WO2016155072A1 (en) 2015-03-31 2015-04-30 Method and apparatus for hiding and opening applications

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510148437.4A CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device

Publications (2)

Publication Number Publication Date
CN104732157A true CN104732157A (en) 2015-06-24
CN104732157B CN104732157B (en) 2018-09-07

Family

ID=53456037

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510148437.4A Active CN104732157B (en) 2015-03-31 2015-03-31 A kind of application hides, deployment method and device

Country Status (2)

Country Link
CN (1) CN104732157B (en)
WO (1) WO2016155072A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404443A (en) * 2015-10-27 2016-03-16 努比亚技术有限公司 Application starting method and apparatus
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN108052248A (en) * 2017-11-30 2018-05-18 维沃移动通信有限公司 The startup method, apparatus and mobile terminal of a kind of application program
CN108229149A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 A kind of method and apparatus of data protection
CN108563932A (en) * 2018-04-10 2018-09-21 Oppo广东移动通信有限公司 Application control method and apparatus, readable storage medium storing program for executing, terminal
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
WO2014169600A1 (en) * 2013-09-06 2014-10-23 中兴通讯股份有限公司 Method, device and terminal for processing hidden file folder

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655542A (en) * 2011-03-01 2012-09-05 联想(北京)有限公司 Method and terminal for switching terminal statuses
CN102509055A (en) * 2011-11-24 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and method for hiding programs of mobile terminal
WO2014169600A1 (en) * 2013-09-06 2014-10-23 中兴通讯股份有限公司 Method, device and terminal for processing hidden file folder
CN103616986A (en) * 2013-11-30 2014-03-05 广东欧珀移动通信有限公司 Method and system for displaying and hiding application icons and mobile terminal
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404443B (en) * 2015-10-27 2019-02-01 努比亚技术有限公司 Using starting method and device
CN105404443A (en) * 2015-10-27 2016-03-16 努比亚技术有限公司 Application starting method and apparatus
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal
CN105930145A (en) * 2016-04-12 2016-09-07 广东欧珀移动通信有限公司 Information hiding method and mobile terminal
CN105930145B (en) * 2016-04-12 2020-07-17 Oppo广东移动通信有限公司 Information hiding method and mobile terminal
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN108052248A (en) * 2017-11-30 2018-05-18 维沃移动通信有限公司 The startup method, apparatus and mobile terminal of a kind of application program
CN108229149A (en) * 2017-12-29 2018-06-29 北京安云世纪科技有限公司 A kind of method and apparatus of data protection
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN108563932A (en) * 2018-04-10 2018-09-21 Oppo广东移动通信有限公司 Application control method and apparatus, readable storage medium storing program for executing, terminal
WO2019196693A1 (en) * 2018-04-10 2019-10-17 Oppo广东移动通信有限公司 Application control method and device, readable storage medium and terminal

Also Published As

Publication number Publication date
CN104732157B (en) 2018-09-07
WO2016155072A1 (en) 2016-10-06

Similar Documents

Publication Publication Date Title
CN104732157A (en) Method and device for hiding and opening applications
AU2023203197B2 (en) User interfaces for peer-to-peer transfers
US10909524B2 (en) User interfaces for transfer accounts
JP6736686B1 (en) Implementation of biometrics
US20190370805A1 (en) User interfaces for transfer accounts
US9686275B2 (en) Correlating cognitive biometrics for continuous identify verification
US20170205259A1 (en) Electronic device and hardware diagnosis result-based process execution method thereof
CN105279417A (en) Application starting control method and user terminal
CN104866752B (en) A kind of application guard method and user terminal
US20040139351A1 (en) Method and apparatus for generating secured attention sequence
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
CN105471811A (en) Privacy space processing method and privacy space processing device
WO2019129042A1 (en) Dual account application switching method and related equipment
CN103616986A (en) Method and system for displaying and hiding application icons and mobile terminal
CN108762870A (en) A kind of page display method and device
CN105183347A (en) Input method operation method and electronic terminal
CN107358179A (en) A kind of living management system, medium and method based on iris verification
CN103685231B (en) Location-based operation demonstration method and server, client
CN106984044A (en) Method and apparatus for starting default flow
CN108154432A (en) Credit applications configuration method, device, equipment and readable storage medium storing program for executing
CN107066864A (en) A kind of application icon display methods and its equipment
CN107562346A (en) Terminal control method, device, terminal and computer-readable recording medium
CN105207979B (en) A kind of user authentication method and device based on user's input feature vector
CN105426085B (en) A kind of music file intercept method and user terminal
CN107391988A (en) Message treatment method, device, terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant