CN105930145A - Information hiding method and mobile terminal - Google Patents

Information hiding method and mobile terminal Download PDF

Info

Publication number
CN105930145A
CN105930145A CN201610225777.7A CN201610225777A CN105930145A CN 105930145 A CN105930145 A CN 105930145A CN 201610225777 A CN201610225777 A CN 201610225777A CN 105930145 A CN105930145 A CN 105930145A
Authority
CN
China
Prior art keywords
attribute
destination object
control operation
mobile terminal
touch control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610225777.7A
Other languages
Chinese (zh)
Other versions
CN105930145B (en
Inventor
丁泽楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610225777.7A priority Critical patent/CN105930145B/en
Publication of CN105930145A publication Critical patent/CN105930145A/en
Application granted granted Critical
Publication of CN105930145B publication Critical patent/CN105930145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The embodiment of the invention discloses an information hiding method and a mobile terminal. The information hiding method may include: setting an attribute of a target object as a hiding attribute according to a received hiding command, wherein the target object is at least one of an application program, a file and a folder; determining if an object hiding function of the mobile terminal is in a starting state or not; and hiding an icon of the target object if so. The information hiding method can hide the icon of the target object in the mobile terminal, and fundamentally prevent illegal operations on some application programs, files and folders, and then protect private information and property safety of a mobile terminal user.

Description

A kind of information concealing method and mobile terminal
Technical field
The present invention relates to technical field of electronic equipment, particularly relate to a kind of information concealing method and shifting Dynamic terminal.
Background technology
Developing rapidly along with electronic technology, the development speed of mobile terminal is more and more faster.Logical Crossing mobile terminal, people are possible not only to communicate activity, it is also possible to carry out paying, entertain, The activities such as record.The function of mobile terminal is the most, and the privacy concern and the property safety that relate to are asked Inscribe the most, such as when mobile terminal is operated by other people, the contact person of user, communication note The privacies such as record, payment record may be revealed, and even mobile terminal may be jeopardized by illegal operation The property safety of user.
In prior art, in order to protect the privacy of user, mobile terminal provide screen locking or Application program locking function, user only inputs correct password or draws correct unblock figure Just can unlock, and then mobile terminal or protected application program are operated.The party Although method can protect the personal secrets of user to a certain extent, but password or unlock figure Easily it is cracked, it is difficult to guarantee that mobile terminal or protected application program be not by illegal operation.
Summary of the invention
The embodiment of the present invention provides a kind of information concealing method and mobile terminal, can hide mobile whole The icon of destination object in end, the privacy information of protection mobile phone users and property safety.
Embodiment of the present invention first aspect provides a kind of information concealing method, and it comprises the steps that
According to the hiding instruction received, the attribute of destination object is set to hide attribute, wherein Described destination object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
As a kind of feasible embodiment, the hiding instruction that described basis receives is by target pair The attribute of elephant is set to hide attribute, including:
Receive the first touch control operation for destination object;
If the touch parameter of described first touch control operation meets default trigger condition, then export institute The attribute stating destination object arranges interface, and wherein said touch parameter includes touch-control dynamics, touch-control In duration or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set by the attribute of described destination object It is set to hide attribute.
As a kind of feasible embodiment, the Objects hide function of described judgement mobile terminal is No be in opening after, described method also includes:
If judged result is no, then receive user's open command by the second touch control operation input;
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or The track of described second touch control operation matches with the reference locus preset, then open described object Hidden function.
As a kind of feasible embodiment, after the described icon hiding described destination object, Described method also includes:
Receive user's out code by the 3rd touch control operation input;
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or The track of described 3rd touch control operation matches with the reference locus preset, then close described object Hidden function;
Unhide the icon of described destination object.
As a kind of feasible embodiment, after the described icon hiding described destination object, Described method also includes:
The attribute of described destination object is set to disclosure by the instruction that unhides according to receiving Attribute;
Unhide the icon of described destination object.
Embodiment of the present invention second aspect provides a kind of mobile terminal, it may include:
Module is set, for being set to by the attribute of destination object according to the hiding instruction received Hiding attribute, wherein said destination object is at least one in application program, file or folder;
Judge module, for judging whether the Objects hide function of mobile terminal is in opening;
Hide module, for when the judged result of described judge module is for being, hide described mesh The icon of mark object.
As a kind of feasible embodiment, the described module that arranges includes:
Receive unit, for receiving the first touch control operation for destination object;
Output unit, for meeting default triggering when the touch parameter of described first touch control operation During condition, the attribute exporting described destination object arranges interface, and wherein said touch parameter includes In touch-control dynamics, touch-control duration or touch-control number of times at least one, described attribute arranges interface and includes Hide Options;
Unit is set, the described selection hidden Options is operated, by described mesh for responding user The attribute of mark object is set to hide attribute.
As a kind of feasible embodiment, described mobile terminal also includes:
First receiver module, for when the judged result of described judge module is no, receives and uses Family is by the open command of the second touch control operation input;
Opening module, for referring to the reference prestored when the finger print information of described second touch control operation Stricture of vagina matches, or when the track of described second touch control operation matches with the reference locus preset, Open described Objects hide function.
As a kind of feasible embodiment, described mobile terminal also includes:
Second receiver module, for receiving user's out code by the 3rd touch control operation input;
Close module, for referring to the reference prestored when the finger print information of described 3rd touch control operation Stricture of vagina matches, or when the track of described 3rd touch control operation matches with the reference locus preset, Close described Objects hide function;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
As a kind of feasible embodiment,
Described module is set, is additionally operable to described target pair according to the instruction that unhides received The attribute of elephant is set to open attribute;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
In the embodiment of the present invention, according to the hiding instruction received, the attribute of destination object can be set It is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in opening;And When judged result is for being, hide the icon of described destination object.Use the embodiment of the present invention, The icon of destination object in mobile terminal can be hidden, fundamentally prevent some application programs, literary composition Part or file are by illegal operation, thus protect privacy information and the property peace of mobile phone users Entirely.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below The accompanying drawing used required in is briefly described, it should be apparent that, the accompanying drawing in describing below It is some embodiments of the present invention, for those of ordinary skill in the art, is not paying wound On the premise of the property made work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the information concealing method that one embodiment of the present of invention provides;
Fig. 2 is the flow process signal of the information concealing method that an alternative embodiment of the invention provides Figure;
Fig. 3 is the structural representation of the mobile terminal that one embodiment of the present of invention provides;
Fig. 4 is the structural representation of the mobile terminal that an alternative embodiment of the invention provides;
Fig. 5 is the structural representation of the mobile terminal of another embodiment offer of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the technical side in the embodiment of the present invention Case is clearly and completely described, it is clear that described embodiment is that a part of the present invention is real Execute example rather than whole embodiments.Based on the embodiment in the present invention, the common skill in this area The every other embodiment that art personnel are obtained under not making creative work premise, all belongs to In the scope of protection of the invention.
The embodiment of the present invention provides a kind of information concealing method and mobile terminal, can hide mobile whole The icon of destination object in end, the privacy information of protection mobile phone users and property safety.Tool During body realizes, the mobile terminal described in the embodiment of the present invention may include but be not limited to: mobile phone, The mobile terminal such as panel computer, notebook computer.
See the stream that Fig. 1, Fig. 1 are the information concealing methods that one embodiment of the present of invention provides Journey schematic diagram.Described information concealing method can be performed by the hardware of floppy disk system control mobile terminal. As it is shown in figure 1, described method can comprise the steps:
S101, is set to hide attribute by the attribute of destination object according to the hiding instruction received.
In embodiments of the present invention, described destination object can be application icon, file or file In folder at least one.
In the embodiment that some are feasible, the trigger action hiding instruction can be pre-set, when Receive user when performing this trigger action, then trigger this and hide instruction, by the genus of destination object Property be set to hide attribute.Wherein this trigger action may include but be not limited to touch control operation or language Sound operates.Such as, when receiving user to destination object execution touch-control duration and/or touch-control power When degree meets the touch control operation of certain condition, can be triggered this and hide instruction, by the genus of destination object Property be set to hide attribute.And for example, when the language hiding this destination object receiving user's input During sound instruction, can be set to the attribute of destination object hide attribute.
S102, it is judged that whether the Objects hide function of mobile terminal is in opening, if judging Result is yes, performs step S103.
In embodiments of the present invention, if the Objects hide function of mobile terminal is in opening, All objects with hiding attribute can be hidden;If this Objects hide function is in closedown State, does not the most hide the object with hiding attribute.
In being embodied as, if the attribute of destination object is arranged to hide attribute, and mobile terminal Objects hide function belong to opening, step S103 can be performed.It should be appreciated that Step S102 can be implemented before or after step S101.
S103, hides the icon of described destination object.
In being embodied as, no matter application program, file or file, can pass through icon Show to user, in order to user operation.
As a kind of feasible embodiment, can be by the icon of destination object from mobile terminal Remove on display interface, be allowed to not visible in screen, thus hide the figure of described destination object Mark.Preferably, after removing the icon of destination object, can by other application programs, file or The icon of file moves to the picture mark position that destination object is original.
The information concealing method of the embodiment of the present invention, can be according to the hiding instruction received by target The attribute of object is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in Opening;And when judged result is for being, hide the icon of described destination object.Use this Inventive embodiments, can hide the icon of destination object in mobile terminal, fundamentally prevent Application program, file or folder are by illegal operation, thus protect the privacy of mobile phone users Information and property safety.
Seeing Fig. 2, Fig. 2 is the information concealing method that an alternative embodiment of the invention provides Schematic flow sheet.Described information concealing method can by floppy disk system control mobile terminal hardware come Perform.As in figure 2 it is shown, described method can comprise the steps:
S201, is set to hide attribute by the attribute of destination object according to the hiding instruction received.
Wherein, during described destination object is application program, file or folder at least one.
In the embodiment that some are feasible, the detailed description of the invention of step S201 can and be schemed In 1 illustrated embodiment, the implementation of step S101 is consistent.
As a kind of feasible implementation, the first touch control operation for destination object can be received; If the touch parameter of described first touch control operation meets default trigger condition, then export described mesh The attribute of mark object arranges interface, and described attribute arranges interface and can include hiding Options;Response is used The described selection hidden Options is operated by family, is set to the attribute of described destination object hide genus Property.Wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times at least one Kind, the trigger condition preset can be by user setup, or mobile terminal default setting.First The touch parameter of touch control operation meets default trigger condition, can be touching of the first touch control operation Control dynamics in the range of default dynamics, touch-control duration in the range of default duration and/or touch Control number of times is in default numbers range.
S202, it is judged that whether the Objects hide function of mobile terminal is in opening, if judging Result is yes, performs step S205, otherwise performs step S203.
In the embodiment that some are feasible, it is judged that whether the Objects hide function of mobile terminal is located Detailed description of the invention in opening is referred to step S102 in embodiment illustrated in fig. 1 Associated description, here is omitted.
S203, receives user's open command by the second touch control operation input.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in closedown State, user can open this Objects hide function by touch control operation or voice operating.Specifically Ground, mobile terminal can receive second touch control operation of user, generates according to the second touch control operation and opens Opening instruction, wherein the second touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to Order, such as " unlatching Objects hide function ", " unlatching of Objects hide function " etc., mobile terminal Open command can be generated after identifying the content of phonetic order.
S204, if the finger print information of described second touch control operation matches with the reference fingerprint prestored, Or the track of described second touch control operation matches with the reference locus preset, then open described Objects hide function, and perform step S205.
In the embodiment that some are feasible, mobile terminal can prestore the fingerprint of validated user Information is as reference fingerprint, or prestores the reference locus of user setup.When user being detected The second touch control operation time, finger print information or the touch trajectory of the second touch control operation can be gathered, will The finger print information of the second touch control operation is compared with the reference fingerprint prestored, or touches second The track of control operation is compared with the reference locus preset, when comparison result is for coupling, and can Respond above-mentioned open command, open the Objects hide function of mobile terminal.Wherein, can be by sentencing Whether disconnected similarity exceedes predetermined threshold value judges whether coupling, such as, when similarity exceedes 80% or 90% is coupling.
In the embodiment that some are feasible, if user inputs open command by voice operating, Can analyze the audio parameter of this voice operating and judge its whether with the reference audio pre-set Match parameters, whether such as one or more parameters such as tone color, tone, audio frequency necessarily Range of error in, if in certain range of error, then judge this voice operating sound ginseng Number and the match parameters of reference audio, can respond above-mentioned open command, open mobile terminal Objects hide function.
S205, hides the icon of described destination object.
In the embodiment that some are feasible, the detailed description of the invention of step S205 is referred to The associated description of step S103 in embodiment illustrated in fig. 1, here is omitted.
S206, receives user's out code by the 3rd touch control operation input.
In the embodiment of the present invention, above-mentioned out code is the out code for Objects hide function.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in unlatching State, user can open this Objects hide function by touch control operation or voice operating.Specifically Ground, mobile terminal can receive the 3rd touch control operation of user, generates according to the 3rd touch control operation and closes Closing instruction, wherein the 3rd touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to Order, such as " closedown Objects hide function ", " closedown of Objects hide function " etc., mobile terminal Above-mentioned out code can be generated after identifying the content of phonetic order.
S207, if the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, Or the track of described 3rd touch control operation matches with the reference locus preset, then close described Objects hide function, and perform step S209.
In being embodied as, it is judged that the finger print information of the 3rd touch control operation with the reference fingerprint prestored is No whether phase when matching and judge the track of the 3rd touch control operation and the reference locus preset The implementation method of coupling refers to the determination methods in step S204 about the second touch control operation, Here is omitted.
S208, the attribute of described destination object is set to by the instruction that unhides according to receiving Open attribute, and perform step S209.
In the embodiment that some are feasible, the attribute of destination object can change.Work as destination object Attribute for hiding attribute time, if receiving the instruction that unhides for destination object, can be by The attribute of destination object is set to open attribute.
In the embodiment that some are feasible, the trigger action of the instruction that unhides can be pre-set, When receiving user and performing this trigger action, then trigger this instruction that unhides, by target pair The Attribute tuning of elephant is open attribute.Wherein this trigger action may include but be not limited to touch control operation Or voice operating.Such as in the case of destination object is in hiding attribute, when receiving use Family meets the touch control operation of certain condition to destination object execution touch-control duration and/or touch-control dynamics Time, this instruction that unhides can be triggered, be open attribute by the Attribute tuning of destination object.Again In the case of being in hiding attribute at destination object, when this mesh hiding receiving user's input When marking the phonetic order of object, can be open attribute by the Attribute tuning of destination object.
S209, the icon of the described destination object that unhides.
In being embodied as, if the Objects hide function of mobile terminal is closed, can unhide institute There is the icon being arranged to hide the object of attribute, including the icon of destination object.If it is mobile whole The Objects hide function of end is opened, but target is arranged to open attribute, and can unhide target The icon of object.
As a kind of feasible embodiment, the icon of destination object can be shown mobile whole On the page of end, it is allowed to visible in screen, thus the icon of the described destination object that unhides. Alternatively, the icon of destination object can be shown position before hiding again;Or, can be by The icon of destination object shows the blank space at the place page.
The information concealing method of the embodiment of the present invention, can be according to the hiding instruction received by target The attribute of object is set to hide attribute, and the Objects hide function at mobile terminal is in unlatching shape During state, hide the icon of described destination object, use the embodiment of the present invention, can hide mobile whole The icon of destination object in end, fundamentally prevents some application programs, file or folder quilt Illegal operation, thus protect privacy information and the property safety of mobile phone users.Wherein move The Objects hide functional status of terminal and the hiding attribute of destination object need to pass through fingerprint inspection Card or sliding trace checking change, to protect destination object not unhided by unauthorized person.
See the structure that Fig. 3, Fig. 3 are the mobile terminals that one embodiment of the present of invention provides to show It is intended to.As it is shown on figure 3, described mobile terminal comprises the steps that
Module 301 is set, for being set by the attribute of destination object according to the hiding instruction received It is set to hide attribute.
In embodiments of the present invention, described destination object can be application icon, file or file In folder at least one.
In the embodiment that some are feasible, the trigger action hiding instruction can be pre-set, when Receive user when performing this trigger action, then trigger this and hide instruction, by the genus of destination object Property be set to hide attribute.Wherein this trigger action may include but be not limited to touch control operation or language Sound operates.Such as, when receiving user to destination object execution touch-control duration and/or touch-control power When degree meets the touch control operation of certain condition, can be triggered this and hide instruction, by the genus of destination object Property be set to hide attribute.And for example, when the language hiding this destination object receiving user's input During sound instruction, can be set to the attribute of destination object hide attribute.
Judge module 302, for judging whether the Objects hide function of mobile terminal is in unlatching State.
In embodiments of the present invention, if the Objects hide function of mobile terminal is in opening, All objects with hiding attribute can be hidden;If this Objects hide function is in closedown State, does not the most hide the object with hiding attribute.
It should be appreciated that judge whether the Objects hide function of mobile terminal is in opening Step can be set to hide by the attribute of destination object according to the hiding instruction that receives Implement before or after attribute.
Hide module 303, for hiding the icon of described destination object.
In being embodied as, no matter application program, file or file, can pass through icon Show to user, in order to user operation.
As a kind of feasible embodiment, can be by the icon of destination object from mobile terminal Remove on display interface, be allowed to not visible in screen, thus hide the figure of described destination object Mark.Preferably, after removing the icon of destination object, can by other application programs, file or The icon of file moves to the picture mark position that destination object is original.
The mobile terminal of the embodiment of the present invention, can be according to the hiding instruction received by destination object Attribute be set to hide attribute;Judge whether the Objects hide function of mobile terminal is in unlatching State;And when judged result is for being, hide the icon of described destination object.Use the present invention Embodiment, can hide the icon of destination object in mobile terminal, fundamentally prevents some from applying Program, file or folder are by illegal operation, thus protect the privacy information of mobile phone users And property safety.
See the structure that Fig. 4, Fig. 4 are the mobile terminals that an alternative embodiment of the invention provides Schematic diagram.As shown in Figure 4, described mobile terminal comprises the steps that
Module 401 is set, for being set by the attribute of destination object according to the hiding instruction received Be set to hide attribute, wherein said destination object be in application program, file or folder at least A kind of.
In the embodiment that some are feasible, the detailed description of the invention arranging module 401 can be with The implementation arranging module 301 in embodiment illustrated in fig. 3 is consistent.
In the embodiment that some are feasible, module 401 is set and comprises the steps that
Receive unit 4011, for receiving the first touch control operation for destination object.
Output unit 4012, for presetting when the touch parameter of described first touch control operation meets Trigger condition time, the attribute exporting described destination object arranges interface.
Wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times at least one Kind, the trigger condition preset can be by user setup, or mobile terminal default setting.First The touch parameter of touch control operation meets default trigger condition, can be touching of the first touch control operation Control dynamics in the range of default dynamics, touch-control duration in the range of default duration and/or touch Control number of times is in default numbers range.
Unit 4013 is set, for responding user, the described selection hidden Options is operated, will The attribute of described destination object is set to hide attribute.
Judge module 402, for judging whether the Objects hide function of mobile terminal is in unlatching State.
In the embodiment that some are feasible, it is judged that the detailed description of the invention of module 402 can be joined Examining the associated description of judge module 302 in embodiment illustrated in fig. 3, here is omitted.
First receiver module 403, for when the judged result of described judge module is no, connects Receive user's open command by the second touch control operation input.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in closedown State, user can open this Objects hide function by touch control operation or voice operating.Specifically Ground, mobile terminal can receive second touch control operation of user, generates according to the second touch control operation and opens Opening instruction, wherein the second touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to Order, such as " unlatching Objects hide function ", " unlatching of Objects hide function " etc., mobile terminal Open command can be generated after identifying the content of phonetic order.
Opening module 404, is used for the finger print information when described second touch control operation and the ginseng prestored Examine fingerprint matches, or the track of described second touch control operation and the reference locus preset are mutually Timing, opens described Objects hide function.
In the embodiment that some are feasible, mobile terminal can prestore the fingerprint of validated user Information is as reference fingerprint, or prestores the reference locus of user setup.When user being detected The second touch control operation time, finger print information or the touch trajectory of the second touch control operation can be gathered, will The finger print information of the second touch control operation is compared with the reference fingerprint prestored, or touches second The track of control operation is compared with the reference locus preset, when comparison result is for coupling, and can Respond above-mentioned open command, open the Objects hide function of mobile terminal.Wherein, can be by sentencing Whether disconnected similarity exceedes predetermined threshold value judges whether coupling, such as, when similarity exceedes 80% or 90% is coupling.
In the embodiment that some are feasible, if user inputs open command by voice operating, Can analyze the audio parameter of this voice operating and judge its whether with the reference audio pre-set Match parameters, whether such as one or more parameters such as tone color, tone, audio frequency necessarily Range of error in, if in certain range of error, then judge this voice operating sound ginseng Number and the match parameters of reference audio, can respond above-mentioned open command, open mobile terminal Objects hide function.
In being embodied as, after opening module 404 opens described Objects hide function, it is judged that mould Block 402 can rejudge whether the Objects hide function of mobile terminal is in opening.
Hide module 405, for when the judged result of described judge module 402 is for being, hidden Hide the icon of described destination object.
In the embodiment that some are feasible, the detailed description of the invention hiding module 405 can be joined Examining the associated description hiding module 403 in embodiment illustrated in fig. 3, here is omitted.
Second receiver module 406, for receiving user's closedown by the 3rd touch control operation input Instruction.
In the embodiment of the present invention, above-mentioned out code is the out code for Objects hide function.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in unlatching State, user can open this Objects hide function by touch control operation or voice operating.Specifically Ground, mobile terminal can receive the 3rd touch control operation of user, generates according to the 3rd touch control operation and closes Closing instruction, wherein the 3rd touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to Order, such as " closedown Objects hide function ", " closedown of Objects hide function " etc., mobile terminal Above-mentioned out code can be generated after identifying the content of phonetic order.
Close module 407, be used for the finger print information when described 3rd touch control operation and the ginseng prestored Examine fingerprint matches, or the track of described 3rd touch control operation and the reference locus preset are mutually Timing, closes described Objects hide function.
In being embodied as, it is judged that the finger print information of the 3rd touch control operation with the reference fingerprint prestored is No whether phase when matching and judge the track of the 3rd touch control operation and the reference locus preset The implementation method of coupling refers to the judgement side in opening module 404 about the second touch control operation Method, here is omitted.
In the embodiment that some are feasible, hide module 405, it may also be used for described closing After Objects hide function, the icon of the described destination object that unhides.
In the embodiment that some are feasible, module 401 is set and can be additionally used in what basis received The attribute of described destination object is set to open attribute by the instruction that unhides.
In the embodiment that some are feasible, the attribute of destination object can change.Work as destination object Attribute for hiding attribute time, if receiving the instruction that unhides for destination object, can be by The attribute of destination object is set to open attribute.
In the embodiment that some are feasible, the trigger action of the instruction that unhides can be pre-set, When receiving user and performing this trigger action, then trigger this instruction that unhides, by target pair The Attribute tuning of elephant is open attribute.Wherein this trigger action may include but be not limited to touch control operation Or voice operating.Such as in the case of destination object is in hiding attribute, when receiving use Family meets the touch control operation of certain condition to destination object execution touch-control duration and/or touch-control dynamics Time, this instruction that unhides can be triggered, be open attribute by the Attribute tuning of destination object.Again In the case of being in hiding attribute at destination object, when this mesh hiding receiving user's input When marking the phonetic order of object, can be open attribute by the Attribute tuning of destination object.
In the embodiment that some are feasible, hide module 404 and can be additionally used in when described target pair When the attribute of elephant is set to open attribute, the icon of the described destination object that unhides.
As a kind of feasible embodiment, the icon of destination object can be shown mobile whole On the page of end, it is allowed to visible in screen, thus the icon of the described destination object that unhides. Alternatively, the icon of destination object can be shown position before hiding again;Or, can be by The icon of destination object shows the blank space at the place page.
The mobile terminal of the embodiment of the present invention, can be according to the hiding instruction received by destination object Attribute be set to hide attribute, when the Objects hide function of mobile terminal is in opening, Hide the icon of described destination object, use the embodiment of the present invention, mesh in mobile terminal can be hidden The icon of mark object, fundamentally prevents some application programs, file or folder from illegally being grasped Make, thus protect privacy information and the property safety of mobile phone users.Wherein mobile terminal The hiding attribute of Objects hide functional status and destination object needs by fingerprint authentication or cunning Dynamic track checking changes, to protect destination object not unhided by unauthorized person.
See the structure of the mobile terminal that another embodiment that Fig. 5, Fig. 5 are the present invention provides Schematic diagram.As it is shown in figure 5, described terminal may also include at least one input equipment 1000; At least one outut device 2000;At least one processor 3000, such as CPU;And storage Device 4000, above-mentioned input equipment 1000, outut device 2000, processor 3000 and storage Device 4000 is connected by bus 5000.
Wherein, the touch control screen of above-mentioned input equipment 1000 concretely terminal, button, Or sound identification module etc., input equipment 1000 can receive the touch control operation of user or voice refers to Order.
The display screen of above-mentioned outut device 2000 concretely terminal or voice playing module etc., In embodiments of the present invention, above-mentioned outut device 2000 can be used for showing icon.
Above-mentioned memorizer 4000 can be high-speed RAM memorizer, it is possible to deposit for non-labile Reservoir (non-volatile memory), such as disk memory.Above-mentioned memorizer 4000 is used In storage batch processing code.
Above-mentioned input equipment 1000, outut device 2000 and processor 3000 are used for calling to be deposited The program code of storage in reservoir 4000, performs to operate as follows:
Above-mentioned processor 3000 can be used for:
According to the hiding instruction received, the attribute of destination object is set to hide attribute, wherein Described destination object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
In the embodiment that some are feasible, above-mentioned input equipment 1000 can be used for receive for First touch control operation of destination object;
The attribute of destination object is arranged by above-mentioned processor 3000 according to the hiding instruction received Step for hiding attribute comprises the steps that
If the touch parameter of described first touch control operation meets default trigger condition, then export institute The attribute stating destination object arranges interface, and wherein said touch parameter includes touch-control dynamics, touch-control In duration or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set by the attribute of described destination object It is set to hide attribute.
In the embodiment that some are feasible, judge mobile terminal at above-mentioned processor 3000 After whether Objects hide function is in opening, above-mentioned input equipment 1000 can be used for:
If judged result is no, then receive user's open command by the second touch control operation input;
Above-mentioned processor 3000 can be additionally used in execution following steps:
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or The track of described second touch control operation matches with the reference locus preset, then open described object Hidden function.
In the embodiment that some are feasible, hide described target pair at above-mentioned processor 3000 After the icon of elephant, above-mentioned input equipment 1000 can be used for:
Receive user's out code by the 3rd touch control operation input;
Above-mentioned processor 3000 can be additionally used in execution following steps:
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or The track of described 3rd touch control operation matches with the reference locus preset, then close described object Hidden function;
Unhide the icon of described destination object.
In the embodiment that some are feasible, after hiding the icon of described destination object, on State processor 3000 and can be additionally used in execution following steps:
The attribute of described destination object is set to disclosure by the instruction that unhides according to receiving Attribute;
Unhide the icon of described destination object.
In the embodiment of the present invention, according to the hiding instruction received, the attribute of destination object can be set It is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in opening;And When judged result is for being, hide the icon of described destination object.Use the embodiment of the present invention, The icon of destination object in mobile terminal can be hidden, fundamentally prevent some application programs, literary composition Part or file are by illegal operation, thus protect privacy information and the property peace of mobile phone users Entirely.
Module in all embodiments of the invention or submodule, can pass through universal integrated circuit, Such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, special IC) realizes.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, closes And and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divide and Delete.
One of ordinary skill in the art will appreciate that realize whole in above-described embodiment method or Part flow process, can be by computer program and completes to instruct relevant hardware, described Program can be stored in a computer read/write memory medium, and this program is upon execution, it may include Flow process such as the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, light Dish, read-only store-memory body (Read-Only Memory, ROM) or random store-memory Body (Random Access Memory, RAM) etc..
Above disclosed only present pre-ferred embodiments, can not limit with this certainly The interest field of the present invention, the equivalent variations therefore made according to the claims in the present invention, still belong to this The scope that invention is contained.

Claims (10)

1. an information concealing method, it is characterised in that described method includes:
It is set to hide attribute, wherein said target by the attribute of destination object according to the hiding instruction received Object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
Method the most according to claim 1, it is characterised in that the hiding instruction that described basis receives It is set to the attribute of destination object hide attribute, including:
Receive the first touch control operation for destination object;
If the touch parameter of described first touch control operation meets default trigger condition, then export described target pair The attribute of elephant arranges interface, and wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times At least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set to hide by the attribute of described destination object Attribute.
Method the most according to claim 1, it is characterised in that the object of described judgement mobile terminal is hidden After whether Tibetan function is in opening, described method also includes:
If judged result is no, then receive user's open command by the second touch control operation input;
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or described second The track of touch control operation matches with the reference locus preset, then open described Objects hide function.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described hiding described mesh After the icon of mark object, described method also includes:
Receive user's out code by the 3rd touch control operation input;
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or the described 3rd The track of touch control operation matches with the reference locus preset, then close described Objects hide function;
Unhide the icon of described destination object.
5. according to the method described in any one of claims 1 to 3, it is characterised in that described hiding described mesh After the icon of mark object, described method also includes:
The attribute of described destination object is set to open attribute by the instruction that unhides according to receiving;
Unhide the icon of described destination object.
6. a mobile terminal, it is characterised in that described mobile terminal includes:
Module is set, for the attribute of destination object being set to according to the hiding instruction received hiding attribute, Wherein said destination object is at least one in application program, file or folder;
Judge module, for judging whether the Objects hide function of mobile terminal is in opening;
Hide module, for when the judged result of described judge module is for being, hide described destination object Icon.
Mobile terminal the most according to claim 6, it is characterised in that the described module that arranges includes:
Receive unit, for receiving the first touch control operation for destination object;
Output unit, is used for when the touch parameter of described first touch control operation meets default trigger condition, The attribute exporting described destination object arranges interface, when wherein said touch parameter includes touch-control dynamics, touch-control In long or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
Unit is set, the described selection hidden Options is operated, by described destination object for responding user Attribute is set to hide attribute.
Mobile terminal the most according to claim 6, it is characterised in that described mobile terminal also includes:
First receiver module, for when the judged result of described judge module is no, receives user by the The open command of two touch control operation inputs;
Opening module, for matching with the reference fingerprint prestored when the finger print information of described second touch control operation, Or when the track of described second touch control operation matches with the reference locus preset, open described Objects hide Function.
9. according to the mobile terminal described in any one of claim 6 to 8, it is characterised in that described mobile whole End also includes:
Second receiver module, for receiving user's out code by the 3rd touch control operation input;
Close module, for matching with the reference fingerprint prestored when the finger print information of described 3rd touch control operation, Or when the track of described 3rd touch control operation matches with the reference locus preset, close described Objects hide Function;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
10. according to the mobile terminal described in any one of claim 6 to 8, it is characterised in that
Described module is set, is additionally operable to the attribute of described destination object according to the instruction that unhides received It is set to open attribute;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
CN201610225777.7A 2016-04-12 2016-04-12 Information hiding method and mobile terminal Active CN105930145B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610225777.7A CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610225777.7A CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105930145A true CN105930145A (en) 2016-09-07
CN105930145B CN105930145B (en) 2020-07-17

Family

ID=56838821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610225777.7A Active CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105930145B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106210358A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Terminal protection device and method
CN106485126A (en) * 2016-10-31 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information processing method based on articulations digitorum manus, device and terminal
CN106775648A (en) * 2016-11-23 2017-05-31 天脉聚源(北京)传媒科技有限公司 A kind of method and device of the automatic drawing back of control
CN106909855A (en) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 File hiding method and device
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN107317926A (en) * 2017-06-21 2017-11-03 深圳传音通讯有限公司 The method and device of hiden application
CN107643868A (en) * 2017-09-13 2018-01-30 维沃移动通信有限公司 One kind puts out screen and shows Switching method and mobile terminal
WO2018086230A1 (en) * 2016-11-08 2018-05-17 深圳Tcl新技术有限公司 Intelligent application activation method and device
CN108093032A (en) * 2017-12-05 2018-05-29 广东小天才科技有限公司 A kind of control method and client of answer lock
CN109388314A (en) * 2017-08-14 2019-02-26 中兴通讯股份有限公司 Hidden function starts method, mobile terminal and computer readable storage medium
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium
CN111782494A (en) * 2020-06-24 2020-10-16 上海闻泰信息技术有限公司 Application software control method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130076592A1 (en) * 2011-09-27 2013-03-28 Paul E. Reeves Unified desktop docking behavior for visible-to-visible extension
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN104992121A (en) * 2015-07-02 2015-10-21 成都亿邻通科技有限公司 Hidden management method for application icons
CN105005740A (en) * 2015-08-04 2015-10-28 广东欧珀移动通信有限公司 Method and system for controlling terminal application

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130076592A1 (en) * 2011-09-27 2013-03-28 Paul E. Reeves Unified desktop docking behavior for visible-to-visible extension
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN104992121A (en) * 2015-07-02 2015-10-21 成都亿邻通科技有限公司 Hidden management method for application icons
CN105005740A (en) * 2015-08-04 2015-10-28 广东欧珀移动通信有限公司 Method and system for controlling terminal application

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106210358A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Terminal protection device and method
CN106485126A (en) * 2016-10-31 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information processing method based on articulations digitorum manus, device and terminal
WO2018086230A1 (en) * 2016-11-08 2018-05-17 深圳Tcl新技术有限公司 Intelligent application activation method and device
CN106775648A (en) * 2016-11-23 2017-05-31 天脉聚源(北京)传媒科技有限公司 A kind of method and device of the automatic drawing back of control
CN106909855A (en) * 2017-03-24 2017-06-30 腾讯科技(深圳)有限公司 File hiding method and device
CN106909855B (en) * 2017-03-24 2021-10-29 腾讯科技(深圳)有限公司 File hiding method and device
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107317926A (en) * 2017-06-21 2017-11-03 深圳传音通讯有限公司 The method and device of hiden application
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN109388314A (en) * 2017-08-14 2019-02-26 中兴通讯股份有限公司 Hidden function starts method, mobile terminal and computer readable storage medium
CN107643868A (en) * 2017-09-13 2018-01-30 维沃移动通信有限公司 One kind puts out screen and shows Switching method and mobile terminal
WO2019061539A1 (en) * 2017-09-30 2019-04-04 深圳传音通讯有限公司 Application icon hiding method, mobile terminal, and computer readable storage medium
CN111492336A (en) * 2017-09-30 2020-08-04 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
CN111492336B (en) * 2017-09-30 2024-02-13 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
CN108093032A (en) * 2017-12-05 2018-05-29 广东小天才科技有限公司 A kind of control method and client of answer lock
CN111782494A (en) * 2020-06-24 2020-10-16 上海闻泰信息技术有限公司 Application software control method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN105930145B (en) 2020-07-17

Similar Documents

Publication Publication Date Title
CN105930145A (en) Information hiding method and mobile terminal
CN104679387B (en) A kind of method for protecting privacy and terminal
CN105760737A (en) Control method for applications and terminal
CN101436247A (en) Biological personal identification method and system based on UEFI
CN104732157B (en) A kind of application hides, deployment method and device
CN103927658A (en) Mobile payment method and terminal
CN108171025A (en) Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN104951685A (en) Method and mobile terminal for running application programs
CN105701420B (en) A kind of management method and terminal of user data
CN104866752B (en) A kind of application guard method and user terminal
CN104375836A (en) Method and device for showing lock screen window
CN104615927A (en) Multisystem safe verification method, multisystem safe verification device and terminal
CN107038357A (en) User authority control method and mobile terminal
CN106815509B (en) A kind of multimedia file guard method, device and electronic equipment
CN106897006A (en) A kind of method for processing payment information, device and user equipment
CN105930726B (en) A kind of processing method and user terminal of malicious operation behavior
CN104809402A (en) Fuzzy display method for information and terminal
CN106778151A (en) Method for identifying ID and device based on person's handwriting
CN105912896A (en) Application switching method and terminal
US20230029490A1 (en) Radar-Based Behaviometric User Authentication
CN104346550A (en) Information processing method and electronic equipment
CN105005436A (en) Program processing method and mobile terminal
Paul et al. IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't
CN106599843A (en) Fingerprint authentication method and device
CN105703909A (en) Authentication method and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant