CN105930145A - Information hiding method and mobile terminal - Google Patents
Information hiding method and mobile terminal Download PDFInfo
- Publication number
- CN105930145A CN105930145A CN201610225777.7A CN201610225777A CN105930145A CN 105930145 A CN105930145 A CN 105930145A CN 201610225777 A CN201610225777 A CN 201610225777A CN 105930145 A CN105930145 A CN 105930145A
- Authority
- CN
- China
- Prior art keywords
- attribute
- destination object
- control operation
- mobile terminal
- touch control
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
Abstract
The embodiment of the invention discloses an information hiding method and a mobile terminal. The information hiding method may include: setting an attribute of a target object as a hiding attribute according to a received hiding command, wherein the target object is at least one of an application program, a file and a folder; determining if an object hiding function of the mobile terminal is in a starting state or not; and hiding an icon of the target object if so. The information hiding method can hide the icon of the target object in the mobile terminal, and fundamentally prevent illegal operations on some application programs, files and folders, and then protect private information and property safety of a mobile terminal user.
Description
Technical field
The present invention relates to technical field of electronic equipment, particularly relate to a kind of information concealing method and shifting
Dynamic terminal.
Background technology
Developing rapidly along with electronic technology, the development speed of mobile terminal is more and more faster.Logical
Crossing mobile terminal, people are possible not only to communicate activity, it is also possible to carry out paying, entertain,
The activities such as record.The function of mobile terminal is the most, and the privacy concern and the property safety that relate to are asked
Inscribe the most, such as when mobile terminal is operated by other people, the contact person of user, communication note
The privacies such as record, payment record may be revealed, and even mobile terminal may be jeopardized by illegal operation
The property safety of user.
In prior art, in order to protect the privacy of user, mobile terminal provide screen locking or
Application program locking function, user only inputs correct password or draws correct unblock figure
Just can unlock, and then mobile terminal or protected application program are operated.The party
Although method can protect the personal secrets of user to a certain extent, but password or unlock figure
Easily it is cracked, it is difficult to guarantee that mobile terminal or protected application program be not by illegal operation.
Summary of the invention
The embodiment of the present invention provides a kind of information concealing method and mobile terminal, can hide mobile whole
The icon of destination object in end, the privacy information of protection mobile phone users and property safety.
Embodiment of the present invention first aspect provides a kind of information concealing method, and it comprises the steps that
According to the hiding instruction received, the attribute of destination object is set to hide attribute, wherein
Described destination object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
As a kind of feasible embodiment, the hiding instruction that described basis receives is by target pair
The attribute of elephant is set to hide attribute, including:
Receive the first touch control operation for destination object;
If the touch parameter of described first touch control operation meets default trigger condition, then export institute
The attribute stating destination object arranges interface, and wherein said touch parameter includes touch-control dynamics, touch-control
In duration or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set by the attribute of described destination object
It is set to hide attribute.
As a kind of feasible embodiment, the Objects hide function of described judgement mobile terminal is
No be in opening after, described method also includes:
If judged result is no, then receive user's open command by the second touch control operation input;
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or
The track of described second touch control operation matches with the reference locus preset, then open described object
Hidden function.
As a kind of feasible embodiment, after the described icon hiding described destination object,
Described method also includes:
Receive user's out code by the 3rd touch control operation input;
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or
The track of described 3rd touch control operation matches with the reference locus preset, then close described object
Hidden function;
Unhide the icon of described destination object.
As a kind of feasible embodiment, after the described icon hiding described destination object,
Described method also includes:
The attribute of described destination object is set to disclosure by the instruction that unhides according to receiving
Attribute;
Unhide the icon of described destination object.
Embodiment of the present invention second aspect provides a kind of mobile terminal, it may include:
Module is set, for being set to by the attribute of destination object according to the hiding instruction received
Hiding attribute, wherein said destination object is at least one in application program, file or folder;
Judge module, for judging whether the Objects hide function of mobile terminal is in opening;
Hide module, for when the judged result of described judge module is for being, hide described mesh
The icon of mark object.
As a kind of feasible embodiment, the described module that arranges includes:
Receive unit, for receiving the first touch control operation for destination object;
Output unit, for meeting default triggering when the touch parameter of described first touch control operation
During condition, the attribute exporting described destination object arranges interface, and wherein said touch parameter includes
In touch-control dynamics, touch-control duration or touch-control number of times at least one, described attribute arranges interface and includes
Hide Options;
Unit is set, the described selection hidden Options is operated, by described mesh for responding user
The attribute of mark object is set to hide attribute.
As a kind of feasible embodiment, described mobile terminal also includes:
First receiver module, for when the judged result of described judge module is no, receives and uses
Family is by the open command of the second touch control operation input;
Opening module, for referring to the reference prestored when the finger print information of described second touch control operation
Stricture of vagina matches, or when the track of described second touch control operation matches with the reference locus preset,
Open described Objects hide function.
As a kind of feasible embodiment, described mobile terminal also includes:
Second receiver module, for receiving user's out code by the 3rd touch control operation input;
Close module, for referring to the reference prestored when the finger print information of described 3rd touch control operation
Stricture of vagina matches, or when the track of described 3rd touch control operation matches with the reference locus preset,
Close described Objects hide function;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
As a kind of feasible embodiment,
Described module is set, is additionally operable to described target pair according to the instruction that unhides received
The attribute of elephant is set to open attribute;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
In the embodiment of the present invention, according to the hiding instruction received, the attribute of destination object can be set
It is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in opening;And
When judged result is for being, hide the icon of described destination object.Use the embodiment of the present invention,
The icon of destination object in mobile terminal can be hidden, fundamentally prevent some application programs, literary composition
Part or file are by illegal operation, thus protect privacy information and the property peace of mobile phone users
Entirely.
Accompanying drawing explanation
In order to be illustrated more clearly that embodiment of the present invention technical scheme, embodiment will be described below
The accompanying drawing used required in is briefly described, it should be apparent that, the accompanying drawing in describing below
It is some embodiments of the present invention, for those of ordinary skill in the art, is not paying wound
On the premise of the property made work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the information concealing method that one embodiment of the present of invention provides;
Fig. 2 is the flow process signal of the information concealing method that an alternative embodiment of the invention provides
Figure;
Fig. 3 is the structural representation of the mobile terminal that one embodiment of the present of invention provides;
Fig. 4 is the structural representation of the mobile terminal that an alternative embodiment of the invention provides;
Fig. 5 is the structural representation of the mobile terminal of another embodiment offer of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the technical side in the embodiment of the present invention
Case is clearly and completely described, it is clear that described embodiment is that a part of the present invention is real
Execute example rather than whole embodiments.Based on the embodiment in the present invention, the common skill in this area
The every other embodiment that art personnel are obtained under not making creative work premise, all belongs to
In the scope of protection of the invention.
The embodiment of the present invention provides a kind of information concealing method and mobile terminal, can hide mobile whole
The icon of destination object in end, the privacy information of protection mobile phone users and property safety.Tool
During body realizes, the mobile terminal described in the embodiment of the present invention may include but be not limited to: mobile phone,
The mobile terminal such as panel computer, notebook computer.
See the stream that Fig. 1, Fig. 1 are the information concealing methods that one embodiment of the present of invention provides
Journey schematic diagram.Described information concealing method can be performed by the hardware of floppy disk system control mobile terminal.
As it is shown in figure 1, described method can comprise the steps:
S101, is set to hide attribute by the attribute of destination object according to the hiding instruction received.
In embodiments of the present invention, described destination object can be application icon, file or file
In folder at least one.
In the embodiment that some are feasible, the trigger action hiding instruction can be pre-set, when
Receive user when performing this trigger action, then trigger this and hide instruction, by the genus of destination object
Property be set to hide attribute.Wherein this trigger action may include but be not limited to touch control operation or language
Sound operates.Such as, when receiving user to destination object execution touch-control duration and/or touch-control power
When degree meets the touch control operation of certain condition, can be triggered this and hide instruction, by the genus of destination object
Property be set to hide attribute.And for example, when the language hiding this destination object receiving user's input
During sound instruction, can be set to the attribute of destination object hide attribute.
S102, it is judged that whether the Objects hide function of mobile terminal is in opening, if judging
Result is yes, performs step S103.
In embodiments of the present invention, if the Objects hide function of mobile terminal is in opening,
All objects with hiding attribute can be hidden;If this Objects hide function is in closedown
State, does not the most hide the object with hiding attribute.
In being embodied as, if the attribute of destination object is arranged to hide attribute, and mobile terminal
Objects hide function belong to opening, step S103 can be performed.It should be appreciated that
Step S102 can be implemented before or after step S101.
S103, hides the icon of described destination object.
In being embodied as, no matter application program, file or file, can pass through icon
Show to user, in order to user operation.
As a kind of feasible embodiment, can be by the icon of destination object from mobile terminal
Remove on display interface, be allowed to not visible in screen, thus hide the figure of described destination object
Mark.Preferably, after removing the icon of destination object, can by other application programs, file or
The icon of file moves to the picture mark position that destination object is original.
The information concealing method of the embodiment of the present invention, can be according to the hiding instruction received by target
The attribute of object is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in
Opening;And when judged result is for being, hide the icon of described destination object.Use this
Inventive embodiments, can hide the icon of destination object in mobile terminal, fundamentally prevent
Application program, file or folder are by illegal operation, thus protect the privacy of mobile phone users
Information and property safety.
Seeing Fig. 2, Fig. 2 is the information concealing method that an alternative embodiment of the invention provides
Schematic flow sheet.Described information concealing method can by floppy disk system control mobile terminal hardware come
Perform.As in figure 2 it is shown, described method can comprise the steps:
S201, is set to hide attribute by the attribute of destination object according to the hiding instruction received.
Wherein, during described destination object is application program, file or folder at least one.
In the embodiment that some are feasible, the detailed description of the invention of step S201 can and be schemed
In 1 illustrated embodiment, the implementation of step S101 is consistent.
As a kind of feasible implementation, the first touch control operation for destination object can be received;
If the touch parameter of described first touch control operation meets default trigger condition, then export described mesh
The attribute of mark object arranges interface, and described attribute arranges interface and can include hiding Options;Response is used
The described selection hidden Options is operated by family, is set to the attribute of described destination object hide genus
Property.Wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times at least one
Kind, the trigger condition preset can be by user setup, or mobile terminal default setting.First
The touch parameter of touch control operation meets default trigger condition, can be touching of the first touch control operation
Control dynamics in the range of default dynamics, touch-control duration in the range of default duration and/or touch
Control number of times is in default numbers range.
S202, it is judged that whether the Objects hide function of mobile terminal is in opening, if judging
Result is yes, performs step S205, otherwise performs step S203.
In the embodiment that some are feasible, it is judged that whether the Objects hide function of mobile terminal is located
Detailed description of the invention in opening is referred to step S102 in embodiment illustrated in fig. 1
Associated description, here is omitted.
S203, receives user's open command by the second touch control operation input.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in closedown
State, user can open this Objects hide function by touch control operation or voice operating.Specifically
Ground, mobile terminal can receive second touch control operation of user, generates according to the second touch control operation and opens
Opening instruction, wherein the second touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to
Order, such as " unlatching Objects hide function ", " unlatching of Objects hide function " etc., mobile terminal
Open command can be generated after identifying the content of phonetic order.
S204, if the finger print information of described second touch control operation matches with the reference fingerprint prestored,
Or the track of described second touch control operation matches with the reference locus preset, then open described
Objects hide function, and perform step S205.
In the embodiment that some are feasible, mobile terminal can prestore the fingerprint of validated user
Information is as reference fingerprint, or prestores the reference locus of user setup.When user being detected
The second touch control operation time, finger print information or the touch trajectory of the second touch control operation can be gathered, will
The finger print information of the second touch control operation is compared with the reference fingerprint prestored, or touches second
The track of control operation is compared with the reference locus preset, when comparison result is for coupling, and can
Respond above-mentioned open command, open the Objects hide function of mobile terminal.Wherein, can be by sentencing
Whether disconnected similarity exceedes predetermined threshold value judges whether coupling, such as, when similarity exceedes
80% or 90% is coupling.
In the embodiment that some are feasible, if user inputs open command by voice operating,
Can analyze the audio parameter of this voice operating and judge its whether with the reference audio pre-set
Match parameters, whether such as one or more parameters such as tone color, tone, audio frequency necessarily
Range of error in, if in certain range of error, then judge this voice operating sound ginseng
Number and the match parameters of reference audio, can respond above-mentioned open command, open mobile terminal
Objects hide function.
S205, hides the icon of described destination object.
In the embodiment that some are feasible, the detailed description of the invention of step S205 is referred to
The associated description of step S103 in embodiment illustrated in fig. 1, here is omitted.
S206, receives user's out code by the 3rd touch control operation input.
In the embodiment of the present invention, above-mentioned out code is the out code for Objects hide function.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in unlatching
State, user can open this Objects hide function by touch control operation or voice operating.Specifically
Ground, mobile terminal can receive the 3rd touch control operation of user, generates according to the 3rd touch control operation and closes
Closing instruction, wherein the 3rd touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to
Order, such as " closedown Objects hide function ", " closedown of Objects hide function " etc., mobile terminal
Above-mentioned out code can be generated after identifying the content of phonetic order.
S207, if the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored,
Or the track of described 3rd touch control operation matches with the reference locus preset, then close described
Objects hide function, and perform step S209.
In being embodied as, it is judged that the finger print information of the 3rd touch control operation with the reference fingerprint prestored is
No whether phase when matching and judge the track of the 3rd touch control operation and the reference locus preset
The implementation method of coupling refers to the determination methods in step S204 about the second touch control operation,
Here is omitted.
S208, the attribute of described destination object is set to by the instruction that unhides according to receiving
Open attribute, and perform step S209.
In the embodiment that some are feasible, the attribute of destination object can change.Work as destination object
Attribute for hiding attribute time, if receiving the instruction that unhides for destination object, can be by
The attribute of destination object is set to open attribute.
In the embodiment that some are feasible, the trigger action of the instruction that unhides can be pre-set,
When receiving user and performing this trigger action, then trigger this instruction that unhides, by target pair
The Attribute tuning of elephant is open attribute.Wherein this trigger action may include but be not limited to touch control operation
Or voice operating.Such as in the case of destination object is in hiding attribute, when receiving use
Family meets the touch control operation of certain condition to destination object execution touch-control duration and/or touch-control dynamics
Time, this instruction that unhides can be triggered, be open attribute by the Attribute tuning of destination object.Again
In the case of being in hiding attribute at destination object, when this mesh hiding receiving user's input
When marking the phonetic order of object, can be open attribute by the Attribute tuning of destination object.
S209, the icon of the described destination object that unhides.
In being embodied as, if the Objects hide function of mobile terminal is closed, can unhide institute
There is the icon being arranged to hide the object of attribute, including the icon of destination object.If it is mobile whole
The Objects hide function of end is opened, but target is arranged to open attribute, and can unhide target
The icon of object.
As a kind of feasible embodiment, the icon of destination object can be shown mobile whole
On the page of end, it is allowed to visible in screen, thus the icon of the described destination object that unhides.
Alternatively, the icon of destination object can be shown position before hiding again;Or, can be by
The icon of destination object shows the blank space at the place page.
The information concealing method of the embodiment of the present invention, can be according to the hiding instruction received by target
The attribute of object is set to hide attribute, and the Objects hide function at mobile terminal is in unlatching shape
During state, hide the icon of described destination object, use the embodiment of the present invention, can hide mobile whole
The icon of destination object in end, fundamentally prevents some application programs, file or folder quilt
Illegal operation, thus protect privacy information and the property safety of mobile phone users.Wherein move
The Objects hide functional status of terminal and the hiding attribute of destination object need to pass through fingerprint inspection
Card or sliding trace checking change, to protect destination object not unhided by unauthorized person.
See the structure that Fig. 3, Fig. 3 are the mobile terminals that one embodiment of the present of invention provides to show
It is intended to.As it is shown on figure 3, described mobile terminal comprises the steps that
Module 301 is set, for being set by the attribute of destination object according to the hiding instruction received
It is set to hide attribute.
In embodiments of the present invention, described destination object can be application icon, file or file
In folder at least one.
In the embodiment that some are feasible, the trigger action hiding instruction can be pre-set, when
Receive user when performing this trigger action, then trigger this and hide instruction, by the genus of destination object
Property be set to hide attribute.Wherein this trigger action may include but be not limited to touch control operation or language
Sound operates.Such as, when receiving user to destination object execution touch-control duration and/or touch-control power
When degree meets the touch control operation of certain condition, can be triggered this and hide instruction, by the genus of destination object
Property be set to hide attribute.And for example, when the language hiding this destination object receiving user's input
During sound instruction, can be set to the attribute of destination object hide attribute.
Judge module 302, for judging whether the Objects hide function of mobile terminal is in unlatching
State.
In embodiments of the present invention, if the Objects hide function of mobile terminal is in opening,
All objects with hiding attribute can be hidden;If this Objects hide function is in closedown
State, does not the most hide the object with hiding attribute.
It should be appreciated that judge whether the Objects hide function of mobile terminal is in opening
Step can be set to hide by the attribute of destination object according to the hiding instruction that receives
Implement before or after attribute.
Hide module 303, for hiding the icon of described destination object.
In being embodied as, no matter application program, file or file, can pass through icon
Show to user, in order to user operation.
As a kind of feasible embodiment, can be by the icon of destination object from mobile terminal
Remove on display interface, be allowed to not visible in screen, thus hide the figure of described destination object
Mark.Preferably, after removing the icon of destination object, can by other application programs, file or
The icon of file moves to the picture mark position that destination object is original.
The mobile terminal of the embodiment of the present invention, can be according to the hiding instruction received by destination object
Attribute be set to hide attribute;Judge whether the Objects hide function of mobile terminal is in unlatching
State;And when judged result is for being, hide the icon of described destination object.Use the present invention
Embodiment, can hide the icon of destination object in mobile terminal, fundamentally prevents some from applying
Program, file or folder are by illegal operation, thus protect the privacy information of mobile phone users
And property safety.
See the structure that Fig. 4, Fig. 4 are the mobile terminals that an alternative embodiment of the invention provides
Schematic diagram.As shown in Figure 4, described mobile terminal comprises the steps that
Module 401 is set, for being set by the attribute of destination object according to the hiding instruction received
Be set to hide attribute, wherein said destination object be in application program, file or folder at least
A kind of.
In the embodiment that some are feasible, the detailed description of the invention arranging module 401 can be with
The implementation arranging module 301 in embodiment illustrated in fig. 3 is consistent.
In the embodiment that some are feasible, module 401 is set and comprises the steps that
Receive unit 4011, for receiving the first touch control operation for destination object.
Output unit 4012, for presetting when the touch parameter of described first touch control operation meets
Trigger condition time, the attribute exporting described destination object arranges interface.
Wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times at least one
Kind, the trigger condition preset can be by user setup, or mobile terminal default setting.First
The touch parameter of touch control operation meets default trigger condition, can be touching of the first touch control operation
Control dynamics in the range of default dynamics, touch-control duration in the range of default duration and/or touch
Control number of times is in default numbers range.
Unit 4013 is set, for responding user, the described selection hidden Options is operated, will
The attribute of described destination object is set to hide attribute.
Judge module 402, for judging whether the Objects hide function of mobile terminal is in unlatching
State.
In the embodiment that some are feasible, it is judged that the detailed description of the invention of module 402 can be joined
Examining the associated description of judge module 302 in embodiment illustrated in fig. 3, here is omitted.
First receiver module 403, for when the judged result of described judge module is no, connects
Receive user's open command by the second touch control operation input.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in closedown
State, user can open this Objects hide function by touch control operation or voice operating.Specifically
Ground, mobile terminal can receive second touch control operation of user, generates according to the second touch control operation and opens
Opening instruction, wherein the second touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to
Order, such as " unlatching Objects hide function ", " unlatching of Objects hide function " etc., mobile terminal
Open command can be generated after identifying the content of phonetic order.
Opening module 404, is used for the finger print information when described second touch control operation and the ginseng prestored
Examine fingerprint matches, or the track of described second touch control operation and the reference locus preset are mutually
Timing, opens described Objects hide function.
In the embodiment that some are feasible, mobile terminal can prestore the fingerprint of validated user
Information is as reference fingerprint, or prestores the reference locus of user setup.When user being detected
The second touch control operation time, finger print information or the touch trajectory of the second touch control operation can be gathered, will
The finger print information of the second touch control operation is compared with the reference fingerprint prestored, or touches second
The track of control operation is compared with the reference locus preset, when comparison result is for coupling, and can
Respond above-mentioned open command, open the Objects hide function of mobile terminal.Wherein, can be by sentencing
Whether disconnected similarity exceedes predetermined threshold value judges whether coupling, such as, when similarity exceedes
80% or 90% is coupling.
In the embodiment that some are feasible, if user inputs open command by voice operating,
Can analyze the audio parameter of this voice operating and judge its whether with the reference audio pre-set
Match parameters, whether such as one or more parameters such as tone color, tone, audio frequency necessarily
Range of error in, if in certain range of error, then judge this voice operating sound ginseng
Number and the match parameters of reference audio, can respond above-mentioned open command, open mobile terminal
Objects hide function.
In being embodied as, after opening module 404 opens described Objects hide function, it is judged that mould
Block 402 can rejudge whether the Objects hide function of mobile terminal is in opening.
Hide module 405, for when the judged result of described judge module 402 is for being, hidden
Hide the icon of described destination object.
In the embodiment that some are feasible, the detailed description of the invention hiding module 405 can be joined
Examining the associated description hiding module 403 in embodiment illustrated in fig. 3, here is omitted.
Second receiver module 406, for receiving user's closedown by the 3rd touch control operation input
Instruction.
In the embodiment of the present invention, above-mentioned out code is the out code for Objects hide function.
In the embodiment that some are feasible, if the Objects hide function of mobile terminal is in unlatching
State, user can open this Objects hide function by touch control operation or voice operating.Specifically
Ground, mobile terminal can receive the 3rd touch control operation of user, generates according to the 3rd touch control operation and closes
Closing instruction, wherein the 3rd touch control operation can be the touch control operation on Objects hide function choosing-item.
In the embodiment that some are feasible, mobile terminal also can receive the voice of user's input and refer to
Order, such as " closedown Objects hide function ", " closedown of Objects hide function " etc., mobile terminal
Above-mentioned out code can be generated after identifying the content of phonetic order.
Close module 407, be used for the finger print information when described 3rd touch control operation and the ginseng prestored
Examine fingerprint matches, or the track of described 3rd touch control operation and the reference locus preset are mutually
Timing, closes described Objects hide function.
In being embodied as, it is judged that the finger print information of the 3rd touch control operation with the reference fingerprint prestored is
No whether phase when matching and judge the track of the 3rd touch control operation and the reference locus preset
The implementation method of coupling refers to the judgement side in opening module 404 about the second touch control operation
Method, here is omitted.
In the embodiment that some are feasible, hide module 405, it may also be used for described closing
After Objects hide function, the icon of the described destination object that unhides.
In the embodiment that some are feasible, module 401 is set and can be additionally used in what basis received
The attribute of described destination object is set to open attribute by the instruction that unhides.
In the embodiment that some are feasible, the attribute of destination object can change.Work as destination object
Attribute for hiding attribute time, if receiving the instruction that unhides for destination object, can be by
The attribute of destination object is set to open attribute.
In the embodiment that some are feasible, the trigger action of the instruction that unhides can be pre-set,
When receiving user and performing this trigger action, then trigger this instruction that unhides, by target pair
The Attribute tuning of elephant is open attribute.Wherein this trigger action may include but be not limited to touch control operation
Or voice operating.Such as in the case of destination object is in hiding attribute, when receiving use
Family meets the touch control operation of certain condition to destination object execution touch-control duration and/or touch-control dynamics
Time, this instruction that unhides can be triggered, be open attribute by the Attribute tuning of destination object.Again
In the case of being in hiding attribute at destination object, when this mesh hiding receiving user's input
When marking the phonetic order of object, can be open attribute by the Attribute tuning of destination object.
In the embodiment that some are feasible, hide module 404 and can be additionally used in when described target pair
When the attribute of elephant is set to open attribute, the icon of the described destination object that unhides.
As a kind of feasible embodiment, the icon of destination object can be shown mobile whole
On the page of end, it is allowed to visible in screen, thus the icon of the described destination object that unhides.
Alternatively, the icon of destination object can be shown position before hiding again;Or, can be by
The icon of destination object shows the blank space at the place page.
The mobile terminal of the embodiment of the present invention, can be according to the hiding instruction received by destination object
Attribute be set to hide attribute, when the Objects hide function of mobile terminal is in opening,
Hide the icon of described destination object, use the embodiment of the present invention, mesh in mobile terminal can be hidden
The icon of mark object, fundamentally prevents some application programs, file or folder from illegally being grasped
Make, thus protect privacy information and the property safety of mobile phone users.Wherein mobile terminal
The hiding attribute of Objects hide functional status and destination object needs by fingerprint authentication or cunning
Dynamic track checking changes, to protect destination object not unhided by unauthorized person.
See the structure of the mobile terminal that another embodiment that Fig. 5, Fig. 5 are the present invention provides
Schematic diagram.As it is shown in figure 5, described terminal may also include at least one input equipment 1000;
At least one outut device 2000;At least one processor 3000, such as CPU;And storage
Device 4000, above-mentioned input equipment 1000, outut device 2000, processor 3000 and storage
Device 4000 is connected by bus 5000.
Wherein, the touch control screen of above-mentioned input equipment 1000 concretely terminal, button,
Or sound identification module etc., input equipment 1000 can receive the touch control operation of user or voice refers to
Order.
The display screen of above-mentioned outut device 2000 concretely terminal or voice playing module etc.,
In embodiments of the present invention, above-mentioned outut device 2000 can be used for showing icon.
Above-mentioned memorizer 4000 can be high-speed RAM memorizer, it is possible to deposit for non-labile
Reservoir (non-volatile memory), such as disk memory.Above-mentioned memorizer 4000 is used
In storage batch processing code.
Above-mentioned input equipment 1000, outut device 2000 and processor 3000 are used for calling to be deposited
The program code of storage in reservoir 4000, performs to operate as follows:
Above-mentioned processor 3000 can be used for:
According to the hiding instruction received, the attribute of destination object is set to hide attribute, wherein
Described destination object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
In the embodiment that some are feasible, above-mentioned input equipment 1000 can be used for receive for
First touch control operation of destination object;
The attribute of destination object is arranged by above-mentioned processor 3000 according to the hiding instruction received
Step for hiding attribute comprises the steps that
If the touch parameter of described first touch control operation meets default trigger condition, then export institute
The attribute stating destination object arranges interface, and wherein said touch parameter includes touch-control dynamics, touch-control
In duration or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set by the attribute of described destination object
It is set to hide attribute.
In the embodiment that some are feasible, judge mobile terminal at above-mentioned processor 3000
After whether Objects hide function is in opening, above-mentioned input equipment 1000 can be used for:
If judged result is no, then receive user's open command by the second touch control operation input;
Above-mentioned processor 3000 can be additionally used in execution following steps:
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or
The track of described second touch control operation matches with the reference locus preset, then open described object
Hidden function.
In the embodiment that some are feasible, hide described target pair at above-mentioned processor 3000
After the icon of elephant, above-mentioned input equipment 1000 can be used for:
Receive user's out code by the 3rd touch control operation input;
Above-mentioned processor 3000 can be additionally used in execution following steps:
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or
The track of described 3rd touch control operation matches with the reference locus preset, then close described object
Hidden function;
Unhide the icon of described destination object.
In the embodiment that some are feasible, after hiding the icon of described destination object, on
State processor 3000 and can be additionally used in execution following steps:
The attribute of described destination object is set to disclosure by the instruction that unhides according to receiving
Attribute;
Unhide the icon of described destination object.
In the embodiment of the present invention, according to the hiding instruction received, the attribute of destination object can be set
It is set to hide attribute;Judge whether the Objects hide function of mobile terminal is in opening;And
When judged result is for being, hide the icon of described destination object.Use the embodiment of the present invention,
The icon of destination object in mobile terminal can be hidden, fundamentally prevent some application programs, literary composition
Part or file are by illegal operation, thus protect privacy information and the property peace of mobile phone users
Entirely.
Module in all embodiments of the invention or submodule, can pass through universal integrated circuit,
Such as CPU (Central Processing Unit, central processing unit), or pass through ASIC
(Application Specific Integrated Circuit, special IC) realizes.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, closes
And and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divide and
Delete.
One of ordinary skill in the art will appreciate that realize whole in above-described embodiment method or
Part flow process, can be by computer program and completes to instruct relevant hardware, described
Program can be stored in a computer read/write memory medium, and this program is upon execution, it may include
Flow process such as the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, light
Dish, read-only store-memory body (Read-Only Memory, ROM) or random store-memory
Body (Random Access Memory, RAM) etc..
Above disclosed only present pre-ferred embodiments, can not limit with this certainly
The interest field of the present invention, the equivalent variations therefore made according to the claims in the present invention, still belong to this
The scope that invention is contained.
Claims (10)
1. an information concealing method, it is characterised in that described method includes:
It is set to hide attribute, wherein said target by the attribute of destination object according to the hiding instruction received
Object is at least one in application program, file or folder;
Judge whether the Objects hide function of mobile terminal is in opening;
If the determination result is YES, then the icon of described destination object is hidden.
Method the most according to claim 1, it is characterised in that the hiding instruction that described basis receives
It is set to the attribute of destination object hide attribute, including:
Receive the first touch control operation for destination object;
If the touch parameter of described first touch control operation meets default trigger condition, then export described target pair
The attribute of elephant arranges interface, and wherein said touch parameter includes in touch-control dynamics, touch-control duration or touch-control number of times
At least one, described attribute arranges interface and includes hiding Options;
The described selection hidden Options is operated by response user, is set to hide by the attribute of described destination object
Attribute.
Method the most according to claim 1, it is characterised in that the object of described judgement mobile terminal is hidden
After whether Tibetan function is in opening, described method also includes:
If judged result is no, then receive user's open command by the second touch control operation input;
If the finger print information of described second touch control operation matches with the reference fingerprint prestored, or described second
The track of touch control operation matches with the reference locus preset, then open described Objects hide function.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described hiding described mesh
After the icon of mark object, described method also includes:
Receive user's out code by the 3rd touch control operation input;
If the finger print information of described 3rd touch control operation matches with the reference fingerprint prestored, or the described 3rd
The track of touch control operation matches with the reference locus preset, then close described Objects hide function;
Unhide the icon of described destination object.
5. according to the method described in any one of claims 1 to 3, it is characterised in that described hiding described mesh
After the icon of mark object, described method also includes:
The attribute of described destination object is set to open attribute by the instruction that unhides according to receiving;
Unhide the icon of described destination object.
6. a mobile terminal, it is characterised in that described mobile terminal includes:
Module is set, for the attribute of destination object being set to according to the hiding instruction received hiding attribute,
Wherein said destination object is at least one in application program, file or folder;
Judge module, for judging whether the Objects hide function of mobile terminal is in opening;
Hide module, for when the judged result of described judge module is for being, hide described destination object
Icon.
Mobile terminal the most according to claim 6, it is characterised in that the described module that arranges includes:
Receive unit, for receiving the first touch control operation for destination object;
Output unit, is used for when the touch parameter of described first touch control operation meets default trigger condition,
The attribute exporting described destination object arranges interface, when wherein said touch parameter includes touch-control dynamics, touch-control
In long or touch-control number of times at least one, described attribute arranges interface and includes hiding Options;
Unit is set, the described selection hidden Options is operated, by described destination object for responding user
Attribute is set to hide attribute.
Mobile terminal the most according to claim 6, it is characterised in that described mobile terminal also includes:
First receiver module, for when the judged result of described judge module is no, receives user by the
The open command of two touch control operation inputs;
Opening module, for matching with the reference fingerprint prestored when the finger print information of described second touch control operation,
Or when the track of described second touch control operation matches with the reference locus preset, open described Objects hide
Function.
9. according to the mobile terminal described in any one of claim 6 to 8, it is characterised in that described mobile whole
End also includes:
Second receiver module, for receiving user's out code by the 3rd touch control operation input;
Close module, for matching with the reference fingerprint prestored when the finger print information of described 3rd touch control operation,
Or when the track of described 3rd touch control operation matches with the reference locus preset, close described Objects hide
Function;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
10. according to the mobile terminal described in any one of claim 6 to 8, it is characterised in that
Described module is set, is additionally operable to the attribute of described destination object according to the instruction that unhides received
It is set to open attribute;
Described hiding module, the icon of the described destination object that is additionally operable to unhide.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610225777.7A CN105930145B (en) | 2016-04-12 | 2016-04-12 | Information hiding method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610225777.7A CN105930145B (en) | 2016-04-12 | 2016-04-12 | Information hiding method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105930145A true CN105930145A (en) | 2016-09-07 |
CN105930145B CN105930145B (en) | 2020-07-17 |
Family
ID=56838821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610225777.7A Active CN105930145B (en) | 2016-04-12 | 2016-04-12 | Information hiding method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105930145B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106210358A (en) * | 2016-09-05 | 2016-12-07 | 努比亚技术有限公司 | Terminal protection device and method |
CN106485126A (en) * | 2016-10-31 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method based on articulations digitorum manus, device and terminal |
CN106775648A (en) * | 2016-11-23 | 2017-05-31 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of the automatic drawing back of control |
CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN107133509A (en) * | 2017-04-28 | 2017-09-05 | 北京小米移动软件有限公司 | Method for secret protection and equipment |
CN107295186A (en) * | 2017-07-03 | 2017-10-24 | 广东欧珀移动通信有限公司 | Method for hidden controlling, device and the storage medium and mobile terminal of application message |
CN107317926A (en) * | 2017-06-21 | 2017-11-03 | 深圳传音通讯有限公司 | The method and device of hiden application |
CN107643868A (en) * | 2017-09-13 | 2018-01-30 | 维沃移动通信有限公司 | One kind puts out screen and shows Switching method and mobile terminal |
WO2018086230A1 (en) * | 2016-11-08 | 2018-05-17 | 深圳Tcl新技术有限公司 | Intelligent application activation method and device |
CN108093032A (en) * | 2017-12-05 | 2018-05-29 | 广东小天才科技有限公司 | A kind of control method and client of answer lock |
CN109388314A (en) * | 2017-08-14 | 2019-02-26 | 中兴通讯股份有限公司 | Hidden function starts method, mobile terminal and computer readable storage medium |
WO2019061539A1 (en) * | 2017-09-30 | 2019-04-04 | 深圳传音通讯有限公司 | Application icon hiding method, mobile terminal, and computer readable storage medium |
CN111782494A (en) * | 2020-06-24 | 2020-10-16 | 上海闻泰信息技术有限公司 | Application software control method and device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130076592A1 (en) * | 2011-09-27 | 2013-03-28 | Paul E. Reeves | Unified desktop docking behavior for visible-to-visible extension |
CN104679387A (en) * | 2015-02-13 | 2015-06-03 | 广东欧珀移动通信有限公司 | Privacy information protection method and terminal |
CN104732157A (en) * | 2015-03-31 | 2015-06-24 | 酷派软件技术(深圳)有限公司 | Method and device for hiding and opening applications |
CN104951682A (en) * | 2015-06-05 | 2015-09-30 | 小米科技有限责任公司 | Privacy protection method and device |
CN104951206A (en) * | 2015-05-28 | 2015-09-30 | 努比亚技术有限公司 | Icon hiding method and device |
CN104992121A (en) * | 2015-07-02 | 2015-10-21 | 成都亿邻通科技有限公司 | Hidden management method for application icons |
CN105005740A (en) * | 2015-08-04 | 2015-10-28 | 广东欧珀移动通信有限公司 | Method and system for controlling terminal application |
-
2016
- 2016-04-12 CN CN201610225777.7A patent/CN105930145B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130076592A1 (en) * | 2011-09-27 | 2013-03-28 | Paul E. Reeves | Unified desktop docking behavior for visible-to-visible extension |
CN104679387A (en) * | 2015-02-13 | 2015-06-03 | 广东欧珀移动通信有限公司 | Privacy information protection method and terminal |
CN104732157A (en) * | 2015-03-31 | 2015-06-24 | 酷派软件技术(深圳)有限公司 | Method and device for hiding and opening applications |
CN104951206A (en) * | 2015-05-28 | 2015-09-30 | 努比亚技术有限公司 | Icon hiding method and device |
CN104951682A (en) * | 2015-06-05 | 2015-09-30 | 小米科技有限责任公司 | Privacy protection method and device |
CN104992121A (en) * | 2015-07-02 | 2015-10-21 | 成都亿邻通科技有限公司 | Hidden management method for application icons |
CN105005740A (en) * | 2015-08-04 | 2015-10-28 | 广东欧珀移动通信有限公司 | Method and system for controlling terminal application |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106210358A (en) * | 2016-09-05 | 2016-12-07 | 努比亚技术有限公司 | Terminal protection device and method |
CN106485126A (en) * | 2016-10-31 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | Information processing method based on articulations digitorum manus, device and terminal |
WO2018086230A1 (en) * | 2016-11-08 | 2018-05-17 | 深圳Tcl新技术有限公司 | Intelligent application activation method and device |
CN106775648A (en) * | 2016-11-23 | 2017-05-31 | 天脉聚源(北京)传媒科技有限公司 | A kind of method and device of the automatic drawing back of control |
CN106909855A (en) * | 2017-03-24 | 2017-06-30 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN106909855B (en) * | 2017-03-24 | 2021-10-29 | 腾讯科技(深圳)有限公司 | File hiding method and device |
CN107133509A (en) * | 2017-04-28 | 2017-09-05 | 北京小米移动软件有限公司 | Method for secret protection and equipment |
CN107317926A (en) * | 2017-06-21 | 2017-11-03 | 深圳传音通讯有限公司 | The method and device of hiden application |
CN107295186A (en) * | 2017-07-03 | 2017-10-24 | 广东欧珀移动通信有限公司 | Method for hidden controlling, device and the storage medium and mobile terminal of application message |
CN109388314A (en) * | 2017-08-14 | 2019-02-26 | 中兴通讯股份有限公司 | Hidden function starts method, mobile terminal and computer readable storage medium |
CN107643868A (en) * | 2017-09-13 | 2018-01-30 | 维沃移动通信有限公司 | One kind puts out screen and shows Switching method and mobile terminal |
WO2019061539A1 (en) * | 2017-09-30 | 2019-04-04 | 深圳传音通讯有限公司 | Application icon hiding method, mobile terminal, and computer readable storage medium |
CN111492336A (en) * | 2017-09-30 | 2020-08-04 | 深圳传音通讯有限公司 | Hiding method of application icon, mobile terminal and computer readable storage medium |
CN111492336B (en) * | 2017-09-30 | 2024-02-13 | 深圳传音通讯有限公司 | Hiding method of application icon, mobile terminal and computer readable storage medium |
CN108093032A (en) * | 2017-12-05 | 2018-05-29 | 广东小天才科技有限公司 | A kind of control method and client of answer lock |
CN111782494A (en) * | 2020-06-24 | 2020-10-16 | 上海闻泰信息技术有限公司 | Application software control method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN105930145B (en) | 2020-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105930145A (en) | Information hiding method and mobile terminal | |
CN104679387B (en) | A kind of method for protecting privacy and terminal | |
CN105760737A (en) | Control method for applications and terminal | |
CN101436247A (en) | Biological personal identification method and system based on UEFI | |
CN104732157B (en) | A kind of application hides, deployment method and device | |
CN103927658A (en) | Mobile payment method and terminal | |
CN108171025A (en) | Implementation method, terminal and the computer readable storage medium of multi-user login pattern | |
CN104951685A (en) | Method and mobile terminal for running application programs | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN104375836A (en) | Method and device for showing lock screen window | |
CN104615927A (en) | Multisystem safe verification method, multisystem safe verification device and terminal | |
CN107038357A (en) | User authority control method and mobile terminal | |
CN106815509B (en) | A kind of multimedia file guard method, device and electronic equipment | |
CN106897006A (en) | A kind of method for processing payment information, device and user equipment | |
CN105930726B (en) | A kind of processing method and user terminal of malicious operation behavior | |
CN104809402A (en) | Fuzzy display method for information and terminal | |
CN106778151A (en) | Method for identifying ID and device based on person's handwriting | |
CN105912896A (en) | Application switching method and terminal | |
US20230029490A1 (en) | Radar-Based Behaviometric User Authentication | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN105005436A (en) | Program processing method and mobile terminal | |
Paul et al. | IEDs on the Road to Fingerprint Authentication: Biometrics have vulnerabilities that PINs and passwords don't | |
CN106599843A (en) | Fingerprint authentication method and device | |
CN105703909A (en) | Authentication method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |