CN105930145B - Information hiding method and mobile terminal - Google Patents

Information hiding method and mobile terminal Download PDF

Info

Publication number
CN105930145B
CN105930145B CN201610225777.7A CN201610225777A CN105930145B CN 105930145 B CN105930145 B CN 105930145B CN 201610225777 A CN201610225777 A CN 201610225777A CN 105930145 B CN105930145 B CN 105930145B
Authority
CN
China
Prior art keywords
target object
hiding
icon
mobile terminal
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610225777.7A
Other languages
Chinese (zh)
Other versions
CN105930145A (en
Inventor
丁泽楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610225777.7A priority Critical patent/CN105930145B/en
Publication of CN105930145A publication Critical patent/CN105930145A/en
Application granted granted Critical
Publication of CN105930145B publication Critical patent/CN105930145B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The embodiment of the invention discloses an information hiding method and a mobile terminal, wherein the information hiding method can comprise the following steps: setting the attribute of a target object as a hidden attribute according to a received hidden instruction, wherein the target object is at least one of an application program, a file or a folder; judging whether an object hiding function of the mobile terminal is in an open state or not; and if so, hiding the icon of the target object. By adopting the embodiment of the invention, the icon of the target object in the mobile terminal can be hidden, and some application programs, files or folders are fundamentally prevented from being illegally operated, so that the privacy information and property safety of a mobile terminal user are protected.

Description

Information hiding method and mobile terminal
Technical Field
The invention relates to the technical field of electronic equipment, in particular to an information hiding method and a mobile terminal.
Background
With the rapid development of electronic technology, mobile terminals are developing more and more rapidly. Through the mobile terminal, people can not only carry out communication activities, but also pay, entertain, record and other activities. The more functions of the mobile terminal, the more privacy and property security problems are involved, for example, when the mobile terminal is operated by other people, privacy of a user's contact, communication record, payment record and the like may be revealed, and even the mobile terminal may be operated illegally, which endangers property security of the user.
In the prior art, in order to protect the privacy of a user, a mobile terminal provides a screen lock function or an application program lock function, and the user can unlock the mobile terminal or the protected application program only by inputting a correct password or drawing a correct unlock graphic. Although the method can protect the privacy security of the user to a certain extent, the password or the unlocking graph is easy to crack, and the mobile terminal or the protected application program is difficult to ensure not to be illegally operated.
Disclosure of Invention
The embodiment of the invention provides an information hiding method and a mobile terminal, which can hide an icon of a target object in the mobile terminal and protect privacy information and property safety of a mobile terminal user.
A first aspect of an embodiment of the present invention provides an information hiding method, which may include:
setting the attribute of a target object as a hidden attribute according to a received hidden instruction, wherein the target object is at least one of an application program, a file or a folder;
judging whether an object hiding function of the mobile terminal is in an open state or not;
and if so, hiding the icon of the target object.
As a possible implementation, the setting the attribute of the target object as the hidden attribute according to the received hiding instruction includes:
receiving a first touch operation aiming at a target object;
if the touch parameter of the first touch operation meets a preset trigger condition, outputting an attribute setting interface of the target object, wherein the touch parameter comprises at least one of touch strength, touch duration or touch frequency, and the attribute setting interface comprises a hidden option;
and responding to the selection operation of the user on the hidden option, and setting the attribute of the target object as the hidden attribute.
As a possible implementation manner, after determining whether the object hiding function of the mobile terminal is in an open state, the method further includes:
if the judgment result is negative, receiving an opening instruction input by a user through a second touch operation;
and if the fingerprint information of the second touch operation is matched with a pre-stored reference fingerprint, or the track of the second touch operation is matched with a preset reference track, starting the object hiding function.
As a possible implementation, after hiding the icon of the target object, the method further includes:
receiving a closing instruction input by a user through a third touch operation;
if the fingerprint information of the third touch operation is matched with a pre-stored reference fingerprint, or the track of the third touch operation is matched with a preset reference track, closing the object hiding function;
unhiding the icon of the target object.
As a possible implementation, after hiding the icon of the target object, the method further includes:
setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction;
unhiding the icon of the target object.
A second aspect of an embodiment of the present invention provides a mobile terminal, which may include:
the setting module is used for setting the attribute of a target object as the hidden attribute according to the received hidden instruction, wherein the target object is at least one of an application program, a file or a folder;
the judging module is used for judging whether the object hiding function of the mobile terminal is in an open state or not;
and the hiding module is used for hiding the icon of the target object when the judgment result of the judging module is yes.
As a possible implementation, the setting module includes:
the device comprises a receiving unit, a processing unit and a display unit, wherein the receiving unit is used for receiving a first touch operation aiming at a target object;
the output unit is used for outputting an attribute setting interface of the target object when a touch parameter of the first touch operation meets a preset trigger condition, wherein the touch parameter comprises at least one of touch strength, touch duration or touch frequency, and the attribute setting interface comprises a hidden option;
and the setting unit is used for setting the attribute of the target object as the hidden attribute in response to the selection operation of the user on the hidden option.
As a possible implementation, the mobile terminal further includes:
the first receiving module is used for receiving an opening instruction input by a user through a second touch operation when the judgment result of the judging module is negative;
and the starting module is used for starting the object hiding function when the fingerprint information of the second touch operation is matched with a pre-stored reference fingerprint or the track of the second touch operation is matched with a preset reference track.
As a possible implementation, the mobile terminal further includes:
the second receiving module is used for receiving a closing instruction input by a user through a third touch operation;
a closing module, configured to close the object hiding function when the fingerprint information of the third touch operation matches a pre-stored reference fingerprint, or when the trajectory of the third touch operation matches a preset reference trajectory;
the hiding module is further configured to unhide the icon of the target object.
As a possible embodiment of the method according to the invention,
the setting module is further used for setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction;
the hiding module is further configured to unhide the icon of the target object.
In the embodiment of the invention, the attribute of the target object can be set as the hidden attribute according to the received hidden instruction; judging whether an object hiding function of the mobile terminal is in an open state or not; and when the judgment result is yes, hiding the icon of the target object. By adopting the embodiment of the invention, the icon of the target object in the mobile terminal can be hidden, and some application programs, files or folders are fundamentally prevented from being illegally operated, so that the privacy information and property safety of a mobile terminal user are protected.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information hiding method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of an information hiding method according to another embodiment of the present invention;
fig. 3 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mobile terminal according to yet another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides an information hiding method and a mobile terminal, which can hide an icon of a target object in the mobile terminal and protect privacy information and property safety of a mobile terminal user. In specific implementation, the mobile terminal described in the embodiment of the present invention may include, but is not limited to: mobile terminals such as mobile phones, tablet computers, notebook computers and the like.
Referring to fig. 1, fig. 1 is a schematic flow chart of an information hiding method according to an embodiment of the present invention. The information hiding method may be performed by a software system controlling hardware of the mobile terminal. As shown in fig. 1, the method may include the steps of:
s101, setting the attribute of the target object as a hidden attribute according to the received hidden instruction.
In the embodiment of the present invention, the target object may be at least one of an application icon, a file, or a folder.
In some possible embodiments, a trigger operation of the hiding instruction may be preset, and when the trigger operation is executed by a user, the hiding instruction is triggered to set the attribute of the target object as the hidden attribute. Wherein the triggering operation may include, but is not limited to, a touch operation or a voice operation. For example, when a touch operation is received that a user performs a touch operation on a target object for which the touch duration and/or the touch strength satisfy a certain condition, the hidden instruction may be triggered, and the attribute of the target object may be set as the hidden attribute. For another example, when a voice instruction to hide the target object is received, which is input by a user, the attribute of the target object may be set as the hidden attribute.
S102, judging whether the object hiding function of the mobile terminal is in an open state, if so, executing the step S103.
In the embodiment of the invention, if the object hiding function of the mobile terminal is in an open state, all objects with the hiding attribute can be hidden; and if the object hiding function is in the closed state, not hiding the object with the hiding attribute.
In a specific implementation, if the attribute of the target object is set as the hidden attribute and the object hiding function of the mobile terminal belongs to the on state, step S103 may be executed. It should be understood that step S102 may be implemented before or after step S101.
S103, hiding the icon of the target object.
In specific implementation, no matter application programs, files or folders, the icons can be displayed to the user, so that the user can operate conveniently.
As a possible implementation manner, the icon of the target object may be removed from the display interface of the mobile terminal and made invisible in the screen, so as to hide the icon of the target object. Preferably, after removing the icon of the target object, the icons of other applications, files or folders may be moved to the original icon position of the target object.
According to the information hiding method, the attribute of the target object can be set as the hidden attribute according to the received hidden command; judging whether an object hiding function of the mobile terminal is in an open state or not; and when the judgment result is yes, hiding the icon of the target object. By adopting the embodiment of the invention, the icon of the target object in the mobile terminal can be hidden, and some application programs, files or folders are fundamentally prevented from being illegally operated, so that the privacy information and property safety of a mobile terminal user are protected.
Referring to fig. 2, fig. 2 is a schematic flowchart of an information hiding method according to another embodiment of the present invention. The information hiding method may be performed by controlling hardware of the mobile terminal by a soft system. As shown in fig. 2, the method may include the steps of:
s201, setting the attribute of the target object as a hidden attribute according to the received hidden instruction.
The target object is at least one of an application program, a file or a folder.
In some possible embodiments, the specific implementation manner of step S201 may be consistent with the implementation manner of step S101 in the embodiment shown in fig. 1.
As a possible implementation, a first touch operation for a target object may be received; if the touch parameter of the first touch operation meets a preset trigger condition, outputting an attribute setting interface of the target object, wherein the attribute setting interface can comprise a hidden option; and responding to the selection operation of the user on the hidden option, and setting the attribute of the target object as the hidden attribute. The touch parameter includes at least one of touch strength, touch duration or touch frequency, and the preset trigger condition may be set by a user or set by default by the mobile terminal. The touch parameter of the first touch operation satisfies a preset trigger condition, which may be that the touch strength of the first touch operation is within a preset strength range, the touch duration is within a preset duration range, and/or the touch frequency is within a preset frequency range.
S202, determining whether the object hiding function of the mobile terminal is in an open state, if so, executing step S205, otherwise, executing step S203.
In some possible embodiments, the specific embodiment of determining whether the object hiding function of the mobile terminal is in the on state may refer to the related description of step S102 in the embodiment shown in fig. 1, and is not described herein again.
And S203, receiving a starting instruction input by the user through a second touch operation.
In some possible embodiments, if the object hiding function of the mobile terminal is in the off state, the user may turn on the object hiding function through a touch operation or a voice operation. Specifically, the mobile terminal may receive a second touch operation of the user, and generate the open instruction according to the second touch operation, where the second touch operation may be a touch operation on the object hiding function option.
In some possible embodiments, the mobile terminal may further receive a voice instruction input by the user, for example, "open the object hiding function", and the like, and the mobile terminal may generate the open instruction after recognizing the content of the voice instruction.
S204, if the fingerprint information of the second touch operation matches a pre-stored reference fingerprint, or the track of the second touch operation matches a pre-set reference track, then the object hiding function is turned on, and step S205 is executed.
In some possible embodiments, the mobile terminal may pre-store fingerprint information of a valid user as a reference fingerprint, or pre-store a reference trajectory set by the user. When the second touch operation of the user is detected, fingerprint information or a touch track of the second touch operation can be collected, the fingerprint information of the second touch operation is compared with a prestored reference fingerprint, or the track of the second touch operation is compared with a preset reference track, and when the comparison result is matched, the object hiding function of the mobile terminal can be started in response to the starting instruction. Whether the similarity exceeds a preset threshold value can be judged to determine whether the similarity is matched, for example, when the similarity exceeds 80% or 90%, the matching is determined.
In some possible embodiments, if the user inputs the opening instruction through the voice operation, the voice parameter of the voice operation may be analyzed and determined whether it matches with a preset parameter of the reference audio, for example, whether one or more parameters of tone, audio, etc. are within a certain error range, and if so, the voice parameter of the voice operation is determined to match with the parameter of the reference audio, and the object hiding function of the mobile terminal may be opened in response to the opening instruction.
S205, hiding the icon of the target object.
In some possible embodiments, reference may be made to the related description of step S103 in the embodiment shown in fig. 1 for specific embodiments of step S205, and details are not repeated here.
And S206, receiving a closing instruction input by the user through a third touch operation.
In an embodiment of the present invention, the close command is a close command for an object hiding function.
In some possible embodiments, if the object hiding function of the mobile terminal is in an open state, the user may open the object hiding function through a touch operation or a voice operation. Specifically, the mobile terminal may receive a third touch operation of the user, and generate a close instruction according to the third touch operation, where the third touch operation may be a touch operation on the object hiding function option.
In some possible embodiments, the mobile terminal may further receive a voice instruction input by the user, such as "close the object hiding function", and the like, and the mobile terminal may generate the close instruction after recognizing the content of the voice instruction.
S207, if the fingerprint information of the third touch operation matches a pre-stored reference fingerprint, or the trajectory of the third touch operation matches a pre-set reference trajectory, closing the object hiding function, and executing step S209.
In a specific implementation, the implementation method for determining whether the fingerprint information of the third touch operation matches the pre-stored reference fingerprint and whether the trajectory of the third touch operation matches the pre-stored reference trajectory may refer to the determination method related to the second touch operation in step S204, and details thereof are not repeated here.
S208, setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction, and executing the step S209.
In some possible implementations, the attributes of the target object may change. When the attribute of the target object is a hidden attribute, if a hide cancel instruction for the target object is received, the attribute of the target object may be set as a public attribute.
In some possible embodiments, a trigger operation for canceling the hiding instruction may be preset, and when the trigger operation is executed by a user, the cancel hiding instruction is triggered to adjust the attribute of the target object to the public attribute. Wherein the triggering operation may include, but is not limited to, a touch operation or a voice operation. For example, when the target object is in the hidden attribute, when a touch operation is received that the user performs a touch operation on the target object for which the touch duration and/or the touch strength satisfy a certain condition, the hiding cancellation instruction may be triggered, and the attribute of the target object is adjusted to be the public attribute. As another example, in the case where the target object is in the hidden attribute, when a voice instruction for hiding the target object is received, which is input by a user, the attribute of the target object may be adjusted to the public attribute.
S209, canceling the icon hiding the target object.
In a specific implementation, if the object hiding function of the mobile terminal is turned off, all the icons of the objects set as the hidden attributes, including the icon of the target object, may be hidden. If the object hiding function of the mobile terminal is started, but the target is set as the public attribute, the icon hiding the target object can be deleted.
As a possible implementation, the icon of the target object may be displayed on the page of the mobile terminal so as to be visible in the screen, thereby canceling hiding the icon of the target object. Optionally, the icon of the target object may be redisplayed in a pre-hidden position; alternatively, the icon of the target object may be displayed in a blank space of the page in which it is located.
The information hiding method can set the attribute of the target object as the hidden attribute according to the received hidden instruction, and hide the icon of the target object when the object hiding function of the mobile terminal is in an open state. The object hiding function state of the mobile terminal and the hiding attribute of the target object need to be changed through fingerprint verification or sliding track verification so as to protect the target object from being hidden by illegal personnel.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention. As shown in fig. 3, the mobile terminal may include:
a setting module 301, configured to set an attribute of the target object as a hidden attribute according to the received hidden instruction.
In the embodiment of the present invention, the target object may be at least one of an application icon, a file, or a folder.
In some possible embodiments, a trigger operation of the hiding instruction may be preset, and when the trigger operation is executed by a user, the hiding instruction is triggered to set the attribute of the target object as the hidden attribute. Wherein the triggering operation may include, but is not limited to, a touch operation or a voice operation. For example, when a touch operation is received that a user performs a touch operation on a target object for which the touch duration and/or the touch strength satisfy a certain condition, the hidden instruction may be triggered, and the attribute of the target object may be set as the hidden attribute. For another example, when a voice instruction to hide the target object is received, which is input by a user, the attribute of the target object may be set as the hidden attribute.
The determining module 302 is configured to determine whether an object hiding function of the mobile terminal is in an open state.
In the embodiment of the invention, if the object hiding function of the mobile terminal is in an open state, all objects with the hiding attribute can be hidden; and if the object hiding function is in the closed state, not hiding the object with the hiding attribute.
It should be understood that the step of determining whether the object hiding function of the mobile terminal is in the on state may be performed before or after setting the attribute of the target object as the hidden attribute according to the received hiding instruction.
A hiding module 303, configured to hide the icon of the target object.
In specific implementation, no matter application programs, files or folders, the icons can be displayed to the user, so that the user can operate conveniently.
As a possible implementation manner, the icon of the target object may be removed from the display interface of the mobile terminal and made invisible in the screen, so as to hide the icon of the target object. Preferably, after removing the icon of the target object, the icons of other applications, files or folders may be moved to the original icon position of the target object.
According to the mobile terminal provided by the embodiment of the invention, the attribute of the target object can be set as the hidden attribute according to the received hidden command; judging whether an object hiding function of the mobile terminal is in an open state or not; and when the judgment result is yes, hiding the icon of the target object. By adopting the embodiment of the invention, the icon of the target object in the mobile terminal can be hidden, and some application programs, files or folders are fundamentally prevented from being illegally operated, so that the privacy information and property safety of a mobile terminal user are protected.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention. As shown in fig. 4, the mobile terminal may include:
the setting module 401 is configured to set an attribute of a target object as a hidden attribute according to a received hidden instruction, where the target object is at least one of an application program, a file, and a folder.
In some possible implementations, the specific implementation of the setup module 401 may be consistent with the implementation of the setup module 301 in the embodiment shown in fig. 3.
In some possible implementations, the setup module 401 may include:
the receiving unit 4011 is configured to receive a first touch operation for a target object.
The output unit 4012 is configured to output an attribute setting interface of the target object when the touch parameter of the first touch operation meets a preset trigger condition.
The touch parameter includes at least one of touch strength, touch duration or touch frequency, and the preset trigger condition may be set by a user or set by default by the mobile terminal. The touch parameter of the first touch operation satisfies a preset trigger condition, which may be that the touch strength of the first touch operation is within a preset strength range, the touch duration is within a preset duration range, and/or the touch frequency is within a preset frequency range.
And the setting unit 4013 is configured to set, in response to a selection operation of the user on the hidden option, an attribute of the target object as a hidden attribute.
A determining module 402, configured to determine whether an object hiding function of the mobile terminal is in an open state.
In some possible embodiments, the specific implementation of the determining module 402 may refer to the description related to the determining module 302 in the embodiment shown in fig. 3, and is not described herein again.
The first receiving module 403 is configured to receive an opening instruction input by a user through a second touch operation when the determination result of the determining module is negative.
In some possible embodiments, if the object hiding function of the mobile terminal is in the off state, the user may turn on the object hiding function through a touch operation or a voice operation. Specifically, the mobile terminal may receive a second touch operation of the user, and generate the open instruction according to the second touch operation, where the second touch operation may be a touch operation on the object hiding function option.
In some possible embodiments, the mobile terminal may further receive a voice instruction input by the user, for example, "open the object hiding function", and the like, and the mobile terminal may generate the open instruction after recognizing the content of the voice instruction.
A starting module 404, configured to start the object hiding function when the fingerprint information of the second touch operation matches a pre-stored reference fingerprint, or when the track of the second touch operation matches a pre-set reference track.
In some possible embodiments, the mobile terminal may pre-store fingerprint information of a valid user as a reference fingerprint, or pre-store a reference trajectory set by the user. When the second touch operation of the user is detected, fingerprint information or a touch track of the second touch operation can be collected, the fingerprint information of the second touch operation is compared with a prestored reference fingerprint, or the track of the second touch operation is compared with a preset reference track, and when the comparison result is matched, the object hiding function of the mobile terminal can be started in response to the starting instruction. Whether the similarity exceeds a preset threshold value can be judged to determine whether the similarity is matched, for example, when the similarity exceeds 80% or 90%, the matching is determined.
In some possible embodiments, if the user inputs the opening instruction through the voice operation, the voice parameter of the voice operation may be analyzed and determined whether it matches with a preset parameter of the reference audio, for example, whether one or more parameters of tone, audio, etc. are within a certain error range, and if so, the voice parameter of the voice operation is determined to match with the parameter of the reference audio, and the object hiding function of the mobile terminal may be opened in response to the opening instruction.
In a specific implementation, after the opening module 404 opens the object hiding function, the determining module 402 may determine whether the object hiding function of the mobile terminal is in an open state again.
A hiding module 405, configured to hide the icon of the target object when the determination result of the determining module 402 is yes.
In some possible embodiments, the detailed implementation of the hiding module 405 may refer to the related description of the hiding module 303 in the embodiment shown in fig. 3, and is not described herein again.
The second receiving module 406 is configured to receive a close instruction input by a user through a third touch operation.
In an embodiment of the present invention, the close command is a close command for an object hiding function.
In some possible embodiments, if the object hiding function of the mobile terminal is in an open state, the user may open the object hiding function through a touch operation or a voice operation. Specifically, the mobile terminal may receive a third touch operation of the user, and generate a close instruction according to the third touch operation, where the third touch operation may be a touch operation on the object hiding function option.
In some possible embodiments, the mobile terminal may further receive a voice instruction input by the user, such as "close the object hiding function", and the like, and the mobile terminal may generate the close instruction after recognizing the content of the voice instruction.
A closing module 407, configured to close the object hiding function when the fingerprint information of the third touch operation matches a pre-stored reference fingerprint, or when the trajectory of the third touch operation matches a preset reference trajectory.
In a specific implementation, the implementation method for determining whether the fingerprint information of the third touch operation matches the pre-stored reference fingerprint and determining whether the trajectory of the third touch operation matches the pre-stored reference trajectory may refer to the determination method related to the second touch operation in the start module 404, which is not described herein again.
In some possible embodiments, the hiding module 405 may be further configured to unhide the icon of the target object after the object hiding function is turned off.
In some possible embodiments, the setting module 401 may be further configured to set the attribute of the target object as the public attribute according to the received unhidking instruction.
In some possible implementations, the attributes of the target object may change. When the attribute of the target object is a hidden attribute, if a hide cancel instruction for the target object is received, the attribute of the target object may be set as a public attribute.
In some possible embodiments, a trigger operation for canceling the hiding instruction may be preset, and when the trigger operation is executed by a user, the cancel hiding instruction is triggered to adjust the attribute of the target object to the public attribute. Wherein the triggering operation may include, but is not limited to, a touch operation or a voice operation. For example, when the target object is in the hidden attribute, when a touch operation is received that the user performs a touch operation on the target object for which the touch duration and/or the touch strength satisfy a certain condition, the hiding cancellation instruction may be triggered, and the attribute of the target object is adjusted to be the public attribute. As another example, in the case where the target object is in the hidden attribute, when a voice instruction for hiding the target object is received, which is input by a user, the attribute of the target object may be adjusted to the public attribute.
In some possible embodiments, the hiding module 405 may be further configured to unhide the icon of the target object when the attribute of the target object is set as the public attribute.
As a possible implementation, the icon of the target object may be displayed on the page of the mobile terminal so as to be visible in the screen, thereby canceling hiding the icon of the target object. Optionally, the icon of the target object may be redisplayed in a pre-hidden position; alternatively, the icon of the target object may be displayed in a blank space of the page in which it is located.
The mobile terminal of the embodiment of the invention can set the attribute of the target object as the hidden attribute according to the received hidden instruction, and hide the icon of the target object when the object hiding function of the mobile terminal is in the open state. The object hiding function state of the mobile terminal and the hiding attribute of the target object need to be changed through fingerprint verification or sliding track verification so as to protect the target object from being hidden by illegal personnel.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a mobile terminal according to another embodiment of the present invention. As shown in fig. 5, the terminal may further include at least one input device 1000; at least one output device 2000; at least one processor 3000, e.g., a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 being connected by a bus 5000.
The input device 1000 may be a touch control screen, a key, or a voice recognition module of the terminal, and the input device 1000 may receive a touch operation or a voice instruction of a user.
The output device 2000 may be a display screen or a voice playing module of a terminal, and in an embodiment of the present invention, the output device 2000 may be used to display an icon.
The memory 4000 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 4000 is used for storing a set of program codes.
The input device 1000, the output device 2000 and the processor 3000 are configured to call the program code stored in the memory 4000, and perform the following operations:
the processor 3000 may be configured to:
setting the attribute of a target object as a hidden attribute according to a received hidden instruction, wherein the target object is at least one of an application program, a file or a folder;
judging whether an object hiding function of the mobile terminal is in an open state or not;
and if so, hiding the icon of the target object.
In some possible embodiments, the input device 1000 may be configured to receive a first touch operation for a target object;
the step of setting the attribute of the target object as the hidden attribute by the processor 3000 according to the received hiding instruction may include:
if the touch parameter of the first touch operation meets a preset trigger condition, outputting an attribute setting interface of the target object, wherein the touch parameter comprises at least one of touch strength, touch duration or touch frequency, and the attribute setting interface comprises a hidden option;
and responding to the selection operation of the user on the hidden option, and setting the attribute of the target object as the hidden attribute.
In some possible embodiments, after the processor 3000 determines whether the object hiding function of the mobile terminal is in an on state, the input device 1000 may be configured to:
if the judgment result is negative, receiving an opening instruction input by a user through a second touch operation;
the processor 3000 may be further configured to perform the following steps:
and if the fingerprint information of the second touch operation is matched with a pre-stored reference fingerprint, or the track of the second touch operation is matched with a preset reference track, starting the object hiding function.
In some possible embodiments, after the processor 3000 hides the icon of the target object, the input device 1000 may be used to:
receiving a closing instruction input by a user through a third touch operation;
the processor 3000 may be further configured to perform the following steps:
if the fingerprint information of the third touch operation is matched with a pre-stored reference fingerprint, or the track of the third touch operation is matched with a preset reference track, closing the object hiding function;
unhiding the icon of the target object.
In some possible embodiments, after hiding the icon of the target object, the processor 3000 may be further configured to:
setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction;
unhiding the icon of the target object.
In the embodiment of the invention, the attribute of the target object can be set as the hidden attribute according to the received hidden instruction; judging whether an object hiding function of the mobile terminal is in an open state or not; and when the judgment result is yes, hiding the icon of the target object. By adopting the embodiment of the invention, the icon of the target object in the mobile terminal can be hidden, and some application programs, files or folders are fundamentally prevented from being illegally operated, so that the privacy information and property safety of a mobile terminal user are protected.
The modules or sub-modules in all embodiments of the present invention may be implemented by a general-purpose integrated circuit, such as a CPU (central processing Unit), or an ASIC (Application Specific integrated circuit).
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the invention can be merged, divided and deleted according to actual needs.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (6)

1. An information hiding method for hiding an icon of a target object in a mobile terminal to fundamentally prevent an application, a file or a folder from being illegally operated, thereby protecting privacy information and property security of a user of the mobile terminal, the method comprising:
setting the attribute of a target object as a hidden attribute according to a received hidden instruction, wherein the target object is at least one of an application program, a file or a folder;
judging whether an object hiding function of the mobile terminal is in an open state or not;
if the judgment result is yes, hiding the icon of the target object, including: removing the icon of the target object from the display interface of the mobile terminal to make the icon invisible in the screen, thereby hiding the icon of the target object, and after removing the icon of the target object, moving the icons of other application programs, files or folders to the original icon position of the target object;
wherein, the setting the attribute of the target object as the hidden attribute according to the received hidden instruction includes: receiving a first touch operation aiming at a target object; if the touch parameter of the first touch operation meets a preset trigger condition, outputting an attribute setting interface of the target object, wherein the touch parameter comprises at least one of touch strength, touch duration or touch frequency, and the attribute setting interface comprises a hidden option; responding to the selection operation of the user on the hidden option, and setting the attribute of the target object as the hidden attribute; the touch parameter of the first touch operation meeting the preset trigger condition includes: the touch control strength of the first touch control operation is within a preset strength range, the touch control duration is within a preset duration range and/or the touch control times are within a preset times range;
after determining whether the object hiding function of the mobile terminal is in an open state, the method further includes: if the judgment result is negative, receiving an opening instruction input by a user through a second touch operation, wherein the second touch operation is a touch operation on the object hiding function option; if the track of the second touch operation is matched with a preset reference track, starting the object hiding function;
wherein after hiding the icon of the target object, the method further comprises: receiving a closing instruction input by a user through a third touch operation; if the track of the third touch operation is matched with a preset reference track, closing the object hiding function;
wherein unhiding the icon of the target object comprises: displaying the icon of the target object in a blank of the page where the icon is located;
if the object hiding function of the mobile terminal is closed, hiding all icons of the objects which are set as the hiding attributes and comprise the icon of the target object is canceled; and if the object hiding function of the mobile terminal is started, but the icon of the target object is set as the public attribute, canceling the icon of the hidden target object.
2. The method of claim 1, wherein after hiding the icon of the target object, the method further comprises:
setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction;
unhiding the icon of the target object.
3. A mobile terminal for hiding an icon of a target object in the mobile terminal to fundamentally prevent an application, a file or a folder from being illegally operated, thereby protecting privacy information and property security of a user of the mobile terminal, the mobile terminal comprising:
the setting module is used for setting the attribute of a target object as the hidden attribute according to the received hidden instruction, wherein the target object is at least one of an application program, a file or a folder;
the judging module is used for judging whether the object hiding function of the mobile terminal is in an open state or not;
a hiding module, configured to hide the icon of the target object when the determination result of the determining module is yes, including: removing the icon of the target object from the display interface of the mobile terminal to make the icon invisible in the screen, thereby hiding the icon of the target object, and after removing the icon of the target object, moving the icons of other application programs, files or folders to the original icon position of the target object;
wherein the setting module includes:
the device comprises a receiving unit, a processing unit and a display unit, wherein the receiving unit is used for receiving a first touch operation aiming at a target object;
the output unit is used for outputting an attribute setting interface of the target object when a touch parameter of the first touch operation meets a preset trigger condition, wherein the touch parameter comprises at least one of touch strength, touch duration or touch frequency, and the attribute setting interface comprises a hidden option; the touch parameter of the first touch operation meeting the preset trigger condition includes: the touch control strength of the first touch control operation is within a preset strength range, the touch control duration is within a preset duration range and/or the touch control times are within a preset times range;
the setting unit is used for setting the attribute of the target object as a hidden attribute in response to the selection operation of the user on the hidden option;
wherein the mobile terminal further comprises:
the first receiving module is used for receiving an opening instruction input by a user through a second touch operation when the judgment result of the judging module is negative, wherein the second touch operation is a touch operation on an object hiding function option;
the starting module is used for starting the object hiding function when the track of the second touch operation is matched with a preset reference track;
wherein the mobile terminal further comprises:
the second receiving module is used for receiving a closing instruction input by a user through a third touch operation;
a closing module, configured to close the object hiding function when the trajectory of the third touch operation matches a preset reference trajectory;
the hiding module is further configured to unhide the icon of the target object, and includes: displaying the icon of the target object in a blank of the page where the icon is located;
if the object hiding function of the mobile terminal is closed, hiding all icons of the objects which are set as the hiding attributes and comprise the icon of the target object is canceled; and if the object hiding function of the mobile terminal is started, but the icon of the target object is set as the public attribute, canceling the icon of the hidden target object.
4. The mobile terminal of claim 3,
the setting module is further used for setting the attribute of the target object as a public attribute according to the received hiding cancellation instruction;
the hiding module is further configured to unhide the icon of the target object.
5. A computer-readable storage medium storing a computer program for instructing associated hardware to perform the method of any one of claims 1 to 2.
6. A mobile terminal comprising a processor and a memory;
the processor calls code stored in the memory to perform the method of any of claims 1 to 2.
CN201610225777.7A 2016-04-12 2016-04-12 Information hiding method and mobile terminal Active CN105930145B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610225777.7A CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610225777.7A CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Publications (2)

Publication Number Publication Date
CN105930145A CN105930145A (en) 2016-09-07
CN105930145B true CN105930145B (en) 2020-07-17

Family

ID=56838821

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610225777.7A Active CN105930145B (en) 2016-04-12 2016-04-12 Information hiding method and mobile terminal

Country Status (1)

Country Link
CN (1) CN105930145B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106210358A (en) * 2016-09-05 2016-12-07 努比亚技术有限公司 Terminal protection device and method
CN106485126A (en) * 2016-10-31 2017-03-08 宇龙计算机通信科技(深圳)有限公司 Information processing method based on articulations digitorum manus, device and terminal
CN106569862A (en) * 2016-11-08 2017-04-19 深圳Tcl新技术有限公司 Intelligent application start method and apparatus
CN106775648A (en) * 2016-11-23 2017-05-31 天脉聚源(北京)传媒科技有限公司 A kind of method and device of the automatic drawing back of control
CN106909855B (en) * 2017-03-24 2021-10-29 腾讯科技(深圳)有限公司 File hiding method and device
CN107133509A (en) * 2017-04-28 2017-09-05 北京小米移动软件有限公司 Method for secret protection and equipment
CN107317926A (en) * 2017-06-21 2017-11-03 深圳传音通讯有限公司 The method and device of hiden application
CN107295186A (en) * 2017-07-03 2017-10-24 广东欧珀移动通信有限公司 Method for hidden controlling, device and the storage medium and mobile terminal of application message
CN109388314A (en) * 2017-08-14 2019-02-26 中兴通讯股份有限公司 Hidden function starts method, mobile terminal and computer readable storage medium
CN107643868A (en) * 2017-09-13 2018-01-30 维沃移动通信有限公司 One kind puts out screen and shows Switching method and mobile terminal
CN111492336B (en) * 2017-09-30 2024-02-13 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
CN108093032B (en) * 2017-12-05 2020-12-25 广东小天才科技有限公司 Answer lock control method and client
CN111782494A (en) * 2020-06-24 2020-10-16 上海闻泰信息技术有限公司 Application software control method and device, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130076592A1 (en) * 2011-09-27 2013-03-28 Paul E. Reeves Unified desktop docking behavior for visible-to-visible extension
CN104951206A (en) * 2015-05-28 2015-09-30 努比亚技术有限公司 Icon hiding method and device
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN104992121A (en) * 2015-07-02 2015-10-21 成都亿邻通科技有限公司 Hidden management method for application icons
CN105005740B (en) * 2015-08-04 2018-01-16 广东欧珀移动通信有限公司 The control method and system of terminal applies

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104679387A (en) * 2015-02-13 2015-06-03 广东欧珀移动通信有限公司 Privacy information protection method and terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications

Also Published As

Publication number Publication date
CN105930145A (en) 2016-09-07

Similar Documents

Publication Publication Date Title
CN105930145B (en) Information hiding method and mobile terminal
EP3349424B1 (en) Method for protecting privacy information and terminal device
CN103916233B (en) A kind of information ciphering method and device
CN104700010B (en) Personal information protection method and protection device
CN108038393B (en) Application privacy protection method and mobile terminal
WO2016165245A1 (en) User interface control method and terminal
CN104778416B (en) A kind of information concealing method and terminal
CN104679387A (en) Privacy information protection method and terminal
CN107944247B (en) Unlocking control method and device and electronic equipment
CN108563933A (en) Control method, device, storage medium and the mobile terminal of application program
CN105760737A (en) Control method for applications and terminal
US9877196B2 (en) User authentication systems and methods
CN104363205B (en) Using login method and device
WO2019047148A1 (en) Password verification method, terminal, and computer readable storage medium
AU2013245980A1 (en) Location-based access control for portable electronic device
CN106022077B (en) A kind of unlocking screen method and terminal
CN104780046A (en) Terminal
CN111095896B (en) Method and system for controlling access to authenticated functionality
CN107085694B (en) Information display processing method and device
CN104933340B (en) The sending method and mobile terminal of a kind of message
CN104780162A (en) Authentication information verification method
CN105005436A (en) Program processing method and mobile terminal
CN108769366B (en) Authority management method, device, mobile terminal and storage medium
CN113282364A (en) Display method, display device and electronic equipment
CN109697345B (en) Data destruction method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

GR01 Patent grant
GR01 Patent grant