Detailed Description
The embodiment of the application provides a method and a device for controlling an intelligent terminal. The method comprises the following steps: receiving an authentication command for an access portal of a hidden application; carrying out user validity verification according to the verification command; and if the user validity verification is successful, displaying an access entrance of the application program which is set to be hidden on a screen of the intelligent terminal. Because the access entrance of the application program set as hidden is displayed on the display screen of the intelligent terminal only when the validity verification is successful, double guarantee is provided for user information security, an attacker cannot directly know whether the application program which can be accessed through the access entrance of the application program set as hidden exists or not from the display screen of the intelligent terminal, namely cannot determine whether an attack target exists or not, in addition, even if blind attack exists, when the attack target exists by using an unconventional technical means, validity verification still needs to be carried out, and the user information security including the personal privacy information of the user is ensured to a great extent.
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation. And the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Referring to fig. 4, a schematic flowchart of a method for controlling an intelligent terminal provided in an embodiment of the present application is shown, where the method includes:
step 401: receiving an authentication command for an access portal of a hidden application;
the verification command in this step 401 is a verification command for viewing and accessing an access entry of a hidden application program;
the verification command may be a password or a biological feature (e.g., fingerprint feature, gesture feature, facial feature).
Step 402: verifying whether the user is a legal user or not according to the verification command; if the verification result is a valid user, go to step 403; if the verification result is an illegal user, executing step 404;
this step 402 is to verify the validity of the user, and if the verification result is a valid user, the user validity is successfully verified; if the verification result is an illegal user, the user validity verification is failed;
the above-mentioned legal user authentication in step 401 and step 402 can be implemented by external hardware and/or biometric features, and a detailed description will be given below of a specific implementation process of the user legal authentication by using the external hardware and/or biometric features.
Step 403: displaying an access entry of an application program set to be hidden on a screen of the intelligent terminal;
the specific representation form of the access entry of the application program may be an icon of the application program, a name of the application program displayed in characters, an identification number of the application program, or the like. The application program can be accessed through an access entrance of the application program.
In this step 403, the access entry of the displayed application is set to be hidden, and unless the user passes the validity verification, the access entry of the application is hidden and invisible to the user anywhere in the intelligent terminal where the application is installed.
Step 404: and prompting the user as an illegal user, and not displaying the access entrance of the application program which is set to be hidden on the screen of the intelligent terminal.
The screen of the intelligent terminal can be a display screen with a touch function or a display screen without the touch function; of course, if a touch technology is required to be used in the implementation of the solution of the embodiment of the present invention, the screen of the smart terminal herein should be understood as a display screen with a touch function.
The hidden access entry of the application program is preset, one or more than or equal to 2 access entries of the application programs needing to be protected can be set to be hidden, the protection method of the application programs does not depend on the application, and when the access entries of at least 2 application programs needing to be protected are set to be hidden, a user only needs to carry out verification once, so that the user operation is facilitated, the user information safety is guaranteed, and the user experience is improved.
In this step 403, the hidden access entry of the Application program may be preset by the manufacturer of the smart terminal, or may be set by the user through controlling an APP (Application) of the smart terminal. Of course, the embodiments of the present invention are not limited to these two arrangements, and other arrangements may be used.
The following describes the process of verifying the validity of a user by using external hardware and biometric features:
firstly, a process of verifying the validity of a user by using external hardware, as shown in fig. 5, includes the following steps 501 to 508:
step 501: detecting whether the intelligent terminal is connected with external hardware, and executing a step 502 after detecting that the intelligent terminal is connected with the external hardware; and when the detection is not detected, the detection is continued.
In step 501, the connection between the intelligent terminal and the external hardware can be divided into two types, one type is wireless connection, and the other type is wired connection; the wireless connection may be a connection performed by an RFID (Radio frequency identification) technology or a connection performed by an NFC (Near Field Communication) technology; the wired connection can be performed by inserting external equipment into a slot of the intelligent terminal;
during wireless connection, when the intelligent terminal starts the RFID function or the NFC function, the external hardware is close to the intelligent terminal, the intelligent terminal can sense the external hardware and perform connection, and then the device controlling the intelligent terminal (i.e., the execution main body in steps 401 to 404) can detect whether the intelligent terminal is connected to the external hardware through a wireless link.
When the intelligent terminal is connected with the cable, the device for controlling the intelligent terminal detects whether external hardware is inserted into the slot of the intelligent terminal, and when the external hardware is inserted into the slot, the device for controlling the intelligent terminal determines that the intelligent terminal is connected with the external hardware.
Step 502: judging whether the external hardware is used for accessing the access entrance of the hidden application program, if so, executing step 503; if the determination result is negative, go to step 504;
step 503: displaying an authentication command input component on a screen of the intelligent terminal, and then executing step 505;
the input component may be one or more of input components that implement various input modes, such as: a component for realizing handwriting input, a component for realizing voice input (such as a virtual microphone), a component for realizing text, character and/or expression input (such as a virtual keyboard), a component for realizing track input (such as a pattern), and the like. The display of the corresponding input component may be performed according to the expression form and specific needs of the legal verification command, and the specific input component is not limited in this embodiment of the application.
Step 504: and ending the user validity verification.
Step 505: receiving an authentication command input by a user in the displayed authentication command input component, and then executing step 506;
step 506: providing the verification command to the external hardware, and then executing step 507;
step 507: receiving a verification result obtained after the external hardware carries out user validity verification according to the verification command; then step 508 is executed;
in this step 507, the external hardware may match the verification command with a valid verification command stored in the external hardware, and determine a verification result according to a matching result;
step 508: and taking the received verification result as a user validity verification result.
Further, in order to hide the access entry of the application program set as hidden in the case of performing user validity verification using external hardware, it is preferable that, after the access entry of the application program set as hidden is displayed on the screen of the smart terminal, the method further includes:
detecting whether the intelligent terminal is disconnected with the external hardware or not;
when the external hardware is in wired connection with the intelligent terminal, the intelligent terminal is disconnected from the external hardware, the external hardware can be moved out of the slot, or the intelligent terminal is used for disconnecting the data connection between the external hardware and the intelligent terminal but not moved out of the slot;
when the external hardware is in wired connection with the intelligent terminal, the intelligent terminal is disconnected from the external hardware, and data connection between the external hardware and the intelligent terminal can be disconnected (for example, the external hardware is far away from the intelligent terminal and/or the intelligent terminal closes the function of connecting the external hardware);
and if the intelligent terminal is detected to be disconnected from the external hardware, hiding the access entrance of the application program set as hidden.
Specifically, the external hardware may be any one of a smart card, a USB (Universal Serial Bus) device, and an NFC device, and may also be other hardware devices, and the following description respectively describes a process of verifying the validity of a user when the external hardware is a smart card, a USB device, and an NFC device:
1) when the external hardware is a smart card:
the smart Card is similar to a normal external plug-in SD Card (Secure Digital Memory Card), but different from the SD Card, the smart Card has its own operating system and file system, and can perform certain operations on files in its own file system, and for the embodiment of the present application, a process of performing user validity verification by the smart Card by using an apparatus for controlling a smart terminal (the apparatus for controlling a smart terminal is an execution subject of the above steps 501 to 508, and is an execution subject of the above steps 401 to 404) is as follows:
step a 101: the device for controlling the intelligent terminal detects that the intelligent card is inserted into the intelligent card slot of the intelligent terminal, and then executes the step a 102;
in step a101, a device for controlling an intelligent terminal detects that an intelligent card is inserted into a USB slot of the intelligent terminal, namely the intelligent card is connected to the intelligent terminal;
step a 102: controlling a device of the intelligent terminal to read a file system in the intelligent card, and then executing the step a 103;
step a 103: the device for controlling the intelligent terminal judges whether a set identification file exists in the file system, if so, the step a104 is executed, and if not, the step a105 is executed;
step a 104: determining whether the smart card is external hardware for accessing the access entrance of the hidden application program by the device for controlling the smart terminal, and then executing the step a 106;
step a103 and step a104 are also processes of determining whether the smart card is an external hardware for accessing the access entry of the hidden application program according to whether the set identification file exists in the file system;
step a 105: and controlling the device of the intelligent terminal to finish the user validity verification.
Step a 106: controlling a device of the intelligent terminal to display an authentication command input component on a screen of the intelligent terminal, and then executing step a 107;
after the apparatus for controlling the smart terminal displays the authentication command input means on the screen of the smart terminal, the user may input an authentication command through the displayed authentication command input means;
step a 107: the device for controlling the intelligent terminal receives the authentication command input by the user in the displayed authentication command input component, and then executes the step a 108;
step a 108: controlling the device of the intelligent terminal to write the received authentication command into a specified password file of the intelligent card, and then executing the step a 109;
the received authentication command is written into a specified password file of the smart card, namely the authentication command is provided for the smart card;
it should be noted that, in this step a108, in order to ensure the security of the verification command and ensure that the verification command is not stolen by an illegal user during transmission and during transmission to an illegal smart card, the device controlling the smart terminal may also encrypt the received verification command, and then write the encrypted verification command into an assigned password file of the smart card according to a preset format;
since the smart card that can be used to access the hidden application interface is a smart card that is paired with the smart terminal, a preset format and a designated password file have been previously agreed between the device that controls the smart terminal and the smart card.
After the step a108 is executed, the smart card will read the verification command (or the encrypted verification command) from the specified password file, verify whether the verification command is correct, and write the verification result into the verification result file;
the legal smart card stores correct/legal verification commands in advance and can also store decryption algorithms, the decryption algorithms correspond to the encryption algorithms when the device for controlling the smart terminal encrypts the verification commands, the judgment of the verification commands can be further carried out, if the smart card is an illegal smart card and does not store the correct/legal verification commands, the decryption algorithms can not be stored, the verification cannot be carried out, and even if the verification is carried out, the verification result is an illegal user, so that the safety of the access entrance of the hidden application program is further ensured.
Step a 109: controlling the device of the intelligent terminal to read the verification result from the verification result file, and then executing the step a 110;
step a109 may also be said to obtain the verification result from the smart card;
step a 110: and the device for controlling the intelligent terminal takes the read verification result as a user validity verification result.
And ending the process of verifying the user legality through the smart card.
2) When the external hardware is USB equipment:
the process of controlling the device of the intelligent terminal and the USB equipment to carry out user validity verification is as follows:
step a 201: a device for controlling the intelligent terminal detects that a USB device is inserted into a USB slot of the intelligent terminal, and then executes step a 202;
after step a201, the USB device sends an authentication invitation request to a device controlling the intelligent terminal, where the invitation request is used to invite the device controlling the intelligent terminal to perform authentication on the USB device;
in step a201, a device for controlling an intelligent terminal detects that a USB device is inserted into a USB slot of the intelligent terminal, that is, detects that the intelligent terminal is connected with the USB device;
step a 202: a device for controlling the intelligent terminal receives an identity authentication invitation request which is sent by the USB equipment and carries equipment information, and then step a203 is executed;
step a 203: the device for controlling the intelligent terminal judges whether the USB equipment is external hardware for accessing the access entrance of the hidden application program according to the equipment information carried in the identity authentication invitation request, if so, the step a204 is executed, and if not, the step a205 is executed;
in this step 203, the apparatus for controlling the intelligent terminal may match the device information with device information stored in the apparatus for controlling the intelligent terminal, and determine whether the USB device is an external hardware for accessing the access entry of the hidden application program by using a matching result.
Step a 204: the device for controlling the intelligent terminal displays the verification command input component on the screen of the intelligent terminal, and then executes the step a 206;
after the apparatus for controlling the smart terminal displays the authentication command input means on the screen of the smart terminal, the user may input an authentication command through the displayed authentication command input means;
step a 205: and controlling the device of the intelligent terminal to finish the user validity verification.
Step a 206: the device for controlling the intelligent terminal receives the authentication command input by the user in the displayed authentication command input component, and then executes step a 207;
step a 207: controlling the intelligent terminal device to transmit the verification command to the USB equipment, and then executing step a 208;
it should be noted that, in step a207, in order to ensure the security of the verification command, and ensure that the verification command is not stolen by an illegal user during transmission and when being transmitted to an illegal USB device, the apparatus controlling the intelligent terminal may also encrypt the received verification command, and then transmit the encrypted verification command to the USB device;
after the step a207 is executed, the USB device compares the received authentication command (or the encrypted authentication command) with the stored valid authentication command, verifies whether the received authentication command is correct, and obtains a verification result;
after the step a207 is executed, the USB device receives the verification command (or the encrypted verification command), verifies whether the received verification command is correct, and transmits a verification result to the apparatus for controlling the intelligent terminal;
the legal USB device stores correct/legal verification commands in advance and can also store decryption algorithms, the decryption algorithms correspond to encryption algorithms when the device for controlling the intelligent terminal encrypts the verification commands, the judgment of the verification commands can be further carried out, if the USB device is an illegal USB device and does not store the correct verification commands, the decryption algorithms can not be stored, the received encrypted verification commands cannot be decrypted, the verification cannot be carried out, and even if the verification is carried out, the verification result is an illegal user, so that the safety of the access entrance of the hidden application program is further ensured.
Step a 208: controlling the device of the intelligent terminal to receive the verification result sent by the USB equipment, and then executing a step a 209;
step a 209: and the device for controlling the intelligent terminal takes the received verification result as a user validity verification result.
Specifically, when the USB device and the device for controlling the intelligent terminal communicate with each other, a set communication mechanism, for example, a communication mechanism such as Socket (Socket) may be used for communication, at this time, a first service program may be stored in the device for controlling the intelligent terminal in advance, and a second service program may be stored in the legitimate USB device, where the first service program is used to monitor whether there is an authentication invitation request and to transmit and receive data, and the second service program is used to request the device for controlling the intelligent terminal to perform authentication and to transmit and receive data.
And ending the process of verifying the user validity through the USB equipment.
3) When external hardware is NFC equipment:
the NFC technology is integrated and evolved from the RFID technology and the interconnection technology, and the functions of an induction type card reader, an induction type card and point-to-point are combined on a single chip, so that the NFC technology can be used for carrying out identification and data exchange with compatible equipment in a short distance.
The NFC equipment is used for carrying out user validity verification, an NFC function needs to be supported and started by the intelligent terminal, and then communication can be carried out with the NFC equipment, so that the following verification process is carried out;
specifically, the process of controlling the device of the intelligent terminal and the NFC device to perform user validity verification is as follows:
step a 301: the device for controlling the intelligent terminal determines that the intelligent terminal is connected with the NFC equipment, and then executes the step a 302;
step a 302: controlling a device of the intelligent terminal to read the identification information in the NFC equipment, and then executing the step a 303;
step a 303: the device for controlling the intelligent terminal judges whether the NFC equipment is external hardware for accessing the access entrance of the hidden application program according to the read identity identification information, if so, the step a304 is executed, and if not, the step a305 is executed;
specifically, in this step 303, the device controlling the intelligent terminal compares the read identification information with the pre-stored legal identification information, and if the read identification information is the same as the pre-stored legal identification information, it is determined that the NFC device is external hardware for accessing the access entry of the hidden application program; if not, determining that the NFC equipment is not external hardware for accessing the access entrance of the hidden application program;
step a 304: the device for controlling the intelligent terminal displays the verification command input component on a screen of the intelligent terminal, and then executes the step a 306;
after the apparatus for controlling the smart terminal displays the authentication command input means on the screen of the smart terminal, the user may input an authentication command through the displayed authentication command input means;
step a 305: and controlling the device of the intelligent terminal to finish the user validity verification.
Step a 306: the device for controlling the intelligent terminal receives the authentication command input by the user in the displayed authentication command input component, and then executes step a 307;
step a 307: the device for controlling the intelligent terminal transmits the verification command to the NFC equipment, and then step a308 is executed;
after the step a307 is executed, the NFC device receives the verification command, verifies whether the verification command is correct, and transmits a verification result to the controlling intelligent terminal;
here, the valid NFC device stores a correct authentication command in advance, and can further authenticate the received authentication command by using the correct authentication command, if the NFC device is an illegal NFC device, the NFC device cannot perform authentication without storing the correct authentication command, and even if the NFC device performs authentication, the authentication result is an illegal user, which further ensures the security of the access entry of the hidden application program.
Step a 308: controlling the device of the intelligent terminal to receive the verification result sent by the NFC equipment, and then executing step a 309;
step a 309: and the device for controlling the intelligent terminal takes the received verification result as a user validity verification result.
And ending the process of verifying the user validity through the NFC equipment.
In the process of verifying the user validity, whether the smart card, the USB equipment or the NFC equipment is used for verifying twice, the equipment verification is firstly carried out, and then the verification command input by the user is verified after the equipment verification is passed.
Secondly, a process of verifying the validity of the user by using the biometric features, as shown in fig. 6, includes the following steps 601 to 604:
step 601: receiving an authentication start command of a user for an access entrance of a hidden application;
step 602: activating a scanning tool for performing a biometric scan;
the biological characteristics herein include: one or more of voice features, fingerprint features, iris features, gesture features, and facial features.
Aiming at the sound characteristics, a section of text and a virtual microphone can be displayed on a display screen of the intelligent terminal, and then a user is prompted to read the section of text, so that the sound characteristics can be obtained;
aiming at the fingerprint characteristics, the intelligent terminal is required to support fingerprint scanning, after the fingerprint scanning equipment is started, a user can input the fingerprint characteristics on the fingerprint scanning equipment, and then a device for controlling the intelligent terminal can obtain the fingerprint characteristics;
aiming at the iris characteristics, the intelligent terminal is required to support iris scanning, after the iris scanning equipment is started, the two eyes of a user align the iris equipment so as to input the iris characteristics, and then a device for controlling the intelligent terminal can obtain the iris characteristics;
aiming at the gesture characteristics and the face characteristics, the camera shooting function of the intelligent terminal needs to be started, the existing gesture recognition technology and the face recognition technology can be utilized for recognition, and then the gesture characteristics and the face characteristics are obtained;
step 603: receiving the biological characteristics scanned by the scanning tool, and using the scanned biological characteristics as an authentication command for an access entrance of the hidden application program;
step 604: and carrying out user validity verification on the scanned biological characteristics by utilizing the previously stored biological characteristics of the legal user.
In step 604, the stored biological features of the legal user may be matched with the biological features scanned this time, and if the similarity is greater than the set value, the user is determined to be a legal user; otherwise, determining the user as an illegal user.
The specific biometric matching algorithm can refer to the existing correlation algorithm, and is not described in detail here.
At this point, the process of verifying the validity of the user using the biometric feature ends.
Further, in order to hide the access entry of the application program set as hidden when the user is authenticated for validity by using the biometric features, preferably, after the access entry of the application program set as hidden is displayed on the screen of the smart terminal, the method further includes:
receiving a biometric scanned by the scanning tool;
the user validity verification is carried out on the biological characteristics scanned by the scanning tool at this time by utilizing the previously stored biological characteristics of the legal user;
and if the user validity verification is successful, hiding the access entrance of the application program set as hidden.
The effect of using the USB device to control the smart terminal is described below with reference to fig. 7 and 8:
assuming that the smart terminal is a smart phone, the specific expression form of the access entry of the application program is an icon, all the icons in the smart phone are a clock icon, a video icon, a phone icon, a call record icon, an information icon, a setting icon and an S memo icon, the preset icons of the hidden application program are a call record icon and a video icon, and the USB device inserted into the USB slot of the smart phone passes the user validity verification, fig. 7 and 8 respectively show schematic diagrams of icons displayed on the touch screen of the smart phone before and after the USB device is inserted.
The hidden application program entry is set in advance, and the setting of the hidden application program entry is described below:
when the hidden access entry of the application program is set by a user, for example, the user sets through an APP, the hidden access entry of the application program can be set through the following steps a to C:
step A: providing an interface for setting an access portal of the hidden application to a user;
and B: receiving a selected command of a user, and determining that an access entry of an application program corresponding to the selected command is a hidden access entry of the application program;
and C: hiding the determined access entrance of the application program.
Preferably, it may be set by any one of the following modes 1, 2, and 3:
mode 1:
the mode 1 is a browsing mode in common, and comprises the following steps b1 to b 4:
step b 1: receiving an access entry starting command of an application program which is set to be hidden by a user;
step b 2: displaying access entries of all application programs in the intelligent terminal and corresponding selection buttons on a screen;
in step b2, assuming that the concrete representation form of the access entry of the application program is still an icon, the access entry of the application program in the smart phone includes: a clock icon, a video icon, a cell phone icon, a call record icon, an information icon, a settings icon, and an S memo icon, where the icons and corresponding buttons of the application program displayed on the touch screen of the smart phone may be as shown in fig. 9.
Step b 3: and receiving a selection command of a user for the selection button, and determining an access entry of the application program corresponding to the selection button selected by the selection command as a hidden access entry of the application program.
In this step b3, on the basis of fig. 9, assuming that the user selects the selection button corresponding to the call record icon and the video icon, the display on the touch screen of the smartphone after the user selects may be as shown in fig. 10.
Step b 4: hiding the determined access entrance of the application program;
step b 5: receiving an access entry completion command of an application program set to be hidden by a user;
in step b5, the user presses the complete button in fig. 10, and at this time, the mobile terminal can know that the user has completed setting the access entry of the application program that needs to be hidden.
It should be noted that, the steps b1 and b5 are optional steps in the embodiment of the present application, and the steps b1 and b5 may not be performed.
In the step b4, the access entry of the application program set as hidden may be hidden by one or two of the following methods:
the first method is as follows: changing the visibility state of the access entrance of the application program set to be hidden from a visible state to an invisible state;
the second method comprises the following steps: changing the visibility state of the access entry of the application determined to be hidden from a visible state to an invisible state and changing the availability state of the application accessed through the access entry of the hidden application from an available state to an unavailable state;
since the visibility state of the access entry of the application program is changed to be invisible, the access entry of the application program cannot be displayed by the mobile terminal, and the access entry of the application program corresponding to each selected selection button is hidden through the first mode and the second mode, and at the moment, the access entry of the application program corresponding to each selected selection button on the screen of the intelligent terminal does not exist. In addition, in the second mode, the availability state of the application program accessed through the access entrance of the hidden application program is changed into an unavailable state, so that even if the user information file saved in the process of obtaining the application program which can be accessed by the user through the access entrance of the hidden application program through other modes is unavailable, the obtained user information file cannot be opened because the application program is unavailable, and the safety of user information is further ensured.
Mode 2:
the method 2 is a search method in common, and may include the following steps c1 to c 7:
step c 1: receiving an access entry starting command of an application program which is set to be hidden by a user;
step c 2: displaying a search box and an input component for inputting information on a screen, wherein the search box is used for receiving an access entrance of an application program which is hidden by setting and is input by a user;
if the smart terminal is a smart phone, the search box and the information input component displayed on the smart phone in step c2 may be as shown in fig. 11.
Step c 3: receiving keyword information input by a user in a search box;
step c 4: searching an access entry of an application program according to the keyword information, and displaying the searched access entry of the application program and a corresponding selection button on a screen;
step c 5: and receiving a selection command of a user for the selection button, and taking the access entry of the application program corresponding to the selection button as the access entry of the application program corresponding to the selection command.
If the keyword input in step c3 is shinin, the display on the touch screen of the smartphone after receiving the selection command of the user for the selection button in step b5 may be as shown in fig. 12.
Step c 6: and hiding the access entrance of the application program corresponding to the selection button.
Specifically, the hiding of the access entry of the hidden application program can be realized by using the above-mentioned mode one or mode two;
step c 7: and receiving an access entry completion command of the application program which is set to be hidden by the user.
In the above step c3, step c4, and step c5, the user may select only one access entry that needs to be set as a hidden application, and after receiving the selection command of the user for the selection button, the intelligent terminal may clear the keyword in the search box to prompt the user to continue searching, or when knowing that the user triggers the "next" key in the keyboard region, the intelligent terminal may clear the keyword in the search box to prompt the user to continue searching, and continue setting the access entry of the hidden application, and when the user inputs the keyword, continue to execute the steps c3, c4, and c5 until receiving the access entry completion command of the application that is set as hidden by the user.
The steps c1 and c7 are optional steps in the embodiment of the present application, and the steps c1 and c7 may not be performed.
Mode 3:
the method 3 is a dragging method in a popular way, and includes the following steps d1 to d 6:
step d 1: receiving an access entry starting command of an application program which is set to be hidden by a user;
step d 2: displaying a first area and a second area on a screen, wherein an access entry of an application program in the intelligent terminal is displayed in the second area, and an access entry of the application program corresponding to a selected command of a user is displayed in the first area;
if the smart terminal is a smart phone, the schematic diagram of the first area displayed on the smart phone and the second area containing the icon of the application program in the smart phone in step d2 may be as shown in fig. 13. Fig. 13 shows that the screen of the intelligent terminal is vertically divided into two regions, or horizontally divided into two regions, or a closed figure (such as a circle, a square, a rectangle, a hexagon, etc.) is displayed on the screen of the intelligent terminal to divide the two regions, where a region inside a closed line is used as a first region, a region outside the closed line is used as a second region, or a region inside the closed line is used as a second region, and a region outside the closed line is used as the first region.
Step d 3: receiving a selected command sent by a user in a mode of dragging the access entrance of the application program in the second area into the first area, and determining that the access entrance of the application program dragged into the first area is used as the hidden application program as the access entrance of the application program corresponding to the selected command;
in this step d3, on the assumption that the access entries of the application dragged into the first area are determined to be the call record icon and the video icon on the basis of fig. 13, the display on the touch screen of the smartphone may be as shown in fig. 14.
Step d 4: hiding an access entry of an application program in the first area;
step d 5: receiving an access entry completion command of an application program set to be hidden by a user;
the steps d1 and d5 are optional steps in the embodiment of the present invention, and the steps d1 and d5 may not be performed.
Specifically, the hiding of the access entry of the application program set as hidden may be implemented by using the above-mentioned one or two ways.
In the above method 1, method 2, and method 3, if the hidden access entry of the application program is set in the first usage mode, the displaying the hidden access entry of the application program on the screen of the intelligent terminal includes:
changing the visibility state of the access portal of the application program which is determined to be hidden from the invisible state to the visible state;
if the hidden access entry of the application program is set in the second usage mode, displaying the access entry of the application program set to be hidden on the screen of the intelligent terminal includes:
changing the visibility state of the access portal of the application determined to be hidden from the invisible state to the visible state and changing the availability state of the application accessible through the access portal of the hidden application from the unavailable state to the available state.
Further, on the basis of the above steps 401 to 403, the method further includes:
hiding the access entrance set as the hidden application program when a command of hiding the access entrance of the application program is received, or when the situation that a user does not operate any hidden application program within a set time length is detected, or when the situation that the user completes the setting of the access entrance of the hidden application program is determined.
Here, the access entry of the application program set to be hidden may be hidden in one or two ways as described above.
Preferably, displaying an access entry of an application program set to be hidden on a screen of the smart terminal includes:
displaying the access entry of the hidden application program and the access entry of the un-hidden application program in different windows or in the same window;
or,
displaying a floating window on a screen of the intelligent terminal, wherein an access entrance of the application program set to be hidden is displayed in the floating window.
Based on the same inventive concept, the embodiment of the present application further provides a device for controlling an intelligent terminal, and as the principle of the problem solved by the device for controlling an intelligent terminal is similar to the method for controlling an intelligent terminal, the implementation of the device for controlling an intelligent terminal may refer to the implementation of the method, and repeated details are not repeated.
As shown in fig. 15, a schematic structural diagram of an apparatus for controlling an intelligent terminal according to an embodiment of the present application includes: a receiving module 151, a first authentication module 152, and an access portal display module 153; wherein:
a receiving module 151 for receiving an authentication command for an access entry of a hidden application;
a first verification module 152, configured to perform user validity verification according to the verification command, and if the verification result is that the user validity verification is successful, trigger the access entry display module;
and an access portal display module 153 configured to display an access portal of the application program set to be hidden on the screen of the intelligent terminal.
Preferably, the apparatus further comprises:
a setting module 154 for setting the access portal of the hidden application by: providing an interface for setting an access portal of the hidden application to a user; receiving a selected command of a user, and determining that an application program corresponding to the selected command is a hidden application program; hiding the determined access entrance of the application program.
Preferably, the apparatus further comprises:
the hiding module 155 is configured to hide the access entry of the hidden application program when a command to hide the access entry of the application program is received, or when it is detected that the user does not operate any hidden application program within a set time period, or when it is determined that the user completes setting of the access entry of the hidden application program.
Preferably, the access entry display module 153 is specifically configured to display the access entry of the hidden application and the access entry of the non-hidden application in different windows or in the same window; or displaying a floating window on a screen of the intelligent terminal, wherein an access entrance of the application program set to be hidden is displayed in the floating window.
Specifically, the validity of the user may be verified only by using the password, or may be verified by using external hardware, or may be verified by using a biometric feature, and a schematic structural diagram of the apparatus for controlling the intelligent terminal when the external hardware is used to verify the validity of the user is shown in fig. 16; fig. 17 is a schematic structural diagram of a device for controlling an intelligent terminal when external hardware is used to verify the validity of a user;
in fig. 16, the apparatus for controlling the smart terminal includes a receiving module 151, a first authentication module 152, and an access entry display module 153; further comprising:
a detecting module 161, configured to detect whether the intelligent terminal is connected to external hardware before the receiving module receives a verification command for an access entry of a hidden application, and trigger the determining module 162 when detecting that the intelligent terminal is connected to the external hardware;
a determining module 162, configured to determine whether the external hardware is an external hardware for accessing the access entry of the hidden application program, and if the determination result is yes, trigger the input component display module 163;
an input component display module 163 for displaying an authentication command input component on a screen of the smart terminal;
the receiving module 151 is specifically configured to receive an authentication command input by a user in the displayed authentication command input component.
Preferably, the first verification module 152 is specifically configured to provide the verification command to the external hardware; obtaining a verification result obtained after the external hardware carries out user validity verification according to the verification command; and taking the obtained verification result as a user validity verification result.
Preferably, the external hardware is a smart card, a Universal Serial Bus (USB) device or a Near Field Communication (NFC) device.
Preferably, the determining module 162 is specifically configured to, when the external hardware is a smart card, read a file system in the smart card; judging whether the smart card is an external hardware for accessing the access entrance of the hidden application program according to whether a set identification file exists in the file system; or,
the determining module 162 is specifically configured to receive an authentication invitation request carrying device information and sent by the USB device when the external hardware is a USB device; judging whether the USB equipment is external hardware for accessing the access entrance of the hidden application program or not according to the equipment information carried in the identity authentication invitation request; or,
the determining module 162 is specifically configured to, when the external hardware is an NFC device, read identity identification information in the NFC device; and judging whether the NFC equipment is external hardware for accessing the access entrance of the hidden application program or not according to the identity identification information.
The apparatus further includes a concealment module 164;
the detecting module 161 is further configured to detect whether the smart terminal is disconnected from external hardware after the access entry displaying module displays the access entry of the application program set to be hidden on the screen of the smart terminal, and trigger the hiding module 164 when detecting that the smart terminal is disconnected from the external hardware;
the hiding module 164 is configured to hide an access entry of the application program set as hidden.
In fig. 17, the apparatus for controlling the smart terminal includes a receiving module 151, a first authentication module 152, and an access entry display module 153; further comprising: a start module 171;
the receiving module 151 is further configured to receive an authentication start command of the user for the access entry of the hidden application before receiving an authentication command for the access entry of the hidden application;
the device further comprises:
an initiating module 171 for initiating a scanning tool for performing a biometric scan;
the receiving module 151 is specifically configured to receive the biometric feature scanned by the scanning tool, and use the scanned biometric feature as an authentication command for an access entry of the hidden application.
Preferably, the biological characteristics include: one or more of voice features, fingerprint features, iris features, gesture features, and facial features.
The first verification module 152 is specifically configured to perform user validity verification on the biometric features scanned by the scanning tool by using the previously stored biometric features of the valid user.
Preferably, the apparatus further comprises a second authentication module 172 and a concealment module 173;
the receiving module 151 is further configured to receive the biometric feature scanned by the scanning tool after the access entry displaying module displays the access entry of the application program set to be hidden on the screen of the smart terminal, and output the received biometric feature to the second verification module 172;
the second verification module 172 is configured to perform user validity verification on the biometric features scanned this time by the scanning tool by using the previously stored biometric features of the valid user, and if the verification result is that the user validity verification is successful, the hiding module 173 is triggered;
the hiding module 173 is configured to hide the access entry of the application program set as hidden.
Through the above description of the embodiments, it is clear to those skilled in the art that the embodiments of the present invention may be implemented by hardware, or by software plus a necessary general hardware platform. Based on such understanding, the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.), and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods according to the embodiments of the present invention.
Those skilled in the art will appreciate that the drawings are merely schematic representations of one preferred embodiment and that the blocks or flow diagrams in the drawings are not necessarily required to practice the present invention.
Those skilled in the art can understand that the modules in the terminal in the embodiment can be distributed in the terminal in the embodiment according to the description of the embodiment, and can also be located in one or more terminals different from the embodiment with corresponding changes. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.