CN106295359A - The processing method and processing device of application - Google Patents

The processing method and processing device of application Download PDF

Info

Publication number
CN106295359A
CN106295359A CN201510274787.5A CN201510274787A CN106295359A CN 106295359 A CN106295359 A CN 106295359A CN 201510274787 A CN201510274787 A CN 201510274787A CN 106295359 A CN106295359 A CN 106295359A
Authority
CN
China
Prior art keywords
application
information
hidden
data
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510274787.5A
Other languages
Chinese (zh)
Inventor
黄勤波
王建修
张冬明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510274787.5A priority Critical patent/CN106295359A/en
Priority to PCT/CN2016/073863 priority patent/WO2016188152A1/en
Publication of CN106295359A publication Critical patent/CN106295359A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses the processing method and processing device of a kind of application, the processing method of described application comprises the following steps: obtain the hiding strategy of the application that terminal is pre-configured with;Obtain the current positional information of described terminal and/or temporal information;Application icon and the application data of application corresponding with described positional information and/or temporal information in described hiding strategy are hidden.The present invention can remove the operation that user is manually hidden or limits from, reduces the most meaningless selection of user and lookup, user friendly operation.

Description

The processing method and processing device of application
Technical field
The present invention relates to terminal unit technical field, particularly relate to the processing method and processing device of a kind of application.
Background technology
Along with the development of terminal technology, the application on terminal interface gets more and more, and function is more and more abundanter, Such as include office application, financing application, communications applications and other Entertainment application etc..Work as user It is not intended to some important application be used by others, these application can be hidden, it is to avoid by other people See or use;Or when the application in interface is more, the application in interface is arranged by user, A part therein is deleted or is moved in a certain file, either hides or housekeeping operation, It is required for user's manual operation, carries out selecting then to be hidden or arrange, operate cumbersome.
Foregoing is only used for auxiliary and understands technical scheme, does not represent and recognizes that foregoing is Prior art.
Summary of the invention
Present invention is primarily targeted at the processing method and processing device that a kind of application is provided, it is intended to solve application Arrange or the technical problem of hiding troublesome poeration.
For achieving the above object, the present invention provides the processing method of a kind of application, the process side of described application Method comprises the following steps:
Obtain the hiding strategy of the application that terminal is pre-configured with;
Obtain the current positional information of described terminal and/or temporal information;
Application drawing by application corresponding with described positional information and/or temporal information in described hiding strategy Mark and application data are hidden.
Preferably, described by answer corresponding with described positional information and/or temporal information in described hiding strategy Application icon and the application step that is hidden of data include:
Obtain application icon corresponding with described positional information and/or temporal information in described hiding strategy and Application data;
Application corresponding for described application icon is filtered by the interface that reads in application, and reads at file Described application data are filtered by interface, are hidden described application icon and application data.
Preferably, the processing method of described application also includes:
When, after currently displayed application icon and application image watermarking, display unhides for user's input The interface of information;
Receive the information unhided of input, according to the information inputted by hidden application icon and Application data show again.
Preferably, the processing method of described application also includes:
Obtain the historical position information of terminal and/or temporal information, and with described historical position information and/ Or the operation data of application corresponding to temporal information, according to described historical position information and/or temporal information, The operation data configuration hiding strategy of application.
Additionally, for achieving the above object, the present invention also provides for the processing means of a kind of application, described application Processing means include:
First acquisition module, for obtaining the hiding strategy of the application that terminal is pre-configured with;
Second acquisition module, for obtaining the current positional information of described terminal and/or temporal information;
Hide module, for by corresponding with described positional information and/or temporal information in described hiding strategy Application icon and the application data of application are hidden.
Preferably, described hiding module includes:
Acquiring unit, is used for obtaining in described hiding strategy corresponding with described positional information and/or temporal information Application icon and application data;
Hidden unit, filters application corresponding for described application icon for the interface that reads in application, And at file reading interface, described application data are filtered, described application icon and application data are entered Row is hidden.
Preferably, the processing means of described application also includes:
Display module, for when currently displayed application icon and application image watermarking after, show for The interface of the information that family input unhides;
Unhide module, for receiving the information unhided of input, and will according to the information inputted Application icon and the application data hidden show again.
Preferably, the processing means of described application also includes:
Configuration module, for obtaining historical position information and/or the temporal information of terminal, and goes through with described History positional information and/or the operation data of application corresponding to temporal information, according to described historical position information and / or temporal information, the operation data configuration hiding strategy of application.
The processing method and processing device of a kind of application of the present invention, terminal is pre-configured with hiding strategy, then obtains Positional information that terminal is current and/or temporal information, based on positional information and/or temporal information formed time Application icon corresponding in hiding strategy and application data are hidden, namely at this space-time by barnyard scape Under scene, the application applied or do not use important for user is hidden, removes user from and manually carry out hidden The operation hidden or limit, reduces the most meaningless selection of user and lookup, user friendly operation.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of the processing method first embodiment that the present invention applies;
Fig. 2 is the refinement schematic flow sheet of step S103 in Fig. 1;
Fig. 3 is the schematic flow sheet of processing method the second embodiment that the present invention applies;
Fig. 4 is the schematic flow sheet of processing method the 3rd embodiment that the present invention applies;
Fig. 5 is the high-level schematic functional block diagram of the processing means first embodiment that the present invention applies;
Fig. 6 is the refinement high-level schematic functional block diagram hiding module in Fig. 5;
Fig. 7 is the high-level schematic functional block diagram of processing means the second embodiment that the present invention applies;
Fig. 8 is the high-level schematic functional block diagram of processing means the 3rd embodiment that the present invention applies.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, do referring to the drawings further Explanation.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not used to limit Determine the present invention.
The present invention provides the processing method of a kind of application, with reference to Fig. 1, in one embodiment, this application Processing method includes:
Step S101, obtains the hiding strategy of the application that terminal is pre-configured with;
Step S102, obtains the current positional information of described terminal and/or temporal information;
In the present embodiment, terminal can be the intelligent terminal such as mobile phone or panel computer.Join in advance in terminal Putting the hiding strategy of application, this hiding strategy includes that temporal information and the needs corresponding with temporal information enter The application that application, positional information and the needs corresponding with positional information that row is hidden are hidden, with in time Between information be hidden with the space time information that positional information forms and the needs corresponding with this space time information should At least one in, it is preferable that hiding strategy includes space time information and corresponding with this space time information Need the application being hidden.
In the present embodiment, the hiding strategy of application can be configured voluntarily by terminal, and terminal can be collected The history space time information of user and untapped application corresponding to history space time information, these are untapped The application that the needs that application configuration is corresponding with this space time information are hidden;Alternatively, it is also possible to by user Independently configure, which time point and/or place are configured in requisition for the application being hidden.
Wherein, the determination of positional information uses the basic function combining the terminal such as map, location positioning to mark Reference point is put in location, determines position range, position model by effective radius on the basis of reference point Enclosing can be the region in effective radius, it is also possible to be the region outside radius, it is also possible to be multiple regions Union or common factor.Network hotspot mainly arranges the credibility of conventional WIFI network.Position range and net Network focus can be used for the judgement of position safety together, it is also possible to being used for independently determines security bit Put.It is said that in general, time and position are a space-time entirety, usually combine consideration.As above Class's time must be corresponding with working position scope (can be one or more).
Additionally, for hiding strategy, on parameter selects, positional information, WIFI hot spot, time period letter Cease three parameters and can only take partial parameters, it is also possible to three parametric joints use, it might even be possible to choose all Such as other type of parameters such as orientation.User can also consider to set for the safety of oneself and self convenience Putting some strategies, the range of activity be such as in limits and accesses office application, be possible to prevent in family child or When old man uses terminal, maloperation has influence on significant data etc..
Step S103, by answer corresponding with described positional information and/or temporal information in described hiding strategy It is hidden by icon and application data.
In the present embodiment, application data are some data of the storage of the application that application icon is corresponding, such as In note application, its application data are its note data receiving or sending, and in camera applications, are clapped The photo taken the photograph is the application data of its correspondence.Wherein, if application corresponding to current application icon has been transported OK, but do not show relevant application data, be then to need not to apply image watermarking, and directly will Application icon is hidden.
In the present embodiment, during user's carried terminal, position can change, and the time also changes constantly, First the present embodiment can obtain current temporal information, and it is right with this temporal information to obtain in hiding strategy The application answered, the application icon that this is applied display on terminal interface and application data are hidden;Or Person obtains current positional information, obtains application corresponding with this positional information in hiding strategy, should Application icon and the application data of applying display on terminal interface are hidden;Or when obtaining current Empty information, obtains application corresponding with this space time information in hiding strategy, applies this at terminal interface Application icon and the application data of upper display are hidden.
In the present embodiment, after the application icon of application and application image watermarking, user can not directly use this A little application hidden.Such as be on duty time period, terminal in Administrative Area or the scope of Lab region In, take pictures, recording etc. is applied and is hidden;Time of having a rest section at night, it is all that interference is had a rest by terminal Application is hidden.
In the present embodiment, based on terminal location and/or time, the application that user uses has certain Rule, limits application and the observability of data thereof according to this rule, by application important for user or The application not used under this position and/or time is hidden, and can remove user's manual operation from and carry out hidden Hide or limit, reduce the most meaningless selection of user and lookup, user friendly operation.
Compared with prior art, the present embodiment terminal is pre-configured with hiding strategy, then obtains terminal current Positional information and/or temporal information, the space-time scene formed based on positional information and/or temporal information will Application icon corresponding in hiding strategy and application data are hidden, namely will under this space-time scene Application or the application that do not uses that user is important are hidden, and remove user from and are manually hidden or limit Operation, reduce the most meaningless selection of user and lookup, user friendly operation.
In a preferred embodiment, as in figure 2 it is shown, on the basis of the embodiment of above-mentioned Fig. 1, on State step S103 to include:
Step S1031, obtains in described hiding strategy corresponding with described positional information and/or temporal information Application icon and application data;
Step S1032, application corresponding for described application icon is filtered by the interface that reads in application, And at file reading interface, described application data are filtered, described application icon and application data are entered Row is hidden.
In the present embodiment, reading interface and file in application read interface and add limitation attribute respectively, so After obtaining the application icon corresponding with positional information and/or temporal information and application data in hiding strategy After, this application icon and application data are limitation attribute, then application was carried out by the reading interface in application Filter, reads interface at file and application data is filtered, terminal upper interface will not show this application Icon and application data, thus reach hiden application icon and the purpose of application data.
Except application icon corresponding with positional information and/or temporal information in hiding strategy and application data Outward, other application is unrestricted attribute, therefore, shows answering of unrestricted attribute on the interface of terminal With and application data, so, the application conventional under current space-time scene by user and application data are carried out Display, user friendly operation.
In a preferred embodiment, as it is shown on figure 3, on the basis of the embodiment of above-mentioned Fig. 1, Also include after above-mentioned steps S103:
Step S104, when, after currently displayed application icon and application image watermarking, display is defeated for user Enter the interface of the information unhided;
Step S105, receives the information unhided of input, according to the information inputted by hidden Application icon and application data show again.
In the present embodiment, if user is being currently used a certain application, terminal interface shows this application Application icon and application data, but if current space-time scene changes, just after change Space-time scene under, this application will be hidden, say, that is currently in use for active user Application and application data, cause this application and application data if as the change of the factor such as position and/or time Observability change, terminal can directly stop user to this application and application data use, by it It is hidden.After this application is hidden, terminal can jump out the information unhided for user's input Interface, such as, input the encrypted message unhided for user, after user inputs password in this interface, Just now the application being hidden shows again, in this way, to improve the motility that application is hidden, Further facilitate the operation of user.
In the present embodiment, above-mentioned encrypted message is arranged in hiding strategy, configuration space time information and with While the application that the needs that this space time information is corresponding are hidden, configuration needs the application weight being hidden The new encrypted message showing (i.e. unhiding), encrypted message can be character information, it is also possible to be to use The finger print information at family etc..
In a preferred embodiment, as shown in Figure 4, on the basis of the embodiment of above-mentioned Fig. 1, Also include before above-mentioned steps S101:
Step S100, obtains the historical position information of terminal and/or temporal information, and with described history Positional information and/or the operation data of application corresponding to temporal information, according to described historical position information and/ Or temporal information, the operation data configuration hiding strategy of application.
In the present embodiment, the hiding strategy of application can be configured voluntarily by terminal, and terminal collects user History space time information and the operation data of application corresponding to history space time information, the operation applied from these Data can getting, which application user uses under which space-time scene and do not use or less use Which application, will not use or the application configuration of less use is that the needs corresponding with this space-time scene are carried out The application hidden.
It addition, while the present embodiment configures hiding strategy voluntarily based on terminal, also provide for carrying out for user The embodiment of the hiding strategy that amendment is configured, to improve the motility of hiding strategy configuration, side further Just the operation of user.
The present invention also provides for the processing means of a kind of application, as it is shown in figure 5, in one embodiment, described The processing means of application includes:
First acquisition module 101, for obtaining the hiding strategy of the application that terminal is pre-configured with;
Second acquisition module 102, for obtaining the current positional information of described terminal and/or temporal information;
In the present embodiment, terminal can be the intelligent terminal such as mobile phone or panel computer.Join in advance in terminal Putting the hiding strategy of application, this hiding strategy includes that temporal information and the needs corresponding with temporal information enter The application that application, positional information and the needs corresponding with positional information that row is hidden are hidden, with in time Between information be hidden with the space time information that positional information forms and the needs corresponding with this space time information should At least one in, it is preferable that hiding strategy includes space time information and corresponding with this space time information Need the application being hidden.
In the present embodiment, the hiding strategy of application can be configured voluntarily by terminal, and terminal can be collected The history space time information of user and untapped application corresponding to history space time information, these are untapped The application that the needs that application configuration is corresponding with this space time information are hidden;Alternatively, it is also possible to by user Independently configure, which time point and/or place are configured in requisition for the application being hidden.
Wherein, the determination of positional information uses the basic function combining the terminal such as map, location positioning to mark Reference point is put in location, determines position range, position model by effective radius on the basis of reference point Enclosing can be the region in effective radius, it is also possible to be the region outside radius, it is also possible to be multiple regions Union or common factor.Network hotspot mainly arranges the credibility of conventional WIFI network.Position range and net Network focus can be used for the judgement of position safety together, it is also possible to being used for independently determines security bit Put.It is said that in general, time and position are a space-time entirety, usually combine consideration.As above Class's time must be corresponding with working position scope (can be one or more).
Additionally, for hiding strategy, on parameter selects, positional information, WIFI hot spot, time period letter Cease three parameters and can only take partial parameters, it is also possible to three parametric joints use, it might even be possible to choose all Such as other type of parameters such as orientation.User can also consider to set for the safety of oneself and self convenience Putting some strategies, the range of activity be such as in limits and accesses office application, be possible to prevent in family child or When old man uses terminal, maloperation has influence on significant data etc..
Hide module 103, for by described hiding strategy with described positional information and/or temporal information pair Application icon and the application data of the application answered are hidden.
In the present embodiment, application data are some data of the storage of the application that application icon is corresponding, such as In note application, its application data are its note data receiving or sending, and in camera applications, are clapped The photo taken the photograph is the application data of its correspondence.Wherein, if application corresponding to current application icon has been transported OK, but do not show relevant application data, be then to need not to apply image watermarking, and directly will Application icon is hidden.
In the present embodiment, during user's carried terminal, position can change, and the time also changes constantly, First the present embodiment can obtain current temporal information, and it is right with this temporal information to obtain in hiding strategy The application answered, the application icon that this is applied display on terminal interface and application data are hidden;Or Person obtains current positional information, obtains application corresponding with this positional information in hiding strategy, should Application icon and the application data of applying display on terminal interface are hidden;Or when obtaining current Empty information, obtains application corresponding with this space time information in hiding strategy, applies this at terminal interface Application icon and the application data of upper display are hidden.
In the present embodiment, after the application icon of application and application image watermarking, user can not directly use this A little application hidden.Such as be on duty time period, terminal in Administrative Area or the scope of Lab region In, take pictures, recording etc. is applied and is hidden;Time of having a rest section at night, it is all that interference is had a rest by terminal Application is hidden.
In the present embodiment, based on terminal location and/or time, the application that user uses has certain Rule, limits application and the observability of data thereof according to this rule, by application important for user or The application not used under this position and/or time is hidden, and can remove user's manual operation from and carry out hidden Hide or limit, reduce the most meaningless selection of user and lookup, user friendly operation.
Compared with prior art, the present embodiment terminal is pre-configured with hiding strategy, then obtains terminal current Positional information and/or temporal information, the space-time scene formed based on positional information and/or temporal information will Application icon corresponding in hiding strategy and application data are hidden, namely will under this space-time scene Application or the application that do not uses that user is important are hidden, and remove user from and are manually hidden or limit Operation, reduce the most meaningless selection of user and lookup, user friendly operation.
In a preferred embodiment, as shown in Figure 6, on the basis of the embodiment of above-mentioned Fig. 5, institute State hiding module 103 to include:
Acquiring unit 1031, is used for obtaining in described hiding strategy and believing with described positional information and/or time The application icon of breath correspondence and application data;
Hidden unit 1032, is carried out application corresponding for described application icon for the interface that reads in application Filter, and described application data are filtered, to described application icon and application at file reading interface Data are hidden.
In the present embodiment, reading interface and file in application read interface and add limitation attribute respectively, so After obtaining the application icon corresponding with positional information and/or temporal information and application data in hiding strategy After, this application icon and application data are limitation attribute, then application was carried out by the reading interface in application Filter, reads interface at file and application data is filtered, terminal upper interface will not show this application Icon and application data, thus reach hiden application icon and the purpose of application data.
Except application icon corresponding with positional information and/or temporal information in hiding strategy and application data Outward, other application is unrestricted attribute, therefore, shows answering of unrestricted attribute on the interface of terminal With and application data, so, the application conventional under current space-time scene by user and application data are carried out Display, user friendly operation.
In a preferred embodiment, as it is shown in fig. 7, on the basis of the embodiment of above-mentioned Fig. 5, institute The processing means stating application also includes:
Display module 104, for when after currently displayed application icon and application image watermarking, showing Interface for the information that user's input unhides;
Unhide module 105, for receiving the information unhided of input, according to the letter inputted Cease and hidden application icon and application data are shown again.
In the present embodiment, if user is being currently used a certain application, terminal interface shows this application Application icon and application data, but if current space-time scene changes, just after change Space-time scene under, this application will be hidden, say, that is currently in use for active user Application and application data, cause this application and application data if as the change of the factor such as position and/or time Observability change, terminal can directly stop user to this application and application data use, by it It is hidden.After this application is hidden, terminal can jump out the information unhided for user's input Interface, such as, input the encrypted message unhided for user, after user inputs password in this interface, Just now the application being hidden shows again, in this way, to improve the motility that application is hidden, Further facilitate the operation of user.
In the present embodiment, above-mentioned encrypted message is arranged in hiding strategy, configuration space time information and with While the application that the needs that this space time information is corresponding are hidden, configuration needs the application weight being hidden The new encrypted message showing (i.e. unhiding), encrypted message can be character information, it is also possible to be to use The finger print information at family etc..
In a preferred embodiment, as shown in Figure 8, on the basis of the embodiment of above-mentioned Fig. 5, institute The processing means stating application also includes:
Configuration module 100, for obtaining historical position information and/or the temporal information of terminal, and with institute State historical position information and/or the operation data of application corresponding to temporal information, according to described history bit confidence Breath and/or temporal information, the operation data configuration hiding strategy of application.
In the present embodiment, the hiding strategy of application can be configured voluntarily by terminal, and terminal collects user History space time information and the operation data of application corresponding to history space time information, the operation applied from these Data can getting, which application user uses under which space-time scene and do not use or less use Which application, will not use or the application configuration of less use is that the needs corresponding with this space-time scene are carried out The application hidden.
It addition, while the present embodiment configures hiding strategy voluntarily based on terminal, also provide for carrying out for user The embodiment of the hiding strategy that amendment is configured, to improve the motility of hiding strategy configuration, side further Just the operation of user.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every Utilize equivalent structure or equivalence flow process conversion that description of the invention and accompanying drawing content made, or directly or Connect and be used in other relevant technical fields, be the most in like manner included in the scope of patent protection of the present invention.

Claims (8)

1. the processing method of an application, it is characterised in that the processing method of described application includes following step Rapid:
Obtain the hiding strategy of the application that terminal is pre-configured with;
Obtain the current positional information of described terminal and/or temporal information;
Application drawing by application corresponding with described positional information and/or temporal information in described hiding strategy Mark and application data are hidden.
2. the processing method of application as claimed in claim 1, it is characterised in that described by described hiding Application icon and the application data of application corresponding with described positional information and/or temporal information in strategy are entered The step that row is hidden includes:
Obtain application icon corresponding with described positional information and/or temporal information in described hiding strategy and Application data;
Application corresponding for described application icon is filtered by the interface that reads in application, and reads at file Described application data are filtered by interface, are hidden described application icon and application data.
3. the processing method of application as claimed in claim 1, it is characterised in that the process of described application Method also includes:
When, after currently displayed application icon and application image watermarking, display unhides for user's input The interface of information;
Receive the information unhided of input, according to the information inputted by hidden application icon and Application data show again.
4. the processing method of the application as described in claim 1 or 3, it is characterised in that described application Processing method also includes:
Obtain the historical position information of terminal and/or temporal information, and with described historical position information and/ Or the operation data of application corresponding to temporal information, according to described historical position information and/or temporal information, The operation data configuration hiding strategy of application.
5. the processing means of an application, it is characterised in that the processing means of described application includes:
First acquisition module, for obtaining the hiding strategy of the application that terminal is pre-configured with;
Second acquisition module, for obtaining the current positional information of described terminal and/or temporal information;
Hide module, for by corresponding with described positional information and/or temporal information in described hiding strategy Application icon and the application data of application are hidden.
6. the processing means of application as claimed in claim 5, it is characterised in that described hiding module bag Include:
Acquiring unit, is used for obtaining in described hiding strategy corresponding with described positional information and/or temporal information Application icon and application data;
Hidden unit, filters application corresponding for described application icon for the interface that reads in application, And at file reading interface, described application data are filtered, described application icon and application data are entered Row is hidden.
7. the processing means of application as claimed in claim 5, it is characterised in that the process of described application Device also includes:
Display module, for when currently displayed application icon and application image watermarking after, show for The interface of the information that family input unhides;
Unhide module, for receiving the information unhided of input, and will according to the information inputted Application icon and the application data hidden show again.
8. the processing means of the application as described in claim 5 or 7, it is characterised in that described application Processing means also includes:
Configuration module, for obtaining historical position information and/or the temporal information of terminal, and goes through with described History positional information and/or the operation data of application corresponding to temporal information, according to described historical position information and / or temporal information, the operation data configuration hiding strategy of application.
CN201510274787.5A 2015-05-26 2015-05-26 The processing method and processing device of application Pending CN106295359A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510274787.5A CN106295359A (en) 2015-05-26 2015-05-26 The processing method and processing device of application
PCT/CN2016/073863 WO2016188152A1 (en) 2015-05-26 2016-02-16 Application processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510274787.5A CN106295359A (en) 2015-05-26 2015-05-26 The processing method and processing device of application

Publications (1)

Publication Number Publication Date
CN106295359A true CN106295359A (en) 2017-01-04

Family

ID=57393413

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510274787.5A Pending CN106295359A (en) 2015-05-26 2015-05-26 The processing method and processing device of application

Country Status (2)

Country Link
CN (1) CN106295359A (en)
WO (1) WO2016188152A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292194A (en) * 2017-05-26 2017-10-24 北京珠穆朗玛移动通信有限公司 A kind of data guard method, mobile terminal and storage medium
CN109697494A (en) * 2018-12-21 2019-04-30 南京维沃软件技术有限公司 A kind of graphic code display methods and terminal device
CN109889507A (en) * 2019-01-24 2019-06-14 太仓红码软件技术有限公司 It is a kind of for monitoring the monitoring method and its system of mailbox safe operation
CN110113486A (en) * 2019-04-28 2019-08-09 维沃移动通信有限公司 A kind of moving method and terminal of application icon
CN114610412A (en) * 2022-03-16 2022-06-10 杭州每刻科技有限公司 Application visibility hierarchical management method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110055058A (en) * 2009-11-19 2011-05-25 엘지전자 주식회사 Mobile terminal and control method thereof
CN103324483A (en) * 2013-06-26 2013-09-25 青岛海信移动通信技术股份有限公司 Method and device for application showing and hiding of intelligent terminal
CN103544020A (en) * 2013-10-31 2014-01-29 华为终端有限公司 Method and mobile terminal for displaying application software icons
CN104092821A (en) * 2014-07-01 2014-10-08 惠州Tcl移动通信有限公司 Icon hiding method and system of mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110055058A (en) * 2009-11-19 2011-05-25 엘지전자 주식회사 Mobile terminal and control method thereof
CN103324483A (en) * 2013-06-26 2013-09-25 青岛海信移动通信技术股份有限公司 Method and device for application showing and hiding of intelligent terminal
CN103544020A (en) * 2013-10-31 2014-01-29 华为终端有限公司 Method and mobile terminal for displaying application software icons
CN104092821A (en) * 2014-07-01 2014-10-08 惠州Tcl移动通信有限公司 Icon hiding method and system of mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292194A (en) * 2017-05-26 2017-10-24 北京珠穆朗玛移动通信有限公司 A kind of data guard method, mobile terminal and storage medium
CN109697494A (en) * 2018-12-21 2019-04-30 南京维沃软件技术有限公司 A kind of graphic code display methods and terminal device
CN109889507A (en) * 2019-01-24 2019-06-14 太仓红码软件技术有限公司 It is a kind of for monitoring the monitoring method and its system of mailbox safe operation
CN109889507B (en) * 2019-01-24 2021-08-06 印象(山东)大数据有限公司 Monitoring method and system for monitoring mailbox operation safety
CN110113486A (en) * 2019-04-28 2019-08-09 维沃移动通信有限公司 A kind of moving method and terminal of application icon
CN114610412A (en) * 2022-03-16 2022-06-10 杭州每刻科技有限公司 Application visibility hierarchical management method and system
CN114610412B (en) * 2022-03-16 2024-03-15 杭州每刻科技有限公司 Application visibility hierarchical management method and system

Also Published As

Publication number Publication date
WO2016188152A1 (en) 2016-12-01

Similar Documents

Publication Publication Date Title
CN106295359A (en) The processing method and processing device of application
CN105187484B (en) The method of mobile terminal and control mobile terminal
DE112011103728B4 (en) Automatic profile change on a mobile computing device
US8904164B2 (en) Multi-mode handheld wireless device to provide data utilizing combined context awareness and situational awareness
US8874162B2 (en) Mobile device safe driving
US20170339131A1 (en) Intelligent task assignment and authorization systems & methods
KR101737243B1 (en) Method, apparatus, program and recording medium for dynamically displaying device list
US20180189894A1 (en) Mobile terminal and method for controlling the same
US20160259420A1 (en) Mobile terminal and method for controlling the same
CN102710847A (en) Method for managing access of multiple visitors to mobile terminal
WO2015025219A1 (en) Limited area temporary instantaneous network
US8825761B2 (en) Systems and methods for sharing group status within a social network
CN106134167A (en) Hybrid telecommunication networks concatenating indicator
CN106251683A (en) Method based on position information share black-box diagram picture and the terminal of use the method
CN102938801A (en) Method and device for processing private messages
US10468021B2 (en) Mobile terminal and method for controlling the same
CN104363569B (en) A kind of method for recommending optimal contact method to mobile subscriber based on context aware
EP2966844A1 (en) Mobile terminal and controlling method thereof
CN102722330A (en) Method and system for unlocking mobile terminal
CN105554064B (en) The method and device of head portrait is set
US20170344955A1 (en) Mobile terminal and method for controlling same
KR102118053B1 (en) Mobile terminal and method for controlling the same
CN106875672A (en) Method, client and the system of shared vehicle are provided
CN108460259A (en) A kind of information processing method, device and terminal
KR20140048976A (en) Dynamic subsumption inference

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104