CN106339636A - Hiding setting method and device, application program content processing method and device - Google Patents

Hiding setting method and device, application program content processing method and device Download PDF

Info

Publication number
CN106339636A
CN106339636A CN201510405913.6A CN201510405913A CN106339636A CN 106339636 A CN106339636 A CN 106339636A CN 201510405913 A CN201510405913 A CN 201510405913A CN 106339636 A CN106339636 A CN 106339636A
Authority
CN
China
Prior art keywords
password
hiding
content
application program
operational order
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510405913.6A
Other languages
Chinese (zh)
Inventor
李海东
左军
刘胡笳
桂挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510405913.6A priority Critical patent/CN106339636A/en
Priority to PCT/CN2016/087467 priority patent/WO2017008630A1/en
Publication of CN106339636A publication Critical patent/CN106339636A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The application discloses a hiding setting method comprising following steps: displaying information of the application program content, wherein the content comprises data and/or function items; receiving a hiding setting instruction; in response to the hiding setting instruction, setting a hiding identity for the content such that the content set with the hiding identity is hidden when an operation instruction for the application program is received. According to the embodiment of the application, data and/ or function items that do not want to be referred to or used by others are hidden through setting partial content of the application program as hiding to protect specific content of the application program. The application also provides a hiding setting device, an application program content processing method and device.

Description

Hiding method to set up and device, application content processing method and processing device
Technical field
The application is related to the information security field of intelligent terminal, more particularly, to a kind of hiding method to set up and device, Application content processing method and processing device.
Background technology
With people, intelligent terminal's use is increased, the user profile privacy concern of intelligent terminal is increasingly subject to To concern.
In the usual way of prior art, realize the secret protection to user profile by arranging system password. In which, user can pre-set the system password of intelligent terminal.When user begins to use intelligent terminal When, intelligent terminal system can point out user's checking identity, that is, require user input password.When user input When password is consistent with preset password, intelligent terminal system passes through authentication, provides application program to make to user With.
During realizing the application, inventor finds that in prior art, at least there are the following problems:
In the implementation of setting system password, when user is after authentication, intelligent terminal is typically no Further secret protection means.For example, after user's unblock intelligent terminal, enter in short message application, should No longer arrange in short message application and further hide salvo.So, if wrapped in this short message application When including user and wanting the short message maintaining secrecy as privacy, such short message can directly display out, can make Become privacy leakage;If in the case of intelligent terminal's unblock, non-user can directly be seen that such Short message, can cause privacy leakage.
Content of the invention
The embodiment of the present application provides a kind of hiding method to set up, it is possible to achieve the particular content of application program is entered The more perfect secret protection of row.
The embodiment of the present application provides a kind of application content processing method, it is possible to achieve the tool to application program Internal appearance carries out more perfect secret protection.
The embodiment of the present application provides a kind of hiding to arrange device, it is possible to achieve the particular content of application program is entered The more perfect secret protection of row.
The embodiment of the present application provides a kind of application content processing meanss, it is possible to achieve the tool to application program Internal appearance carries out more perfect secret protection.
A kind of hiding method to set up, comprising:
The information of the content of display application program;Wherein, described content includes data and/or function items;
Receive and hide setting instruction;
In response to described hiding setting instruction, it is described curriculum offering hidden identification, so that receiving pin During to the operational order of described application program, the described content being provided with described hidden identification is hidden.
A kind of application content processing method, comprising:
Receive the operational order for described application program, described operational order includes stealth mode switching command With at least one in the operating instruction of described application program;
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification Content;
If described application program has the content being provided with hidden identification, hide or display described in be provided with The content of hidden identification.
A kind of hiding arranges device, comprising:
Display module, for showing the information of the content of application program;Wherein, described content include data and / or function items;
Hide setting command reception module, hide setting instruction for receiving;
Hidden identification processing module, in response to described hiding setting instruction, being that described curriculum offering is hidden Mark, so that when receiving the operational order for described application program, be provided with described hiding mark The described content known is hidden.
A kind of application content processing meanss, comprising:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Whether operational order processing module, in response to described operational order, searching in described application program There is the content being provided with hidden identification;If described application program has the content being provided with hidden identification, It is provided with the content of hidden identification described in hiding or showing.
Compared with prior art, the embodiment of the present application has the advantages that in the embodiment of the present application, leads to Cross and be set to hide by the partial content of application program, and consulted being not desired to by others or the data that uses and / or function items hide, to realize the secret protection to the particular content of application program.
Brief description
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application, The schematic description and description of the application is used for explaining the application, does not constitute the improper limit to the application Fixed.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of the hiding method to set up that the application one embodiment provides;
Fig. 2 is the configuration diagram of the hiding setting device that the application one embodiment provides;
Fig. 3 is the flow process detailed annotation figure of the hiding method to set up that the application one embodiment provides;
Fig. 4 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene one Figure;
Fig. 4 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene one Figure;
Fig. 4 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene one Figure;
Fig. 5 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene two Figure;
Fig. 5 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene two Figure;
Fig. 5 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene two Figure;
Fig. 5 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene two Schematic diagram;
Fig. 5 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene two Schematic diagram;
Fig. 6 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene three Figure;
Fig. 6 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene three Figure;
Fig. 6 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene three Figure;
Fig. 6 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene three Schematic diagram;
Fig. 6 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene three Schematic diagram;
Fig. 7 is the schematic flow sheet of the application content processing method that the application one embodiment provides;
Fig. 8 is the configuration diagram of the application content processing meanss that the application one embodiment provides;
The framework of the specific embodiment of the hiding setting device that Fig. 9 provides for the application one embodiment is illustrated Figure.
Specific embodiment
Purpose, technical scheme and advantage for making the application are clearer, specifically real below in conjunction with the application Apply example and corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, described Embodiment is only some embodiments of the present application, rather than whole embodiments.Based on the enforcement in the application Example, the acquired every other enforcement under the premise of not making creative work of those of ordinary skill in the art Example, broadly falls into the scope of the application protection.
Intelligent terminal in the application can include smart mobile phone, panel computer etc..Described intelligent terminal is permissible There is touch control display, acceleration transducer, voice input device, Fingerprint Identification Unit, physical button etc..
Described touch control display is sometimes referred to as " touch screen " or " touch screen " or " touch control display system ". Described touch control display provides input interface and output interface between equipment and user.Described touch-control shows Device is connected with display controller, and described display controller is used for receiving from/to touch control display and/or sends electricity Signal.Described touch control display shows to user's visualization output.Visualization output may include figure, text, Icon, video and any combination of them (being referred to as " figure ").In some embodiments, visualization is defeated Some or all in going out may correspond to user interface object.
Described touch control display is had touch-control surface, is received from user based on tactile and/or tactile The sensor of input or one group of sensor.Described touch control display and display controller are (together with any correlation Instruction set in the module of connection and/or memorizer) contact on detection touch control display (and contact is any Mobile), and the contact detected is converted into and the user interface object that is shown on touch control display (for example, One or more soft keys, icon, webpage or image) interaction.In exemplary embodiment, described touch-control shows Show that the contact point between device and user corresponds to the finger of user.
Although other display technologies can use in other embodiments, touch control display can use liquid crystal Display (lcd) technology, light emitting polymer displays (lpd) technology, or light emitting diode (led) technology. Using arbitrary touch sensing technology (this touch in multiple touch sensing technology of currently known or later exploitation Sensing technology is including but not limited to capacitive, ohmic, infrared and surface acoustic wave technique) and other Proximity sensor arrays or the other elements for determining the one or more points being contacted with touch control display, are touched Control display and display controller can detect that contact and its any movement.It is any suitably right that user can use As or additament, stylus, finger etc. are contacting touch control display.In some embodiments, by user circle Face is designed to the main contact with based on finger and gesture work, due to finger contact area on the touchscreen Domain is larger, so this may be accurate not as the input based on stylus.In some embodiments, equipment will be based on thick The input of rough finger is converted to accurate pointer/cursor position or order for executing the desired action of user. Except touch screen, intelligent terminal may also include touch pad (not shown) for activating or disabling specific function. In some embodiments, touch pad is the Touch Zone of equipment, does not show visually from touch pad unlike touch screen Change output.Touch pad can be the touch-control surface separated with touch control display or by touch screen formed touch The extension on control surface.
Described acceleration transducer is a kind of sensing that can measure acceleration and be converted into usable output signal Device.Acceleration is exactly the power acting in accelerator when object on object, like terrestrial gravitation, It is exactly gravity.Acceleration can be a constant or variable.Acceleration transducer has two kinds: a kind of It is angular acceleration transducer, be improved by gyroscope (angular-rate sensor);Another kind is exactly that line adds Velocity sensor.
Described voice input device is used for receiving sound and inputs and be converted into the signal of telecommunication, is processed for intelligent terminal.
Described physical button is used for being pressed and produces the signal of telecommunication, is processed for intelligent terminal.
In some embodiments, intelligent terminal can be according to touch control display and/or touch pad and/or acceleration sensing The input of device and/or voice input device and/or other input equipments uniquely executes predefined one group of function, As triggered the hiding setting procedure of application program entrance, passing through by shaking (being detected by acceleration transducer) Click on control (being detected by touch control display) triggering application program and enter and hide setting procedure, known by voice (do not detect by voice input device) that triggering application program enters and hide setting procedure etc..
Described Fingerprint Identification Unit is used for gathering the fingerprint image of user and being converted into the signal of telecommunication, enters for intelligent terminal Row is processed.Fingerprint Identification Unit has Multiple Type, such as: capacitive fingerprint evaluator, optical finger print evaluator, Radar Fingerprint Identification Unit etc..Described capacitive fingerprint evaluator is referred to by the resistance variations conduction on user's finger top layer Print image.The top layer of skin, the cell including the top layer of finger is non-living body.Peel Nonliving body cell off Ground floor skin of living body cell can be seen in top layer, and these Skin Cells have a certain amount of resistance.They also exist The common fingerprint ridge line of composition given shape and ditch on skin surface.Particular electrical quality in cell with The combination of the arrangement mode of cell enables the resistance of skin surface to be measured to and changes unique.Described light Learn Fingerprint Identification Unit by carrying out taking pictures obtaining fingerprint image to user's finger top layer.Described radar fingerprint is known Other device passes through to launch radar energy and read signal from finger superficial reflex, to build fingerprint image.
Below in conjunction with accompanying drawing, describe the technical scheme that each embodiment of the application provides in detail.
Fig. 1 is the schematic flow sheet of the hiding method to set up that the application one embodiment provides.
This hiding method to set up embodiment specifically includes following steps:
S101: the information of the content of display application program;Wherein, described content includes data and/or function ?.
In the present embodiment, executive agent can hide setting device for a kind of, and described hiding setting device can be right Should be in intelligent terminal or application program.
In a kind of embodiment, described intelligent terminal can have system management module, described system management module Application program can be managed, including but not limited to the partial content of application program is hidden arranging.
In another kind of embodiment, described application program can have hiding curriculum offering module, for application The partial content of program is hidden arranging.
The touch control display of described intelligent terminal shows the information of the content of application program.Wherein, described content Including data and/or function items.
In the embodiment of the present application, the data of application program, refer to any displayable data of application program. Such as, the displayable data of this application program can include taking certain application program " instant messaging " as a example But it is not limited to text chat record, the information such as the picture of transmission, video, voice in chat process, with And the icon of contact person and name, etc..
And the function items of application program, be refer to characterize the function that possesses of application program can display information. Such as, still taking certain application program " instant messaging " as a example, the function items of this application program, such as permissible Be this application program feature list in each list item, including voice-enabled chat, Video chat, chat record, Photograph album, collection, wallet, expression, Instant Transfer, subscribe to number, etc. list item.User passes through click function Certain list item in list, can trigger intelligent terminal and show the data under corresponding list item.Such as, user clicks on " collection " this list item, then can trigger all instant messaging information of intelligent terminal's display collection.
S102: receive and hide setting instruction.
Described hiding setting device receives hides setting instruction.
S103: in response to described hiding setting instruction, be described curriculum offering hidden identification, so that connecing Be received for described application program operational order when, the described content being provided with described hidden identification is hidden Hide.
Described hiding setting device, in response to described hiding setting instruction, is described curriculum offering hidden identification.
Further, after receiving hiding setting instruction, in response to described hiding setting instruction, it is described content Before setting hidden identification, methods described also includes: described hiding setting device judges whether to answer with described Hiding password with program maps mutually.If there is described hiding password, prompt cipher is verified, receives first and tests Card password, judges described first checking password and described hiding password match.Therefore, the embodiment of the present application Malicious operation or maloperation can effectively be prevented.
Further, judge whether with the hiding password of described application program maps mutually after, described side Method also includes: if there is not described hiding password, prompt cipher is arranged, and receives the second checking password, with institute State the second checking password as hiding password, set up the mapping relations hiding password and described application program.For Application program creates hides password, subsequently to carry out hidden to the described content being provided with described hidden identification The switching hidden or show.
Further, after prompt cipher setting, before receiving the second checking password, methods described also includes: institute State and hide setting device reception the 3rd checking password, judge that described 3rd checking password with system administration password is No coupling.If described 3rd checking password and described system administration password match, the new setting of input is pointed out to hide Password.Therefore, the embodiment of the present application can effectively prevent malice from creating hiding password for application program, further Management and control is carried out to access safety.
Further, methods described also includes: described hiding setting device receives for the password hiding password Delete instruction;Delete instruction in response to described password, judge whether and hiding password mapping to be deleted Application program;When judging not exist the application program with hiding password mapping to be deleted, delete institute State hiding password to be deleted.
In a kind of embodiment, methods described also includes: is judging exist and hiding password mapping to be deleted Application program when, prompt the user whether to be provided with hidden identification in the application program delete described mapping Content;When the content receiving user input deletes instruction, delete be provided with the content of hidden identification with And described hiding password to be deleted.
In another kind of embodiment, methods described also includes: reflects with hiding password to be deleted judging to exist During the application program penetrated, prompt the user whether to be provided with hidden identification in the application program hide described mapping Content;When the content receiving user input hides instruction, hide the content being provided with hidden identification And delete described hiding password to be deleted.Further, methods described also includes: described hiding setting Device receives password setting instruction;Instruction is arranged according to password, is that the application program setting of described mapping is new Hiding password.
In another kind of embodiment, methods described also includes: reflects with hiding password to be deleted judging to exist During the application program penetrated, prompt the user whether as the new hiding password of the application program setting of described mapping;? Receive user input password setting instruction when, according to password arrange instruction, be the application journey of described mapping The new hiding password of sequence setting.
Further, described hiding password can be including but not limited to biological characteristic, can also be such as word Symbol password, gesture password etc..Described first checking password can be including but not limited to biological characteristic, such as Can also be character password, gesture password etc..
Further, described biological characteristic includes following at least one: fingerprint characteristic, palm print characteristics, vocal print Feature, iris feature, face feature.
Further, methods described also includes: described hiding setting device receives for described application program Operational order, described operational order is included in stealth mode switching command and the operating instruction of described application program At least one, in response to described operational order, hide the described content being provided with described hidden identification.
In the present embodiment, the system management module of intelligent terminal directly will be provided with the curriculum offering of hidden identification It is hiding.Specifically, in a kind of mode, response is directed to the operational order of the content being provided with hidden identification, The content being provided with hidden identification can directly not shown by intelligent terminal.In another mode, ring Should can pass through system or third-party for the operational order of the content being provided with hidden identification, intelligent terminal Application program, increases a new display layer on the display layer of the position being arranged on script display content.By It is set to be shown on the position of content in new display layer, therefore terminating for described new display layer Display before, content can't show, that is, will not by operation intelligent terminal user see.In addition In a kind of mode, response, can be hiding by being provided with for the operational order of the content being provided with hidden identification Mark curriculum offering in hiding document so that being provided with the content of hidden identification not in any form Shown in the display location of script.
Further, comprise the 4th checking password in described operational order.Described hiding setting device in response to Described operational order, in the hiding password judging described 4th checking password and described application program mapping Timing, hides the described content being provided with described hidden identification.
Further, described hiding setting device is judging described 4th checking password and described application program The hiding password match of mapping, and when being provided with the described content of described hidden identification and being in non-concealed state, Hide the described content being provided with described hidden identification.
Further, after hiding and being provided with the described content of described hidden identification, methods described also includes: Described hiding setting device receives the operational order for described application program, and described operational order includes hiding At least one in the operating instruction of pattern switching instruction and described application program, in response to described operational order, Display is provided with the described content of described hidden identification.
Further, comprise the 5th checking password in described operational order.Described hiding setting device in response to Described operational order, in the hiding password judging described 5th checking password and described application program mapping Timing, display is provided with the described content of described hidden identification.
Further, described hiding setting device is judging described 5th checking password and described application program The hiding password match of mapping, and when being provided with the described content of described hidden identification and being in hidden state, Display is provided with the described content of described hidden identification.
Further, described operational order is triggered by fingerprint sensor.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program Hide protection.
Above for the application one embodiment provide hiding method to set up, those skilled in the art it should be appreciated that The application one embodiment is also corresponding to provide a kind of hiding to arrange device, refers to Fig. 2.
Fig. 2 is the configuration diagram of the hiding setting device that the application one embodiment provides.
Described hiding setting device specifically includes:
Display module 101, for showing the information of the content of application program;Wherein, described content includes counting According to and/or function items;
Hide setting command reception module 102, hide setting instruction for receiving;
Hidden identification processing module 103, in response to described hiding setting instruction, being described curriculum offering Hidden identification, so that when receiving the operational order for described application program, be provided with described hidden The described content hiding mark is hidden.
Further, described hidden identification processing module 103 is specifically additionally operable to, and hides setting instruction receiving Afterwards, in response to described hiding setting instruction, before being described curriculum offering hidden identification, judge whether with The hiding password of described application program maps mutually;If there is described hiding password, prompt cipher is verified;Receive First checking password, judges described first checking password and described hiding password match.
Further, described hidden identification processing module 103 is specifically additionally operable to, judge whether with described After the hiding password of application program maps mutually, if there is not described hiding password, prompt cipher is arranged;Connect Receive the second checking password;Using the described second checking password as hiding password, set up hiding password and answer with described Mapping relations with program.
Further, described device also includes:
Password removing module 104, instruction deleted by the password for receiving for hiding password;In response to described Instruction deleted by password, judges whether the application program with hiding password mapping to be deleted;Judging When there is not the application program with hiding password mapping to be deleted, delete described hiding password to be deleted.
Further, described password removing module 104 is specifically additionally operable to, and is judging exist and to be deleted During the application program of hiding password mapping, prompt the user whether to delete the application program being provided with described mapping In be provided with the content of hidden identification;When the content receiving user input deletes instruction, delete and set The content of hidden identification and described hiding password to be deleted are put.
Further, described hidden identification processing module 103 is specifically additionally operable to, and after prompt cipher setting, connects Before receiving the second checking password, receive the 3rd checking password, judge that described 3rd checking password is close with system administration Whether code mates;If described 3rd checking password and described system administration password match, input is pointed out newly to arrange Hiding password.
Further, described hiding password includes biological characteristic;Described first checking password includes biological characteristic.
Further, described biological characteristic includes following at least one: fingerprint characteristic, palm print characteristics, vocal print Feature, iris feature, face feature.
Further, described device also includes:
Operational order receiver module 105, for receiving the operational order for described application program, described behaviour Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 106, in response to described operational order, hide be provided with described hidden Hide the described content of mark.
Further, comprise the 4th checking password in described operational order;
Described operational order processing module 106 is specifically in response to described operational order, judging State the 4th checking password and the mapping of described application program hiding password match when, hide be provided with described hidden Hide the described content of mark.
Further, described operational order processing module 106 is specifically for judging described 4th checking The hiding password match that password is mapped with described application program, and it is provided with the described interior of described hidden identification When appearance is in non-concealed state, hide the described content being provided with described hidden identification.
Further, after hiding and being provided with the described content of described hidden identification, described device also includes:
Operational order receiver module 105, for receiving the operational order for described application program, described behaviour Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 106, in response to described operational order, display is provided with described hidden Hide the described content of mark.
Further, comprise the 5th checking password in described operational order;
Described operational order processing module 106 is specifically in response to described operational order, judging When stating the hiding password match that the 5th checking password is mapped with described application program, display is provided with described hidden Hide the described content of mark.
Further, described operational order processing module 106 is specifically for judging described 5th checking The hiding password match that password is mapped with described application program, and it is provided with the described interior of described hidden identification When appearance is in hidden state, display is provided with the described content of described hidden identification.
Further, described operational order is triggered by fingerprint sensor.
The hiding method to set up that the application one embodiment described further below provides.
Fig. 3 is the flow process detailed annotation figure of the hiding method to set up that the application one embodiment provides.
This hiding method to set up embodiment specifically includes following steps:
S201: described intelligent terminal shows the information of the content of application program.Wherein, described content includes counting According to and/or function items.
S202: described hiding setting device receives the selection instruction for described content, in response to described selection Instruction, is that described curriculum offering chooses mark.
In the present embodiment, user can select, by clicking on, data or the function items needing to be hidden.Intelligence Can the touch control display of terminal to detect the corresponding viewing area of data or function items clicked and change into telecommunications Number, Electric signal processing is become digital signal by intelligent terminal, and the system management module of intelligent terminal receives this numeral Signal, that is, receive the selection instruction for described content.
In order to avoid maloperation, methods described can also include:
After described intelligent terminal for reception is directed to the selection instruction of described content, touch control display shows hides determination Prompting.In specific embodiment, described hiding determination prompting can correspond to all selected contents;Can also Corresponding to a selected content.
In other embodiment, hide and determine that prompting can also be by other modes such as voice output, vibrations outputs Realize.Corresponding, receiving hiding setting instruction can also by phonetic entry, vibrations input (for example: have The shaking of rule) etc. other modes realize.
In other specific embodiments, receive application program partial content choose information after, directly to part Curriculum offering hidden identification, and need not further confirm that, with simple flow.
S203: described hiding setting device receives hides setting instruction.
In a kind of embodiment, described intelligent terminal can have system management module, described system management module Application program can be managed, including but not limited to the partial content of application program is hidden arranging. The hiding method to set up of the present embodiment can pass through system management module, and the partial content of application program is carried out Hide setting.In another kind of embodiment, described intelligent terminal can have application program, described application program The partial content of application program can be hidden arranging.The hiding method to set up of the present embodiment can be passed through Application program is hidden to the partial content of itself arranging.
In conjunction with being embodied as scene one
Fig. 4 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene one Figure.
Fig. 4 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene one Figure.
Fig. 4 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene one Figure.
In this implement scene, intelligent terminal has default function.
Step 1: enter default function, display comprises the information of application program particular content.Please join figure 4a, described intelligent terminal shows the particular content of multiple application programs.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 4 b, Select " the prosperous chat record of Ali " and " mobile-phone payment function ".
Step 3: click on " hiding " to confirm to arrange hidden identification to selected data and/or function items. Please join Fig. 4 c.
In conjunction with being embodied as scene two
Fig. 5 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene two Figure.
Fig. 5 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene two Figure.
Fig. 5 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene two Figure.
Fig. 5 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene two Schematic diagram.
Fig. 5 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene two Schematic diagram.
In this implement scene, intelligent terminal has default function.
Step 1: enter default function, display comprises the information of application program particular content.Please join figure 5a, described intelligent terminal shows the particular content of multiple application programs.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 5 b, Select " the prosperous chat record of Ali ", eject " hiding " button.
Step 3: click on " hiding " button to confirm to hide mark to selected data and/or function items setting Know.Please join Fig. 5 c.
Step 4: select to need to set the data of application program hidden and/or function items.Please join Fig. 5 d, Select " mobile-phone payment function ", eject " hiding " button.
Step 5: click on " hiding " button to confirm to hide mark to selected data and/or function items setting Know.Please join Fig. 5 e.
In conjunction with being embodied as scene three
Fig. 6 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene three Figure.
Fig. 6 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene three Figure.
Fig. 6 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene three Figure.
Fig. 6 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene three Schematic diagram.
Fig. 6 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene three Schematic diagram.
In this implement scene, intelligent terminal has application program.
Step 1: enter application program, display comprises the information of application program particular content.Please join Fig. 6 a, Described intelligent terminal shows the particular content of application program.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 6 b, Select " the prosperous chat record of Ali ", popup menu option.
Step 3: select " hiding " option to confirm to hide mark to selected data and/or function items setting Know.Please join Fig. 6 c.
Step 4: select to need to set the data of application program hidden and/or function items.Please join Fig. 6 d, Select " mobile-phone payment function ", popup menu option.
Step 5: select " hiding " option to confirm to hide mark to selected data and/or function items setting Know.Please join Fig. 6 e.
S204: described hiding setting device judges whether the hiding password with described application program maps mutually; When judged result is to be, execution step s205;Judged result for no when, execution step s206.
After receiving hiding setting instruction, the system management module of described intelligent terminal or application program judge With the presence or absence of the hiding password with described application program maps mutually.
S205: described hiding setting device prompt cipher checking;Receive user inputted according to this prompting first Checking password, and judge whether the first checking password and the hiding password of described application program maps mutually mate, If coupling, execution step s207;When judging the first checking password and hiding password mismatch, then may be used Carry out any operation with prompt cipher authentication failed or no longer.
S206: described hiding setting device prompt cipher setting;Then receive user inputs according to this prompting 3rd checking password, and judge whether described 3rd checking password is mated with system administration password.If described Three checking passwords and described system administration password match, point out new setting of input to hide password.Described hiding sets Put device and receive the second checking password, using the described second checking password as hiding password, set up and hide password Mapping relations with described application program.
When there is not hiding password, need to hide password for application program setting, so as follow-up to being set The switching that the described content of described hidden identification is hidden or shows.Before being hidden password setting, need User identity is identified, when the 3rd checking password receiving and system administration password match, then to pass through Identification, is hidden password and obtains and mapped with application program.When the 3rd receiving verifies password and be System administrator password mismatches, then carry out can any operation with prompt cipher authentication failed or no longer.
S207: described hiding setting device, in response to described hiding setting instruction, determines and is provided with choosing mark The content known, is described curriculum offering hidden identification.
S208: described hiding setting device receives the operational order for described application program, described operation refers to Order includes at least one in stealth mode switching command and the operating instruction of described application program, described operation Comprise in instruction to verify password, in response to described operational order, judge described checking password and described application The hiding password match of program maps.
In a kind of embodiment, described intelligent terminal can have fingerprint sensor, and described operational order can be Identified by fingerprint sensor.In a kind of specific embodiment, when application program is opened, this application program Receive the operational order being identified by fingerprint sensor, and be provided with hidden identification in this application program Content is hidden or shows.In another kind of specific embodiment, corresponding to different application programs, Ke Yishe Put different fingerprint templates, when the fingerprint that intelligent terminal for reception is transmitted by fingerprint sensor, this can be referred to The image information of the image information of stricture of vagina and each fingerprint template is compared, and finds out the fingerprint with this fingerprint matching Template, and determine corresponding application program, and it is directed to the content being provided with hidden identification in this application program It is hidden or show.
S209: judge whether the described content being provided with described hidden identification is in hidden state, judging When result is to be, execute s211;Judged result for no when, execution step s210.
S210: hide the described content being provided with described hidden identification.
S211: display is provided with the described content of described hidden identification.
In the present embodiment, when application program has multiple content being provided with hidden identification, if wherein one The individual content being provided with hidden identification is not provided as hiding, and is all provided with the content of hidden identification It is set to hide.If the content being all provided with hidden identification has been set to hide, display is all set Put the content of hidden identification.
In the embodiment of the present application, above-mentioned steps s208~s211 can also be different from above-mentioned hiding setting device Other devices execution.Such as, can be answering belonging to the described content being provided with described hidden identification Executed with program.
In the present embodiment, with regard to being related to the hiding setting of application data, the system management module of intelligent terminal is straight Connect and be set to hide by the application data selecting in abovementioned steps.Specifically, in a kind of mode, intelligent terminal The application data being provided with hidden identification directly can not be shown.In another mode, intelligence is eventually System or third-party application program can be passed through in end, is arranged on the position originally showing described application data Increase a new display layer on display layer.Because new display layer is set to be shown in described application data Position on, therefore before terminating display for described new display layer, described application data is not Can show, will not be seen by the user of operation intelligent terminal.In another mode, can will set The application data having put hidden identification is arranged in hiding document, so that being provided with the application of hidden identification Data is not shown in the display location of script in any form.
With regard to being related to the hiding setting of application function, intelligent terminal can call the corresponding interface of application program, The hiding setting instruction of transmission application function.When application program is opened again, application program receives application The hiding setting instruction of function, and application function is hidden arrange.It is related to the hidden of application data with above-mentioned Hide setting similar, can be by way of new display layer be set or the mode in hiding document that arranges enters Row hides setting.
In a kind of embodiment, when the partial content to application program is hidden.Described operational order and institute State hiding setting instruction can gather simultaneously, further, after curriculum offering hidden identification, directly hide It is provided with the content of hidden identification.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program Hide protection.
Below with reference to Fig. 7 and Fig. 8, describe a kind of application content processing method and processing device in detail.
Fig. 7 is the schematic flow sheet of the application content processing method that the application one embodiment provides.
Described application content processing method specifically includes following steps:
S301: receive the operational order for described application program, described operational order includes stealth mode and cuts Change at least one in instruction and the operating instruction of described application program, comprise to verify close in described operational order Code.Described operational order is identified by fingerprint sensor.Described operational order is used for triggering execution step s302.
S302: in response to described operational order, judging described checking password and described application program mapping Hiding password match when, search described application program in whether there is the content being provided with hidden identification.
S303: if described application program has the content being provided with hidden identification, and be provided with hiding mark The content known is when being in non-concealed state, hide described in be provided with the content of hidden identification.If described application Program has the content being provided with hidden identification, and is provided with the content of hidden identification and is in hidden state When, it is provided with the content of hidden identification described in display.
S304: if described application program does not have the content being provided with hidden identification, do not carry out any operation Or prompting is no provided with the content of hidden identification.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program Hide protection.
Fig. 8 is the configuration diagram of the application content processing meanss that the application one embodiment provides.
Described application content processing meanss specifically include:
Operational order receiver module 301, for receiving the operational order for described application program, described behaviour Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 302, in response to described operational order, searching in described application program Whether there is the content being provided with hidden identification;If described application program has is provided with hidden identification Content, hide or display described in be provided with the content of hidden identification.
Further, comprise in described operational order to verify password;
Described operational order processing module 302 is specifically in response to described operational order, judging State checking password and the mapping of described application program hiding password match when, whether search in described application program There is the content being provided with hidden identification.
Further, described operational order processing module 302 specifically for, if described application program have by When being provided with the content of hidden identification, and being provided with the content of hidden identification and be in non-concealed state, hide The described content being provided with hidden identification.
Further, described operational order processing module 302 specifically for, if described application program have by When being provided with the content of hidden identification, and being provided with the content of hidden identification and be in hidden state, show institute State the content being provided with hidden identification.
Further, described operational order is triggered by fingerprint sensor.
The framework of the specific embodiment of the hiding setting device that Fig. 9 provides for the application one embodiment is illustrated Figure.
In specific embodiment, described intelligent terminal can include hardware system and software system.
Described hardware system includes fingerprint sensor, described fingerprint sensor be used for obtain by user's finger for Fingerprint signal and finger pressing signal that fingerprint sensor is pressed and triggered, and the fingerprint signal that will obtain It is sent to software system with finger pressing signal.Wherein, comprise information in fingerprint in fingerprint signal.
Described software system includes system core module, system architecture module and application program module.
Described system core module includes driver element and finger pressing interrupt processing unit.Described driver element For receiving fingerprint signal and/or finger pressing signal, so that software system is further processed.Described Finger presses fingerprint signal and/or the finger pressing letter that interrupt processing unit is used for receiving according to driver element Number trigger default control command.
Described system architecture module includes fingerprint collecting and identification administrative unit (referred to as described identification administrative unit) With privacy mode administrative unit.Described identification administrative unit is used for the fingerprint image letter comprising in fingerprint signal Breath is identified and manages.Described privacy mode administrative unit is used for the content being provided with hidden identification is carried out Show or hide.
Described driver element, finger pressing interrupt processing unit, driver element and finger pressing interrupt processing list Unit is used for supporting application program module, and provides related interface for each unit in application program module.
Described application program module includes system arranging unit and application program unit.Described system arranging unit For being managed to the application program unit in application program module.Described application program unit can be tool Body application program, software as prosperous in Ali etc..
The framework explanation of the specific embodiment of the hiding setting device providing for the application one embodiment above, Describe the workflow of this device below for this specific embodiment in detail.
Described workflow may include that
The interface display application program of system arranging unit/application program unit of s401: intelligent terminal interior The information held;Wherein, described content includes data and/or function items.
S402: fingerprint sensor obtains fingerprint signal and finger pressing signal;And by driver element by finger Pressing signal transmission presses interrupt processing unit to finger.
S403: finger pressing interrupt processing unit generates trigger and is sent to fingerprint collecting and identification management mould Block, so that fingerprint collecting and identification management module, according to trigger, obtain fingerprint at fingerprint sensor Signal.
S404: fingerprint collecting judges the information in fingerprint in the fingerprint signal receiving with identification management module Whether mate with preset fingerprint template (can also be a kind of information in fingerprint).
S405: if coupling, system arranging unit/application program unit is described curriculum offering hidden identification, So that when receiving the operational order for described application program, being provided with the institute of described hidden identification State content to be hidden.
Described workflow can also include:
Instruction deleted by the password that s406: fingerprint collecting is received for fingerprint template with identification management module.
S407: delete instruction in response to described password, fingerprint collecting and identification management module determine to be deleted Fingerprint template, and judge whether the application program with fingerprint template to be deleted mapping.
S408: if there is not the application program with fingerprint template to be deleted mapping, fingerprint collecting and identification Management module deletes described fingerprint template to be deleted.
S409: if there is the application program with fingerprint template to be deleted mapping, system arranging unit is pointed out Whether user deletes the content being provided with hidden identification in the application program of described mapping.
S410: intelligent terminal when the content receiving user input deletes instruction, delete by system arranging unit It is provided with the content of hidden identification;Fingerprint collecting deletes described fingerprint mould to be deleted with identification management module Plate.
Described workflow can also include:
The information of the content of interface display application program of the application program unit of s411: intelligent terminal;Wherein, Described content includes data and/or function items.
The fingerprint that the acquisition of s412: fingerprint sensor is pressed for fingerprint sensor and triggered by user's finger Signal and finger pressing signal;And finger is pressed to finger pressing interruption by signal transmission by driver element Reason unit.
S413: finger pressing interrupt processing unit generates trigger and is sent to fingerprint collecting and identification management mould Block, so that fingerprint collecting obtains fingerprint letter with identification management module according to trigger at fingerprint sensor Number.
S414: fingerprint collecting judges the information in fingerprint in the fingerprint signal receiving with identification management module Whether mate with preset fingerprint template.
S415: if coupling, it is hiding that application program unit judges whether the content being provided with hidden identification is in State.
S416: if the content being provided with hidden identification is in non-concealed state, privacy mode administrative unit is hidden Hide the content being provided with hidden identification.
S417: if the content being provided with hidden identification is in hidden state, privacy mode administrative unit shows It is provided with the content of hidden identification.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot Close the form of the embodiment of software and hardware aspect.And, the present invention can adopt and wherein wrap one or more Computer-usable storage medium containing computer usable program code (including but not limited to disk memory, Cd-rom, optical memory etc.) the upper computer program implemented form.
The present invention is to produce with reference to method according to embodiments of the present invention, equipment (system) and computer program The flow chart of product and/or block diagram are describing.It should be understood that can by computer program instructions flowchart and / or block diagram in each flow process and/or the flow process in square frame and flow chart and/or block diagram and/ Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embed The processing module of formula datatron or other programmable data processing device by produce a machine so that by terms of The instruction of the processing module execution of calculation machine or other programmable data processing device produces for realizing in flow process The dress of the function of specifying in one flow process of figure or multiple flow process and/or one square frame of block diagram or multiple square frame Put.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process and set So that being stored in this computer-readable memory in the standby computer-readable memory working in a specific way Instruction produce and include the manufacture of command device, the realization of this command device is in one flow process or multiple of flow chart The function of specifying in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes Obtain and series of operation steps is executed on computer or other programmable devices to produce computer implemented place Reason, thus the instruction of execution is provided for realizing in flow chart one on computer or other programmable devices The step of the function of specifying in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
One typical configure, computing device include one or more processing modules (cpu), input/ Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory (ram) and/or the form such as Nonvolatile memory, such as read only memory (rom) or flash memory (flash ram). Internal memory is the example of computer-readable medium.
Computer-readable medium include permanent and non-permanent, removable and non-removable media can by appoint What method or technique is realizing information Store.Information can be computer-readable instruction, data structure, program Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (pram), static RAM (sram), dynamic random access memory (dram), its The random access memory (ram) of his type, read only memory (rom), electrically erasable are read-only Memorizer (eeprom), fast flash memory bank or other memory techniques, read-only optical disc read only memory (cd-rom), digital versatile disc (dvd) or other optical storage, magnetic cassette tape, tape magnetic Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated The information that equipment accesses.Define according to herein, computer-readable medium does not include temporary computer-readable matchmaker Body (transitory media), the such as data signal of modulation and carrier wave.
Also, it should be noted term " inclusion ", "comprising" or its any other variant be intended to non- The comprising of exclusiveness, so that include a series of process of key elements, method, product or equipment not only wrap Include those key elements, but also include other key elements being not expressly set out, or also include for this process, Method, product or the intrinsic key element of equipment.In the absence of more restrictions, " included by sentence One ... " key element that limits is being it is not excluded that including the process of described key element, method, product or setting Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.And, the application can adopt and wherein include calculating one or more Machine usable program code computer-usable storage medium (including but not limited to disk memory, cd-rom, Optical memory etc.) the upper computer program implemented form.
The foregoing is only embodiments herein, be not limited to the application.For this area skill For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle Any modification, equivalent substitution and improvement made etc., within the scope of should be included in claims hereof.

Claims (40)

1. a kind of hiding method to set up is it is characterised in that include:
The information of the content of display application program;Wherein, described content includes data and/or function items;
Receive and hide setting instruction;
In response to described hiding setting instruction, it is described curriculum offering hidden identification, so that receiving pin During to the operational order of described application program, the described content being provided with described hidden identification is hidden.
2. after the method for claim 1 is it is characterised in that receive hiding setting instruction, response In described hiding setting instruction, before being described curriculum offering hidden identification, methods described also includes:
Judge whether the hiding password with described application program maps mutually;
If there is described hiding password, prompt cipher is verified;
Receive the first checking password, judge described first checking password and described hiding password match.
3. method as claimed in claim 2 is it is characterised in that judge whether and described application journey After the hiding password of sequence maps mutually, methods described also includes:
If there is not described hiding password, prompt cipher is arranged;
Receive the second checking password;
Using the described second checking password as hiding password, set up the mapping hiding password and described application program Relation.
4. method as claimed in claim 3 is it is characterised in that after prompt cipher setting, receive second Before checking password, methods described also includes:
Receive the 3rd checking password, judge whether described 3rd checking password is mated with system administration password;
If described 3rd checking password and described system administration password match, the new setting of input is pointed out to hide password.
5. method as claimed in claim 2 is it is characterised in that methods described also includes:
Receive the password for hiding password and delete instruction;
Delete instruction in response to described password, judge whether the application with hiding password mapping to be deleted Program;
When judging not exist the application program with hiding password mapping to be deleted, delete described to be deleted Hiding password.
6. method as claimed in claim 5 is it is characterised in that methods described also includes:
When judging to exist the application program with hiding password mapping to be deleted, prompt the user whether to delete It is provided with the content of hidden identification in the application program of described mapping;
Receive user input content delete instruction when, delete be provided with hidden identification content and Described hiding password to be deleted.
7. the method as described in claim as arbitrary in claim 2~6 is it is characterised in that described hiding password bag Include biological characteristic;Described first checking password includes biological characteristic.
8. method as claimed in claim 7 it is characterised in that described biological characteristic include following at least A kind of:
Fingerprint characteristic;
Palm print characteristics;
Vocal print feature;
Iris feature;
Face feature.
9. the method for claim 1 is it is characterised in that methods described also includes:
Receive the operational order for described application program, described operational order includes stealth mode switching command With at least one in the operating instruction of described application program;
In response to described operational order, hide the described content being provided with described hidden identification.
10. method as claimed in claim 9 is tested it is characterised in that comprising the 4th in described operational order Card password;Then
In response to described operational order, hide the described content being provided with described hidden identification, comprising:
In response to described operational order, judging described 4th checking password and described application program mapping During hiding password match, hide the described content being provided with described hidden identification.
11. methods as claimed in claim 10 are it is characterised in that judging that described 4th checking is close During the hiding password match that code is mapped with described application program, hide and be provided with the described of described hidden identification Content, comprising:
In the hiding password match judging described 4th checking password and described application program mapping, and set When having put the described content of described hidden identification and being in non-concealed state, hide and be provided with described hidden identification Described content.
12. the method for claim 1 are provided with described hidden identification it is characterised in that hiding Described content after, methods described also includes:
Receive the operational order for described application program, described operational order includes stealth mode switching command With at least one in the operating instruction of described application program;
In response to described operational order, display is provided with the described content of described hidden identification.
13. methods as claimed in claim 12 are it is characterised in that comprise the 5th in described operational order Checking password;
In response to described operational order, display is provided with the described content of described hidden identification, comprising:
In response to described operational order, judging described 5th checking password and described application program mapping During hiding password match, display is provided with the described content of described hidden identification.
14. methods as claimed in claim 13 are it is characterised in that judging that described 5th checking is close During the hiding password match that code is mapped with described application program, display is provided with the described of described hidden identification Content, comprising:
In the hiding password match judging described 5th checking password and described application program mapping, and set When having put the described content of described hidden identification and being in hidden state, display is provided with described hidden identification Described content.
Method as described in 15. claims as arbitrary in claim 9~14 is it is characterised in that described operational order Triggered by fingerprint sensor.
A kind of 16. application content processing methods are it is characterised in that include:
Receive the operational order for described application program, described operational order includes stealth mode switching command With at least one in the operating instruction of described application program;
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification Content;
If described application program has the content being provided with hidden identification, hide or display described in be provided with The content of hidden identification.
17. methods as claimed in claim 16 are it is characterised in that comprise in described operational order to verify Password;Then
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification Content, comprising:
In response to described operational order, judging described checking password and hiding that described application program maps During password match, search in described application program whether there is the content being provided with hidden identification.
If 18. methods as claimed in claim 17 are it is characterised in that described application program has is set Put the content of hidden identification, hide described in be provided with the content of hidden identification, comprising:
If described application program has the content being provided with hidden identification, and is provided with the interior of hidden identification Hold when being in non-concealed state, hide described in be provided with the content of hidden identification.
If 19. methods as claimed in claim 17 are it is characterised in that described application program has is set Put the content of hidden identification, described in display, be provided with the content of hidden identification, comprising:
If described application program has the content being provided with hidden identification, and is provided with the interior of hidden identification When appearance is in hidden state, it is provided with the content of hidden identification described in display.
Method as described in 20. claims as arbitrary in claim 16~19 is it is characterised in that described operational order Triggered by fingerprint sensor.
A kind of 21. hiding arrange device it is characterised in that including:
Display module, for showing the information of the content of application program;Wherein, described content include data and / or function items;
Hide setting command reception module, hide setting instruction for receiving;
Hidden identification processing module, in response to described hiding setting instruction, being that described curriculum offering is hidden Mark, so that when receiving the operational order for described application program, be provided with described hiding mark The described content known is hidden.
22. devices as claimed in claim 21 are it is characterised in that described hidden identification processing module has Body is additionally operable to, and after receiving and hiding setting instruction, in response to described hiding setting instruction, is described interior be installed with Before putting hidden identification, judge whether the hiding password with described application program maps mutually;If existing described Hiding password, prompt cipher is verified;Receive the first checking password, judge described first checking password and institute State hiding password match.
23. devices as claimed in claim 22 are it is characterised in that described hidden identification processing module has Body is additionally operable to, judge whether with the hiding password of described application program maps mutually after, if there is not institute State hiding password, prompt cipher is arranged;Receive the second checking password;Using the described second checking password as hidden Hide password, set up the mapping relations hiding password and described application program.
24. devices as claimed in claim 23 are it is characterised in that described hidden identification processing module has Body is additionally operable to, and after prompt cipher setting, before receiving the second checking password, receives the 3rd checking password, judges Whether described 3rd checking password is mated with system administration password;If described 3rd checking password and described system Administrator password mates, and points out new setting of input to hide password.
25. devices as claimed in claim 22 are it is characterised in that described device also includes:
Password removing module, instruction deleted by the password for receiving for hiding password;In response to described password Delete instruction, judge whether the application program with hiding password mapping to be deleted;Judging not deposit In the application program with hiding password mapping to be deleted, delete described hiding password to be deleted.
26. devices as claimed in claim 25 are it is characterised in that described password removing module is specifically gone back For when judging to exist the application program with hiding password mapping to be deleted, prompting the user whether to delete Except the content being provided with hidden identification in the application program of described mapping;Receiving the content of user input When deleting instruction, delete and be provided with the content of hidden identification and described hiding password to be deleted.
Device as described in 27. claims as arbitrary in claim 22~26 is it is characterised in that described hiding password Including biological characteristic;Described first checking password includes biological characteristic.
28. devices as claimed in claim 27 it is characterised in that described biological characteristic include following extremely Few one kind:
Fingerprint characteristic;
Palm print characteristics;
Vocal print feature;
Iris feature;
Face feature.
29. devices as claimed in claim 21 are it is characterised in that described device also includes:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module, in response to described operational order, hiding and being provided with described hiding mark The described content known.
30. devices as claimed in claim 29 are it is characterised in that comprise the 4th in described operational order Checking password;
Described operational order processing module is specifically in response to described operational order, judging described During the hiding password match that four checking passwords are mapped with described application program, hide and be provided with described hiding mark The described content known.
31. devices as claimed in claim 30 are it is characterised in that described operational order processing module has Body is used for, in the hiding password match judging described 4th checking password and described application program mapping, and When being provided with the described content of described hidden identification and being in non-concealed state, hide and be provided with described hiding The described content of mark.
32. devices as claimed in claim 21 are provided with described hiding mark it is characterised in that hiding After the described content known, described device also includes:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module, in response to described operational order, display is provided with described hiding mark The described content known.
33. devices as claimed in claim 32 are it is characterised in that comprise the 5th in described operational order Checking password;
Described operational order processing module is specifically in response to described operational order, judging described During the hiding password match that five checking passwords are mapped with described application program, display is provided with described hiding mark The described content known.
34. devices as claimed in claim 33, described operational order processing module is specifically for sentencing Break and described 5th checking password and the hiding password match of described application program mapping, and be provided with described When the described content of hidden identification is in hidden state, display is provided with the described content of described hidden identification.
Device as described in 35. claims as arbitrary in claim 29~34 is it is characterised in that described operational order Triggered by fingerprint sensor.
A kind of 36. application content processing meanss are it is characterised in that include:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Whether operational order processing module, in response to described operational order, searching in described application program There is the content being provided with hidden identification;If described application program has the content being provided with hidden identification, It is provided with the content of hidden identification described in hiding or showing.
37. devices as claimed in claim 36 are it is characterised in that comprise in described operational order to verify Password;
Described operational order processing module is specifically in response to described operational order, testing described in judge During the hiding password match that card password is mapped with described application program, search in described application program and whether have It is provided with the content of hidden identification.
38. devices as claimed in claim 37 are it is characterised in that described operational order processing module has Body is used for, if described application program has the content being provided with hidden identification, and is provided with hidden identification Content when being in non-concealed state, hide described in be provided with the content of hidden identification.
39. devices as claimed in claim 37 are it is characterised in that described operational order processing module has Body is used for, if described application program has the content being provided with hidden identification, and is provided with hidden identification Content when being in hidden state, be provided with the content of hidden identification described in display.
Device as described in 40. claims as arbitrary in claim 36~39 is it is characterised in that described operational order Triggered by fingerprint sensor.
CN201510405913.6A 2015-07-10 2015-07-10 Hiding setting method and device, application program content processing method and device Pending CN106339636A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510405913.6A CN106339636A (en) 2015-07-10 2015-07-10 Hiding setting method and device, application program content processing method and device
PCT/CN2016/087467 WO2017008630A1 (en) 2015-07-10 2016-06-28 Hiding setting method and apparatus, and application program content processing method and apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510405913.6A CN106339636A (en) 2015-07-10 2015-07-10 Hiding setting method and device, application program content processing method and device

Publications (1)

Publication Number Publication Date
CN106339636A true CN106339636A (en) 2017-01-18

Family

ID=57757253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510405913.6A Pending CN106339636A (en) 2015-07-10 2015-07-10 Hiding setting method and device, application program content processing method and device

Country Status (2)

Country Link
CN (1) CN106339636A (en)
WO (1) WO2017008630A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319484A (en) * 2017-05-17 2018-07-24 腾讯科技(深圳)有限公司 A kind of processing method of five application page, device and storage medium
CN109302506A (en) * 2018-09-28 2019-02-01 南昌努比亚技术有限公司 Instant communication information storage method, device and computer readable storage medium
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111176816A (en) * 2019-12-30 2020-05-19 深圳市亿道信息股份有限公司 Kiosk mode implementation method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508609A (en) * 2011-11-17 2012-06-20 潘天华 Method for controlling displaying and hiding of computer application program window
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
US20140378099A1 (en) * 2013-06-19 2014-12-25 Huawei Device Co., Ltd. Method and Apparatus for Processing Data and Message
CN104463004A (en) * 2013-09-24 2015-03-25 北京三星通信技术研究有限公司 Method and device for protecting interface content

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980429A (en) * 2005-11-30 2007-06-13 中兴通讯股份有限公司 Method for information secrete-keeping in mobile terminal
CN103366127B (en) * 2012-03-29 2018-08-10 联想(北京)有限公司 A kind of data processing method and device
CN102880837B (en) * 2012-08-24 2016-05-04 腾讯科技(深圳)有限公司 Improve method and the mobile terminal of security of mobile terminal
CN104008350B (en) * 2014-05-15 2017-10-24 惠州Tcl移动通信有限公司 Enter the mobile terminal and method of different user pattern by different unlocking manners
CN103986840B (en) * 2014-05-30 2015-11-25 小米科技有限责任公司 Control method and the device of dialog information

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102508609A (en) * 2011-11-17 2012-06-20 潘天华 Method for controlling displaying and hiding of computer application program window
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
US20140378099A1 (en) * 2013-06-19 2014-12-25 Huawei Device Co., Ltd. Method and Apparatus for Processing Data and Message
CN104463004A (en) * 2013-09-24 2015-03-25 北京三星通信技术研究有限公司 Method and device for protecting interface content

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108319484A (en) * 2017-05-17 2018-07-24 腾讯科技(深圳)有限公司 A kind of processing method of five application page, device and storage medium
CN109302506A (en) * 2018-09-28 2019-02-01 南昌努比亚技术有限公司 Instant communication information storage method, device and computer readable storage medium
CN112069478A (en) * 2019-06-10 2020-12-11 Oppo广东移动通信有限公司 Application control method, electronic device, and non-volatile computer-readable storage medium

Also Published As

Publication number Publication date
WO2017008630A1 (en) 2017-01-19

Similar Documents

Publication Publication Date Title
CN108139953A (en) For checking the device level mandate of content
CN106778130B (en) Message display method, display device and mobile terminal
CN103810437B (en) A kind of method of hide application program and terminal
CN103118031B (en) Log in method and the electronic equipment of application account
CN106575332A (en) Authenticated device used to unlock another device
CN104732121A (en) Encryption setting method, decryption setting method and corresponding device of application program
US10999158B2 (en) User interfaces for controlling or presenting information about multiple cellular identifiers on an electronic device
CN106201204B (en) Start the method and apparatus of application function
CN106228054A (en) Auth method and device
CN105373737B (en) A kind of application encryption method and mobile terminal
CN106339636A (en) Hiding setting method and device, application program content processing method and device
CN105323218A (en) Identity verifying method and device
CN106484231A (en) A kind of method and device of application hides
CN105281907B (en) Encrypted data processing method and device
CN105930076B (en) The display methods of mobile communication terminal and its hiding selected object
KR20140132286A (en) Method and apparatus for Unlocking Terminal Device
CN104268039B (en) Mantenance data acquisition methods, apparatus and system
CN106533917B (en) Relation chain processing method, apparatus and system
CN107861669A (en) The switching method and mobile terminal of a kind of custom system
CN106020697A (en) Control method and device for display elements
CN108052822A (en) Terminal control method, apparatus and system
CN108737638A (en) Application control method, apparatus, mobile terminal and computer-readable medium
Agrawal et al. Smart Authentication for smart phones
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN105786354B (en) A kind of hiden application deployment method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1233000

Country of ref document: HK

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170118

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1233000

Country of ref document: HK