CN106339636A - Hiding setting method and device, application program content processing method and device - Google Patents
Hiding setting method and device, application program content processing method and device Download PDFInfo
- Publication number
- CN106339636A CN106339636A CN201510405913.6A CN201510405913A CN106339636A CN 106339636 A CN106339636 A CN 106339636A CN 201510405913 A CN201510405913 A CN 201510405913A CN 106339636 A CN106339636 A CN 106339636A
- Authority
- CN
- China
- Prior art keywords
- password
- hiding
- content
- application program
- operational order
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 108
- 238000003672 processing method Methods 0.000 title claims abstract description 11
- 230000004044 response Effects 0.000 claims abstract description 50
- 238000012545 processing Methods 0.000 claims description 53
- 238000013507 mapping Methods 0.000 claims description 33
- 238000011022 operating instruction Methods 0.000 claims description 15
- 230000001960 triggered effect Effects 0.000 claims description 10
- 230000001755 vocal effect Effects 0.000 claims description 4
- 238000012360 testing method Methods 0.000 claims description 2
- 230000006870 function Effects 0.000 description 44
- 238000010586 diagram Methods 0.000 description 18
- 230000008569 process Effects 0.000 description 16
- 238000003825 pressing Methods 0.000 description 13
- 238000012790 confirmation Methods 0.000 description 10
- 230000001133 acceleration Effects 0.000 description 9
- 238000005516 engineering process Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000003860 storage Methods 0.000 description 7
- 210000004027 cell Anatomy 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000008878 coupling Effects 0.000 description 4
- 238000010168 coupling process Methods 0.000 description 4
- 238000005859 coupling reaction Methods 0.000 description 4
- 210000003491 skin Anatomy 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 230000008859 change Effects 0.000 description 3
- 238000012800 visualization Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008054 signal transmission Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 208000031481 Pathologic Constriction Diseases 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 229920000642 polymer Polymers 0.000 description 1
- 230000011514 reflex Effects 0.000 description 1
- 210000004927 skin cell Anatomy 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 210000001215 vagina Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Abstract
The application discloses a hiding setting method comprising following steps: displaying information of the application program content, wherein the content comprises data and/or function items; receiving a hiding setting instruction; in response to the hiding setting instruction, setting a hiding identity for the content such that the content set with the hiding identity is hidden when an operation instruction for the application program is received. According to the embodiment of the application, data and/ or function items that do not want to be referred to or used by others are hidden through setting partial content of the application program as hiding to protect specific content of the application program. The application also provides a hiding setting device, an application program content processing method and device.
Description
Technical field
The application is related to the information security field of intelligent terminal, more particularly, to a kind of hiding method to set up and device,
Application content processing method and processing device.
Background technology
With people, intelligent terminal's use is increased, the user profile privacy concern of intelligent terminal is increasingly subject to
To concern.
In the usual way of prior art, realize the secret protection to user profile by arranging system password.
In which, user can pre-set the system password of intelligent terminal.When user begins to use intelligent terminal
When, intelligent terminal system can point out user's checking identity, that is, require user input password.When user input
When password is consistent with preset password, intelligent terminal system passes through authentication, provides application program to make to user
With.
During realizing the application, inventor finds that in prior art, at least there are the following problems:
In the implementation of setting system password, when user is after authentication, intelligent terminal is typically no
Further secret protection means.For example, after user's unblock intelligent terminal, enter in short message application, should
No longer arrange in short message application and further hide salvo.So, if wrapped in this short message application
When including user and wanting the short message maintaining secrecy as privacy, such short message can directly display out, can make
Become privacy leakage;If in the case of intelligent terminal's unblock, non-user can directly be seen that such
Short message, can cause privacy leakage.
Content of the invention
The embodiment of the present application provides a kind of hiding method to set up, it is possible to achieve the particular content of application program is entered
The more perfect secret protection of row.
The embodiment of the present application provides a kind of application content processing method, it is possible to achieve the tool to application program
Internal appearance carries out more perfect secret protection.
The embodiment of the present application provides a kind of hiding to arrange device, it is possible to achieve the particular content of application program is entered
The more perfect secret protection of row.
The embodiment of the present application provides a kind of application content processing meanss, it is possible to achieve the tool to application program
Internal appearance carries out more perfect secret protection.
A kind of hiding method to set up, comprising:
The information of the content of display application program;Wherein, described content includes data and/or function items;
Receive and hide setting instruction;
In response to described hiding setting instruction, it is described curriculum offering hidden identification, so that receiving pin
During to the operational order of described application program, the described content being provided with described hidden identification is hidden.
A kind of application content processing method, comprising:
Receive the operational order for described application program, described operational order includes stealth mode switching command
With at least one in the operating instruction of described application program;
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification
Content;
If described application program has the content being provided with hidden identification, hide or display described in be provided with
The content of hidden identification.
A kind of hiding arranges device, comprising:
Display module, for showing the information of the content of application program;Wherein, described content include data and
/ or function items;
Hide setting command reception module, hide setting instruction for receiving;
Hidden identification processing module, in response to described hiding setting instruction, being that described curriculum offering is hidden
Mark, so that when receiving the operational order for described application program, be provided with described hiding mark
The described content known is hidden.
A kind of application content processing meanss, comprising:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to
Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Whether operational order processing module, in response to described operational order, searching in described application program
There is the content being provided with hidden identification;If described application program has the content being provided with hidden identification,
It is provided with the content of hidden identification described in hiding or showing.
Compared with prior art, the embodiment of the present application has the advantages that in the embodiment of the present application, leads to
Cross and be set to hide by the partial content of application program, and consulted being not desired to by others or the data that uses and
/ or function items hide, to realize the secret protection to the particular content of application program.
Brief description
Accompanying drawing described herein is used for providing further understanding of the present application, constitutes the part of the application,
The schematic description and description of the application is used for explaining the application, does not constitute the improper limit to the application
Fixed.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of the hiding method to set up that the application one embodiment provides;
Fig. 2 is the configuration diagram of the hiding setting device that the application one embodiment provides;
Fig. 3 is the flow process detailed annotation figure of the hiding method to set up that the application one embodiment provides;
Fig. 4 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene one
Figure;
Fig. 4 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene one
Figure;
Fig. 4 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene one
Figure;
Fig. 5 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene two
Figure;
Fig. 5 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene two
Figure;
Fig. 5 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene two
Figure;
Fig. 5 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene two
Schematic diagram;
Fig. 5 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene two
Schematic diagram;
Fig. 6 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene three
Figure;
Fig. 6 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene three
Figure;
Fig. 6 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene three
Figure;
Fig. 6 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene three
Schematic diagram;
Fig. 6 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene three
Schematic diagram;
Fig. 7 is the schematic flow sheet of the application content processing method that the application one embodiment provides;
Fig. 8 is the configuration diagram of the application content processing meanss that the application one embodiment provides;
The framework of the specific embodiment of the hiding setting device that Fig. 9 provides for the application one embodiment is illustrated
Figure.
Specific embodiment
Purpose, technical scheme and advantage for making the application are clearer, specifically real below in conjunction with the application
Apply example and corresponding accompanying drawing is clearly and completely described to technical scheme.Obviously, described
Embodiment is only some embodiments of the present application, rather than whole embodiments.Based on the enforcement in the application
Example, the acquired every other enforcement under the premise of not making creative work of those of ordinary skill in the art
Example, broadly falls into the scope of the application protection.
Intelligent terminal in the application can include smart mobile phone, panel computer etc..Described intelligent terminal is permissible
There is touch control display, acceleration transducer, voice input device, Fingerprint Identification Unit, physical button etc..
Described touch control display is sometimes referred to as " touch screen " or " touch screen " or " touch control display system ".
Described touch control display provides input interface and output interface between equipment and user.Described touch-control shows
Device is connected with display controller, and described display controller is used for receiving from/to touch control display and/or sends electricity
Signal.Described touch control display shows to user's visualization output.Visualization output may include figure, text,
Icon, video and any combination of them (being referred to as " figure ").In some embodiments, visualization is defeated
Some or all in going out may correspond to user interface object.
Described touch control display is had touch-control surface, is received from user based on tactile and/or tactile
The sensor of input or one group of sensor.Described touch control display and display controller are (together with any correlation
Instruction set in the module of connection and/or memorizer) contact on detection touch control display (and contact is any
Mobile), and the contact detected is converted into and the user interface object that is shown on touch control display (for example,
One or more soft keys, icon, webpage or image) interaction.In exemplary embodiment, described touch-control shows
Show that the contact point between device and user corresponds to the finger of user.
Although other display technologies can use in other embodiments, touch control display can use liquid crystal
Display (lcd) technology, light emitting polymer displays (lpd) technology, or light emitting diode (led) technology.
Using arbitrary touch sensing technology (this touch in multiple touch sensing technology of currently known or later exploitation
Sensing technology is including but not limited to capacitive, ohmic, infrared and surface acoustic wave technique) and other
Proximity sensor arrays or the other elements for determining the one or more points being contacted with touch control display, are touched
Control display and display controller can detect that contact and its any movement.It is any suitably right that user can use
As or additament, stylus, finger etc. are contacting touch control display.In some embodiments, by user circle
Face is designed to the main contact with based on finger and gesture work, due to finger contact area on the touchscreen
Domain is larger, so this may be accurate not as the input based on stylus.In some embodiments, equipment will be based on thick
The input of rough finger is converted to accurate pointer/cursor position or order for executing the desired action of user.
Except touch screen, intelligent terminal may also include touch pad (not shown) for activating or disabling specific function.
In some embodiments, touch pad is the Touch Zone of equipment, does not show visually from touch pad unlike touch screen
Change output.Touch pad can be the touch-control surface separated with touch control display or by touch screen formed touch
The extension on control surface.
Described acceleration transducer is a kind of sensing that can measure acceleration and be converted into usable output signal
Device.Acceleration is exactly the power acting in accelerator when object on object, like terrestrial gravitation,
It is exactly gravity.Acceleration can be a constant or variable.Acceleration transducer has two kinds: a kind of
It is angular acceleration transducer, be improved by gyroscope (angular-rate sensor);Another kind is exactly that line adds
Velocity sensor.
Described voice input device is used for receiving sound and inputs and be converted into the signal of telecommunication, is processed for intelligent terminal.
Described physical button is used for being pressed and produces the signal of telecommunication, is processed for intelligent terminal.
In some embodiments, intelligent terminal can be according to touch control display and/or touch pad and/or acceleration sensing
The input of device and/or voice input device and/or other input equipments uniquely executes predefined one group of function,
As triggered the hiding setting procedure of application program entrance, passing through by shaking (being detected by acceleration transducer)
Click on control (being detected by touch control display) triggering application program and enter and hide setting procedure, known by voice
(do not detect by voice input device) that triggering application program enters and hide setting procedure etc..
Described Fingerprint Identification Unit is used for gathering the fingerprint image of user and being converted into the signal of telecommunication, enters for intelligent terminal
Row is processed.Fingerprint Identification Unit has Multiple Type, such as: capacitive fingerprint evaluator, optical finger print evaluator,
Radar Fingerprint Identification Unit etc..Described capacitive fingerprint evaluator is referred to by the resistance variations conduction on user's finger top layer
Print image.The top layer of skin, the cell including the top layer of finger is non-living body.Peel Nonliving body cell off
Ground floor skin of living body cell can be seen in top layer, and these Skin Cells have a certain amount of resistance.They also exist
The common fingerprint ridge line of composition given shape and ditch on skin surface.Particular electrical quality in cell with
The combination of the arrangement mode of cell enables the resistance of skin surface to be measured to and changes unique.Described light
Learn Fingerprint Identification Unit by carrying out taking pictures obtaining fingerprint image to user's finger top layer.Described radar fingerprint is known
Other device passes through to launch radar energy and read signal from finger superficial reflex, to build fingerprint image.
Below in conjunction with accompanying drawing, describe the technical scheme that each embodiment of the application provides in detail.
Fig. 1 is the schematic flow sheet of the hiding method to set up that the application one embodiment provides.
This hiding method to set up embodiment specifically includes following steps:
S101: the information of the content of display application program;Wherein, described content includes data and/or function
?.
In the present embodiment, executive agent can hide setting device for a kind of, and described hiding setting device can be right
Should be in intelligent terminal or application program.
In a kind of embodiment, described intelligent terminal can have system management module, described system management module
Application program can be managed, including but not limited to the partial content of application program is hidden arranging.
In another kind of embodiment, described application program can have hiding curriculum offering module, for application
The partial content of program is hidden arranging.
The touch control display of described intelligent terminal shows the information of the content of application program.Wherein, described content
Including data and/or function items.
In the embodiment of the present application, the data of application program, refer to any displayable data of application program.
Such as, the displayable data of this application program can include taking certain application program " instant messaging " as a example
But it is not limited to text chat record, the information such as the picture of transmission, video, voice in chat process, with
And the icon of contact person and name, etc..
And the function items of application program, be refer to characterize the function that possesses of application program can display information.
Such as, still taking certain application program " instant messaging " as a example, the function items of this application program, such as permissible
Be this application program feature list in each list item, including voice-enabled chat, Video chat, chat record,
Photograph album, collection, wallet, expression, Instant Transfer, subscribe to number, etc. list item.User passes through click function
Certain list item in list, can trigger intelligent terminal and show the data under corresponding list item.Such as, user clicks on
" collection " this list item, then can trigger all instant messaging information of intelligent terminal's display collection.
S102: receive and hide setting instruction.
Described hiding setting device receives hides setting instruction.
S103: in response to described hiding setting instruction, be described curriculum offering hidden identification, so that connecing
Be received for described application program operational order when, the described content being provided with described hidden identification is hidden
Hide.
Described hiding setting device, in response to described hiding setting instruction, is described curriculum offering hidden identification.
Further, after receiving hiding setting instruction, in response to described hiding setting instruction, it is described content
Before setting hidden identification, methods described also includes: described hiding setting device judges whether to answer with described
Hiding password with program maps mutually.If there is described hiding password, prompt cipher is verified, receives first and tests
Card password, judges described first checking password and described hiding password match.Therefore, the embodiment of the present application
Malicious operation or maloperation can effectively be prevented.
Further, judge whether with the hiding password of described application program maps mutually after, described side
Method also includes: if there is not described hiding password, prompt cipher is arranged, and receives the second checking password, with institute
State the second checking password as hiding password, set up the mapping relations hiding password and described application program.For
Application program creates hides password, subsequently to carry out hidden to the described content being provided with described hidden identification
The switching hidden or show.
Further, after prompt cipher setting, before receiving the second checking password, methods described also includes: institute
State and hide setting device reception the 3rd checking password, judge that described 3rd checking password with system administration password is
No coupling.If described 3rd checking password and described system administration password match, the new setting of input is pointed out to hide
Password.Therefore, the embodiment of the present application can effectively prevent malice from creating hiding password for application program, further
Management and control is carried out to access safety.
Further, methods described also includes: described hiding setting device receives for the password hiding password
Delete instruction;Delete instruction in response to described password, judge whether and hiding password mapping to be deleted
Application program;When judging not exist the application program with hiding password mapping to be deleted, delete institute
State hiding password to be deleted.
In a kind of embodiment, methods described also includes: is judging exist and hiding password mapping to be deleted
Application program when, prompt the user whether to be provided with hidden identification in the application program delete described mapping
Content;When the content receiving user input deletes instruction, delete be provided with the content of hidden identification with
And described hiding password to be deleted.
In another kind of embodiment, methods described also includes: reflects with hiding password to be deleted judging to exist
During the application program penetrated, prompt the user whether to be provided with hidden identification in the application program hide described mapping
Content;When the content receiving user input hides instruction, hide the content being provided with hidden identification
And delete described hiding password to be deleted.Further, methods described also includes: described hiding setting
Device receives password setting instruction;Instruction is arranged according to password, is that the application program setting of described mapping is new
Hiding password.
In another kind of embodiment, methods described also includes: reflects with hiding password to be deleted judging to exist
During the application program penetrated, prompt the user whether as the new hiding password of the application program setting of described mapping;?
Receive user input password setting instruction when, according to password arrange instruction, be the application journey of described mapping
The new hiding password of sequence setting.
Further, described hiding password can be including but not limited to biological characteristic, can also be such as word
Symbol password, gesture password etc..Described first checking password can be including but not limited to biological characteristic, such as
Can also be character password, gesture password etc..
Further, described biological characteristic includes following at least one: fingerprint characteristic, palm print characteristics, vocal print
Feature, iris feature, face feature.
Further, methods described also includes: described hiding setting device receives for described application program
Operational order, described operational order is included in stealth mode switching command and the operating instruction of described application program
At least one, in response to described operational order, hide the described content being provided with described hidden identification.
In the present embodiment, the system management module of intelligent terminal directly will be provided with the curriculum offering of hidden identification
It is hiding.Specifically, in a kind of mode, response is directed to the operational order of the content being provided with hidden identification,
The content being provided with hidden identification can directly not shown by intelligent terminal.In another mode, ring
Should can pass through system or third-party for the operational order of the content being provided with hidden identification, intelligent terminal
Application program, increases a new display layer on the display layer of the position being arranged on script display content.By
It is set to be shown on the position of content in new display layer, therefore terminating for described new display layer
Display before, content can't show, that is, will not by operation intelligent terminal user see.In addition
In a kind of mode, response, can be hiding by being provided with for the operational order of the content being provided with hidden identification
Mark curriculum offering in hiding document so that being provided with the content of hidden identification not in any form
Shown in the display location of script.
Further, comprise the 4th checking password in described operational order.Described hiding setting device in response to
Described operational order, in the hiding password judging described 4th checking password and described application program mapping
Timing, hides the described content being provided with described hidden identification.
Further, described hiding setting device is judging described 4th checking password and described application program
The hiding password match of mapping, and when being provided with the described content of described hidden identification and being in non-concealed state,
Hide the described content being provided with described hidden identification.
Further, after hiding and being provided with the described content of described hidden identification, methods described also includes:
Described hiding setting device receives the operational order for described application program, and described operational order includes hiding
At least one in the operating instruction of pattern switching instruction and described application program, in response to described operational order,
Display is provided with the described content of described hidden identification.
Further, comprise the 5th checking password in described operational order.Described hiding setting device in response to
Described operational order, in the hiding password judging described 5th checking password and described application program mapping
Timing, display is provided with the described content of described hidden identification.
Further, described hiding setting device is judging described 5th checking password and described application program
The hiding password match of mapping, and when being provided with the described content of described hidden identification and being in hidden state,
Display is provided with the described content of described hidden identification.
Further, described operational order is triggered by fingerprint sensor.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by
Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program
Hide protection.
Above for the application one embodiment provide hiding method to set up, those skilled in the art it should be appreciated that
The application one embodiment is also corresponding to provide a kind of hiding to arrange device, refers to Fig. 2.
Fig. 2 is the configuration diagram of the hiding setting device that the application one embodiment provides.
Described hiding setting device specifically includes:
Display module 101, for showing the information of the content of application program;Wherein, described content includes counting
According to and/or function items;
Hide setting command reception module 102, hide setting instruction for receiving;
Hidden identification processing module 103, in response to described hiding setting instruction, being described curriculum offering
Hidden identification, so that when receiving the operational order for described application program, be provided with described hidden
The described content hiding mark is hidden.
Further, described hidden identification processing module 103 is specifically additionally operable to, and hides setting instruction receiving
Afterwards, in response to described hiding setting instruction, before being described curriculum offering hidden identification, judge whether with
The hiding password of described application program maps mutually;If there is described hiding password, prompt cipher is verified;Receive
First checking password, judges described first checking password and described hiding password match.
Further, described hidden identification processing module 103 is specifically additionally operable to, judge whether with described
After the hiding password of application program maps mutually, if there is not described hiding password, prompt cipher is arranged;Connect
Receive the second checking password;Using the described second checking password as hiding password, set up hiding password and answer with described
Mapping relations with program.
Further, described device also includes:
Password removing module 104, instruction deleted by the password for receiving for hiding password;In response to described
Instruction deleted by password, judges whether the application program with hiding password mapping to be deleted;Judging
When there is not the application program with hiding password mapping to be deleted, delete described hiding password to be deleted.
Further, described password removing module 104 is specifically additionally operable to, and is judging exist and to be deleted
During the application program of hiding password mapping, prompt the user whether to delete the application program being provided with described mapping
In be provided with the content of hidden identification;When the content receiving user input deletes instruction, delete and set
The content of hidden identification and described hiding password to be deleted are put.
Further, described hidden identification processing module 103 is specifically additionally operable to, and after prompt cipher setting, connects
Before receiving the second checking password, receive the 3rd checking password, judge that described 3rd checking password is close with system administration
Whether code mates;If described 3rd checking password and described system administration password match, input is pointed out newly to arrange
Hiding password.
Further, described hiding password includes biological characteristic;Described first checking password includes biological characteristic.
Further, described biological characteristic includes following at least one: fingerprint characteristic, palm print characteristics, vocal print
Feature, iris feature, face feature.
Further, described device also includes:
Operational order receiver module 105, for receiving the operational order for described application program, described behaviour
Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 106, in response to described operational order, hide be provided with described hidden
Hide the described content of mark.
Further, comprise the 4th checking password in described operational order;
Described operational order processing module 106 is specifically in response to described operational order, judging
State the 4th checking password and the mapping of described application program hiding password match when, hide be provided with described hidden
Hide the described content of mark.
Further, described operational order processing module 106 is specifically for judging described 4th checking
The hiding password match that password is mapped with described application program, and it is provided with the described interior of described hidden identification
When appearance is in non-concealed state, hide the described content being provided with described hidden identification.
Further, after hiding and being provided with the described content of described hidden identification, described device also includes:
Operational order receiver module 105, for receiving the operational order for described application program, described behaviour
Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 106, in response to described operational order, display is provided with described hidden
Hide the described content of mark.
Further, comprise the 5th checking password in described operational order;
Described operational order processing module 106 is specifically in response to described operational order, judging
When stating the hiding password match that the 5th checking password is mapped with described application program, display is provided with described hidden
Hide the described content of mark.
Further, described operational order processing module 106 is specifically for judging described 5th checking
The hiding password match that password is mapped with described application program, and it is provided with the described interior of described hidden identification
When appearance is in hidden state, display is provided with the described content of described hidden identification.
Further, described operational order is triggered by fingerprint sensor.
The hiding method to set up that the application one embodiment described further below provides.
Fig. 3 is the flow process detailed annotation figure of the hiding method to set up that the application one embodiment provides.
This hiding method to set up embodiment specifically includes following steps:
S201: described intelligent terminal shows the information of the content of application program.Wherein, described content includes counting
According to and/or function items.
S202: described hiding setting device receives the selection instruction for described content, in response to described selection
Instruction, is that described curriculum offering chooses mark.
In the present embodiment, user can select, by clicking on, data or the function items needing to be hidden.Intelligence
Can the touch control display of terminal to detect the corresponding viewing area of data or function items clicked and change into telecommunications
Number, Electric signal processing is become digital signal by intelligent terminal, and the system management module of intelligent terminal receives this numeral
Signal, that is, receive the selection instruction for described content.
In order to avoid maloperation, methods described can also include:
After described intelligent terminal for reception is directed to the selection instruction of described content, touch control display shows hides determination
Prompting.In specific embodiment, described hiding determination prompting can correspond to all selected contents;Can also
Corresponding to a selected content.
In other embodiment, hide and determine that prompting can also be by other modes such as voice output, vibrations outputs
Realize.Corresponding, receiving hiding setting instruction can also by phonetic entry, vibrations input (for example: have
The shaking of rule) etc. other modes realize.
In other specific embodiments, receive application program partial content choose information after, directly to part
Curriculum offering hidden identification, and need not further confirm that, with simple flow.
S203: described hiding setting device receives hides setting instruction.
In a kind of embodiment, described intelligent terminal can have system management module, described system management module
Application program can be managed, including but not limited to the partial content of application program is hidden arranging.
The hiding method to set up of the present embodiment can pass through system management module, and the partial content of application program is carried out
Hide setting.In another kind of embodiment, described intelligent terminal can have application program, described application program
The partial content of application program can be hidden arranging.The hiding method to set up of the present embodiment can be passed through
Application program is hidden to the partial content of itself arranging.
In conjunction with being embodied as scene one
Fig. 4 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene one
Figure.
Fig. 4 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene one
Figure.
Fig. 4 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene one
Figure.
In this implement scene, intelligent terminal has default function.
Step 1: enter default function, display comprises the information of application program particular content.Please join figure
4a, described intelligent terminal shows the particular content of multiple application programs.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 4 b,
Select " the prosperous chat record of Ali " and " mobile-phone payment function ".
Step 3: click on " hiding " to confirm to arrange hidden identification to selected data and/or function items.
Please join Fig. 4 c.
In conjunction with being embodied as scene two
Fig. 5 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene two
Figure.
Fig. 5 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene two
Figure.
Fig. 5 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene two
Figure.
Fig. 5 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene two
Schematic diagram.
Fig. 5 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene two
Schematic diagram.
In this implement scene, intelligent terminal has default function.
Step 1: enter default function, display comprises the information of application program particular content.Please join figure
5a, described intelligent terminal shows the particular content of multiple application programs.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 5 b,
Select " the prosperous chat record of Ali ", eject " hiding " button.
Step 3: click on " hiding " button to confirm to hide mark to selected data and/or function items setting
Know.Please join Fig. 5 c.
Step 4: select to need to set the data of application program hidden and/or function items.Please join Fig. 5 d,
Select " mobile-phone payment function ", eject " hiding " button.
Step 5: click on " hiding " button to confirm to hide mark to selected data and/or function items setting
Know.Please join Fig. 5 e.
In conjunction with being embodied as scene three
Fig. 6 a is the display signal that the hiding method to set up that the application one embodiment provides combines implement scene three
Figure.
Fig. 6 b is that the hiding method to set up that the application one embodiment provides chooses signal with reference to implement scene three
Figure.
Fig. 6 c is the confirmation signal that the hiding method to set up that the application one embodiment provides combines implement scene three
Figure.
Fig. 6 d is that the hiding method to set up that the application one embodiment provides is chosen with reference to the another of implement scene three
Schematic diagram.
Fig. 6 e is another confirmation that the hiding method to set up that the application one embodiment provides combines implement scene three
Schematic diagram.
In this implement scene, intelligent terminal has application program.
Step 1: enter application program, display comprises the information of application program particular content.Please join Fig. 6 a,
Described intelligent terminal shows the particular content of application program.
Step 2: select to need to set the data of application program hidden and/or function items.Please join Fig. 6 b,
Select " the prosperous chat record of Ali ", popup menu option.
Step 3: select " hiding " option to confirm to hide mark to selected data and/or function items setting
Know.Please join Fig. 6 c.
Step 4: select to need to set the data of application program hidden and/or function items.Please join Fig. 6 d,
Select " mobile-phone payment function ", popup menu option.
Step 5: select " hiding " option to confirm to hide mark to selected data and/or function items setting
Know.Please join Fig. 6 e.
S204: described hiding setting device judges whether the hiding password with described application program maps mutually;
When judged result is to be, execution step s205;Judged result for no when, execution step s206.
After receiving hiding setting instruction, the system management module of described intelligent terminal or application program judge
With the presence or absence of the hiding password with described application program maps mutually.
S205: described hiding setting device prompt cipher checking;Receive user inputted according to this prompting first
Checking password, and judge whether the first checking password and the hiding password of described application program maps mutually mate,
If coupling, execution step s207;When judging the first checking password and hiding password mismatch, then may be used
Carry out any operation with prompt cipher authentication failed or no longer.
S206: described hiding setting device prompt cipher setting;Then receive user inputs according to this prompting
3rd checking password, and judge whether described 3rd checking password is mated with system administration password.If described
Three checking passwords and described system administration password match, point out new setting of input to hide password.Described hiding sets
Put device and receive the second checking password, using the described second checking password as hiding password, set up and hide password
Mapping relations with described application program.
When there is not hiding password, need to hide password for application program setting, so as follow-up to being set
The switching that the described content of described hidden identification is hidden or shows.Before being hidden password setting, need
User identity is identified, when the 3rd checking password receiving and system administration password match, then to pass through
Identification, is hidden password and obtains and mapped with application program.When the 3rd receiving verifies password and be
System administrator password mismatches, then carry out can any operation with prompt cipher authentication failed or no longer.
S207: described hiding setting device, in response to described hiding setting instruction, determines and is provided with choosing mark
The content known, is described curriculum offering hidden identification.
S208: described hiding setting device receives the operational order for described application program, described operation refers to
Order includes at least one in stealth mode switching command and the operating instruction of described application program, described operation
Comprise in instruction to verify password, in response to described operational order, judge described checking password and described application
The hiding password match of program maps.
In a kind of embodiment, described intelligent terminal can have fingerprint sensor, and described operational order can be
Identified by fingerprint sensor.In a kind of specific embodiment, when application program is opened, this application program
Receive the operational order being identified by fingerprint sensor, and be provided with hidden identification in this application program
Content is hidden or shows.In another kind of specific embodiment, corresponding to different application programs, Ke Yishe
Put different fingerprint templates, when the fingerprint that intelligent terminal for reception is transmitted by fingerprint sensor, this can be referred to
The image information of the image information of stricture of vagina and each fingerprint template is compared, and finds out the fingerprint with this fingerprint matching
Template, and determine corresponding application program, and it is directed to the content being provided with hidden identification in this application program
It is hidden or show.
S209: judge whether the described content being provided with described hidden identification is in hidden state, judging
When result is to be, execute s211;Judged result for no when, execution step s210.
S210: hide the described content being provided with described hidden identification.
S211: display is provided with the described content of described hidden identification.
In the present embodiment, when application program has multiple content being provided with hidden identification, if wherein one
The individual content being provided with hidden identification is not provided as hiding, and is all provided with the content of hidden identification
It is set to hide.If the content being all provided with hidden identification has been set to hide, display is all set
Put the content of hidden identification.
In the embodiment of the present application, above-mentioned steps s208~s211 can also be different from above-mentioned hiding setting device
Other devices execution.Such as, can be answering belonging to the described content being provided with described hidden identification
Executed with program.
In the present embodiment, with regard to being related to the hiding setting of application data, the system management module of intelligent terminal is straight
Connect and be set to hide by the application data selecting in abovementioned steps.Specifically, in a kind of mode, intelligent terminal
The application data being provided with hidden identification directly can not be shown.In another mode, intelligence is eventually
System or third-party application program can be passed through in end, is arranged on the position originally showing described application data
Increase a new display layer on display layer.Because new display layer is set to be shown in described application data
Position on, therefore before terminating display for described new display layer, described application data is not
Can show, will not be seen by the user of operation intelligent terminal.In another mode, can will set
The application data having put hidden identification is arranged in hiding document, so that being provided with the application of hidden identification
Data is not shown in the display location of script in any form.
With regard to being related to the hiding setting of application function, intelligent terminal can call the corresponding interface of application program,
The hiding setting instruction of transmission application function.When application program is opened again, application program receives application
The hiding setting instruction of function, and application function is hidden arrange.It is related to the hidden of application data with above-mentioned
Hide setting similar, can be by way of new display layer be set or the mode in hiding document that arranges enters
Row hides setting.
In a kind of embodiment, when the partial content to application program is hidden.Described operational order and institute
State hiding setting instruction can gather simultaneously, further, after curriculum offering hidden identification, directly hide
It is provided with the content of hidden identification.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by
Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program
Hide protection.
Below with reference to Fig. 7 and Fig. 8, describe a kind of application content processing method and processing device in detail.
Fig. 7 is the schematic flow sheet of the application content processing method that the application one embodiment provides.
Described application content processing method specifically includes following steps:
S301: receive the operational order for described application program, described operational order includes stealth mode and cuts
Change at least one in instruction and the operating instruction of described application program, comprise to verify close in described operational order
Code.Described operational order is identified by fingerprint sensor.Described operational order is used for triggering execution step
s302.
S302: in response to described operational order, judging described checking password and described application program mapping
Hiding password match when, search described application program in whether there is the content being provided with hidden identification.
S303: if described application program has the content being provided with hidden identification, and be provided with hiding mark
The content known is when being in non-concealed state, hide described in be provided with the content of hidden identification.If described application
Program has the content being provided with hidden identification, and is provided with the content of hidden identification and is in hidden state
When, it is provided with the content of hidden identification described in display.
S304: if described application program does not have the content being provided with hidden identification, do not carry out any operation
Or prompting is no provided with the content of hidden identification.
In the embodiment of the present application, by the partial content of application program is set to hide, and will be not desired to by
Others consults or the data that uses and/or function items are hidden, to realize the hidden of the particular content to application program
Hide protection.
Fig. 8 is the configuration diagram of the application content processing meanss that the application one embodiment provides.
Described application content processing meanss specifically include:
Operational order receiver module 301, for receiving the operational order for described application program, described behaviour
Make instruction and include at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module 302, in response to described operational order, searching in described application program
Whether there is the content being provided with hidden identification;If described application program has is provided with hidden identification
Content, hide or display described in be provided with the content of hidden identification.
Further, comprise in described operational order to verify password;
Described operational order processing module 302 is specifically in response to described operational order, judging
State checking password and the mapping of described application program hiding password match when, whether search in described application program
There is the content being provided with hidden identification.
Further, described operational order processing module 302 specifically for, if described application program have by
When being provided with the content of hidden identification, and being provided with the content of hidden identification and be in non-concealed state, hide
The described content being provided with hidden identification.
Further, described operational order processing module 302 specifically for, if described application program have by
When being provided with the content of hidden identification, and being provided with the content of hidden identification and be in hidden state, show institute
State the content being provided with hidden identification.
Further, described operational order is triggered by fingerprint sensor.
The framework of the specific embodiment of the hiding setting device that Fig. 9 provides for the application one embodiment is illustrated
Figure.
In specific embodiment, described intelligent terminal can include hardware system and software system.
Described hardware system includes fingerprint sensor, described fingerprint sensor be used for obtain by user's finger for
Fingerprint signal and finger pressing signal that fingerprint sensor is pressed and triggered, and the fingerprint signal that will obtain
It is sent to software system with finger pressing signal.Wherein, comprise information in fingerprint in fingerprint signal.
Described software system includes system core module, system architecture module and application program module.
Described system core module includes driver element and finger pressing interrupt processing unit.Described driver element
For receiving fingerprint signal and/or finger pressing signal, so that software system is further processed.Described
Finger presses fingerprint signal and/or the finger pressing letter that interrupt processing unit is used for receiving according to driver element
Number trigger default control command.
Described system architecture module includes fingerprint collecting and identification administrative unit (referred to as described identification administrative unit)
With privacy mode administrative unit.Described identification administrative unit is used for the fingerprint image letter comprising in fingerprint signal
Breath is identified and manages.Described privacy mode administrative unit is used for the content being provided with hidden identification is carried out
Show or hide.
Described driver element, finger pressing interrupt processing unit, driver element and finger pressing interrupt processing list
Unit is used for supporting application program module, and provides related interface for each unit in application program module.
Described application program module includes system arranging unit and application program unit.Described system arranging unit
For being managed to the application program unit in application program module.Described application program unit can be tool
Body application program, software as prosperous in Ali etc..
The framework explanation of the specific embodiment of the hiding setting device providing for the application one embodiment above,
Describe the workflow of this device below for this specific embodiment in detail.
Described workflow may include that
The interface display application program of system arranging unit/application program unit of s401: intelligent terminal interior
The information held;Wherein, described content includes data and/or function items.
S402: fingerprint sensor obtains fingerprint signal and finger pressing signal;And by driver element by finger
Pressing signal transmission presses interrupt processing unit to finger.
S403: finger pressing interrupt processing unit generates trigger and is sent to fingerprint collecting and identification management mould
Block, so that fingerprint collecting and identification management module, according to trigger, obtain fingerprint at fingerprint sensor
Signal.
S404: fingerprint collecting judges the information in fingerprint in the fingerprint signal receiving with identification management module
Whether mate with preset fingerprint template (can also be a kind of information in fingerprint).
S405: if coupling, system arranging unit/application program unit is described curriculum offering hidden identification,
So that when receiving the operational order for described application program, being provided with the institute of described hidden identification
State content to be hidden.
Described workflow can also include:
Instruction deleted by the password that s406: fingerprint collecting is received for fingerprint template with identification management module.
S407: delete instruction in response to described password, fingerprint collecting and identification management module determine to be deleted
Fingerprint template, and judge whether the application program with fingerprint template to be deleted mapping.
S408: if there is not the application program with fingerprint template to be deleted mapping, fingerprint collecting and identification
Management module deletes described fingerprint template to be deleted.
S409: if there is the application program with fingerprint template to be deleted mapping, system arranging unit is pointed out
Whether user deletes the content being provided with hidden identification in the application program of described mapping.
S410: intelligent terminal when the content receiving user input deletes instruction, delete by system arranging unit
It is provided with the content of hidden identification;Fingerprint collecting deletes described fingerprint mould to be deleted with identification management module
Plate.
Described workflow can also include:
The information of the content of interface display application program of the application program unit of s411: intelligent terminal;Wherein,
Described content includes data and/or function items.
The fingerprint that the acquisition of s412: fingerprint sensor is pressed for fingerprint sensor and triggered by user's finger
Signal and finger pressing signal;And finger is pressed to finger pressing interruption by signal transmission by driver element
Reason unit.
S413: finger pressing interrupt processing unit generates trigger and is sent to fingerprint collecting and identification management mould
Block, so that fingerprint collecting obtains fingerprint letter with identification management module according to trigger at fingerprint sensor
Number.
S414: fingerprint collecting judges the information in fingerprint in the fingerprint signal receiving with identification management module
Whether mate with preset fingerprint template.
S415: if coupling, it is hiding that application program unit judges whether the content being provided with hidden identification is in
State.
S416: if the content being provided with hidden identification is in non-concealed state, privacy mode administrative unit is hidden
Hide the content being provided with hidden identification.
S417: if the content being provided with hidden identification is in hidden state, privacy mode administrative unit shows
It is provided with the content of hidden identification.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can be using complete hardware embodiment, complete software embodiment or knot
Close the form of the embodiment of software and hardware aspect.And, the present invention can adopt and wherein wrap one or more
Computer-usable storage medium containing computer usable program code (including but not limited to disk memory,
Cd-rom, optical memory etc.) the upper computer program implemented form.
The present invention is to produce with reference to method according to embodiments of the present invention, equipment (system) and computer program
The flow chart of product and/or block diagram are describing.It should be understood that can by computer program instructions flowchart and
/ or block diagram in each flow process and/or the flow process in square frame and flow chart and/or block diagram and/
Or the combination of square frame.These computer program instructions can be provided to general purpose computer, special-purpose computer, embed
The processing module of formula datatron or other programmable data processing device by produce a machine so that by terms of
The instruction of the processing module execution of calculation machine or other programmable data processing device produces for realizing in flow process
The dress of the function of specifying in one flow process of figure or multiple flow process and/or one square frame of block diagram or multiple square frame
Put.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process and set
So that being stored in this computer-readable memory in the standby computer-readable memory working in a specific way
Instruction produce and include the manufacture of command device, the realization of this command device is in one flow process or multiple of flow chart
The function of specifying in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Obtain and series of operation steps is executed on computer or other programmable devices to produce computer implemented place
Reason, thus the instruction of execution is provided for realizing in flow chart one on computer or other programmable devices
The step of the function of specifying in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
One typical configure, computing device include one or more processing modules (cpu), input/
Output interface, network interface and internal memory.
Internal memory potentially includes the volatile memory in computer-readable medium, random access memory
(ram) and/or the form such as Nonvolatile memory, such as read only memory (rom) or flash memory (flash ram).
Internal memory is the example of computer-readable medium.
Computer-readable medium include permanent and non-permanent, removable and non-removable media can by appoint
What method or technique is realizing information Store.Information can be computer-readable instruction, data structure, program
Module or other data.The example of the storage medium of computer includes, but are not limited to phase transition internal memory
(pram), static RAM (sram), dynamic random access memory (dram), its
The random access memory (ram) of his type, read only memory (rom), electrically erasable are read-only
Memorizer (eeprom), fast flash memory bank or other memory techniques, read-only optical disc read only memory
(cd-rom), digital versatile disc (dvd) or other optical storage, magnetic cassette tape, tape magnetic
Disk storage or other magnetic storage apparatus or any other non-transmission medium, can be used for storage can be calculated
The information that equipment accesses.Define according to herein, computer-readable medium does not include temporary computer-readable matchmaker
Body (transitory media), the such as data signal of modulation and carrier wave.
Also, it should be noted term " inclusion ", "comprising" or its any other variant be intended to non-
The comprising of exclusiveness, so that include a series of process of key elements, method, product or equipment not only wrap
Include those key elements, but also include other key elements being not expressly set out, or also include for this process,
Method, product or the intrinsic key element of equipment.In the absence of more restrictions, " included by sentence
One ... " key element that limits is being it is not excluded that including the process of described key element, method, product or setting
Also there is other identical element in standby.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer journey
Sequence product.Therefore, the application can using complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.And, the application can adopt and wherein include calculating one or more
Machine usable program code computer-usable storage medium (including but not limited to disk memory, cd-rom,
Optical memory etc.) the upper computer program implemented form.
The foregoing is only embodiments herein, be not limited to the application.For this area skill
For art personnel, the application can have various modifications and variations.All institutes within spirit herein and principle
Any modification, equivalent substitution and improvement made etc., within the scope of should be included in claims hereof.
Claims (40)
1. a kind of hiding method to set up is it is characterised in that include:
The information of the content of display application program;Wherein, described content includes data and/or function items;
Receive and hide setting instruction;
In response to described hiding setting instruction, it is described curriculum offering hidden identification, so that receiving pin
During to the operational order of described application program, the described content being provided with described hidden identification is hidden.
2. after the method for claim 1 is it is characterised in that receive hiding setting instruction, response
In described hiding setting instruction, before being described curriculum offering hidden identification, methods described also includes:
Judge whether the hiding password with described application program maps mutually;
If there is described hiding password, prompt cipher is verified;
Receive the first checking password, judge described first checking password and described hiding password match.
3. method as claimed in claim 2 is it is characterised in that judge whether and described application journey
After the hiding password of sequence maps mutually, methods described also includes:
If there is not described hiding password, prompt cipher is arranged;
Receive the second checking password;
Using the described second checking password as hiding password, set up the mapping hiding password and described application program
Relation.
4. method as claimed in claim 3 is it is characterised in that after prompt cipher setting, receive second
Before checking password, methods described also includes:
Receive the 3rd checking password, judge whether described 3rd checking password is mated with system administration password;
If described 3rd checking password and described system administration password match, the new setting of input is pointed out to hide password.
5. method as claimed in claim 2 is it is characterised in that methods described also includes:
Receive the password for hiding password and delete instruction;
Delete instruction in response to described password, judge whether the application with hiding password mapping to be deleted
Program;
When judging not exist the application program with hiding password mapping to be deleted, delete described to be deleted
Hiding password.
6. method as claimed in claim 5 is it is characterised in that methods described also includes:
When judging to exist the application program with hiding password mapping to be deleted, prompt the user whether to delete
It is provided with the content of hidden identification in the application program of described mapping;
Receive user input content delete instruction when, delete be provided with hidden identification content and
Described hiding password to be deleted.
7. the method as described in claim as arbitrary in claim 2~6 is it is characterised in that described hiding password bag
Include biological characteristic;Described first checking password includes biological characteristic.
8. method as claimed in claim 7 it is characterised in that described biological characteristic include following at least
A kind of:
Fingerprint characteristic;
Palm print characteristics;
Vocal print feature;
Iris feature;
Face feature.
9. the method for claim 1 is it is characterised in that methods described also includes:
Receive the operational order for described application program, described operational order includes stealth mode switching command
With at least one in the operating instruction of described application program;
In response to described operational order, hide the described content being provided with described hidden identification.
10. method as claimed in claim 9 is tested it is characterised in that comprising the 4th in described operational order
Card password;Then
In response to described operational order, hide the described content being provided with described hidden identification, comprising:
In response to described operational order, judging described 4th checking password and described application program mapping
During hiding password match, hide the described content being provided with described hidden identification.
11. methods as claimed in claim 10 are it is characterised in that judging that described 4th checking is close
During the hiding password match that code is mapped with described application program, hide and be provided with the described of described hidden identification
Content, comprising:
In the hiding password match judging described 4th checking password and described application program mapping, and set
When having put the described content of described hidden identification and being in non-concealed state, hide and be provided with described hidden identification
Described content.
12. the method for claim 1 are provided with described hidden identification it is characterised in that hiding
Described content after, methods described also includes:
Receive the operational order for described application program, described operational order includes stealth mode switching command
With at least one in the operating instruction of described application program;
In response to described operational order, display is provided with the described content of described hidden identification.
13. methods as claimed in claim 12 are it is characterised in that comprise the 5th in described operational order
Checking password;
In response to described operational order, display is provided with the described content of described hidden identification, comprising:
In response to described operational order, judging described 5th checking password and described application program mapping
During hiding password match, display is provided with the described content of described hidden identification.
14. methods as claimed in claim 13 are it is characterised in that judging that described 5th checking is close
During the hiding password match that code is mapped with described application program, display is provided with the described of described hidden identification
Content, comprising:
In the hiding password match judging described 5th checking password and described application program mapping, and set
When having put the described content of described hidden identification and being in hidden state, display is provided with described hidden identification
Described content.
Method as described in 15. claims as arbitrary in claim 9~14 is it is characterised in that described operational order
Triggered by fingerprint sensor.
A kind of 16. application content processing methods are it is characterised in that include:
Receive the operational order for described application program, described operational order includes stealth mode switching command
With at least one in the operating instruction of described application program;
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification
Content;
If described application program has the content being provided with hidden identification, hide or display described in be provided with
The content of hidden identification.
17. methods as claimed in claim 16 are it is characterised in that comprise in described operational order to verify
Password;Then
In response to described operational order, whether have in the described application program of lookup and be provided with hidden identification
Content, comprising:
In response to described operational order, judging described checking password and hiding that described application program maps
During password match, search in described application program whether there is the content being provided with hidden identification.
If 18. methods as claimed in claim 17 are it is characterised in that described application program has is set
Put the content of hidden identification, hide described in be provided with the content of hidden identification, comprising:
If described application program has the content being provided with hidden identification, and is provided with the interior of hidden identification
Hold when being in non-concealed state, hide described in be provided with the content of hidden identification.
If 19. methods as claimed in claim 17 are it is characterised in that described application program has is set
Put the content of hidden identification, described in display, be provided with the content of hidden identification, comprising:
If described application program has the content being provided with hidden identification, and is provided with the interior of hidden identification
When appearance is in hidden state, it is provided with the content of hidden identification described in display.
Method as described in 20. claims as arbitrary in claim 16~19 is it is characterised in that described operational order
Triggered by fingerprint sensor.
A kind of 21. hiding arrange device it is characterised in that including:
Display module, for showing the information of the content of application program;Wherein, described content include data and
/ or function items;
Hide setting command reception module, hide setting instruction for receiving;
Hidden identification processing module, in response to described hiding setting instruction, being that described curriculum offering is hidden
Mark, so that when receiving the operational order for described application program, be provided with described hiding mark
The described content known is hidden.
22. devices as claimed in claim 21 are it is characterised in that described hidden identification processing module has
Body is additionally operable to, and after receiving and hiding setting instruction, in response to described hiding setting instruction, is described interior be installed with
Before putting hidden identification, judge whether the hiding password with described application program maps mutually;If existing described
Hiding password, prompt cipher is verified;Receive the first checking password, judge described first checking password and institute
State hiding password match.
23. devices as claimed in claim 22 are it is characterised in that described hidden identification processing module has
Body is additionally operable to, judge whether with the hiding password of described application program maps mutually after, if there is not institute
State hiding password, prompt cipher is arranged;Receive the second checking password;Using the described second checking password as hidden
Hide password, set up the mapping relations hiding password and described application program.
24. devices as claimed in claim 23 are it is characterised in that described hidden identification processing module has
Body is additionally operable to, and after prompt cipher setting, before receiving the second checking password, receives the 3rd checking password, judges
Whether described 3rd checking password is mated with system administration password;If described 3rd checking password and described system
Administrator password mates, and points out new setting of input to hide password.
25. devices as claimed in claim 22 are it is characterised in that described device also includes:
Password removing module, instruction deleted by the password for receiving for hiding password;In response to described password
Delete instruction, judge whether the application program with hiding password mapping to be deleted;Judging not deposit
In the application program with hiding password mapping to be deleted, delete described hiding password to be deleted.
26. devices as claimed in claim 25 are it is characterised in that described password removing module is specifically gone back
For when judging to exist the application program with hiding password mapping to be deleted, prompting the user whether to delete
Except the content being provided with hidden identification in the application program of described mapping;Receiving the content of user input
When deleting instruction, delete and be provided with the content of hidden identification and described hiding password to be deleted.
Device as described in 27. claims as arbitrary in claim 22~26 is it is characterised in that described hiding password
Including biological characteristic;Described first checking password includes biological characteristic.
28. devices as claimed in claim 27 it is characterised in that described biological characteristic include following extremely
Few one kind:
Fingerprint characteristic;
Palm print characteristics;
Vocal print feature;
Iris feature;
Face feature.
29. devices as claimed in claim 21 are it is characterised in that described device also includes:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to
Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module, in response to described operational order, hiding and being provided with described hiding mark
The described content known.
30. devices as claimed in claim 29 are it is characterised in that comprise the 4th in described operational order
Checking password;
Described operational order processing module is specifically in response to described operational order, judging described
During the hiding password match that four checking passwords are mapped with described application program, hide and be provided with described hiding mark
The described content known.
31. devices as claimed in claim 30 are it is characterised in that described operational order processing module has
Body is used for, in the hiding password match judging described 4th checking password and described application program mapping, and
When being provided with the described content of described hidden identification and being in non-concealed state, hide and be provided with described hiding
The described content of mark.
32. devices as claimed in claim 21 are provided with described hiding mark it is characterised in that hiding
After the described content known, described device also includes:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to
Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Operational order processing module, in response to described operational order, display is provided with described hiding mark
The described content known.
33. devices as claimed in claim 32 are it is characterised in that comprise the 5th in described operational order
Checking password;
Described operational order processing module is specifically in response to described operational order, judging described
During the hiding password match that five checking passwords are mapped with described application program, display is provided with described hiding mark
The described content known.
34. devices as claimed in claim 33, described operational order processing module is specifically for sentencing
Break and described 5th checking password and the hiding password match of described application program mapping, and be provided with described
When the described content of hidden identification is in hidden state, display is provided with the described content of described hidden identification.
Device as described in 35. claims as arbitrary in claim 29~34 is it is characterised in that described operational order
Triggered by fingerprint sensor.
A kind of 36. application content processing meanss are it is characterised in that include:
Operational order receiver module, for receiving the operational order for described application program, described operation refers to
Order includes at least one in stealth mode switching command and the operating instruction of described application program;
Whether operational order processing module, in response to described operational order, searching in described application program
There is the content being provided with hidden identification;If described application program has the content being provided with hidden identification,
It is provided with the content of hidden identification described in hiding or showing.
37. devices as claimed in claim 36 are it is characterised in that comprise in described operational order to verify
Password;
Described operational order processing module is specifically in response to described operational order, testing described in judge
During the hiding password match that card password is mapped with described application program, search in described application program and whether have
It is provided with the content of hidden identification.
38. devices as claimed in claim 37 are it is characterised in that described operational order processing module has
Body is used for, if described application program has the content being provided with hidden identification, and is provided with hidden identification
Content when being in non-concealed state, hide described in be provided with the content of hidden identification.
39. devices as claimed in claim 37 are it is characterised in that described operational order processing module has
Body is used for, if described application program has the content being provided with hidden identification, and is provided with hidden identification
Content when being in hidden state, be provided with the content of hidden identification described in display.
Device as described in 40. claims as arbitrary in claim 36~39 is it is characterised in that described operational order
Triggered by fingerprint sensor.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510405913.6A CN106339636A (en) | 2015-07-10 | 2015-07-10 | Hiding setting method and device, application program content processing method and device |
PCT/CN2016/087467 WO2017008630A1 (en) | 2015-07-10 | 2016-06-28 | Hiding setting method and apparatus, and application program content processing method and apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510405913.6A CN106339636A (en) | 2015-07-10 | 2015-07-10 | Hiding setting method and device, application program content processing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106339636A true CN106339636A (en) | 2017-01-18 |
Family
ID=57757253
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510405913.6A Pending CN106339636A (en) | 2015-07-10 | 2015-07-10 | Hiding setting method and device, application program content processing method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106339636A (en) |
WO (1) | WO2017008630A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319484A (en) * | 2017-05-17 | 2018-07-24 | 腾讯科技(深圳)有限公司 | A kind of processing method of five application page, device and storage medium |
CN109302506A (en) * | 2018-09-28 | 2019-02-01 | 南昌努比亚技术有限公司 | Instant communication information storage method, device and computer readable storage medium |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111176816A (en) * | 2019-12-30 | 2020-05-19 | 深圳市亿道信息股份有限公司 | Kiosk mode implementation method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508609A (en) * | 2011-11-17 | 2012-06-20 | 潘天华 | Method for controlling displaying and hiding of computer application program window |
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
US20140378099A1 (en) * | 2013-06-19 | 2014-12-25 | Huawei Device Co., Ltd. | Method and Apparatus for Processing Data and Message |
CN104463004A (en) * | 2013-09-24 | 2015-03-25 | 北京三星通信技术研究有限公司 | Method and device for protecting interface content |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1980429A (en) * | 2005-11-30 | 2007-06-13 | 中兴通讯股份有限公司 | Method for information secrete-keeping in mobile terminal |
CN103366127B (en) * | 2012-03-29 | 2018-08-10 | 联想(北京)有限公司 | A kind of data processing method and device |
CN102880837B (en) * | 2012-08-24 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Improve method and the mobile terminal of security of mobile terminal |
CN104008350B (en) * | 2014-05-15 | 2017-10-24 | 惠州Tcl移动通信有限公司 | Enter the mobile terminal and method of different user pattern by different unlocking manners |
CN103986840B (en) * | 2014-05-30 | 2015-11-25 | 小米科技有限责任公司 | Control method and the device of dialog information |
-
2015
- 2015-07-10 CN CN201510405913.6A patent/CN106339636A/en active Pending
-
2016
- 2016-06-28 WO PCT/CN2016/087467 patent/WO2017008630A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102508609A (en) * | 2011-11-17 | 2012-06-20 | 潘天华 | Method for controlling displaying and hiding of computer application program window |
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
US20140378099A1 (en) * | 2013-06-19 | 2014-12-25 | Huawei Device Co., Ltd. | Method and Apparatus for Processing Data and Message |
CN104463004A (en) * | 2013-09-24 | 2015-03-25 | 北京三星通信技术研究有限公司 | Method and device for protecting interface content |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108319484A (en) * | 2017-05-17 | 2018-07-24 | 腾讯科技(深圳)有限公司 | A kind of processing method of five application page, device and storage medium |
CN109302506A (en) * | 2018-09-28 | 2019-02-01 | 南昌努比亚技术有限公司 | Instant communication information storage method, device and computer readable storage medium |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
WO2017008630A1 (en) | 2017-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108139953A (en) | For checking the device level mandate of content | |
CN106778130B (en) | Message display method, display device and mobile terminal | |
CN103810437B (en) | A kind of method of hide application program and terminal | |
CN103118031B (en) | Log in method and the electronic equipment of application account | |
CN106575332A (en) | Authenticated device used to unlock another device | |
CN104732121A (en) | Encryption setting method, decryption setting method and corresponding device of application program | |
US10999158B2 (en) | User interfaces for controlling or presenting information about multiple cellular identifiers on an electronic device | |
CN106201204B (en) | Start the method and apparatus of application function | |
CN106228054A (en) | Auth method and device | |
CN105373737B (en) | A kind of application encryption method and mobile terminal | |
CN106339636A (en) | Hiding setting method and device, application program content processing method and device | |
CN105323218A (en) | Identity verifying method and device | |
CN106484231A (en) | A kind of method and device of application hides | |
CN105281907B (en) | Encrypted data processing method and device | |
CN105930076B (en) | The display methods of mobile communication terminal and its hiding selected object | |
KR20140132286A (en) | Method and apparatus for Unlocking Terminal Device | |
CN104268039B (en) | Mantenance data acquisition methods, apparatus and system | |
CN106533917B (en) | Relation chain processing method, apparatus and system | |
CN107861669A (en) | The switching method and mobile terminal of a kind of custom system | |
CN106020697A (en) | Control method and device for display elements | |
CN108052822A (en) | Terminal control method, apparatus and system | |
CN108737638A (en) | Application control method, apparatus, mobile terminal and computer-readable medium | |
Agrawal et al. | Smart Authentication for smart phones | |
CN110263515B (en) | Opening method of encrypted application and terminal equipment | |
CN105786354B (en) | A kind of hiden application deployment method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 1233000 Country of ref document: HK |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170118 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1233000 Country of ref document: HK |