CN106484301A - A kind of method of hiden application and terminal - Google Patents

A kind of method of hiden application and terminal Download PDF

Info

Publication number
CN106484301A
CN106484301A CN201610928673.2A CN201610928673A CN106484301A CN 106484301 A CN106484301 A CN 106484301A CN 201610928673 A CN201610928673 A CN 201610928673A CN 106484301 A CN106484301 A CN 106484301A
Authority
CN
China
Prior art keywords
application
display interface
hiden
biological information
application icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610928673.2A
Other languages
Chinese (zh)
Inventor
杜逸珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610928673.2A priority Critical patent/CN106484301A/en
Publication of CN106484301A publication Critical patent/CN106484301A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

The present invention provides a kind of method of hiden application and terminal, solves the problems, such as that prior art is difficult to efficiently and easily terminal applies are hidden.The method of the present invention includes:If monitoring the touch operation for application icon corresponding to the first application in application icon display interface, and within the persistent period of described touch operation, collect the biological information for identifying user identity, then verification process is carried out to the described biological information collecting;If the described biological information collecting is proved to be successful, then by application icon corresponding for the described first application from described application icon display interface movement to hiden application display interface, in described hiden application display interface, include the corresponding application icon of hiden application.The embodiment of the present invention after the biological information of user input is proved to be successful just can efficiently and easily by application icon from application icon display interface movement to hiden application display interface, and there is higher safety, improve Consumer's Experience.

Description

A kind of method of hiden application and terminal
Technical field
The present invention relates to the technical field of communications applications, particularly relate to a kind of method of hiden application and terminal.
Background technology
Rich and varied application program is existed on existing mobile device, certain applications program can be related to user's property safety Or expose the privacy of user.For this kind of phenomenon, user can hide corresponding desktop application icon, hidden to reach protection itself Private or the purpose of property safety.
But in prior art user when being hidden to desktop application icon, operating process is loaded down with trivial details, and safety is low, fall The low experience of user.
Content of the invention
It is an object of the invention to provide a kind of method of hiden application and terminal are difficult to fast it is intended to solve prior art The problem easily terminal applies being hidden.
To achieve these goals, the invention provides a kind of method of hiden application, it is applied to terminal, including:
If monitor the touch operation for application icon corresponding to the first application in application icon display interface, and in institute State in the persistent period of touch operation, collect the biological information for identifying user identity, then to described in collecting Biological information carries out verification process;
If the described biological information collecting is proved to be successful, by application icon corresponding for the described first application from Described application icon display interface movement, to hiden application display interface, includes hiding in described hiden application display interface Apply corresponding application icon.
To achieve these goals, the embodiment of the present invention additionally provides a kind of terminal, including:
Authentication module, if for monitoring to touch for application icon corresponding to the first application in application icon display interface Touch operation, and within the persistent period of described touch operation, collect the biological information for identifying user identity, then right The described biological information collecting carries out verification process;
First mobile module, if the described biological information for collecting is proved to be successful, described first is applied From described application icon display interface movement to hiden application display interface, described hiden application shows corresponding application icon The corresponding application icon of hiden application is included in interface.
The embodiment of the present invention has the advantages that:
The technique scheme of the embodiment of the present invention, if monitor to apply institute right in application icon display interface first Answer the touch operation of application icon, and within the persistent period of described touch operation, collect the life for identifying user identity Thing characteristic information, then carry out verification process to the described biological information collecting;If the described biological characteristic letter collecting Breath is proved to be successful, then answer application icon corresponding for the described first application to hiding from described application icon display interface movement With display interface, in described hiden application display interface, include the corresponding application icon of hiden application.The embodiment of the present invention After the biological information of user input is proved to be successful just can efficiently and easily by application icon from application icon display interface Move to hiden application display interface, and there is higher safety, improve Consumer's Experience.
Brief description
Fig. 1 is a workflow diagram of the method for hiden application of the embodiment of the present invention;
Fig. 2 is the another workflow diagram of the method for hiden application of the embodiment of the present invention;
Fig. 3 is another workflow diagram of the method for hiden application of the embodiment of the present invention;
Fig. 4 is in the method for hiden application of the embodiment of the present invention, application icon is mobile extremely by application icon display interface The operation chart of hiden application display interface;
Fig. 5 is the operation chart using hiden application in the method for hiden application of the embodiment of the present invention;
Fig. 6 is a structured flowchart of the terminal of the embodiment of the present invention;
Fig. 7 is the another structured flowchart of the terminal of the embodiment of the present invention;
Fig. 8 is another structured flowchart of the terminal of the embodiment of the present invention.
Specific embodiment
For making the technical problem to be solved in the present invention, technical scheme and advantage clearer, below in conjunction with being embodied as Example and accompanying drawing are described in detail.
The embodiment provides a kind of method of hiden application and terminal, solve prior art and be difficult to quick side Just problem terminal applies being hidden.
First embodiment
As shown in figure 1, The embodiment provides a kind of method of hiden application, being applied to terminal, this terminal has Body can be the equipment such as smart mobile phone, panel computer, personal computer, and the method for this hiden application includes:
Step 101:If monitoring the touch behaviour for application icon corresponding to the first application in application icon display interface Make, and within the persistent period of this touch operation, collect the biological information for identifying user identity, then to collecting Biological information carry out verification process.
This biological information can be specially finger print information, and this biological information can be also image surface, iris, palmmprint certainly Deng, due to each individuality have uniquely can measure or can automatic identification and checking physiological property, therefore pass through biological special Reference breath carries out authentication to user, can more safely and reliably protect the privacy of user.
Specifically, the biological information collecting and default biological information are compared process, if collecting Biological information consistent with default biological information, then be proved to be successful, otherwise authentication failed.
Step 102:If the above-mentioned biological information collecting is proved to be successful, should by corresponding for the above-mentioned first application With icon from application icon display interface movement to hiden application display interface, include hidden in this hiden application display interface Hide and apply corresponding application icon.
Specifically, the application icon corresponding by the first application can be grown in the embodiment of the present invention, be simultaneously entered fingerprint, at this After fingerprint authentication success, just conveniently and efficiently first can be applied corresponding application icon movement to hiden application display interface, Improve Consumer's Experience.
The method of the hiden application of the embodiment of the present invention, if monitor for the first application institute in application icon display interface The touch operation of corresponding application icon, and within the persistent period of described touch operation, collect for identifying user identity Biological information, then carry out verification process to the described biological information collecting;If the described biological characteristic collecting Information Authentication success, then by application icon corresponding for the described first application from described application icon display interface movement to hiding Application display interface, includes the corresponding application icon of hiden application in described hiden application display interface.The present invention is implemented Application icon just efficiently and easily can be shown boundary from application icon after the biological information of user input is proved to be successful by example Face movement is to hiden application display interface, and has higher safety, improves Consumer's Experience.
Second embodiment
As shown in Fig. 2 embodiments of the invention provide a kind of method of hiden application, it is applied to terminal, this terminal is concrete Can be the equipment such as smart mobile phone, panel computer, personal computer, the method for this hiden application includes:
Step 201:If monitoring the touch behaviour for application icon corresponding to the first application in application icon display interface Make, and within the persistent period of this touch operation, collect the biological information for identifying user identity, then to collecting Biological information carry out verification process.
Specifically, the biological information collecting and default biological information are compared process, if collecting Biological information consistent with default biological information, then be proved to be successful, otherwise authentication failed.
Step 202:If the above-mentioned biological information collecting is proved to be successful, should by corresponding for the above-mentioned first application With icon from application icon display interface movement to hiden application display interface, include hidden in this hiden application display interface Hide and apply corresponding application icon.
Specifically, the application icon corresponding by the first application can be grown in the embodiment of the present invention, be simultaneously entered fingerprint, at this After fingerprint authentication success, just conveniently and efficiently first can be applied corresponding application icon movement to hiden application display interface, Improve Consumer's Experience.
Step 203:When terminal is in application icon display interface, monitor whether to receive for identifying user identity Biological information.
This biological information can be specially finger print information, and this biological information can be also image surface, iris, palmmprint certainly Deng, due to each individuality have uniquely can measure or can automatic identification and checking physiological property, therefore pass through biological special Reference breath carries out authentication to user, can more safely and reliably protect the privacy of user.
Step 204:If receiving above-mentioned biological information, the biological information receiving is biological special with default Reference breath is compared.
Wherein, above-mentioned default biological information can be specially the finger print information that user inputs in advance, and user passes through in advance Typing finger print information, in order to be compared with the finger print information of follow-up typing, and after comparing success, is recalled hiden application and shows Show interface.
Step 205:If the above-mentioned biological information receiving is consistent with default biological information, by above-mentioned application Icon display interface jumps to hiden application display interface.
Here, when biological information is consistent with default biological information, you can enter hiden application display interface, Realize the efficient and convenient purpose recalling hiden application display interface.Further, after above-mentioned steps 205, the present invention is implemented The method of the hiden application of example, also includes:
If monitoring the scheduled operation for the second corresponding application icon of application in above-mentioned hiden application display interface, By application icon corresponding for this second application by described hiden application display interface movement to application icon display interface.
Specifically, if length for application icon corresponding to the second application is detected by operation, will be right for the second application institute Answer application icon by current display interface movement to application icon display interface, can quickly cancel hidden to the second application Hide.
Further, after above-mentioned steps 205, the method for the hiden application of the embodiment of the present invention, also include:
Detect and during the enabled instruction of the 3rd application, start the described 3rd and answer in described hiden application display interface With.
In the embodiment of the present invention, after recalling hiden application display interface, detect for this hiden application display interface In the 3rd application (hiden application) enabled instruction when, e.g., to the 3rd application corresponding to application icon touch operation, quickly Start the 3rd application hidden, realize the convenient and swift purpose being conveniently used hiden application.
Further, after above-mentioned steps 205, the method for the hiden application of the embodiment of the present invention, also include:
If detecting when exiting the exit instruction of hiden application display interface, jumped to by described hiden application display interface Described application icon display interface.
Specifically, during the clicking operation of return key, just will hide and answer in hiden application display interface if user is detected It is hidden with display interface, and show application icon display interface.
The method of the hiden application of the embodiment of the present invention, user chooses application institute to be concealed right in application icon display interface The application icon answered, and typing biological information, after this biological information is proved to be successful, just can conveniently and efficiently correspond to With being hidden;User's typing biological information when this biological information is consistent with default biological information, and Hiden application display interface can quickly be entered, be user-friendly to the application hidden.
3rd embodiment
With reference to Fig. 3, illustrate the hiden application of the embodiment of the present invention method realize process.
Step 301:User typing fingerprint A in the terminal.
Step 302:With the head of a household by needing the corresponding application icon of hiding application in application icon display interface, and input Fingerprint carries out identification, enters hiden application display interface and show the application hidden after identification success.
As shown in Figure 4 it is assumed that user will be hidden to the App4 in application icon display interface, then length presses App4, with When touch fingerprint button, compare typing fingerprint whether consistent with above-mentioned fingerprint A, if unanimously, App4 is shown by application icon Show Interface Moving to hiden application display interface.
Step 303:The application being unhided on demand with the head of a household, this application is unhided and returns application icon to be shown Interface.
Step 304:Touch fingerprint key in application icon display interface and carry out identification, enter to hide after identification success and answer With display interface, the application icon in click hiden application display interface is using the application hidden.
As shown in figure 5, user touches fingerprint button in application icon display interface carries out identification, identify successfully laggard Enter hiden application display interface, this hiden application display interface shows all applications hidden, such as App4, user clicks on The application icon of App4 just can use this App4.
Step 305:Click on return key in hiden application display interface, return application icon display interface.
It should be noted that there is not the restriction of sequencing between above-mentioned steps 303,304 and 305.
The method of the hiden application of the embodiment of the present invention, user only need to press certain in application icon display interface length and apply, with When input fingerprint just this application can be put into hiding interface, in addition, application icon display interface input fingerprint can enter Hiding interface is using the application hidden, simple and fast.
Fourth embodiment
As shown in fig. 6, embodiments of the invention additionally provide a kind of terminal 600, including:
Authentication module 601, if for monitoring for application icon corresponding to the first application in application icon display interface Touch operation, and within the persistent period of described touch operation, collect the biological information for identifying user identity, Then verification process is carried out to the described biological information collecting;
First mobile module 602, if the described biological information for collecting is proved to be successful, should by described first With corresponding application icon from described application icon display interface movement to hiden application display interface, described hiden application shows Show and in interface, include the corresponding application icon of hiden application.
The terminal of the embodiment of the present invention, also includes:
Monitoring module 603, uses for mark for when terminal is in application icon display interface, monitoring whether to receive The biological information of family identity;
Comparing module 604, if for receiving described biological information, by the described biological information receiving Compare with default biological information;
First jump module 605, if the described biological information for receiving is consistent with default biological information, Then hiden application display interface is jumped to by described application icon display interface.
The terminal of the embodiment of the present invention, also includes:
Second mobile module 606, if corresponding for the second application in described hiden application display interface for monitoring The scheduled operation of application icon, then moved application icon corresponding for the described second application by described hiden application display interface To application icon display interface.
The terminal of the embodiment of the present invention, also includes:
Second jump module 607, if during for the exit instruction exiting hiden application display interface is detected, by described hidden Hide application display interface and jump to described application icon display interface.
The terminal of the embodiment of the present invention, described biological information is finger print information.
The terminal of the embodiment of the present invention, if monitor for application drawing corresponding to the first application in application icon display interface Target touch operation, and within the persistent period of described touch operation, collect and believe for the biological characteristic identifying user identity Breath, then carry out verification process to the described biological information collecting;If the described biological information collecting is verified into Work(, then show boundary by application icon corresponding for the described first application from described application icon display interface movement to hiden application Face, includes the corresponding application icon of hiden application in described hiden application display interface.The embodiment of the present invention is defeated in user The biological information entering be proved to be successful after just can efficiently and easily by application icon from application icon display interface movement to hidden Hide application display interface, and there is higher safety, improve Consumer's Experience.
5th embodiment
As shown in fig. 7, being the another structured flowchart of embodiment of the present invention terminal, the terminal 700 shown in Fig. 7 includes:At least One processor 701, memorizer 702, at least one network interface 704 and other users interface 703.Each in terminal 700 Assembly is coupled by bus system 705.It is understood that the connection that bus system 705 is used for realizing between these assemblies is led to Letter.Bus system 705, in addition to including data/address bus, also includes power bus, controlling bus and status signal bus in addition.It but is For the sake of clear explanation, in the figure 7 various buses are all designated as bus system 705.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synchlink DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memorizer 702 of system and method described herein be intended to including but not limited to these and arbitrarily its It is suitable for the memorizer of type.
In some embodiments, memorizer 702 stores following element, executable module or data structure, or Their subset of person, or their superset:Operating system 7021 and application program 7022.
Wherein, operating system 7021, comprise various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and process hardware based task.Application program 7022, comprises various application programs, such as media Player (Media Player), browser (Browser) etc., are used for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 7022.
In one embodiment of this invention, by call memorizer 702 storage program or instruction, can be specifically The program of storage or instruction in application program 7022, if processor 701 is used for monitoring in application icon display interface the The touch operation of application icon corresponding to one application, and within the persistent period of described touch operation, collect and use for mark The biological information of family identity, then carry out verification process to the described biological information collecting;If collect is described Biological information is proved to be successful, then move application icon corresponding for the described first application from described application icon display interface Move to hiden application display interface, in described hiden application display interface, include the corresponding application icon of hiden application.
Alternatively, processor 701 is additionally operable to:When terminal is in application icon display interface, monitor whether to receive use Biological information in mark user identity;If receiving described biological information, described biological special by receive Reference ceases and presets biological information and compare;If the described biological information receiving and default biological information Unanimously, then described hiden application display interface is jumped to by described application icon display interface.
Alternatively, processor 701 is additionally operable to:If monitoring to correspond to for the second application in described hiden application display interface Application icon scheduled operation, then application icon corresponding for the described second application is moved by described hiden application display interface Move to application icon display interface.
Alternatively, processor 701 is additionally operable to:If detecting when exiting the exit instruction of hiden application display interface, by institute State hiden application display interface and jump to described application icon display interface.
Alternatively, described biological information is finger print information.
The terminal 700 of the embodiment of the present invention, if processor 701 is used for monitoring in application icon display interface first The touch operation of application icon corresponding to application, and within the persistent period of described touch operation, collect for identifying user The biological information of identity, then carry out verification process to the described biological information collecting;If the described life collecting Thing characteristic information is proved to be successful, then move application icon corresponding for the described first application from described application icon display interface To hiden application display interface, in described hiden application display interface, include the corresponding application icon of hiden application.This Bright embodiment after the biological information of user input is proved to be successful just can efficiently and easily by application icon from application icon Display interface movement is to hiden application display interface, and has higher safety, improves Consumer's Experience.
The terminal of the present invention is as being mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 700 is capable of each process that in previous embodiment, terminal is realized, for avoiding repeating, no longer superfluous here State.
The method that the embodiments of the present invention disclose all can apply in processor 701, or real by processor 701 Existing.Processor 701 is probably a kind of IC chip, has the disposal ability of signal.During realizing, said method Each step can be completed by the instruction of the integrated logic circuit of the hardware in processor 701 or software form.Above-mentioned place Reason device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated Circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and logic diagram.General Processor can be microprocessor or this processor can also be any conventional processor etc..In conjunction with embodiment of the present invention institute The step of disclosed method can be embodied directly in hardware decoding processor execution and complete, or with the hardware in decoding processor And software module combination execution completes.Software module may be located at random access memory, and flash memory, read only memory are programmable read-only In the ripe storage medium in this area such as memorizer or electrically erasable programmable memory, depositor.This storage medium is located at Memorizer 702, processor 701 reads the information in memorizer 702, the step completing said method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine and to realize.Hardware is realized, processing unit can be implemented in one or more special IC (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, Controller, microcontroller, microprocessor, for executing in other electronic units or a combination thereof of herein described function.
Software is realized, can be realized herein by executing the module (such as process, function etc.) of function described herein Described technology.Software code is storable in memorizer and passes through computing device.Memorizer can within a processor or Realize outside processor.
Sixth embodiment
As shown in figure 8, another structured flowchart of the terminal for the embodiment of the present invention.Terminal 800 shown in Fig. 8 includes radio frequency (Radio Frequency, RF) circuit 810, memorizer 820, input block 830, display unit 840, processor 860, audio frequency Circuit 870, WiFi (Wireless Fidelity) module 880 and power supply 890.
Wherein, input block 830 can be used for numeral or the character information of receiving user's input, and produces and terminal 800 User setup and the relevant signal input of function control.Specifically, in the embodiment of the present invention, this input block 830 is permissible Including contact panel 831.Contact panel 831, also referred to as touch screen, can collect user thereon or neighbouring touch operation (is compared As user uses the operation on contact panel 831 of any suitable object such as finger, stylus or adnexa), and according to setting in advance Fixed formula drives corresponding attachment means.Optionally, contact panel 831 may include touch detecting apparatus and touch controller two Individual part.Wherein, touch detecting apparatus detect the touch orientation of user, and detect the signal that touch operation brings, and signal is passed Give touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then Give this processor 860, and can the order sent of receiving processor 860 being executed.Furthermore, it is possible to adopt resistance-type, electricity The polytypes such as appearance formula, infrared ray and surface acoustic wave realize contact panel 831.Except contact panel 831, input block 830 Other input equipments 832 can also be included, other input equipments 832 can include but is not limited to physical keyboard, function key (such as Volume control button, switch key etc.), trace ball, mouse, one or more of action bars etc..
Wherein, display unit 840 can be used for showing by the information of user input or the information and the terminal that are supplied to user 800 various menu interfaces.Display unit 840 may include display floater 841, optionally, can adopt LCD or organic light emission two The forms such as pole pipe (Organic Light-Emitting Diode, OLED) are configuring display floater 841.
It should be noted that contact panel 831 can cover display floater 841, form touch display screen, when the inspection of this touch display screen Measure thereon or after neighbouring touch operation, send processor 860 to determine the type of touch event, with preprocessor 860 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.This Application Program Interface viewing area And the arrangement mode of this conventional control viewing area does not limit, can for being arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.This Application Program Interface viewing area is displayed for the interface of application program.Each interface is permissible Comprise the interface elements such as icon and/or the widget desktop control of at least one application program.This Application Program Interface viewing area It can also be the empty interface not comprising any content.This conventional control viewing area is used for showing the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 860 is the control centre of terminal 800, using various interfaces and connection whole mobile phone each Part, is stored in software program and/or module in first memory 821 by running or executing, and calls and be stored in the Data in two memorizeies 822, the various functions of execution terminal 800 and processing data, thus carry out overall prison to terminal 800 Control.Optionally, processor 860 may include one or more processing units.
In one embodiment of this invention, by calling software program and/or the module storing in this first memory 821 And/or the data in this second memory 822, if processor 860 is used for monitoring in application icon display interface first The touch operation of application icon corresponding to application, and within the persistent period of described touch operation, collect for identifying user The biological information of identity, then carry out verification process to the described biological information collecting;If the described life collecting Thing characteristic information is proved to be successful, then move application icon corresponding for the described first application from described application icon display interface To hiden application display interface, in described hiden application display interface, include the corresponding application icon of hiden application.
Alternatively, processor 860 is additionally operable to:When terminal is in application icon display interface, monitor whether to receive use Biological information in mark user identity;If receiving described biological information, described biological special by receive Reference ceases and presets biological information and compare;If the described biological information receiving and default biological information Unanimously, then described hiden application display interface is jumped to by described application icon display interface.
Alternatively, processor 860 is additionally operable to:If monitoring to correspond to for the second application in described hiden application display interface Application icon scheduled operation, then application icon corresponding for the described second application is moved by described hiden application display interface Move to application icon display interface.
Alternatively, processor 860 is additionally operable to:If detecting when exiting the exit instruction of hiden application display interface, by institute State hiden application display interface and jump to described application icon display interface.
Alternatively, described biological information is finger print information.
The terminal 800 of the embodiment of the present invention, if processor 860 is used for monitoring in application icon display interface first The touch operation of application icon corresponding to application, and within the persistent period of described touch operation, collect for identifying user The biological information of identity, then carry out verification process to the described biological information collecting;If the described life collecting Thing characteristic information is proved to be successful, then move application icon corresponding for the described first application from described application icon display interface To hiden application display interface, in described hiden application display interface, include the corresponding application icon of hiden application.This Bright embodiment after the biological information of user input is proved to be successful just can efficiently and easily by application icon from application icon Display interface movement is to hiden application display interface, and has higher safety, improves Consumer's Experience.
The terminal of the present invention is as being mobile phone, panel computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle-mounted computer etc. terminal.
Terminal 800 is capable of each process that in previous embodiment, terminal is realized, for avoiding repeating, no longer superfluous here State.
Those of ordinary skill in the art are it is to be appreciated that combine the list of each example of the embodiments described herein description Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually To be executed with hardware or software mode, the application-specific depending on technical scheme and design constraint.Professional and technical personnel Each specific application can be used different methods to realize described function, but this realization is it is not considered that exceed The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description, Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
It should be understood that disclosed apparatus and method in embodiment provided herein, can pass through other Mode is realized.For example, device embodiment described above is only schematically, for example, the division of described unit, it is only A kind of division of logic function, actual can have other dividing mode when realizing, for example multiple units or assembly can in conjunction with or Person is desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or unit or communication link Connect, can be electrical, mechanical or other forms.
The described unit illustrating as separating component can be or may not be physically separate, show as unit The part showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.The mesh to realize this embodiment scheme for some or all of unit therein can be selected according to the actual needs 's.
In addition, can be integrated in a processing unit in each functional unit in each embodiment of the present invention it is also possible to It is that unit is individually physically present it is also possible to two or more units are integrated in a unit.
If described function realized using in the form of SFU software functional unit and as independent production marketing or use when, permissible It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words Partly being embodied in the form of software product of part that prior art is contributed or this technical scheme, this meter Calculation machine software product is stored in a storage medium, including some instructions with so that a computer equipment (can be individual People's computer, server, or network equipment etc.) execution each embodiment methods described of the present invention all or part of step. And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
One of ordinary skill in the art will appreciate that realizing all or part of flow process in above-described embodiment method, it is permissible Related hardware is controlled to complete by computer program, described program can be stored in a computer read/write memory medium In, this program is upon execution, it may include as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The foregoing is only presently preferred embodiments of the present invention, not in order to limit the present invention, all essences in the present invention Within god and principle, any modification, equivalent substitution and improvement made etc., should be included within the scope of the present invention.

Claims (10)

1. a kind of method of hiden application, is applied to terminal it is characterised in that including:
If monitoring the touch operation for application icon corresponding to the first application in application icon display interface, and touch described Touch in the persistent period of operation, collect the biological information for identifying user identity, then to the described biology collecting Characteristic information carries out verification process;
If the described biological information collecting is proved to be successful, by application icon corresponding for the described first application from described Application icon display interface movement, to hiden application display interface, includes hiden application in described hiden application display interface Corresponding application icon.
If 2. the method for hiden application according to claim 1 is it is characterised in that believe in the described biological characteristic collecting Breath is proved to be successful, then answer application icon corresponding for the described first application to hiding from described application icon display interface movement After the step of display interface, the method for described hiden application also includes:
When terminal is in application icon display interface, monitors whether to receive and believe for the biological characteristic identifying user identity Breath;
If receiving described biological information, the described biological information receiving and default biological information are entered Row compares;
If the described biological information receiving is consistent with default biological information, by described application icon display interface Jump to described hiden application display interface.
If 3. the method for hiden application according to claim 2 is it is characterised in that the described described biological characteristic receiving Information is consistent with default biological information, then jump to described hiden application display interface by described application icon display interface Step after, methods described also includes:
If monitoring the scheduled operation for the second corresponding application icon of application in described hiden application display interface, by institute State application icon corresponding to the second application by described hiden application display interface movement to application icon display interface.
If 4. the method for hiden application according to claim 2 is it is characterised in that the described described biological characteristic receiving Information is consistent with default biological information, then jump to described hiden application display interface by described application icon display interface Step after, methods described also includes:
If detecting when exiting the exit instruction of hiden application display interface, jumped to described by described hiden application display interface Application icon display interface.
5. the method for hiden application according to claim 1 is it is characterised in that described biological information is believed for fingerprint Breath.
6. a kind of terminal is it is characterised in that include:
Authentication module, if for monitoring the touch behaviour for application icon corresponding to the first application in application icon display interface Make, and within the persistent period of described touch operation, collect the biological information for identifying user identity, then to collection To described biological information carry out verification process;
First mobile module, if the described biological information for collecting is proved to be successful, will be right for the described first application institute The application icon answered from described application icon display interface movement to hiden application display interface, described hiden application display interface In include the corresponding application icon of hiden application.
7. terminal according to claim 6 is it is characterised in that also include:
Monitoring module, for when terminal is in application icon display interface, monitoring whether to receive for identifying user identity Biological information;
Comparing module, if for receiving described biological information, by the described biological information receiving with default Biological information is compared;
First jump module, if the described biological information for receiving is consistent with default biological information, by institute State application icon display interface and jump to described hiden application display interface.
8. terminal according to claim 7 is it is characterised in that also include:
Second mobile module, if for monitoring for the second corresponding application icon of application in described hiden application display interface Scheduled operation, then by application icon corresponding for the described second application by described hiden application display interface movement to application drawing Mark display interface.
9. terminal according to claim 7 is it is characterised in that also include:
Second jump module, if during for the exit instruction exiting hiden application display interface is detected, by described hiden application Display interface jumps to described application icon display interface.
10. terminal according to claim 6 is it is characterised in that described biological information is finger print information.
CN201610928673.2A 2016-10-31 2016-10-31 A kind of method of hiden application and terminal Pending CN106484301A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610928673.2A CN106484301A (en) 2016-10-31 2016-10-31 A kind of method of hiden application and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610928673.2A CN106484301A (en) 2016-10-31 2016-10-31 A kind of method of hiden application and terminal

Publications (1)

Publication Number Publication Date
CN106484301A true CN106484301A (en) 2017-03-08

Family

ID=58271216

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610928673.2A Pending CN106484301A (en) 2016-10-31 2016-10-31 A kind of method of hiden application and terminal

Country Status (1)

Country Link
CN (1) CN106484301A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN107563158A (en) * 2017-08-30 2018-01-09 努比亚技术有限公司 Show hiden application figure calibration method, equipment and computer-readable recording medium
CN108171034A (en) * 2017-12-20 2018-06-15 维沃移动通信有限公司 A kind of method and terminal for protecting privacy
CN108845730A (en) * 2018-05-29 2018-11-20 维沃移动通信有限公司 A kind of object control method and terminal
CN110113486A (en) * 2019-04-28 2019-08-09 维沃移动通信有限公司 A kind of moving method and terminal of application icon
CN111492336A (en) * 2017-09-30 2020-08-04 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
EP3907635A1 (en) * 2017-03-29 2021-11-10 Shanghai Harvest Intelligence Technology Co., Ltd. Method and device for starting application based on fingerprint recognition

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164120A (en) * 2013-01-31 2013-06-19 广东欧珀移动通信有限公司 Hidden APK icon fast display method and mobile terminal
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
CN106126077A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 A kind of application program image target display control method and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103164120A (en) * 2013-01-31 2013-06-19 广东欧珀移动通信有限公司 Hidden APK icon fast display method and mobile terminal
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN105159542A (en) * 2015-09-21 2015-12-16 北京元心科技有限公司 Desktop icon display method and apparatus for intelligent device
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
CN106126077A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 A kind of application program image target display control method and mobile terminal

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3907635A1 (en) * 2017-03-29 2021-11-10 Shanghai Harvest Intelligence Technology Co., Ltd. Method and device for starting application based on fingerprint recognition
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application
CN107563158A (en) * 2017-08-30 2018-01-09 努比亚技术有限公司 Show hiden application figure calibration method, equipment and computer-readable recording medium
CN107563158B (en) * 2017-08-30 2020-08-21 契科基纳(南京)科技有限公司 Method, device and computer readable storage medium for displaying hidden application icon
CN111492336A (en) * 2017-09-30 2020-08-04 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
CN111492336B (en) * 2017-09-30 2024-02-13 深圳传音通讯有限公司 Hiding method of application icon, mobile terminal and computer readable storage medium
CN108171034A (en) * 2017-12-20 2018-06-15 维沃移动通信有限公司 A kind of method and terminal for protecting privacy
CN108845730A (en) * 2018-05-29 2018-11-20 维沃移动通信有限公司 A kind of object control method and terminal
CN110113486A (en) * 2019-04-28 2019-08-09 维沃移动通信有限公司 A kind of moving method and terminal of application icon

Similar Documents

Publication Publication Date Title
CN106484301A (en) A kind of method of hiden application and terminal
CN103631511B (en) Method and apparatus for constructing main screen in the terminal with touch screen
CN106126077B (en) Display control method of application program icons and mobile terminal
CN106681623B (en) A kind of sharing method and mobile terminal of screenshotss image
CN107450800A (en) A kind of task method to set up, mobile terminal and computer-readable recording medium
CN106383645A (en) Music playing control method and mobile terminal
CN106020613A (en) Operation method and mobile terminal for unread messages
CN106648416A (en) Method for starting application and mobile terminal
CN106843654A (en) The method and mobile terminal of a kind of terminal multi-job operation
CN106569656A (en) Operation control method for mobile terminal, and mobile terminal
CN106484303A (en) A kind of method preventing maloperation and electronic equipment
CN107526492A (en) The interface display method and mobile terminal of a kind of application program
CN106844067A (en) The processing method and mobile terminal of a kind of content
CN106445363A (en) Payment interface startup method and mobile terminal
CN106570372A (en) Starting method of application program and mobile terminal
CN106250026A (en) The startup method of the application program of a kind of mobile terminal and mobile terminal
CN106325753A (en) Payment interface display method and mobile terminal
CN105243345A (en) Accidental touch preventing method for electronic equipment and electronic equipment
CN106527906A (en) Picture capture method and mobile terminal
CN105827816A (en) Screen splitting method for terminal screen, and mobile terminal
CN106371739A (en) Application quick startup method and mobile terminal
CN106354374A (en) Icon moving method and mobile terminal
CN105824662A (en) Application program uninstalling method and electronic equipment
CN106598623A (en) Picture combination template generation method and mobile terminal
CN106959797A (en) The method to set up and mobile terminal of a kind of notice footmark

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170308

RJ01 Rejection of invention patent application after publication