CN106503506B - A kind of information display method and electronic equipment - Google Patents

A kind of information display method and electronic equipment Download PDF

Info

Publication number
CN106503506B
CN106503506B CN201610967452.6A CN201610967452A CN106503506B CN 106503506 B CN106503506 B CN 106503506B CN 201610967452 A CN201610967452 A CN 201610967452A CN 106503506 B CN106503506 B CN 106503506B
Authority
CN
China
Prior art keywords
application program
visitor
electronic equipment
creation
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610967452.6A
Other languages
Chinese (zh)
Other versions
CN106503506A (en
Inventor
韩桂敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610967452.6A priority Critical patent/CN106503506B/en
Publication of CN106503506A publication Critical patent/CN106503506A/en
Application granted granted Critical
Publication of CN106503506B publication Critical patent/CN106503506B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/106Enforcing content protection by specific content processing
    • G06F21/1066Hiding content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Abstract

The present invention provides a kind of information display method and electronic equipment, this method comprises: when detecting access request of the visitor to the first application program, creation and first application program the second application program with the same function;Start second application program, shows the login interface of second application program.Information display method provided by the invention, when visitor uses electronic equipment access application, since application program shows login interface on the screen, it is not easy to reveal the information of user, the privacy of information is preferably.

Description

A kind of information display method and electronic equipment
Technical field
The present invention relates to field of communication technology more particularly to a kind of information display method and electronic equipments.
Background technique
With the fast development of electronic equipment, electronic equipment is widely used for people.Electronic equipment can not only be used In communicating, taking pictures, social, acquisition information, storage information etc. can be also used for, electronic equipment has become people and obtains information Important channel.
In some scenes, such as when the party such as colleague, friend, it may be desirable to exchange electronic equipment or there are users Electronic equipment is lent into the case where other people use, for example, user by electronic equipment lend other people log-in instant communication softwares or other Application program etc.;In other scene, such as exists in office and electronic equipment is lent into the case where other people use etc.. During other people use consumer electronic devices, it is easy to cause the information leakage of consumer electronic devices.
As it can be seen that current electronic equipment has that the privacy of information is poor.
Summary of the invention
The embodiment of the present invention provides a kind of information display method and electronic equipment, is easy leakage to solve electronic device information The problem of.
In a first aspect, the embodiment of the invention provides a kind of information display methods, comprising:
When detecting access request of the visitor to the first application program, creation has identical with first application program Second application program of function;
Start second application program, shows the login interface of second application program.
Second aspect, the embodiment of the present invention also provide a kind of electronic equipment, comprising:
Creation module, for when detecting access request of the visitor to the first application program, creation to be answered with described first With program the second application program with the same function;
Display module shows the login interface of second application program for starting second application program.
In this way, in the embodiment of the present invention, when detecting access request of the visitor to the first application program, creation with it is described First application program the second application program with the same function;Start second application program, shows second application The login interface of program.In this way, when visitor uses electronic equipment access application, since application program is shown on the screen Login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without any creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of flow chart for information display method that first embodiment of the invention provides;
Fig. 2 is a kind of flow chart for information display method that second embodiment of the invention provides;
Fig. 3 is the structure chart for a kind of electronic equipment that third embodiment of the invention provides;
Fig. 4 is the structure chart for another electronic equipment that third embodiment of the invention provides;
Fig. 5 is the structure chart for another electronic equipment that third embodiment of the invention provides;
Fig. 6 is the structure chart for another electronic equipment that third embodiment of the invention provides;
Fig. 7 is the structure chart for another electronic equipment that third embodiment of the invention provides;
Fig. 8 is the structure chart for a kind of electronic equipment that fourth embodiment of the invention provides.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
First embodiment
It is a kind of flow chart of information display method provided in an embodiment of the present invention referring to Fig. 1, Fig. 1, as shown in Figure 1, packet Include following steps:
Step 101, when detecting access request of the visitor to the first application program, creation with first application program Second application program with the same function.
In some scenes, such as colleague, friend's party etc. be under scenes, and can have user electronic equipment is lent other people makes With the case where, be easy to allow other side to generate estrangement if the application program that user uses user at this time is set as hiding, if will not letter Breath, which is hidden, is easy to cause information leakage.Other people need to exit the account of user's original login when using application program login account. In the embodiment of the present invention, when detecting access request of the visitor to the first application program, create identical as the first application program Second application program of function is used for visitor, and when the second application program of guest access, login circle show on electronic equipment screen Face does not show logon account information, it is not easy to user information be caused to reveal.
In this step, above-mentioned visitor can be through the user after specific authentication, for example, by specifically solving The user of electronic equipment is accessed after lock cipher unlock, wherein the unlocking manner can be password unlock, be also possible to fingerprint unlock Etc..
The behaviour that above-mentioned visitor executes when can be the first application program of guest access to the access request of the first application program Make.For example, visitor needs access application A, it can be by visiting with the icon of application program on finger point touching screen Ask application program;Visitor can also execute double click operation by the shortcut to application program A come access application A etc. Deng.
Above-mentioned second application program can be attending to anything else for the first application program, can be what the first application program of duplication obtained Second application program, the second application program is identical with the function of the first application program, can also show on the screen identical fast Prompt mode.In this way, can achieve and access the identical experience of above-mentioned first application program when the second application program of guest access Sense.
Step 102, starting second application program, show the login interface of second application program.
After electronic equipment receives above-mentioned access request, start the second application program, the second application program is made to be in operation State, and show the login interface of the second application program.
Above-mentioned login interface can be the interface for logon account information, for example, showing input account on login interface With the region of password.Before user inputs account information, the information of account is not shown on login interface.In this way, when visitor visits The login interface that application program is shown when asking application program, on electronic equipment screen, the information without showing logon account, from And it can protect the privacy of user information.In addition, if user's login account in the first application program, visitor can be second Login account in application program, user do not have to exit listed account, and easy to operate, user experience is good.
The method of the embodiment of the present invention can be applied to electronic equipment, such as: mobile phone, computer, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), personal digital assistant (personal digital Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or wearable device (Wearable Device) etc..
The information display method of the embodiment of the present invention, when detecting access request of the visitor to the first application program, wound It builds and first application program the second application program with the same function;Start second application program, described in display The login interface of second application program.In this way, when visitor uses electronic equipment access application, since application program is being shielded Login interface is shown on curtain, it is not easy to reveal the information of user, the privacy of information is preferably.
Second embodiment
Referring to fig. 2, Fig. 2 is a kind of flow chart of information display method provided in an embodiment of the present invention, as shown in Fig. 2, packet Include following steps:
Step 201, the unlock instruction for receiving user's input judge that the unlock instruction is that preset visitor unlock refers to It enables.
In some scenes, such as colleague, friend's party etc. be under scenes, and can have user electronic equipment is lent other people makes With the case where, be easy to allow other side to generate estrangement if the application program that user uses user at this time is set as hiding, if will not letter Breath, which is hidden, is easy to cause information leakage.Other people need to exit the account of user's original login when using application program login account. When detecting access request of the visitor to the first application program, creation applies journey with the second of the first application program identical function Sequence is used for visitor, and the first application program and the second application program motion time do not create independent process, the first application program Operation can not influence the use of the second application program.
Electronic equipment when not in use, is in the lock state, and needs to be unlocked by inputting unlock instruction at this time.The solution Lock instruction can be password, such as number, letter, fingerprint etc., be also possible to other unlocking manners, for example, by specific Icon slides into predeterminated position etc..User can preset unlock instruction, and user, which inputs unlock instruction, can be user's solution The operation executed when lock.
Two unlock instructions can be set in user, and one of unlock instruction can be unlocked for user, for as differentiation, this Place is known as user's unlock instruction;Another unlock instruction is unlocked for visitor and is used, referred to herein as visitor's unlock instruction.Using not With unlock instruction be unlocked into electronic equipment when, information difference that electronic equipment show.For example, user uses electricity When sub- equipment, user's unlock instruction can be used and be unlocked;When user need electronic equipment lending other people in use, without When wishing that the information of user is checked by other people, visitor's unlock instruction can be used and be unlocked.
After electronic equipment receives unlock instruction, judge whether the instruction received is visitor's unlock instruction, can be passed through Judge the unlock instruction received and the whether same or similar degree of preset visitor's unlock instruction whether in default range. For example, preset visitor's unlock instruction is 1234, if the instruction received is 1234, judge the unlock instruction for visitor's solution Lock instruction.
It, can be by whether judging with the similarity of preset fingerprint in preset range when unlock instruction is unlocked by fingerprint It is interior to determine whether be visitor's unlock instruction.For example, the finger of the user's unlock instruction used for user can be set in user Line, if fingerprint and preset fingerprint that electronic equipment receives mismatch, i.e., when similarity is less than the threshold value of preset similarity, It is set as preset visitor's unlock instruction.
For example, user's unlock instruction is pre-set fingerprint, if the similarity of the fingerprint received and preset fingerprint It is 60%, presetting similarity size is 80%, then judges that the unlock instruction received is preset visitor's unlock instruction.Herein Only illustrate.
In this way, user can realize user's free switching access module by inputting different unlock instructions.
Step 202, when detecting access request of the visitor to the first application program, creation with first application program Second application program with the same function.
In this step, above-mentioned visitor can be through the user after specific authentication, for example, by specifically solving The user of electronic equipment is accessed after lock cipher unlock, which can be password unlock, be also possible to fingerprint unlock etc.. If judging, user identity is visitor's identity, can enter guest mode.
Wherein, the behaviour executed when above-mentioned visitor can be guest access application program to the access request of the first application program Make.For example, visitor needs access application A, it can be by visiting with the icon of application program on finger point touching screen Ask application program;Visitor can also execute double click operation by the shortcut to application program A come access application A etc. Deng.
Above-mentioned second application program can be attending to anything else for the first application program, can be what the first application program of duplication obtained Second application program, the second application program is identical with the function of the first application program, can also show on the screen identical fast Prompt mode.In this way, can achieve and access the identical experience of above-mentioned first application program when the second application program of guest access Sense.
Optionally, described when detecting access request of the visitor to the first application program, creation and first application Program the second application program with the same function, comprising:
When detecting access request of the visitor to the first application program, judges whether first application program is in and step on Record state;
If first application program is in logging state, create with the same function with first application program Second application program.
It is above-mentioned to judge whether the first application program is in logging state and can be whether judgement has account on an electronic device It is logged in the first application program, which can be instant messaging application program, can be other using journey Sequence.Above-mentioned account can be the corresponding account of account that user registers in first application program, for example, telephone number, i.e. When communication account etc..Electronic equipment can carry out judging whether to be logged in account according to the data in process list.
If the first application program is in logging state, the second application identical with the first function of application can be created Program, in this way, user does not need to exit listed account when visitor needs to access the first application program, visitor can be with Using the second application program login account, it is convenient to operate, and user experience is good.
In addition, that is, no account logs in the first application program if the first application program is not on logging state, visit Accessible first application program of visitor, and when accessing first application program, the interface display of the first application program is to log in boundary Face, it is not easy to user information be caused to be revealed.
In this embodiment, when the first application program of guest access, if the first application program is in logging state, The second application program identical with the first function of application is created, is used for visitor.In this way, being answered when visitor needs to access first When with program, user does not need to exit the account for having login, and the second application program login account can be used in visitor, operation Convenient, user experience is good.
After the creation with first application program the second application program with the same function, in the starting Before second application program, the method also includes:
It shows second application program, and hides first application program.
After creating above-mentioned second application program, the icon of second application program can be shown on electronic equipment screen Or shortcut, the icon of the first application program or shortcut are hidden, the account in the first application program can be normal Information is received, electronic equipment can not prompt notification message.In this way, due to the second application program and the first function of application phase Together, when guest access needs to access the first application program, visitor can be used the second application program and substitute the first application program, User experience is good, and the account information that user logs in the first application program is not easy to be leaked, the safety of information compared with It is good.
In this embodiment, it in this way, when other people use the electronic equipment of user, is applied due to concealing user first The icon of program, the account information that user logs in the first application program are also hidden, and can protect the login account of user The information at family is not leaked, and user experience can be improved by the second application program access application in other people.
Step 203, starting second application program, show the login interface of second application program.
After electronic equipment receives above-mentioned access request, start the second application program, the second application program is made to be in operation State, and show the login interface of the second application program.
Above-mentioned login interface can be the interface for logon account information, for example, showing input account on login interface With the region of password.Before user inputs account information, the information of account is not shown on login interface.In this way, when visitor visits The login interface that application program is shown when asking application program, on electronic equipment screen, the information without showing logon account, from And it can protect the privacy of user information.In addition, if user's login account in the first application program, visitor can be second Login account in application program, user do not have to exit the account for having login, and easy to operate, user experience is good.
Optionally, starting second application program, shows the login interface of second application program, comprising:
Start second application program, creates the process of second application program;
The login interface of second application program is shown using the process.
After electronic equipment starts the second application program, the process of the second application program is created, to make the second application program It is run using the process.Since the second application program is run using independent process, in this way, when the first application program is in When logging state, the second application program login account is can be used in visitor, without will be listed in the first application program Account exits, and user experience is good.Above-mentioned login interface can be the interface for logon account information, for example, login interface The region of upper display input account and password.
The process of second application program can be bound with the first application program, after binding, if deleting the first application Program, the second application program can also be deleted therewith.
In this embodiment, the process for creating the second application program shows the login of application program using the process Interface.In this way, the second application program login account can be used in visitor when the first application program is in logging state, without It needs to exit account listed in the first application program, and the account in the first application program can normally receive letter The privacy of breath, information is good, and it is convenient to operate, and user experience is good.
The information display method of the embodiment of the present invention receives the solution of user's input on the basis of Fig. 1 corresponding embodiment Lock instruction judges that the unlock instruction is preset visitor's unlock instruction, i.e., creates second after carrying out authentication to visitor Application program is used for visitor.In this way, the first application program logon account can be used when user uses electronic equipment, visit When visitor uses the electronic equipment, the second application program logon account can be used.Guest login account information has not influenced user The account information of login, and logon account information not will be leaked, the privacy of information is preferably.
3rd embodiment
It is the structure chart that the present invention implements a kind of electronic equipment provided referring to Fig. 3, Fig. 3, as shown in figure 3, electronic equipment 300 include: creation module 301 and the first display module 302, in which:
Creation module 301, for creating and described first when detecting access request of the visitor to the first application program Application program the second application program with the same function;
First display module 302 shows login circle of second application program for starting second application program Face.
Optionally, as shown in figure 4, the creation module 301 includes:
Judging unit 3011, for judging described first when detecting access request of the visitor to the first application program Whether application program is in logging state;
First creating unit 3012, if being in logging state, creation and described first for first application program Application program the second application program with the same function.
Optionally, as shown in figure 5, the electronic equipment 300 further include:
Second display module 303 for showing second application program, and hides first application program.
Optionally, as shown in fig. 6, first display module 302 includes:
Second creating unit 3021 creates the process of second application program for starting second application program;
Using unit 3022, for showing the login interface of second application program using the process.
Optionally, as shown in fig. 7, the electronic equipment 300 further include:
Receiving module 304 judges that the unlock instruction is preset visitor for receiving the unlock instruction of user's input Unlock instruction.
Electronic equipment 300 can be realized each process that electronic equipment is realized in the embodiment of the method for Fig. 1 to Fig. 2, to keep away Exempt to repeat, which is not described herein again.
The electronic equipment 300 of the embodiment of the present invention, when detecting access request of the visitor to the first application program, creation With first application program the second application program with the same function;Start second application program, shows described the The login interface of two application programs.In this way, when visitor uses electronic equipment access application, since application program is in screen Upper display login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Fourth embodiment
It is the structure chart that the present invention implements the electronic equipment provided referring to Fig. 8, Fig. 8, as shown in figure 8, electronic equipment 800 wraps It includes: at least one processor 801, memory 802, at least one network interface 804 and user interface 803.In electronic equipment 800 Various components be coupled by bus system 805.It is understood that bus system 805 is for realizing between these components Connection communication.Bus system 805 further includes power bus, control bus and status signal bus in addition in addition to including data/address bus. But for the sake of clear explanation, various buses are all designated as bus system 805 in fig. 8.
Wherein, user interface 803 may include display, keyboard or pointing device (for example, mouse, trace ball (track ball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 802 in the embodiment of the present invention can be volatile memory or nonvolatile memory, It or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable P ROM, EPROM), electrically erasable programmable read-only memory (Electrically EP ROM, EEPROM) Or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as outside Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous D RAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SD RAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SD RAM, ESDRAM), synchronous connect Connect dynamic random access memory (Synch link D RAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 802 of system and method described herein is intended to include but is not limited to these With the memory of any other suitable type.
In some embodiments, memory 802 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 8021 and application program 8022.
Wherein, operating system 8021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 8022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 8022.
In embodiments of the present invention, by the program or instruction of calling memory 802 to store, specifically, can be application The program or instruction stored in program 8022, processor 801 are used for:
When detecting access request of the visitor to the first application program, creation has identical with first application program Second application program of function;
Start second application program, shows the login interface of second application program.
The method that the embodiments of the present invention disclose can be applied in processor 801, or be realized by processor 801. Processor 801 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 801 or the instruction of software form.Above-mentioned processing Device 801 can be general processor, digital signal processor (Digital Signal Processor, DSP), dedicated integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor is also possible to any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 802, processor 801 reads the information in memory 802, completes the above method in conjunction with its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combination is to realize.For hardware realization, processing unit be may be implemented in one or more specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, processor 801 executes described when detecting access request of the visitor to the first application program, creation with First application program, second application program with the same function, comprising:
When detecting access request of the visitor to the first application program, judges whether first application program is in and step on Record state;
If first application program is in logging state, create with the same function with first application program Second application program.
Optionally, processor 801, which is executed, answers in the creation with first application program with the same function second After program, before starting second application program, the method also includes:
It shows second application program, and hides first application program.
Optionally, processor 801 executes starting second application program, shows stepping on for second application program Record interface, comprising:
Start second application program, creates the process of second application program;
The login interface of second application program is shown using the process.
Optionally, processor 801 execute it is described detect visitor to the access request of the first application program before, it is described Method further include:
The unlock instruction for receiving user's input judges that the unlock instruction is preset visitor's unlock instruction.
Electronic equipment 800 can be realized each process that electronic equipment is realized in previous embodiment, to avoid repeating, here It repeats no more.
The electronic equipment 800 of the embodiment of the present invention, when detecting access request of the visitor to the first application program, creation With first application program the second application program with the same function;Start second application program, shows described the The login interface of two application programs.In this way, when visitor uses electronic equipment access application, since application program is in screen Upper display login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of logical function partition, there may be another division manner in actual implementation, for example, multiple units or components can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or communication link of device or unit It connects, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.Some or all of unit therein can be selected to realize the embodiment of the present invention according to the actual needs Purpose.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, ROM, RAM, magnetic or disk etc. are various can store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (8)

1. a kind of information display method characterized by comprising
When detecting access request of the visitor to the first application program, creation has identical function with first application program The second application program;
Start second application program, shows the login interface of second application program;
Wherein, described when detecting access request of the visitor to the first application program, creation has with first application program There is the second application program of identical function, comprising:
When detecting access request of the visitor to the first application program, judge whether first application program is in login shape State;
If first application program is in logging state, creation and first application program with the same function second Application program;
It is described to judge whether first application program is in logging state, comprising:
Account is judged whether there is to log in first application program;
If first application program is in logging state, create with the same function with first application program Second application program, comprising:
Account logs in first application program if it exists, then creates with the same function with first application program Second application program.
2. the method as described in claim 1, which is characterized in that there is identical function with first application program in the creation After second application program of energy, before starting second application program, the method also includes:
It shows second application program, and hides first application program.
3. the method as described in claim 1, which is characterized in that starting second application program, display described second The login interface of application program, comprising:
Start second application program, creates the process of second application program;
The login interface of second application program is shown using the process.
4. the method as described in claim 1, which is characterized in that detect that visitor asks the access of the first application program described Before asking, the method also includes:
The unlock instruction for receiving user's input judges that the unlock instruction is preset visitor's unlock instruction.
5. a kind of electronic equipment characterized by comprising
Creation module, for when detecting access request of the visitor to the first application program, creation to apply journey with described first Sequence the second application program with the same function;
First display module shows the login interface of second application program for starting second application program;
Wherein, the creation module includes:
Judging unit, for judging first application program when detecting access request of the visitor to the first application program Whether logging state is in;
First creating unit, if being in logging state, creation and first application program for first application program Second application program with the same function;
The judging unit is specifically used for, and judges whether there is account and logs in first application program;
First creating unit is specifically used for, and account logs in first application program if it exists, then creation with it is described First application program the second application program with the same function.
6. electronic equipment as claimed in claim 5, which is characterized in that the electronic equipment further include:
Second display module for showing second application program, and hides first application program.
7. electronic equipment as claimed in claim 5, which is characterized in that first display module includes:
Second creating unit creates the process of second application program for starting second application program;
Using unit, for showing the login interface of second application program using the process.
8. electronic equipment as claimed in claim 5, which is characterized in that the electronic equipment further include:
Receiving module judges that the unlock instruction is that preset visitor unlock refers to for receiving the unlock instruction of user's input It enables.
CN201610967452.6A 2016-10-31 2016-10-31 A kind of information display method and electronic equipment Active CN106503506B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610967452.6A CN106503506B (en) 2016-10-31 2016-10-31 A kind of information display method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610967452.6A CN106503506B (en) 2016-10-31 2016-10-31 A kind of information display method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106503506A CN106503506A (en) 2017-03-15
CN106503506B true CN106503506B (en) 2019-08-20

Family

ID=58321859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610967452.6A Active CN106503506B (en) 2016-10-31 2016-10-31 A kind of information display method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106503506B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111344675B (en) * 2017-09-13 2023-10-13 深圳传音通讯有限公司 Virtual system operation method and virtual system based on intelligent terminal
US10698701B1 (en) * 2019-06-01 2020-06-30 Apple Inc. User interface for accessing an account
US11601419B2 (en) 2020-06-21 2023-03-07 Apple Inc. User interfaces for accessing an account
CN112070946A (en) * 2020-09-02 2020-12-11 平安信托有限责任公司 Gate-based social application program control method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103824004A (en) * 2014-02-26 2014-05-28 可牛网络技术(北京)有限公司 Application program protection method and device
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal
CN105824544A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method for starting application program and terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224322B (en) * 2015-09-25 2018-10-16 维沃移动通信有限公司 A kind of attend to anything else method and the terminal of application program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104102882A (en) * 2013-04-12 2014-10-15 腾讯科技(深圳)有限公司 Protection method and device for privacy data of application program
CN103824004A (en) * 2014-02-26 2014-05-28 可牛网络技术(北京)有限公司 Application program protection method and device
CN104992091A (en) * 2015-06-05 2015-10-21 小米科技有限责任公司 Method and apparatus for accessing terminal end
CN105824544A (en) * 2015-11-30 2016-08-03 南京步步高通信科技有限公司 Method for starting application program and terminal
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal

Also Published As

Publication number Publication date
CN106503506A (en) 2017-03-15

Similar Documents

Publication Publication Date Title
CN106503506B (en) A kind of information display method and electronic equipment
Bauer et al. Device-enabled authorization in the Grey system
CN108647508B (en) Method and system for automatic association of authentication credentials with biometric information
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN105701420B (en) A kind of management method and terminal of user data
CN104516777A (en) User interface management method and system
CN106372470B (en) A kind of method and mobile terminal for reminding input password
CN107864144A (en) Obtain method and device, computer installation and the storage medium of dynamic password
CN106462713B (en) The interface display method and terminal of terminal
CN106843655B (en) A kind of information display method and electronic equipment
CN105827816B (en) A kind of the split screen method and mobile terminal of terminal screen
CN105117629A (en) Electronic device control method and apparatus, and electronic device
CN106203011A (en) The method and apparatus entering operating system desktop
CN105956431A (en) Application protection processing method and mobile terminal
CN107103224A (en) A kind of unlocking method and mobile terminal
CN106203174A (en) Application information processing method and device and electronic equipment
CN107679381B (en) A kind of notification information processing method and mobile terminal
CN105099674B (en) User authen method, authentication device and terminal
CN108647510A (en) Application program access method and device
US20180268149A1 (en) Dynamic security policies
CN107506198A (en) The display methods and mobile terminal of a kind of mobile terminal
CN106060050B (en) Auth method and terminal device
US20170147809A1 (en) Enhancing security of a mobile device using pre-authentication sequences
CN106407761A (en) An unlocking method and unlocking device
CN106778344B (en) A kind of data permission control method and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant