CN107395880B - Information display method and device and terminal - Google Patents

Information display method and device and terminal Download PDF

Info

Publication number
CN107395880B
CN107395880B CN201710573695.6A CN201710573695A CN107395880B CN 107395880 B CN107395880 B CN 107395880B CN 201710573695 A CN201710573695 A CN 201710573695A CN 107395880 B CN107395880 B CN 107395880B
Authority
CN
China
Prior art keywords
application program
hidden
working mode
information
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710573695.6A
Other languages
Chinese (zh)
Other versions
CN107395880A (en
Inventor
王斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710573695.6A priority Critical patent/CN107395880B/en
Publication of CN107395880A publication Critical patent/CN107395880A/en
Application granted granted Critical
Publication of CN107395880B publication Critical patent/CN107395880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72406User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an information display method, an information display device and a terminal, and belongs to the field of information security. The method comprises the following steps: when the application program is in a foreground running state, acquiring a current working mode of the application program, wherein the application program comprises a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed; if the current working mode of the application program is the first working mode, hiding information in the application program; and if the current working mode of the application program is the second working mode, displaying the hidden information in the application program. The embodiment of the invention solves the problems that after the application lock is set for the application, the flexibility of the information display mode is poor, and the personal privacy information can still be leaked.

Description

Information display method and device and terminal
Technical Field
The embodiment of the invention relates to the field of information security, in particular to an information display method, an information display device and a terminal.
Background
The application programs with rich types in the intelligent terminal bring convenience to daily life of users and also bring hidden danger of personal privacy information leakage.
In the related art, in order to avoid disclosure of personal privacy information, a user may set an application lock for an application program and set a corresponding unlock password for the application lock, and when the application lock is in an unlocked state, the user cannot use the application program and information in the application program cannot be displayed. During the starting process of the application program, a user needs to input a password in the application lock unlocking interface to unlock the application lock. When the password input by the user is consistent with the opening password, the application lock is opened, the user can normally use the application program, and the information in the application program is normally displayed.
However, setting an application lock for an application only protects the entire application, and when the application lock is not unlocked, the entire application cannot be used. Once the application lock is unlocked, all information in the application is displayed normally. When other people borrow the intelligent terminal from the user and need use the application program provided with the application lock, the user can check the personal privacy information in the application program after opening the application lock through the password, so the flexibility of an information display mode in the related technology is poor, and the leakage of the personal privacy information can be still caused.
Disclosure of Invention
In order to solve the technical problem, embodiments of the present invention provide an information display method, an information display device, and a terminal. The technical scheme is as follows:
according to a first aspect of embodiments of the present invention, there is provided an information display method including:
when the application program is in a foreground running state, acquiring a current working mode of the application program, wherein the application program comprises a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed;
if the current working mode of the application program is the first working mode, hiding information in the application program;
and if the current working mode of the application program is the second working mode, displaying the hidden information in the application program.
According to a second aspect of the embodiments of the present invention, there is provided an information display apparatus including:
the device comprises a first acquisition module, a second acquisition module and a display module, wherein the first acquisition module is used for acquiring the current working mode of an application program when the application program is in a foreground running state, the application program comprises a first working mode and a second working mode, the hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed;
the hidden module is used for hiding the hidden information in the application program when the current working mode of the application program is a first working mode;
and the display module is used for displaying the hidden information in the application program when the current working mode of the application program is the second working mode.
According to a third aspect of embodiments of the present invention, there is provided a terminal comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the information display method according to the first aspect.
According to a fourth aspect of embodiments of the present invention, there is provided a computer-readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by the processor to implement the information display method according to the first aspect.
In the embodiment of the invention, the application program comprises a first working mode and a second working mode, when the application program runs in a foreground and is in the first working mode, the application program hides the hidden information corresponding to the preset hidden target, and ensures that the hidden information cannot be checked even if other people use the application program, so that the leakage of personal privacy information is avoided, and the problem that the leakage of the personal privacy information in the application can still be caused by setting an application lock for the application in the related technology is solved; when the application program runs in the foreground and is in the second working mode, the application program displays the hidden information, a user can operate the personal privacy information conveniently, and the flexibility of information display is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 illustrates a method flow diagram of a method of displaying information provided by one embodiment of the present invention;
FIG. 2 is a schematic diagram of an embodiment of an information display method according to the present invention;
FIG. 3 is a flow chart of a method of displaying information according to another embodiment of the present invention;
FIG. 4 is a schematic interface diagram illustrating a mode-switching password setup process in the information display method shown in FIG. 3;
FIG. 5 is a schematic interface diagram illustrating a hidden object setup process in the information display method shown in FIG. 3;
FIG. 6 is an interface schematic for a normal mode and a first operating mode;
FIG. 7 is a schematic diagram of an interface for switching from a first operating mode to a second operating mode in the information display method shown in FIG. 3;
FIG. 8 is a flow chart of a method of displaying information provided by another embodiment of the present invention;
FIG. 9 is a flow chart of a method of displaying information provided by another embodiment of the present invention;
fig. 10 is a block diagram showing the configuration of an information display apparatus according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Reference herein to "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
In the related art, in order to avoid disclosure of personal privacy information in an application program, for example, to avoid others from looking up chat records in a social application program, a user may set a corresponding application lock for the application program, and each time the application program is opened, the user needs to input a password to open the application lock.
After an application lock is set for an application program, the application program comprises a normal use state and a use prohibition state, in the normal use state, a user can normally use and check all information in the application program, and in the use prohibition state, the user cannot use the application program, namely all information in the application program cannot be checked. Obviously, setting an application lock for an application program can only realize the protection of the personal privacy information of a coarse granularity (aiming at an application layer), and when other people need to use the application provided with the application lock, after the user opens the application lock through a password, other people can check the personal privacy information in the application, and the privacy protection in a real sense cannot be realized due to the personal privacy security loophole.
In the embodiment of the invention, the first working mode for hiding the personal privacy information and the second working mode for displaying the personal privacy information are set for the application program, and the flexible switching between the two working modes is realized through the interaction between the application program layer and the terminal system layer, so that the personal privacy information protection with fine granularity (aiming at the specified information in the application program) is realized, and the personal privacy information of the user can not be checked even though other people use the application program in various use scenes.
The information display method provided by each embodiment of the invention is applied to an application program installed in an intelligent terminal, the intelligent terminal is a terminal such as a smart phone, a tablet computer, an electronic book reader and a personal computer, the application program is a social application program (including a microblog application program, an instant messaging application program and the like), a web browsing application program (or called a web browser) or a video playing application program and the like which support the function of hiding and displaying personal privacy information, and meanwhile, the application program also has the function of monitoring other application programs in a system. The following description will be made by using exemplary embodiments.
Referring to fig. 1, a flowchart of a method of displaying information according to an embodiment of the present invention is shown, where the embodiment takes the information displaying method as an example for a terminal to describe, the method includes:
step 101, when the application program is in a foreground running state, obtaining a current working mode of the application program, wherein the application program comprises a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed.
In the embodiment of the invention, the application program comprises a first working mode and a second working mode, and in the first working mode, hidden information corresponding to a hidden target appointed by a user is hidden in the application program; in the second working mode, the hidden information corresponding to the hidden target designated by the user is displayed in the application program.
In a possible implementation manner, when the application is in foreground running filling, for example, when the application is started, or the application is switched from a background running state to a foreground running state, or the terminal wakes up from a screen locking state and the application is in the foreground running state (i.e., when the terminal needs to display the content in the application in the foreground), the application acquires the current working mode.
Optionally, when the application program is started, or the background running state is converted into the foreground running state, or the terminal is awakened from the screen locking state and the application program is in the foreground running state, the application program is in the first working mode by default.
And 102, if the current working mode of the application program is the first working mode, hiding information in the application program.
When the application program is detected to be in the first working mode currently, in order to avoid that the personal privacy information in the application program is seen by others, the application program carries out hiding processing on hidden information corresponding to a hidden target preset by a user. After the hiding process is performed, the user can only view unset non-hidden information in the application program interface.
For different types of application programs, hidden targets set by users are different, and correspondingly, hidden information corresponding to the hidden targets is also different. In one possible implementation, when the application is a social application, the hidden target set by the user may be a target contact, and accordingly, the hidden information corresponding to the target contact may be at least one of contact information of the target contact, historical communication information (which may be specific to communication information with the target contact within a specified time period), or social information. In the first operating mode, the user cannot view information related to the target contact in the application program interface.
Optionally, the hidden information corresponding to the target contact further includes push information. And when the application program is a social application program, the social application program monitors the push information through the monitoring process in the first working mode, stops displaying the push information when the push information is the information sent by the target contact person, and displays the push information when the application program is switched to the second working mode.
In another possible implementation, when the application is a web browsing application, the hidden target set by the user may be a target web page, and accordingly, the hidden information corresponding to the target web page may include a favorite tag and a historical browsing history of the target web page, and even include a favorite tag and a historical browsing history of a next-level web page (i.e., a child web page) corresponding to the target web page. In the first mode of operation, the user cannot view access information associated with the target web page.
In other possible embodiments, when the application is an album application, the hidden target set by the user may be a designated album set, and accordingly, each photo included in the designated album set is hidden information. In the first mode of operation, the user cannot view the designated album set.
Because only part of the private information is hidden in the first working mode, and the functions of the application program are not limited, other users can still use the application program normally, and the private information is ensured not to be leaked.
And 103, if the current working mode of the application program is the second working mode, displaying the hidden information in the application program.
Besides the first working mode, the application program also comprises a second working mode, and when the application program is in a foreground state and in the second working mode, the application program displays hidden information hidden in the first working mode, so that a user can view and operate personal privacy information.
In the embodiment of the invention, the application program can be flexibly switched between the first working state and the second working state. In a possible implementation manner, a mode switching password for switching from the first operating mode to the second operating mode is preset by the user, and the application program obtains the password input by the user through the password input interface in the first operating mode, and detects whether the password input by the user is the same as the mode switching password. And when the input password is the same as the mode switching password, the application program is switched from the first working mode to the second working mode, and the hidden information hidden in the first working mode is displayed in the second working mode.
In summary, in the embodiment of the present invention, the application includes two working modes, namely, a first working mode and a second working mode, and when the application runs in the foreground and is in the first working mode, the application hides the hidden information corresponding to the preset hidden target, so as to ensure that the hidden information cannot be viewed even when other people use the application, thereby preventing the leakage of the personal privacy information, and solving the problem that the setting of the application lock for the application still causes the leakage of the personal privacy information in the application in the related art; when the application program runs in the foreground and is in the second working mode, the application program displays the hidden information, a user can operate the personal privacy information conveniently, and the flexibility of information display is improved.
In order to realize transparent and non-inductive switching between the first working mode and the second working mode, in the embodiment of the invention, the application program monitors the terminal system layer through the monitoring process in the running state, and automatically switches the working modes according to the monitoring result and the preset working mode switching logic.
Taking an application as a social application as an example, as shown in fig. 2, the application obtains a target contact to be hidden, which is screened from a contact list by a user in advance, and stores a mode switching password (which is switched from a first operating mode to a second operating mode) set by the user (in a mode switching password storage module). When the application program is in a first working mode, the application program monitors a character string input in a preset application program in the system through a password input monitoring module, detects whether the character string is the same as a mode switching password through a password verification module, and if the character string is the same as the mode switching password, the application program is switched from the first working mode to a second working mode and displays social information, historical communication information and contact information of a target contact; when the application program is in the second working mode, the application program monitors the system layer through the state change monitoring module to acquire the state change of the terminal and the application program, so that the second working state is switched into the first working state according to the state change condition and the working mode switching logic stored in the mode switching module, the social information, the historical communication information and the contact information of the target contact are hidden, and the transparent and unaware working mode switching is realized. The following description will be made by using exemplary embodiments.
Referring to fig. 3, a flowchart of a method for displaying information according to another embodiment of the present invention is shown, where the information displaying method is applied to a terminal and an application installed in the terminal is a social application, for example, the method includes:
step 301, obtaining an input mode switching password through a mode switching password setting interface, where the mode switching password is a password for switching a working mode.
In one possible implementation manner, when the social application program runs for the first time, a mode switching password setting interface is displayed, and a mode switching password input in the interface by a user is received, wherein the mode switching password is a password for triggering the first working mode to be switched to the second working mode. Optionally, the number of bits of the mode-switching password is default for the application program or is customized by the user.
Optionally, the social application in the second working mode provides a mode-switching password setting entry (the entry is not provided in the application in the first working mode), and through the entry, the user may modify the originally set mode-switching password in the mode-switching password setting interface.
Illustratively, as shown in fig. 4, when the social application runs for the first time, the mode-switching password setting interface 41 is displayed, and a mode-switching password input by the user is received, and when a click signal to the completion button 411 is received, it is determined that the password setting is completed, and the mode-switching password is stored.
It should be noted that, if the user does not set the mode switching password when the application program is run for the first time, for example, when the application program detects that the user clicks the cancel button 412 in the mode switching password setting interface 41, the application program will subsequently operate in the normal mode, and in the normal mode, all information in the application program is normally displayed.
Step 302, a hidden target setting signal is received through a contact list.
Further, the user selects a hidden target (i.e. sets personal privacy information to be hidden) according to the own requirement, and correspondingly, the application program in the terminal receives a hidden target setting signal triggered by the user.
The hidden target set by the user is different for different types of applications. In this embodiment, when the application is a social application, the hidden target is a target contact, and the hidden information corresponding to the hidden target includes: at least one of contact information of the target contact, historical communication information with the target contact, and social information of the target contact.
In a possible embodiment, after detecting that the mode switching password setting is completed, the application further displays a contact list and instructs the user to select a target contact to be hidden, and accordingly, the application receives a hidden target setting signal (i.e. a selection signal triggered by the user) through the contact list.
Illustratively, as shown in fig. 5, the application program displays a contact list 42, each contact in the contact list 42 corresponds to a respective selection control 421, and when the user clicks the selection control 421 corresponding to the contact, the application program receives a hidden target setting signal, where the hidden target setting signal indicates the target contact.
In other possible embodiments, the application may also receive a hidden target setting signal, i.e., indicating historical communication information with the target contact, via a session list (a list generated when a session is conducted with a different contact).
Step 303, determining the target contact person indicated by the hidden target setting signal as a preset hidden target.
Further, the application program determines the target contact person indicated by the hidden target setting signal as a preset hidden target, and sets a corresponding identifier for the preset hidden target. For example, the application program sets a preset identification field corresponding to each target contact as "secret".
Illustratively, as shown in fig. 5, when the user finishes selecting and clicking the determination button 422, the application program determines the target contacts "zhang three" and "lie four" as the preset hidden targets.
Through the steps 301 to 303, the application program completes the mode switching password and the hidden contact setting (without executing each time), and in the subsequent use process, the display process of the hidden contact can be controlled through the mode switching password. It should be noted that the mode switching password and the hidden contact setting may be completed when the application program is run for the first time, or may be completed during the use of the application program, which is not limited in the embodiment of the present invention.
And step 304, when the application program is in a foreground running state, acquiring the current working mode of the application program.
The implementation of this step is similar to step 101, and this embodiment is not described herein again.
In a possible implementation manner, when the terminal needs to perform foreground display on the application, the current working mode of the application is obtained.
Step 305, if the current working mode of the application program is the first working mode, determining at least one of the contact information, the historical communication information and the social information corresponding to the target contact as hidden information.
When the application program is in the first working mode, the application program further determines hidden information corresponding to a preset hidden target, so that the hidden information is hidden.
In one possible implementation manner, the application program acquires a contact (i.e., a target contact) with a preset identification field set as "secret", and further determines at least one of contact information, historical communication information and social information of the target contact as hidden information, wherein the types of the hidden information corresponding to different target contacts are the same or different.
Optionally, in the process of setting the preset hidden target, the user sets part or all of the information corresponding to the preset hidden target as the hidden information according to the requirement.
For example, the user sets the historical communication information and the social information corresponding to the target contact person "zhang san" as the hidden information, and sets the historical communication information corresponding to the target contact person "lisi san" as the hidden information.
Optionally, in the process of setting the preset hidden target, the user sets information corresponding to the preset hidden target in the preset time period as the hidden information according to the requirement.
For example, the user sets the historical communication information of the target contact "Zhang three" in the period of 2017.6.2710: 20:00-10:30:00 as the hidden information.
Optionally, in the process of setting the preset hidden target, the user determines, as the hidden information, a predetermined type of information corresponding to the preset hidden target according to a requirement, where the predetermined type is at least one of a picture, a voice, a video, or a text.
For example, the user sets the picture in the historical communication information of the target contact "zhang san" as the hidden information.
Step 306, hiding the hidden information.
After the hidden information corresponding to each target contact is determined, the application program hides the hidden information, so that the hidden information is not displayed in an application program interface.
Optionally, when the hidden information is the contact information of the target contact, after the hiding process, the contact information is no longer displayed in the contact list of the application program; when the hidden information is the historical communication information of the target contact, after the hidden processing, the session record of the target contact is not displayed in the session list of the application program; when the hidden information is the social information of the target contact, after the hidden processing, the social information of the target contact is no longer displayed in a social sharing interface (used for displaying information such as characters, pictures, voice and video published by each contact) of the application.
Schematically, as shown in fig. 6, in the normal mode (all information is normally displayed), session records of "mystery person", "company mailbox notification", "XX bank" and "colleague" are displayed in the session interface 43 of the application program, and contacts of "mystery person", "company mailbox notification", "XX bank" and "colleague" are displayed in the contact interface 44; when the user sets the contacts "mystery person", "corporate mailbox notification" and "XX bank" as preset hidden targets and the application is in the first working mode, only the session record with "colleague" is displayed in the session interface 43, and only the contact "colleague" is displayed in the contact interface 44.
Obviously, in the first working mode, when other people normally use all functions in the application program, hidden contents preset by the user cannot be viewed, so that the personal privacy safety of the user is ensured.
Step 307, the input password is acquired.
In order to realize switching from the first working mode to the second working mode, the application program acquires the password input by the user in the first working mode and detects whether the input password is the same as a preset mode switching password. Regarding the manner of obtaining the password, in one possible implementation, the present step includes the following steps.
Monitoring a character string input in a preset application program, wherein the preset application program is a dialing application program and/or a calculator application program.
When a user wants to switch an application program from a first working mode to a second working mode, and thus view operation hidden contents in the second working mode, the user needs to input a mode switching password.
In the prior art, passwords are all input explicitly, that is, a mode switching button is displayed in an application program interface, when it is detected that the mode switching button is clicked, a password input interface is displayed in the application program, and a password input by a user is received (the password is input in the application program). If the switching from the first working mode to the second working mode is realized by adopting the password input mode, other people know that other working modes exist in the application program according to the mode switching button, and therefore the hidden danger of password cracking is brought.
In the embodiment of the invention, the password is input in an implicit mode. When the application program is in the first working mode, the application program monitors a preset application program in the terminal (the preset application program needs to have monitoring authority), and therefore the character string input in the preset application program is obtained.
In one possible embodiment, when the application program is in the first working mode and detects that the dialing application program and/or the calculator application program is in the foreground running state, the application program enables a monitoring process to monitor the character string input in the dialing application program and/or the calculator application program.
Illustratively, as shown in fig. 7, in the first operation mode, only the contact "colleague" is displayed in the contact interface 44 of the social application, and when the user switches the social application to the background operation and opens the dialing application, the social application monitors the character string input by the user in the dialing interface 451.
And secondly, when the character string input in the preset application program is monitored, taking the character string as the input password.
When the character string input in the preset application program is monitored, the application program uses the character string as the password input by the user,
illustratively, as shown in FIG. 7, the application takes the string "123456" as the input password.
And 308, when the input password is the same as the mode switching password, switching the current working mode of the application program to a second working mode, and displaying the hidden information in the application program.
In a possible implementation manner, a password detection process is started in an application program, whether a character string input in a preset application program is the same as a mode switching password or not is detected, and if the character string input in the preset application program is the same as the mode switching password, the social application program further performs working mode switching; if the two are different, the social application program instructs the preset application program to execute corresponding operation on the character string. For example, when the preset application is a dialing application, the social application instructs the dialing application to perform a call operation; when the preset application program is a calculator application program, the social application program instructs the calculator application program to perform calculation operation.
Illustratively, as shown in fig. 7, when the user enters a character string "123456" in the dialing interface 45 and clicks the dial button 451, the social application detects whether the character string is the same as the mode switch password.
Optionally, when the character string input in the preset application is the same as the mode switching password, the preset application jumps to the social contact application, and the social contact application is automatically set to the second working mode. In the second working mode, the social application program displays the hidden content so that the user can conveniently view and operate the hidden content.
Optionally, in order to distinguish the hidden content from the non-hidden content, the social application performs special identification on the hidden content in the interface, such as adding a corner mark to the hidden content, or performing special display (highlighting, bolding, and enlarging) on the hidden content.
Illustratively, as shown in fig. 7, after the second operation mode is performed, compared to the first operation mode, the originally hidden contacts "mystery", "company mailbox notification" and "XX bank" are also displayed in the contact interface of the application, and the originally hidden contacts include an "S" corner mark 441.
It should be noted that, in the second working mode, the social application program has the function of setting the mode switching password and the hidden target, that is, the user can change the mode switching password and the hidden target in the social application program.
Through the above steps 307 and 308, the social application program realizes transparent switching from the first working mode to the second working mode, and when using the social application program in the first working mode, others do not perceive that the social application program has the second working mode.
Step 309, deleting the input record of the character string in the preset application program.
In order to avoid leakage of a mode switching password input in a preset application program, after the social application program completes mode switching, a deleting instruction is sent to the preset application program to instruct the preset application program to delete an input record of a character string.
For example, when the preset application is a dialing application, the social application instructs the dialing application to delete the dialing record corresponding to the character string.
And step 310, when the current working mode of the application program is the second working mode and the mode switching condition is met, switching the current working mode of the application program to the first working mode and hiding the hidden information.
Different from the situation that a mode switching password needs to be input when the first working mode is switched to the second working mode, in order to realize the non-sensing switching from the second working mode to the first working mode, when the application program is currently in the second working mode, the social application program detects whether a second mode switching condition is met. Optionally, the detecting whether the mode switching condition is satisfied includes the following several possible embodiments.
Firstly, detecting whether a screen locking instruction is acquired; and when the screen locking instruction is acquired, determining that a second mode switching condition is met.
In a possible implementation manner, when the social application program is in a foreground or background running state and it is detected that the terminal receives a screen locking instruction, the social application program determines that the second mode switching condition is met, and further switches to the first working mode.
In a use scenario, when other people borrow the terminal from the user and need to use the social application program containing the personal privacy, the user only needs to lock the screen of the terminal, the social application program is automatically switched to the first working mode, and after the terminal is subsequently unlocked, the social application program is still in the first working mode, so that the personal privacy of the user is prevented from being revealed.
Secondly, detecting whether an application program exit instruction is acquired; and when the application program exit instruction is acquired, determining that a second mode switching condition is met.
In a possible implementation manner, when the social application program is in a foreground or background running state and an application program exit instruction is received, the social application program determines that the second mode switching condition is met, firstly switches to the first working mode, and then exits from the application program (the terminal kills the application program process).
In a use scenario, when other people borrow the terminal from the user and need to use the social application program containing the personal privacy, the user only needs to quit the social application program, the social application program is automatically switched to the first working mode, and after the social application program is restarted subsequently, the social application program is still in the first working mode, so that the personal privacy of the user is prevented from being revealed.
Thirdly, detecting whether the application program is switched from a foreground operation mode to a background operation mode; and when the application program is switched from the foreground operation mode to the background operation mode and reaches the preset duration, determining that a second mode switching condition is met.
In a possible implementation manner, when the social application program is switched from the foreground running state to the background running state, and the duration of entering the background running state reaches a preset duration (for example, 60s), the social application program determines that the second mode switching condition is met, and switches to the first working mode, so that inconvenience brought to the use of the user by frequent switching of the working modes of the social application program when the user switches to use the application program is avoided. When the social application program is subsequently switched from the background running state to the foreground running state, the first working mode is still kept, and the personal privacy of the user is prevented from being revealed.
And when the mode switching condition is detected to be met, the application program switches the current working mode into the first working mode and hides the hidden information.
In summary, in the embodiment of the present invention, the application includes two working modes, namely, a first working mode and a second working mode, and when the application runs in the foreground and is in the first working mode, the application hides the hidden information corresponding to the preset hidden target, so as to ensure that the hidden information cannot be viewed even when other people use the application, thereby preventing the leakage of the personal privacy information, and solving the problem that the setting of the application lock for the application still causes the leakage of the personal privacy information in the application in the related art; when the application program runs in the foreground and is in the second working mode, the application program displays the hidden information, a user can operate the personal privacy information conveniently, and the flexibility of information display is improved.
In this embodiment, the application program monitors the character string input in the dialing application program and/or the calculator application program, and automatically switches to the second working mode when the input character string is the same as the mode switching password, thereby avoiding setting a password entry interface in the application program, and improving the secrecy of the mode switching password entry process.
In this embodiment, after the application completes mode switching according to the character string input in the preset application, the application instructs the preset application to delete the input record of the character string, thereby avoiding leakage of the mode switching password and ensuring the security of the mode switching password.
In this embodiment, when the application is in the second working mode, the application or the terminal state change is detected, and the first working mode is automatically switched to, so that the non-sensing switching between the working modes is realized, and the mode switching efficiency is improved.
Since the mode switching password may be entered by the dialing application, in order to avoid that the preset mode switching password is the same as the contact information, which results in that the dialing cannot be completed, in a possible embodiment, on the basis of fig. 3, as shown in fig. 8, the above step 301 further includes the following steps:
step 311, detecting whether the character string corresponding to the mode switching password belongs to a preset character string set.
After the mode switching password input by the user is obtained in step 301, the application further detects whether the character string corresponding to the mode switching password belongs to a preset character string set, and optionally, the preset character string set includes at least one of a telephone number (including a short number set by the user), a public service telephone number, or a terminal engineering mode instruction set in the address book. The public service class telephone number is a telephone number such as 110, 120, 119, and the terminal engineering mode instruction set includes at least one instruction (such as #6130 #) for entering an engineering mode.
Optionally, the application has a right to read the address book in the terminal. After reading the address book, the application program detects whether a number which is the same as the character string corresponding to the mode switching password exists in the address book, if not, the application program determines to complete the password setting, and step 314 is executed; if the password exists, in order to avoid conflict, the application program displays preset prompt information and prompts the user to input the password again.
In step 312, if the string corresponding to the mode switching password does not belong to the preset string set, it is determined that the mode switching password setting is completed.
In this embodiment, the application program detects the password input by the user at the mode switching password setting stage, thereby effectively avoiding the mode switching password set by the user from conflicting with the number in the address book.
In another possible implementation, when the information display method is applied to a web browsing application program, on the basis of fig. 3, as shown in fig. 9, the above steps 302 and 303 may be replaced by steps 313 and 314, and the step 305 may be replaced by step 315.
Step 313, receiving a hidden target setting signal through the web page list.
In a possible embodiment, the web browsing application displays a web page list, where the web page list includes websites corresponding to historically visited web pages and instructs the user to select a target web page to be hidden, and accordingly, the web browsing application receives a hidden target setting signal (i.e., a selection signal triggered by the user) through the contact list.
In other possible embodiments, the web browsing application displays a website entry interface and receives a website of the target web page manually input by the user.
In step 314, the target webpage indicated by the hidden target setting signal is determined as a preset hidden target.
For example, the web browsing application determines the target web page with address www.xxx.com as the preset hidden target.
Step 315, if the current working mode of the application program is the first working mode, determining the collection tag and the historical browsing record of the target webpage and the collection tag and the historical browsing record of the sub-webpage corresponding to the target webpage as hidden information.
Because the target webpage to be hidden may also have a next-level sub-webpage, in order to improve the security of personal privacy, the web browsing application program determines the collection tag and the historical browsing record of the current target webpage as hidden information, and determines the collection tag and the historical browsing record of the sub-webpage corresponding to the target webpage as hidden information. And the sub-web page corresponding to the target web page and the target web page have the same domain name prefix.
Illustratively, when the web address of the target web page is www.xxx.com, the historical browsing history generated when the user accesses www.xxx.com/demo.
The following are embodiments of the apparatus of the present invention, and for details not described in detail in the embodiments of the apparatus, reference may be made to the above-mentioned one-to-one corresponding method embodiments.
Referring to fig. 10, a block diagram of an information display device according to an embodiment of the present invention is shown. The information display device is implemented as all or a part of the terminal by hardware or a combination of hardware and software. The device includes:
a first obtaining module 1010, configured to obtain a current working mode of an application program when the application program is in a foreground operating state, where the application program includes a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed;
a hiding module 1020, configured to hide hidden information in the application program when a current working mode of the application program is a first working mode;
a displaying module 1030, configured to display the hidden information in the application program when the current working mode of the application program is the second working mode.
Optionally, when the application is in the first operating mode, the apparatus further includes:
the password acquisition module is used for acquiring an input password;
and the switching display module is used for switching the current working mode of the application program to a second working mode when the input password is the same as the mode switching password and displaying the hidden information in the application program.
Optionally, the password obtaining module includes:
the monitoring unit is used for monitoring a character string input in a preset application program, wherein the preset application program is a dialing application program and/or a calculator application program;
and the password determining unit is used for taking the character string as the input password when the character string input in the preset application program is monitored.
Optionally, the apparatus further includes:
and the deleting module is used for deleting the input record of the character string in the preset application program.
Optionally, the apparatus further includes:
the second acquisition module is used for acquiring the input mode switching password through a mode switching password setting interface;
the detection module is used for detecting whether a character string corresponding to the mode switching password belongs to a preset character string set, wherein the preset character string set comprises at least one of a telephone number in an address list, a public service telephone number or a terminal engineering mode instruction set;
and the setting module is used for determining to complete the setting of the mode switching password when the character string corresponding to the mode switching password does not belong to the preset character string set.
Optionally, the apparatus further includes:
and the switching hiding module is used for switching the current working mode of the application program to the first working mode and hiding the hidden information when the current working mode of the application program is the second working mode and meets the mode switching condition.
Optionally, the mode switching condition includes:
acquiring a screen locking instruction;
and/or the presence of a gas in the gas,
acquiring an exit instruction of an application program;
and/or the presence of a gas in the gas,
and the application program is switched from a foreground operation mode to a background operation mode and reaches a preset time length.
Optionally, the application is a social application, and the apparatus further includes:
the first receiving module is used for receiving a hidden target setting signal through a contact list;
a first determining module, configured to determine a target contact indicated by the hidden target setting signal as the preset hidden target;
the processing module 1020 includes:
the first information determining unit is used for determining at least one of contact information, historical communication information and social information corresponding to the target contact as the hidden information;
and the first processing unit is used for hiding the hidden information.
Optionally, the application is a web browsing application, and the apparatus further includes:
the second receiving module is used for receiving the hidden target setting signal through the webpage list;
a second determining unit, configured to determine a target webpage indicated by the hidden target setting signal as the preset hidden target;
the processing module 1020 includes:
the second information determining unit is used for determining the collection label and the historical browsing record of the target webpage and the collection label and the historical browsing record of the sub-webpage corresponding to the target webpage as the hidden information;
and the second processing unit is used for hiding the hidden information.
In summary, in the embodiment of the present invention, the application includes two working modes, namely, a first working mode and a second working mode, and when the application runs in the foreground and is in the first working mode, the application hides the hidden information corresponding to the preset hidden target, so as to ensure that the hidden information cannot be viewed even when other people use the application, thereby preventing the leakage of the personal privacy information, and solving the problem that the setting of the application lock for the application still causes the leakage of the personal privacy information in the application in the related art; when the application program runs in the foreground and is in the second working mode, the application program displays the hidden information, a user can operate the personal privacy information conveniently, and the flexibility of information display is improved.
In this embodiment, the application program monitors the character string input in the dialing application program and/or the calculator application program, and automatically switches to the second working mode when the input character string is the same as the mode switching password, thereby avoiding setting a password entry interface in the application program, and improving the secrecy of the mode switching password entry process.
In this embodiment, after the application completes mode switching according to the character string input in the preset application, the application instructs the preset application to delete the input record of the character string, thereby avoiding leakage of the mode switching password and ensuring the security of the mode switching password.
In this embodiment, when the application is in the second working mode, the application or the terminal state change is detected, and the first working mode is automatically switched to, so that the non-sensing switching between the working modes is realized, and the mode switching efficiency is improved.
Referring to fig. 11, a schematic structural diagram of a terminal according to an embodiment of the present invention is shown. Specifically, the method comprises the following steps:
terminal 1100 can include, among other components, RF (Radio Frequency) circuitry 1110, memory 1120 including one or more computer-readable storage media, input unit 1130, display unit 1140, sensors 1150, audio circuitry 1160, near field communication module 1170, processor 1180 including one or more processing cores, and power supply 1190. Those skilled in the art will appreciate that the terminal structure shown in fig. 11 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
RF circuit 1110 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, for receiving downlink messages from a base station and then processing the received downlink messages by one or more processors 1180; in addition, data relating to uplink is transmitted to the base station. In general, RF circuitry 1110 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuitry 1110 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, SMS (Short Messaging Service), and the like.
The memory 1120 may be used to store software programs and modules, and the processor 1180 may execute various functional applications and data processing by operating the software programs and modules stored in the memory 1120. The memory 1120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 1100, and the like. Further, the memory 1120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 1120 may also include a memory controller to provide the processor 1180 and the input unit 1130 access to the memory 1120.
The input unit 1130 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. Specifically, the input unit 1130 may include an image input device 1131 and other input devices 1132. The image input device 1131 may be a camera or a photoelectric scanning device. The input unit 1130 may include other input devices 1132 in addition to the image input device 1131. In particular, other input devices 1132 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 1140 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal 1100, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 1140 may include a Display panel 1141, and optionally, the Display panel 1141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
The terminal 1100 can also include at least one sensor 1150, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 1141 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 1141 and/or the backlight when the terminal 1100 moves to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 1100, detailed descriptions thereof are omitted.
Audio circuitry 1160, speakers 1161, and microphone 1162 may provide an audio interface between a user and terminal 1100. The audio circuit 1160 may transmit the electrical signal converted from the received audio data to the speaker 1161, and convert the electrical signal into a sound signal for output by the speaker 1161; on the other hand, the microphone 1162 converts the collected sound signals into electrical signals, which are received by the audio circuit 1160 and converted into audio data, which are then processed by the audio data output processor 1180, and then transmitted to, for example, another electronic device via the RF circuit 1110, or output to the memory 1120 for further processing. Audio circuitry 1160 may also include an earbud jack to provide peripheral headset communication with terminal 1100.
The terminal 1100 establishes a near field communication connection with an external device through the near field communication module 1170, and performs data interaction through the near field communication connection. In this embodiment, the near field communication module 1170 specifically includes a bluetooth module and/or a WiFi module.
The processor 1180 is a control center of the terminal 1100, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the terminal 1100 and processes data by operating or executing software programs and/or modules stored in the memory 1120 and calling data stored in the memory 1120, thereby performing overall monitoring of the mobile phone. Optionally, processor 1180 may include one or more processing cores; preferably, the processor 1180 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated within processor 1180.
Terminal 1100 can also include a power supply 1190 (e.g., a battery) for providing power to various components, which can be logically coupled to processor 1180 via a power management system that can be configured to manage charging, discharging, and power consumption. Power supply 1190 may also include one or more dc or ac power supplies, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, or any other component.
Although not shown, the terminal 1100 may further include a bluetooth module or the like, which is not described in detail herein.
Specifically, in the present embodiment, the terminal 1100 further includes a memory and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the one or more processors to implement the information display method in the foregoing embodiments.
Those skilled in the art will understand that all or part of the steps in the information display method of the above embodiments may be implemented by a program to instruct related hardware, where the program may be stored in a computer-readable storage medium, and the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
An embodiment of the present invention further provides a computer-readable storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the instruction, the program, the code set, or the instruction set is loaded and executed by the processor to implement the information display method described in each of the above embodiments.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (18)

1. An information display method, characterized in that the method comprises:
when an application program is in a foreground running state, acquiring a current working mode of the application program, wherein the application program comprises a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed;
if the current working mode of the application program is the first working mode, hiding the hidden information in the application program, wherein in the first working mode, non-hidden information is displayed on an application program interface of the application program;
acquiring an input password, wherein the password is input through a preset application program, and the preset application program is different from the application program;
when the input password is the same as the mode switching password, switching the current working mode of the application program to the second working mode;
and if the current working mode of the application program is the second working mode, displaying the hidden information in the application program, wherein the hidden information and the non-hidden information are displayed on an application program interface of the application program in the second working mode.
2. The method of claim 1, wherein obtaining the entered password comprises:
monitoring a character string input in the preset application program, wherein the preset application program is a dialing application program and/or a calculator application program;
and when the character string input in the preset application program is monitored, taking the character string as the input password.
3. The method according to claim 2, wherein after the switching the operation mode of the application program to the second operation mode, further comprising:
and deleting the input record of the character string in the preset application program.
4. The method according to claim 2, wherein when the preset application is a dialing application, before the obtaining of the current working mode of the application, further comprises:
acquiring an input mode switching password through a mode switching password setting interface;
detecting whether a character string corresponding to the mode switching password belongs to a preset character string set or not, wherein the preset character string set comprises at least one of a telephone number, a public service telephone number or a terminal engineering mode instruction set in an address list;
and if the character string corresponding to the mode switching password does not belong to the preset character string set, determining that the mode switching password setting is finished.
5. The method of any of claims 1 to 4, further comprising:
and when the current working mode of the application program is the second working mode and meets the mode switching condition, switching the current working mode of the application program to the first working mode and hiding the hidden information.
6. The method of claim 5, wherein the mode switching condition comprises:
acquiring a screen locking instruction;
and/or the presence of a gas in the gas,
acquiring an exit instruction of an application program;
and/or the presence of a gas in the gas,
and the application program is switched from a foreground operation mode to a background operation mode and reaches a preset duration.
7. The method according to any one of claims 1 to 4, wherein the application is a social application, and before the obtaining of the current working mode of the application, the method further comprises:
receiving a hidden target setting signal through a contact list;
determining a target contact person indicated by the hidden target setting signal as the preset hidden target;
the hiding processing of the hidden information corresponding to the preset hidden target in the application program includes:
determining at least one of contact information, historical communication information and social information corresponding to the target contact as the hidden information;
and hiding the hidden information.
8. The method according to any one of claims 1 to 4, wherein the application is a web browsing application, and before the obtaining of the current working mode of the application, the method further comprises:
receiving a hidden target setting signal through a webpage list;
determining a target webpage indicated by the hidden target setting signal as the preset hidden target;
the hiding processing of the hidden information corresponding to the preset hidden target in the application program includes:
determining the collection label and the historical browsing record of the target webpage and the collection label and the historical browsing record of the sub-webpage corresponding to the target webpage as the hidden information;
and hiding the hidden information.
9. An information display apparatus, characterized in that the apparatus comprises:
the device comprises a first acquisition module, a second acquisition module and a display module, wherein the first acquisition module is used for acquiring a current working mode of an application program when the application program is in a foreground running state, the application program comprises a first working mode and a second working mode, hidden information corresponding to a preset hidden target in the first working mode is hidden, and the hidden information in the second working mode is displayed;
the hidden module is used for hiding the hidden information in the application program when the current working mode of the application program is the first working mode, wherein in the first working mode, non-hidden information is displayed on an application program interface of the application program;
the password acquisition module is used for acquiring an input password, the password is input through a preset application program, and the preset application program is different from the application program;
the switching display module is used for switching the current working mode of the application program to the second working mode when the input password is the same as the mode switching password;
and a display module, configured to display the hidden information in the application program when the current working mode of the application program is the second working mode, where in the second working mode, the hidden information and the non-hidden information are displayed on an application program interface of the application program.
10. The apparatus of claim 9, wherein the password obtaining module comprises:
the monitoring unit is used for monitoring the character string input in the preset application program, and the preset application program is a dialing application program and/or a calculator application program;
and the password determining unit is used for taking the character string as the input password when the character string input in the preset application program is monitored.
11. The apparatus of claim 10, further comprising:
and the deleting module is used for deleting the input record of the character string in the preset application program.
12. The apparatus of claim 10, further comprising:
the second acquisition module is used for acquiring the input mode switching password through a mode switching password setting interface;
the detection module is used for detecting whether a character string corresponding to the mode switching password belongs to a preset character string set, wherein the preset character string set comprises at least one of a telephone number in an address list, a public service telephone number or a terminal engineering mode instruction set;
and the setting module is used for determining to complete the setting of the mode switching password when the character string corresponding to the mode switching password does not belong to the preset character string set.
13. The apparatus of any of claims 9 to 12, further comprising:
and the switching hiding module is used for switching the current working mode of the application program to the first working mode and hiding the hidden information when the current working mode of the application program is the second working mode and meets the mode switching condition.
14. The apparatus of claim 13, wherein the mode switching condition comprises:
acquiring a screen locking instruction;
and/or the presence of a gas in the gas,
acquiring an exit instruction of an application program;
and/or the presence of a gas in the gas,
and the application program is switched from a foreground operation mode to a background operation mode and reaches a preset time length.
15. The apparatus of any of claims 9 to 12, wherein the application is a social application, the apparatus further comprising:
the first receiving module is used for receiving a hidden target setting signal through a contact list;
a first determining module, configured to determine a target contact indicated by the hidden target setting signal as the preset hidden target;
a processing module, comprising:
the first information determining unit is used for determining at least one of contact information, historical communication information and social information corresponding to the target contact as the hidden information;
and the first processing unit is used for hiding the hidden information.
16. The apparatus of any of claims 9 to 12, wherein the application is a web browsing application, the apparatus further comprising:
the second receiving module is used for receiving the hidden target setting signal through the webpage list;
a second determining unit, configured to determine a target webpage indicated by the hidden target setting signal as the preset hidden target;
a processing module, comprising:
the second information determining unit is used for determining the collection label and the historical browsing record of the target webpage and the collection label and the historical browsing record of the sub-webpage corresponding to the target webpage as the hidden information;
and the second processing unit is used for hiding the hidden information.
17. A terminal, characterized in that it comprises a processor and a memory in which at least one instruction, at least one program, set of codes or set of instructions is stored, which is loaded and executed by the processor to implement the information display method according to any one of claims 1 to 8.
18. A computer-readable storage medium, having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the information display method according to any one of claims 1 to 8.
CN201710573695.6A 2017-07-14 2017-07-14 Information display method and device and terminal Active CN107395880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710573695.6A CN107395880B (en) 2017-07-14 2017-07-14 Information display method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710573695.6A CN107395880B (en) 2017-07-14 2017-07-14 Information display method and device and terminal

Publications (2)

Publication Number Publication Date
CN107395880A CN107395880A (en) 2017-11-24
CN107395880B true CN107395880B (en) 2021-05-28

Family

ID=60340649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710573695.6A Active CN107395880B (en) 2017-07-14 2017-07-14 Information display method and device and terminal

Country Status (1)

Country Link
CN (1) CN107395880B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108965577B (en) * 2018-05-28 2021-05-28 维沃移动通信有限公司 Interface display method and terminal equipment
CN109614815A (en) * 2018-11-07 2019-04-12 闻泰通讯股份有限公司 Display methods, system and the electronic equipment of data information
CN109542407A (en) * 2018-11-15 2019-03-29 深圳市华师兄弟教育科技有限公司 The micro- electric small routine system of AI
CN112446034A (en) * 2019-09-04 2021-03-05 中兴通讯股份有限公司 Data hiding management method and device, terminal and computer readable medium
CN111782599A (en) * 2019-09-24 2020-10-16 北京京东尚科信息技术有限公司 Information generation method and device
CN111259460B (en) * 2019-12-18 2023-01-17 明度智云(浙江)科技有限公司 Locking state information display method and device
CN115022695B (en) * 2021-03-04 2023-09-19 聚好看科技股份有限公司 Display device and Widget control display method
CN114489858B (en) * 2022-02-11 2024-03-19 Tcl通讯科技(成都)有限公司 Application software information setting method and device, terminal equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101384048A (en) * 2008-09-08 2009-03-11 中兴通讯股份有限公司 Information managing method and mobile terminal
CN103377343A (en) * 2012-04-19 2013-10-30 富泰华工业(深圳)有限公司 System and method for information confidentiality
CN102880837B (en) * 2012-08-24 2016-05-04 腾讯科技(深圳)有限公司 Improve method and the mobile terminal of security of mobile terminal
CN104036203A (en) * 2013-03-07 2014-09-10 腾讯科技(深圳)有限公司 Information security management method and information security management system
CN105160274B (en) * 2015-09-24 2017-10-27 宇龙计算机通信科技(深圳)有限公司 A kind of guard method of user data and terminal
CN105868648B (en) * 2016-03-28 2019-06-04 珠海格力电器股份有限公司 Mobile terminal and data processing method and device for mobile terminal guest mode
CN106485113A (en) * 2016-10-18 2017-03-08 上海传英信息技术有限公司 Mobile terminal and the method for secret protection of mobile terminal

Also Published As

Publication number Publication date
CN107395880A (en) 2017-11-24

Similar Documents

Publication Publication Date Title
CN107395880B (en) Information display method and device and terminal
CN108536783B (en) Data processing method and device, terminal and computer readable storage medium
US11269981B2 (en) Information displaying method for terminal device and terminal device
EP3151117B1 (en) Method and device for delaying information broadcasting
US10129044B2 (en) Method and apparatus for controlling smart device
CN108521494B (en) Terminal control method and device, readable storage medium and terminal
US11537408B2 (en) Method for managing application program use time offline, and terminal device
CN106778175B (en) Interface locking method and device and terminal equipment
CN106658489B (en) Terminal application processing method and device and mobile terminal
CN106453052B (en) Message interaction method and device
CN109155750B (en) Communication method and device
US20170300260A1 (en) Method, device and computer-readable storage medium for data migration
WO2018214748A1 (en) Method and apparatus for displaying application interface, terminal and storage medium
CN108270757B (en) User account switching method, device, client and system
CN111656347B (en) Project display method and terminal
WO2019184631A1 (en) Information processing method and apparatus, computer-readable storage medium, and terminal
US10027629B2 (en) Short message service reading method and device
CN110062929A (en) A kind of method, apparatus and terminal showing data
CN110140344B (en) Notification message processing method and terminal
CN112163194A (en) Authorization method of application permission, mobile terminal and computer storage medium
CN108573141B (en) Information access method and device
CN107147778B (en) Data processing method and device and mobile terminal
CN107148011B (en) Method, device and system for executing target service
CN108549823B (en) Multi-role using method and device of terminal and electronic equipment
US20160259925A1 (en) Terminal unlocking method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant