CN107423585A - The concealed application method and system of a kind of application - Google Patents

The concealed application method and system of a kind of application Download PDF

Info

Publication number
CN107423585A
CN107423585A CN201710644272.9A CN201710644272A CN107423585A CN 107423585 A CN107423585 A CN 107423585A CN 201710644272 A CN201710644272 A CN 201710644272A CN 107423585 A CN107423585 A CN 107423585A
Authority
CN
China
Prior art keywords
application
concealed
icon
user
application icon
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710644272.9A
Other languages
Chinese (zh)
Inventor
唐昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aiyouwei Software Development Co Ltd
Original Assignee
Shanghai Aiyouwei Software Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aiyouwei Software Development Co Ltd filed Critical Shanghai Aiyouwei Software Development Co Ltd
Priority to CN201710644272.9A priority Critical patent/CN107423585A/en
Publication of CN107423585A publication Critical patent/CN107423585A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the present application discloses the concealed application method and system of a kind of application, is related to intelligent terminal technical field.Methods described includes:User instruction and checking information are obtained, the user instruction is used to start the concealed using operation of application;Determine the first application icon to be concealed;Obtain the second application icon that stowed position is provided;Hide first application icon.The concealed application method and system of the application of the application, stowed position is provided by other application icon, being hidden using verification method needs the concealed application used, with ensure using crypticity, improve user satisfaction.

Description

The concealed application method and system of a kind of application
Technical field
The application is related to intelligent terminal technical field, more particularly to the concealed application method and system of application.
Background technology
With the rapid development of the communication technology, the life of people, work etc. are with intelligent terminal (for example, portable electronic is set It is standby) it is closely bound up.At present, portable electric appts provide the convenience of mobile communication, but the communication information but has leakage Potential safety hazard, information security issue receives much concern.Currently, by applying the modes such as encryption or double space, to a certain extent It ensure that the information security of application.But using encryption after, if without display, user be difficult to find that into application entering Mouthful;If display, can not meet the needs of applying crypticity again.In addition, this mode of double space storage application is often more held Easily discovered by other people, reduce using crypticity.
Accordingly, it is desired to provide the concealed application method and system of a kind of application, hidden bit is provided by other application icon Put, being hidden using verification method needs the concealed application used, with ensure using crypticity, improve user satisfaction.
The content of the invention
According to the first aspect of some embodiments of the present application, there is provided a kind of concealed application method of application, be applied to In terminal (for example, electronic equipment etc.), methods described can include:Obtain user instruction and checking information, the user instruction For starting the concealed using operation of application;Determine the first application icon to be concealed;Obtain offer stowed position second should Use icon;Hide first application icon.
In certain embodiments, methods described may further include:Judge whether to confirm to hide first application drawing Mark;If confirming to hide, first application icon is hidden.
In certain embodiments, methods described may further include:If unconfirmed hide, the secret of the application is exited Use operation.
In certain embodiments, methods described may further include:It is determined that hide the second application icon of the first application; Judge whether checking information is effective;If checking information is effective, the first hiding application to be launched is determined;Start described hiding First application.
In certain embodiments, methods described may further include:It is determined that the second application icon of the first application is hidden, And display location;Judge whether checking information is effective;If checking information is effective, determine that hiding first of display to be restored should With;In the display location, recover the display first hiding application.
In certain embodiments, it is described to determine that display location further comprises the position of drawing a circle for obtaining user, or provide more Individual display location Transparent frame selects to determine for user.
In certain embodiments, methods described may further include:Second application icon described in Special display, the spy Different display includes User Defined frame, color change.
In certain embodiments, second application icon for obtaining offer stowed position further comprises:Described in dragging First application icon is to the second application icon, or the first application icon described in line and the second application icon.
In certain embodiments, further comprise:Obtaining user, long-press or the application icon of double-click are the first application twice Icon, the second application icon.
According to the second aspect of some embodiments of the present application, there is provided a system, including:One memory, by with It is set to data storage and instruction;One is established the processor to communicate with memory, wherein, when performing the instruction in memory, The processor is configured as:User instruction and checking information are obtained, the user instruction is used for the concealed use for starting application Operation;Determine the first application icon to be concealed;Obtain the second application icon that stowed position is provided;Hide first application Icon.
Therefore, according to the concealed application method and system of the application of some embodiments of the present application, other application figure is passed through Mark provides stowed position, and being hidden using verification method needs the concealed application used, with ensure using crypticity, improve User satisfaction.
Brief description of the drawings
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of accompanying drawing reference implementation example, In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram that the electronic functionalities provided according to some embodiments of the present application configure.
Fig. 3 is the exemplary flow using hidden method that the secret provided according to some embodiments of the present application uses Figure.
Fig. 4 is the exemplary flow using startup method that the secret provided according to some embodiments of the present application uses Figure.
Fig. 5 is the exemplary stream for the application recovery display methods that the secret provided according to some embodiments of the present application uses Cheng Tu.
Embodiment
Below with reference to accompanying drawing description for ease of Integrated Understanding the application as defined in claim and its equivalent Various embodiments.These embodiments include various specific details in order to understand, but these be considered only as it is exemplary.Cause This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described here The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure Description.
The term and phrase used in description below and claims is not limited to literal meaning, and be merely can Understand and as one man understand the application.Therefore, for those skilled in the art, it is possible to understand that, there is provided to the various implementations of the application The description of example is only the purpose to illustrate, rather than limitation appended claims and its application of Equivalent definitions.
Below in conjunction with the accompanying drawing in the application some embodiments, the technical scheme in the embodiment of the present application is carried out clear Chu, it is fully described by, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments. Based on the embodiment in the application, those of ordinary skill in the art are obtained all under the premise of creative work is not made Other embodiment, belong to the scope of the application protection.
It should be noted that the term used in the embodiment of the present application is only merely for the mesh of description specific embodiment , and it is not intended to be limiting the application." one " of singulative used in the embodiment of the present application and appended claims, "one", " one kind ", " described " and "the" be also intended to including most forms, unless context clearly shows that other implications.Also It should be appreciated that term "and/or" used herein refers to and list items purposes comprising one or more mutually bindings are any Or it is possible to combine.Expression " first ", " second ", " described the first " and " described the second " be used for modify respective element without Consideration order or importance, are used only for distinguishing a kind of element and another element, without limiting respective element.
Terminal according to the application some embodiments can be electronic equipment, the electronic equipment can include smart mobile phone, PC (PC, such as tablet personal computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device And one or more of combinations in wearable device etc. (VR).According to some embodiments of the present application, the wearable device Type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics can be included Clothes), decorated type (such as pad skin, tatoo or built in electronic device) etc., or several combination.In some realities of the application Apply in example, the electronic equipment can be flexible, be not limited to the said equipment, or can be one kind in above-mentioned various equipment Or several combination.In this application, term " user " can be indicated using the people of electronic equipment or setting using electronic equipment Standby (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of concealed application method of application.For the ease of understanding the embodiment of the present application, with It is lower that the embodiment of the present application is described in detail refer to the attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1 Shown, Environment System 100 can include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics Key 117 etc..In some embodiments of the present application, electronic equipment 110 can omit one or more elements, or can enter one Step includes one or more of the other element.
Bus 111 can include circuit.The circuit can be with one or more element (examples in interconnection electronics 110 Such as, bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and secondary or physical bond 117).The circuit can also be realized between one or more elements in electronic equipment 110 communication (for example, obtain and/or Send information).
Processor 112 can include one or more coprocessors (Co-processor), application processor (AP, Application Processor) and communication processor (Communication Processor).As an example, processor 112 can perform with the control of one or more elements of electronic equipment 110 and/or data processing (for example, it is concealed to start application Operation etc.).
Memory 113 can be with data storage.The data can include other with one or more of electronic equipment 110 The related instruction of element or data.For example, the data can include the initial data of the before processing of processor 112, intermediate data And/or the data after processing.Memory 113 can include impermanent memory memory and/or permanent memory memory.Make For example, memory 113 can store the checking information of user.
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap Include kernel, middleware, API (API, Application Programming Interface) and/or using journey Sequence (or " application ").
At least a portion of the kernel, the middleware or the API can include operating system (OS, Operating System).As an example, the kernel can be controlled or managed for performing other programs (for example, middle Part, API and application program) in realize operation or function system resource (for example, bus 111, processor 112nd, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, it is described should One or more elements of electronic equipment 110 are accessed with DLL or the application program to control or management system resource.
The middleware can be as the intermediate layer of data transfer.The data transfer can allow API or Application program is with the kernel communication exchanging data.As an example, the middleware can be handled from the application program One or more task requests of acquisition.For example, the middleware can be to one or more application assigned electronic equipments The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or Multiple tasks are asked.The API can be that the application program is used to control from the kernel or the middleware The interface of function is provided.The API can also include one or more interfaces or function (for example, instruction).It is described Function can be used for starting control, data channel control, security control, Control on Communication, document control, window control, text control System, image procossing, information processing etc..
Input/output module 114 can send what is inputted from user or external equipment to the other elements of electronic equipment 110 Instruction or data.Input/output module 114 can also be defeated by the instruction of the other elements acquisition from electronic equipment 110 or data Go out to user or external equipment.In certain embodiments, input/output module 114 can include input block, and user can lead to Cross the input block input information or instruction.
Display 115 can be with display content.The content can to user show all kinds (for example, text, image, Video, icon and/or symbol etc., or several combinations).Display 115 can include liquid crystal display (LCD, Liquid Crystal Display), light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode (OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro Mechanical Systems) display or electric paper display etc., or several combinations.Display 115 can include display Screen, touch-screen etc..The display screen can show the application icon for providing stowed position.The application drawing that stowed position is provided Mark can help user to remember the entrance of hiden application by self-defined frame or Icon Color change etc..In some embodiments In, display 115 can show virtual key.The touch-screen can obtain the input of the virtual key.Display 115 can lead to Cross the touch-screen and obtain input.The input can include touch input, gesture input, action input, close input, electronics Pen or the input (for example, hovering input) of user's body part.
Communication module 116 can configure the communication between equipment.In certain embodiments, Environment System 100 can be with Further comprise electronic equipment 140.As an example, the communication between the equipment can include electronic equipment 110 and other set Communication between standby (for example, server 130 or electronic equipment 140).For example, communication module 116 can by radio communication or Wire communication is connected to network 120, realizes and communicates with other equipment (for example, server 130 or electronic equipment 140).
The radio communication can include microwave communication and/or satellite communication etc..The radio communication can include honeycomb Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA (CDMA, Code Division MultipleAccess), 3G (Third Generation) Moblie (3G, The 3rd Generation Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G), Long Term Evolution (LTE, Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), WCDMA (WCDMA, Wideband Code Division MultipleAccess), UMTS (UMTS, Universal Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc., it is or several Combination.According to some embodiments of the present application, the radio communication can include WLAN (WiFi, Wireless Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication (NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, BodyAreaNetwork) Deng, or several combinations.According to some embodiments of the present application, the wire communication can include GLONASS (Glonass/GNSS, Global Navigation Satellite System), global positioning system (GPS, Global Position System), Beidou navigation satellite system or Galileo (European GPS) etc..The cable modem Letter can include USB (USB, Universal Serial Bus), high-definition media interface (HDMI, High- Definition Multimedia Interface), proposed standard 232 (RS-232, Recommend Standard 232), And/or plain old telephone service (POTS, Plain OldTelephone Service) etc., or several combinations.
Secondary or physical bond 117 can be used for user mutual.Secondary or physical bond 117 can include one or more entity keys.In some realities Apply in example, user can be with the function of self-defined secondary or physical bond 117.As an example, secondary or physical bond 117 can send instruction.The instruction The secret that application can be included starting uses.The concealed use for starting application can include hiden application, start and hide Application, recover hiding application of display etc..
In certain embodiments, electronic equipment 110 may further include sensor.The sensor can be included but not It is limited to light sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid to pass Sensor, biology sensor, laser sensor, Hall sensor, intelligence sensor etc., or several combinations.
In certain embodiments, electronic equipment 110 may further include infrared equipment, image capture device etc..As Example, the infrared equipment can identify by infrared ray mode of delivery, and blink, watch the technical limit spacing eyes such as identification attentively Information.For example, the infrared equipment is acted come certification user profile by gathering the blink of user.As an example, described image Collecting device can include camera, iris device etc..The camera can realize the functions such as eyeball tracking.The iris dress Authentication (for example, certification user profile) can be carried out using iris recognition technology by putting.The iris device can include rainbow Film camera, the iris camera can obtain iris information, and the iris information can be stored in memory 113.
Network 120 can include communication network.The communication network can include computer network (for example, LAN (LAN, Local Area Network) or wide area network (WAN, Wide Area Network)), internet and/or telephone network Deng, or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes Business device 130, electronic equipment 140 etc.) send information.
Server 130 can be by the other equipment in the connection Environment System 100 of network 120 (for example, electronic equipment 110th, electronic equipment 140 etc.).For example, server 130 can be sent by network 120 to electronic equipment 110 starts the hidden of application It is secret to use operational order etc..In certain embodiments, when electronic equipment 110 is lost, server 130 can pass through network 120 The secret that startup application is sent to electronic equipment uses operational order;When iris verification fails, server 130 can pass through net Network 120 further locks electronic equipment 110.
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application, The part or all of operation performed in electronic equipment 110 can be in another equipment or multiple equipment (for example, electronic equipment 140 And/or server 130) in perform.In certain embodiments, when electronic equipment 110 be automatically or in response to request perform it is a kind of or When multiple functions and/or service, electronic equipment 110 can ask other equipment (for example, electronic equipment 140 and/or server 130) perform function and/or service are substituted.In certain embodiments, electronic equipment 110 is in addition to perform function or service, further Perform relative one or more functions.In certain embodiments, other equipment is (for example, electronic equipment 140 and/or clothes Business device 130) asked function or other related one or more functions can be performed, implementing result can be sent to electricity Sub- equipment 110.Electronic equipment 110 can repeat result or further handle implementing result, to provide asked function Or service.As an example, electronic equipment 110 can use cloud computing, distributed computing technology and/or client-server end to calculate meter Calculate etc., or several combinations.In certain embodiments, can be included according to the difference of cloud computing service property, the cloud computing Public cloud, private clound and mixed cloud etc..In certain embodiments, when electronic equipment 110 is lost, electronic equipment 140 can be to Electronic equipment 110 sends positioning instruction, to obtain the positional information of electronic equipment 110.In certain embodiments, electronic equipment 140 can obtain the hiden application of electronic equipment 110, and carry out simultaneously operating.
It should be noted that the description for Environment System 100 above, only for convenience of description, can not be this Shen It please be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system can Each element can be combined on the premise of without departing substantially from the principle, or forms subsystem and be connected with other elements, To implementing the various modifications and variations on the above method and systematic difference field progress form and details.For example, network environment System 100 may further include database.In another example electronic equipment 110 can not include secondary or physical bond 117 etc..It is all such The deformation of class, within the protection domain of the application.
Fig. 2 is the exemplary cell block diagram that the electronic functionalities provided according to some embodiments of the present application configure.Such as Shown in Fig. 2, processor 112 can include processing module 200, and the processing module 200 can include acquiring unit 210, it is determined that Unit 220, control unit 230, display unit 240.
According to some embodiments of the present application, acquiring unit 210 can obtain information.In certain embodiments, the letter Breath can include but is not limited to text, picture, audio, video, action, gesture, sound, eyes (for example, iris information etc.), gas Breath, light etc., or several combinations.In certain embodiments, described information can include but is not limited to input information, system information And/or communication information etc..As an example, acquiring unit 210 can pass through the touch of input/output module 114, display 115 Screen, secondary or physical bond 117 and/or sensor obtain the input information of electronic equipment 110.The input information can include other equipment (for example, electronic equipment 140) and/or the input of user, for example, the input of key-press input, touch-control, gesture input, action input, remote Journey input, transmission input, eyes input, sound input, breath input, light input etc., or several combinations.The input information Obtaining widget can include but is not limited to infrared equipment, image capture device, sensor etc., or several combinations.As showing Example, acquiring unit 210 can obtain iris information etc. by image capture device (for example, iris shooting is first-class).In some realities Apply in example, acquiring unit 210 can obtain the application icon for providing stowed position by the input information of user.The offer The application icon of stowed position can normally be shown or Special display.The Special display can include application icon frame by Color change of User Defined or application icon etc..
In certain embodiments, acquiring unit 210 can obtain the communication information by network 120.The communication information can With including application software information, communication signal (for example, voice signal, vision signal etc.), short message etc..In some embodiments In, acquiring unit 210 can obtain system information by network 120, memory 113 and/or sensor.The system information can With include but is not limited to the system mode of electronic equipment 110, presupposed information, memory 113 store information (for example, iris is recognized Demonstrate,prove information etc.) etc., or several combinations.
In certain embodiments, described information can include instruction.The instruction includes user instruction and/or system command Deng, or several combinations.The instruction can include triggering command, certification instruction, fill in instruction etc., or several combinations.Institute Certification user profile can be included, start the concealed using operation etc. of application by stating certification instruction.As an example, when user presses thing When managing key (for example, shortcut etc.), electronic equipment 110 can start the concealed using operation etc. of application.
According to some embodiments of the present application, determining unit 220 can determine information.In certain embodiments, it is it is determined that single Member 220 can determine that user selects application icon to be concealed.As an example, when the concealed of user starts application uses operation When, electronic equipment 110 may remind the user that selection needs the concealed application used, and determining unit 220 can pass through the behaviour of user Make (for example, long-press, double-click etc.) and determine application icon to be concealed.
According to some embodiments of the present application, control unit 230 can be with control electronics.In certain embodiments, control Unit 230 processed can start the concealed using operation, hiden application icon etc. of application.In certain embodiments, control unit 230 The icon hiding of the concealed application used can will be needed, for example, control unit 230 can make display unit 240 not show institute Stating needs the concealed application icon used.In certain embodiments, control unit 230 can will need concealed practical application hidden Hide into the application icon that stowed position is provided, for example, control unit 230 can make display unit 240 only show that offer is hidden The application icon of position.In certain embodiments, when obtaining the checking information of user, control unit 230 can be according to application The concealed application for starting hiding application using instruction, stowed position being provided without starting.
According to some embodiments of the present application, display unit 240 can be with display information.In certain embodiments, display is single Member 240 can show the application icon for providing stowed position.In certain embodiments, when obtaining the checking information of user, show Show that unit 240 can recover the hiding application icon of display according to the concealed using instruction of application.
It should be noted that described above for the unit in processing module 200, only for convenience of description, can not be this Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on the system, Unit may be combined on the premise of without departing substantially from the principle, or form submodule and connect with other units Connect, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned module and unit.For example, processing module 200 can not include display unit 240.In another example processing module 200 may further include analytic unit, the analysis is single The validity that member can analyze the checking information of user (for example analyzes the iris information of collection and read the one of iris information Cause property etc.).Such deformation, within the protection domain of the application.
Fig. 3 is the exemplary flow using hidden method that the secret provided according to some embodiments of the present application uses Figure.As shown in figure 3, flow 300 can be realized by processing module 200.In certain embodiments, the application that the secret uses Hidden method can be started by instructing.The instruction can include user instruction, system command, action command etc., or several Combination.As an example, the information that the system command can be obtained by sensor generates.The user instruction can include Voice, gesture, action, secondary or physical bond 117 and/or virtual key etc., or several combinations.
310, user instruction and checking information are obtained.Operation 310 can pass through the acquiring unit 210 of processing module 200 Realize.In certain embodiments, the user instruction includes starting the concealed using operation of application, such as hiden application etc..Institute Password identification checking or bio-identification checking can be included by stating checking information.It is close that the password identification includes numerical ciphers, gesture Code, graphical passwords etc., or several combinations.The bio-identification includes iris recognition, fingerprint recognition, face recognition, sound knowledge Not etc., or several combinations.As an example, if secondary or physical bond 117 is defined for starting the concealed using operation of application, work as user When pressing secondary or physical bond 117, acquiring unit 210 can obtain the concealed using instruction of the application.In certain embodiments, when with When family starts the secret of application using operation, acquiring unit 210 can further obtain checking information, further ensure application The security that uses of secret.In certain embodiments, the checking information can be further used for hide secret use should With, start the concealed application used, recover the operations such as the concealed application used of display.
320, the first application icon to be concealed is determined.Operation 320 can pass through the determining unit of processing module 200 220 realize.In certain embodiments, when the secret of user starts application is using operation, electronic equipment 110 can prompt user Application icon to be concealed is selected, determining unit 220 can determine according to the selection operation (for example, long-press, double-click etc.) of user Application icon to be concealed.
330, the second application icon that stowed position is provided is obtained.Operation 330 can pass through the acquisition of processing module 200 Unit 210 or determining unit 220 are realized.In certain embodiments, acquiring unit 210 can be according to the operation of user (for example, long By, double-click, click) obtain the second application icon that stowed position is provided.As an example, when the secret of user starts application makes During with operation, it is application to be concealed that acquiring unit 210, which can obtain the application icon that user double-clicks for the first time,;Acquiring unit 210 can further obtain second of application icon double-clicked of user to provide the application of stowed position.In another example when user opens When the secret of dynamic application is using operation, the application icon that acquiring unit 210 can obtain user's first time long-press is hiding to provide The application of position;The application icon that acquiring unit 210 can obtain second of long-press of user is application to be concealed.In some realities Apply in example, determining unit 220 can determine to provide the second of stowed position according to the operation (for example, dragging, line etc.) of user Application icon.As an example, when it is determined that during first application icon to be concealed, user can directly drag first application drawing To the second application icon, determining unit 220 can determine to provide stowed position by second application icon mark.In another example when When determining the first application icon to be concealed, the first application icon can be linked to the second application icon, determining unit by user 220 can determine to provide stowed position by second application icon being wired.In certain embodiments, display unit 240 The line track of the application icon of user's line first and the second application icon can be shown.
340, judge whether to confirm to hide.Operation 330 can be single by the determining unit 220 of processing module 200, control Member 230 is realized.In certain embodiments, control unit 230 can prompt the user whether to confirm to hide first application icon, Determining unit 220 can determine whether to hide first application icon according to the selection of user.
If unconfirmed hide, operation 320 is returned, determines the first application icon to be concealed.In certain embodiments, if not Confirm to hide, the concealed using operation of application can be exited.
If confirming to hide, into operation 350,350, first application icon is hidden.Operation 350 can pass through processing The control unit 230 of module 200, display unit 240 are realized.In certain embodiments, control unit 230 can be by described first Application icon is hidden into second application icon.In certain embodiments, control unit 230 can be with control display unit 240 do not show first application icon, only show second application icon.In certain embodiments, second application Icon can prompt user to remember the entrance of first application icon by User Defined frame, color change etc..
Fig. 4 is the exemplary flow using startup method that the secret provided according to some embodiments of the present application uses Figure.As shown in figure 4, flow 400 can be realized by processing module 200.In certain embodiments, the application that the secret uses Startup method can be started by instructing.
410, user instruction and checking information are obtained.Operation 410 can pass through the acquiring unit 210 of processing module 200 Realize.In certain embodiments, the user instruction includes starting the concealed using operation of application, such as starts hiding application Deng.The checking information can include password identification checking or bio-identification checking.As an example, if secondary or physical bond 117 is defined For starting the concealed using operation of application, when user presses secondary or physical bond 117, acquiring unit 210 can obtain the application Concealed use instruction.In certain embodiments, when user starts application it is concealed using operation when, acquiring unit 210 can be with Checking information is further obtained, further ensures the security that the secret of application uses.
420, it is determined that hiding the second application icon of the first application.Operation 420 can pass through the determination of processing module 200 Unit 220 is realized.In certain embodiments, when the secret of user starts application is using operation, electronic equipment 110 can prompt User selects to provide the second application icon of stowed position, and determining unit 220 can be according to the selection operation of user (for example, long Press, double-click) determine to hide the second application icon of the first application.In certain embodiments, second application icon can be with The entrance for the first application for prompting to hide described in user by modes such as User Defined frame, color changes.
430, judge whether checking information is effective.Operation 430 can be real by the determining unit 220 of processing module 200 It is existing.In certain embodiments, determining unit 220 can with the checking information of comparative analysis user with hide the first application icon when The uniformity of checking information, determine whether checking information is effective.
If checking information is invalid, operation 420 is returned to, it is determined that hiding the second application icon of the first application.In some implementations In example, if checking information is invalid, the concealed using operation of application can be exited.
If checking information is effective, into operation 440,440, the first hiding application to be launched is determined.Operation 440 can To be realized by the acquiring unit 210, determining unit 220, display unit 240 of processing module 200.In certain embodiments, obtain Take unit 210 the first hiding application to be launched can be obtained according to the operation of user (for example, long-press, double-click, click). As an example, when the second application icon hides multiple hiden applications, display unit 240 can show the multiple hiden application List, it is hiden application to be launched that acquiring unit 210, which can obtain user and click on the application icon of selection,.In some embodiments In, determining unit 220 can determine hiden application to be launched according to the operation of user.
450, start the first hiding application.Operation 450 can by the control unit 230 of processing module 200, Display unit 240 is realized.In certain embodiments, control unit 230 can start the first hiding application.In some realities Apply in example, control unit 230 can show the interactive interface of the first application of the startup with control display unit 240.
Fig. 5 is the exemplary stream for the application recovery display methods that the secret provided according to some embodiments of the present application uses Cheng Tu.As shown in figure 5, flow 500 can be realized by processing module 200.In certain embodiments, what the secret used should It can be started with display methods is recovered by instructing.
510, user instruction and checking information are obtained.Operation 510 can pass through the acquiring unit 210 of processing module 200 Realize.In certain embodiments, the user instruction includes starting the concealed using operation of application, such as recovers what display was hidden Using etc..The checking information can include password identification checking or bio-identification checking.If the as an example, quilt of secondary or physical bond 117 Define for starting the concealed using operation of application, when user presses secondary or physical bond 117, acquiring unit 210 can obtain described The concealed of application uses instruction.In certain embodiments, when the secret of user starts application is using operation, acquiring unit 210 Checking information can be further obtained, further ensures the security that the secret of application uses.
520, it is determined that the second application icon of the first application is hidden, and display location.Operation 420 can pass through processing The determining unit 220 of module 200 is realized.In certain embodiments, when the secret of user starts application is using operation, electronics is set Standby 110 can prompt user to select to provide the second application icon of stowed position, and determining unit 220 can be according to the selection of user (for example, long-press, double-click etc.) is operated to determine to hide the second application icon of the first application.In certain embodiments, described second The first application that application icon can prompt to hide described in user by modes such as User Defined frame, color changes enters Mouthful.In certain embodiments, when the secret of user starts application is using operation, electronic equipment 110 can prompt user to select Recover the display location of the application of display first, determining unit 220 can determine according to the selection operation (for example, drawing a circle) of user Recover the display location of the application of display first.In certain embodiments, display unit 240 can show that user draws a circle and determine display The track of position.In certain embodiments, display unit 240 can be extensive for selection by the user with the multiple display locations of Transparence Display The display location of the hiden application shown again.
530, judge whether checking information is effective.Operation 530 can be real by the determining unit 220 of processing module 200 It is existing.In certain embodiments, determining unit 220 can with the checking information of comparative analysis user with hide the first application icon when The uniformity of checking information, determine whether checking information is effective.
If checking information is invalid, operation 520 is returned, it is determined that the second application icon of the first application is hidden, and display position Put.In certain embodiments, if checking information is invalid, the concealed using operation of application can be exited.
If checking information is effective, into operation 540,540, the first hiding application of display to be restored is determined.Operation 540 can be realized by the acquiring unit 210, determining unit 220, display unit 240 of processing module 200.In some embodiments In, acquiring unit 210 can obtain the hiding of display to be restored according to the operation of user (for example, long-press, double-click, click) First application.As an example, when the second application icon hides multiple hiden applications, display unit 240 can show described more Individual hiden application list, acquiring unit 210 can obtain user click on the application icon of selection should for hiding for display to be restored With.In certain embodiments, determining unit 220 can determine the hiden application of display to be restored according to the operation of user.
550, in the display location, recover to show the first hiding application.Operation 550 can be by handling mould The control unit 230 of block 200, display unit 240 are realized.In certain embodiments, control unit 230 can be in the display position Put, recover the display first hiding application.In certain embodiments, control unit 230 can be existed with control display unit 240 The display location, show first application icon.
It should be noted that the description for flow 300, flow 400, flow 500 above, only for convenience of description, not The application can be limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, based on the system Principle, each operation may be combined, or form sub-process and other behaviour on the premise of without departing substantially from the principle Combine, the various modifications and variations in form and details are carried out to the function of implementing above-mentioned flow and operation.For example, flow 300 can not perform operation 340, directly hide the first application icon;Held again in another example flow 400 can first carry out operation 430 Row operation 420 etc..For another example flow 500, which can first carry out operation 530, redos 520 etc..Such deformation, Within the protection domain of the application.
In summary, according to the concealed application method and system of the application of the embodiment of the present application, other application icon is passed through Stowed position is provided, being hidden using verification method needs the concealed application used, with ensure using crypticity, improve and use Family satisfaction.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can To carry out various change.
It should be noted that in this manual, term " comprising ", "comprising" or its any other variant are intended to Nonexcludability includes, so that process, method, article or equipment including a series of elements not only will including those Element, but also the other element including being not expressly set out, or it is this process, method, article or equipment also to include Intrinsic key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that Other identical element also be present in process, method, article or equipment including the key element.
Finally, it is to be noted that, a series of above-mentioned processing are not only included with order described here in temporal sequence The processing of execution, and the processing including performing parallel or respectively rather than in chronological order.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with To be completed by the related hardware of computer program instructions, described program can be stored in a computer-readable recording medium, The program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic disc, CD, read-only storage (Read-Only Memory, ROM) or random access memory (RandomAccess Memory, RAM) etc..
Above disclosed is only some preferred embodiments of the application, it is impossible to the right model of the application is limited with this Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to the application right Made equivalent variations are sought, still falls within and invents covered scope.

Claims (10)

  1. A kind of 1. concealed application method of application, it is characterised in that including:
    User instruction and checking information are obtained, the user instruction is used to start the concealed using operation of application;
    Determine the first application icon to be concealed;
    Obtain the second application icon that stowed position is provided;
    Hide first application icon.
  2. 2. the concealed application method of application according to claim 1, it is characterised in that further comprise:
    Judge whether to confirm to hide first application icon;
    If confirming to hide, first application icon is hidden.
  3. 3. the concealed application method of application according to claim 2, it is characterised in that further comprise:
    If unconfirmed hide, the concealed using operation of the application is exited.
  4. 4. the concealed application method of application according to claim 1, it is characterised in that further comprise:
    It is determined that hide the second application icon of the first application;
    Judge whether checking information is effective;
    If checking information is effective, the first hiding application to be launched is determined;
    Start the first hiding application.
  5. 5. the concealed application method of the application according to claim 1 or 4, it is characterised in that further comprise:
    It is determined that the second application icon of the first application is hidden, and display location;
    Judge whether checking information is effective;
    If checking information is effective, the first hiding application of display to be restored is determined;
    In the display location, recover the display first hiding application.
  6. 6. the concealed application method of application according to claim 5, it is characterised in that the determination display location is further Position of drawing a circle including obtaining user, or multiple display location Transparent frames are provided and select to determine for user.
  7. 7. the concealed application method of application according to claim 1, it is characterised in that further comprise:
    Second application icon described in Special display, the Special display include User Defined frame, color change.
  8. 8. the concealed application method of application according to claim 1, it is characterised in that described obtain provides stowed position Second application icon further comprises:First application icon is dragged to the second application icon, or the first application described in line Icon and the second application icon.
  9. 9. the concealed application method of application according to claim 1, it is characterised in that further comprise:
    Obtaining user, long-press or the application icon of double-click are the first application icon, the second application icon twice.
  10. A 10. system, it is characterised in that including:
    One memory, is configured as data storage and instruction;
    One is established the processor to communicate with memory, wherein, when performing the instruction in memory, the processor is configured For:
    User instruction and checking information are obtained, the user instruction is used to start the concealed using operation of application;
    Determine the first application icon to be concealed;
    Obtain the second application icon that stowed position is provided;
    Hide first application icon.
CN201710644272.9A 2017-07-31 2017-07-31 The concealed application method and system of a kind of application Pending CN107423585A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710644272.9A CN107423585A (en) 2017-07-31 2017-07-31 The concealed application method and system of a kind of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710644272.9A CN107423585A (en) 2017-07-31 2017-07-31 The concealed application method and system of a kind of application

Publications (1)

Publication Number Publication Date
CN107423585A true CN107423585A (en) 2017-12-01

Family

ID=60431704

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710644272.9A Pending CN107423585A (en) 2017-07-31 2017-07-31 The concealed application method and system of a kind of application

Country Status (1)

Country Link
CN (1) CN107423585A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109815670A (en) * 2019-01-17 2019-05-28 Oppo广东移动通信有限公司 Document handling method and Related product
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN113110771A (en) * 2021-04-01 2021-07-13 Tcl通讯(宁波)有限公司 Desktop application icon display control method and device, terminal equipment and storage medium
CN113452694A (en) * 2021-06-25 2021-09-28 中国人民解放军国防科技大学 Covert communication method for realizing network control on terminal application based on public channel

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
US20160300079A1 (en) * 2013-09-06 2016-10-13 Zte Corporation Method and Device for Processing Hidden File Folder, and Terminal
CN106126077A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 A kind of application program image target display control method and mobile terminal
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN106527856A (en) * 2016-10-26 2017-03-22 深圳市金立通信设备有限公司 Application icon display method and terminal
CN106682467A (en) * 2016-12-20 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Hiding method for software, device and intelligent terminal
CN106980439A (en) * 2017-03-21 2017-07-25 海信集团有限公司 The method and device of hiden application icon

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160300079A1 (en) * 2013-09-06 2016-10-13 Zte Corporation Method and Device for Processing Hidden File Folder, and Terminal
CN103793657A (en) * 2014-02-18 2014-05-14 北京网秦天下科技有限公司 System and method used for hiding application on mobile terminal
CN104732157A (en) * 2015-03-31 2015-06-24 酷派软件技术(深圳)有限公司 Method and device for hiding and opening applications
CN105574421A (en) * 2016-01-06 2016-05-11 珠海市魅族科技有限公司 Method and device for displaying and hiding application icon
CN105955587A (en) * 2016-06-15 2016-09-21 广东欧珀移动通信有限公司 Hidden application icon display method and device
CN106126077A (en) * 2016-06-15 2016-11-16 维沃移动通信有限公司 A kind of application program image target display control method and mobile terminal
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN106527856A (en) * 2016-10-26 2017-03-22 深圳市金立通信设备有限公司 Application icon display method and terminal
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN106682467A (en) * 2016-12-20 2017-05-17 宇龙计算机通信科技(深圳)有限公司 Hiding method for software, device and intelligent terminal
CN106980439A (en) * 2017-03-21 2017-07-25 海信集团有限公司 The method and device of hiden application icon

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system
CN109815670A (en) * 2019-01-17 2019-05-28 Oppo广东移动通信有限公司 Document handling method and Related product
CN113110771A (en) * 2021-04-01 2021-07-13 Tcl通讯(宁波)有限公司 Desktop application icon display control method and device, terminal equipment and storage medium
CN113452694A (en) * 2021-06-25 2021-09-28 中国人民解放军国防科技大学 Covert communication method for realizing network control on terminal application based on public channel
CN113452694B (en) * 2021-06-25 2022-04-08 中国人民解放军国防科技大学 Covert communication method for realizing network control on terminal application based on public channel

Similar Documents

Publication Publication Date Title
CN107657953A (en) Sound control method and system
CN107609914A (en) A kind of intelligent menu design method and system
CN107423585A (en) The concealed application method and system of a kind of application
CN108040167A (en) The method that limiting terminal uses
CN107256353A (en) Possesses the display methods of privacy protection function
CN107315681A (en) Application program self-starting test system, medium and method
CN109472122A (en) A kind of multimedia messages reminding method and system
CN109492412A (en) The encryption storage method and system of file
CN107358179A (en) A kind of living management system, medium and method based on iris verification
CN107862518A (en) A kind of method of payment and system based on terminal location
CN107786979A (en) A kind of multiple terminals shared communication method and system
CN107368793A (en) A kind of colored method for collecting iris and system
CN107341378A (en) For the method for the access right for setting application
CN107506721A (en) A kind of more method for collecting iris and system
CN107944245A (en) A kind of eyeball tracking iris unlocking method and system
CN107404484A (en) A kind of method, apparatus and system of mechanical release authority
CN107220531A (en) A kind of information processing method of convenient login
CN107018153A (en) A kind of safe login method
CN206908680U (en) Intelligent terminal with secure log function
CN108897479A (en) A kind of terminal touch control method and system
CN108010519A (en) A kind of information search method and system
CN107704843A (en) A kind of simple eye iris verification method and system
CN107402690A (en) A kind of global collecting method and system
CN107623736A (en) A kind of equipment connection method and system
CN108229383A (en) A kind of iris wiring method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171201