CN107766704B - Application program operation method and device and terminal - Google Patents

Application program operation method and device and terminal Download PDF

Info

Publication number
CN107766704B
CN107766704B CN201610670691.5A CN201610670691A CN107766704B CN 107766704 B CN107766704 B CN 107766704B CN 201610670691 A CN201610670691 A CN 201610670691A CN 107766704 B CN107766704 B CN 107766704B
Authority
CN
China
Prior art keywords
hidden
application
application program
operation interface
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610670691.5A
Other languages
Chinese (zh)
Other versions
CN107766704A (en
Inventor
陈思帆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610670691.5A priority Critical patent/CN107766704B/en
Publication of CN107766704A publication Critical patent/CN107766704A/en
Application granted granted Critical
Publication of CN107766704B publication Critical patent/CN107766704B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides an application program operation method, an application program operation device and a terminal, wherein the application program operation method comprises the following steps: setting an application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction; receiving a first opening instruction input by a user at a second position of a current display page of a system operation interface; and opening the hidden application program according to the first opening instruction, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position. By the technical scheme, the application program in the terminal can still be normally used after being hidden, so that the use safety of the terminal can be improved, and the use experience of a user can also be improved.

Description

Application program operation method and device and terminal
Technical Field
The invention relates to the technical field of terminals, in particular to an application program operation method, an application program operation device and a terminal.
Background
At present, in the related art, the application program of the terminal can be hidden so that the application program is not displayed on the operation interface of the terminal, but after the application program is hidden, the application program can be normally used only after the hiding is cancelled, so that inconvenience is brought to the use of a user.
Therefore, how to implement normal use of the application program after hiding the application program in the terminal, that is, the use safety of the terminal is improved and the use experience of the user is improved, is a technical problem to be solved urgently.
Disclosure of Invention
Based on the above problems, the present invention provides a new technical solution, in which an explicit system operation interface of a terminal is associated with a hidden operation interface, after an application program of the terminal is set in the hidden operation interface, a corresponding hidden application program can be opened by performing a click operation on a corresponding position of an application icon of the application program, where the application icon is placed on the system operation interface and the hidden operation interface, so as to normally use the hidden application program, that is, improve the use safety of the terminal and improve the use experience of a user.
In view of the above, according to a first aspect of the present invention, an application operating method is provided, including: setting an application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction; receiving a first opening instruction input by a user at a second position of a current display page of a system operation interface; and opening the hidden application program according to the first opening instruction, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position.
In the technical scheme, after the hidden application program is hidden according to the related setting operation of the user and the application icon is set at the first position of the current hidden page of the hidden operation interface of the terminal, the hidden application program can be opened to carry out normal operation when the user inputs a first opening instruction at the second position of the system operation interface displayed by the terminal and the current display page corresponding to the current hidden page, wherein the first position and the second position are corresponding, for example, the current hidden page and the current display page are respectively the third page of the hidden operation interface, and the first position and the second position are respectively the positions at the lower right corner of the corresponding page, so that the corresponding hidden application program can be operated and opened at the corresponding page of the system operation interface by associating the explicit system operation interface of the terminal with the implicit hidden operation interface, by using the hidden application program normally, the use safety of the terminal can be improved, and the use experience of a user can be improved.
In the foregoing technical solution, preferably, the opening the hidden application according to the first opening instruction specifically includes: detecting whether application icons of other application programs are displayed at the second position of the current display page or not; and when the application icons of the other application programs are not detected to be displayed at the second position, opening the hidden application program according to the first opening instruction.
In the technical scheme, when a first opening instruction for opening the hidden application program is input at a second position of a currently displayed page of a system operation interface of the terminal, whether application icons of other application programs are displayed at the position is detected, if not, the hidden application program can be directly opened according to the first opening instruction for relevant operation, and the condition that the application icons of other application programs cannot be displayed at the second position, corresponding to the first position where the application icons of the hidden application programs are displayed, of the currently displayed page is the necessary premise that the application programs in the terminal can still be normally used after being hidden is indicated.
Further, in the above technical solution, if it is detected that the application icon of the other application program is displayed at the second position, the other application program can only be correspondingly opened according to the first opening instruction.
In any of the above technical solutions, preferably, the method further includes: when the fact that the application icons of the other application programs are displayed at the second position is detected, the application icons of the other application programs are moved to other positions according to the received moving instruction, and the hidden application programs are opened according to the first opening instruction.
In the technical scheme, when the application icons of other application programs are detected to be displayed at the second position of the current display page of the system operation interface of the terminal, the application icons can be moved to other positions through a moving instruction input by a user, and then a first opening instruction can be continuously input to smoothly open the hidden application program for related operation, namely, the hidden application program can be opened at the corresponding display page of the explicit system operation interface in other effective modes after a path capable of opening the hidden application program is blocked, so that the use experience of the user is further improved.
In any of the above technical solutions, preferably, the method further includes: judging whether a decryption key input by a user is matched with a preset key or not; and entering the hidden operation interface when the decryption key is judged to be matched with a preset key, wherein the preset key and the hidden operation interface are correspondingly stored.
In the technical scheme, the hidden operation interface of the terminal is encrypted, identity authentication is required before the hidden operation interface is accessed to operate each time, only when the input decryption key is matched with the preset key, the hidden application program is allowed to be operated in the hidden operation interface, for example, the hidden application program is cancelled, namely, other people except the terminal user cannot enter the hidden operation interface at will, the use safety of the hidden application program is improved, and the use experience of a user is improved.
The key may be a digital key, a pattern key, a fingerprint identification key, an iris identification key, or the like.
In any of the above technical solutions, preferably, the method further includes: receiving an operation instruction input by a user on the hidden operation interface; and executing corresponding operation on the hidden application program according to the operation instruction.
In the technical scheme, after the user enters the hidden operation interface, the hidden application program can be correspondingly operated, such as opened for use, moved, deleted and the like, that is, under the hidden operation interface, the user can safely and securely perform any operation on the hidden application program without being limited by the right.
According to a second aspect of the present invention, there is provided an application operating apparatus comprising: the setting module is used for setting the application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction; the first receiving module is used for receiving a first opening instruction input by a user at a second position of a current display page of the system operation interface; and the control module is used for opening the hidden application program according to a first opening instruction received by the first receiving module, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position.
In the technical scheme, after the hidden application program is hidden according to the related setting operation of the user and the application icon is set at the first position of the current hidden page of the hidden operation interface of the terminal, the hidden application program can be opened to carry out normal operation when the user inputs a first opening instruction at the second position of the system operation interface displayed by the terminal and the current display page corresponding to the current hidden page, wherein the first position and the second position are corresponding, for example, the current hidden page and the current display page are respectively the third page of the hidden operation interface, and the first position and the second position are respectively the positions at the lower right corner of the corresponding page, so that the corresponding hidden application program can be operated and opened at the corresponding page of the system operation interface by associating the explicit system operation interface of the terminal with the implicit hidden operation interface, by using the hidden application program normally, the use safety of the terminal can be improved, and the use experience of a user can be improved.
In the above technical solution, preferably, the control module specifically includes: the detection submodule is used for detecting whether application icons of other application programs are displayed at the second position of the current display page or not; and the promoter module is used for opening the hidden application program according to the first opening instruction when the detection submodule does not detect that the application icons of the other application programs are displayed at the second position.
In the technical scheme, when a first opening instruction for opening the hidden application program is input at a second position of a currently displayed page of a system operation interface of the terminal, whether application icons of other application programs are displayed at the position is detected, if not, the hidden application program can be directly opened according to the first opening instruction for relevant operation, and the condition that the application icons of other application programs cannot be displayed at the second position, corresponding to the first position where the application icons of the hidden application programs are displayed, of the currently displayed page is the necessary premise that the application programs in the terminal can still be normally used after being hidden is indicated.
Further, in the above technical solution, if the detection sub-module detects that the application icon of the other application program is displayed at the second position, the sub-module can only correspondingly open the other application program according to the first opening instruction.
In any one of the above technical solutions, preferably, the control module further includes: and the moving submodule is used for moving the application icons of the other application programs to other positions according to the received moving instruction when the detection submodule detects that the application icons of the other application programs are displayed at the second position, so that the hidden application programs are opened by the starting submodule according to the first opening instruction.
In the technical scheme, when the application icons of other application programs are detected to be displayed at the second position of the current display page of the system operation interface of the terminal, the application icons can be moved to other positions through a moving instruction input by a user, and then a first opening instruction can be continuously input to smoothly open the hidden application program for related operation, namely, the hidden application program can be opened at the corresponding display page of the explicit system operation interface in other effective modes after a path capable of opening the hidden application program is blocked, so that the use experience of the user is further improved.
In any of the above technical solutions, preferably, the method further includes: the judging module is used for judging whether the decryption key input by the user is matched with the preset key; and the control module is further configured to: and when the judgment module judges that the decryption key is matched with a preset key, entering the hidden operation interface, wherein the preset key and the hidden operation interface are correspondingly stored.
In the technical scheme, the hidden operation interface of the terminal is encrypted, identity authentication is required before the hidden operation interface is accessed to operate each time, only when the input decryption key is matched with the preset key, the hidden application program is allowed to be operated in the hidden operation interface, for example, the hidden application program is cancelled, namely, other people except the terminal user cannot enter the hidden operation interface at will, the use safety of the hidden application program is improved, and the use experience of a user is improved.
The key may be a digital key, a pattern key, a fingerprint identification key, an iris identification key, or the like.
In any of the above technical solutions, preferably, the method further includes: the second receiving module is used for receiving an operation instruction input by a user on the hidden operation interface; and the execution module is used for executing corresponding operation on the hidden application program according to the operation instruction received by the second receiving module.
In the technical scheme, after the user enters the hidden operation interface, the hidden application program can be correspondingly operated, such as opened for use, moved, deleted and the like, that is, under the hidden operation interface, the user can safely and securely perform any operation on the hidden application program without being limited by the right.
According to a third aspect of the present invention, there is provided a terminal comprising: the application operating device according to any of the above technical solutions, therefore, the terminal has all the advantages of the application operating device according to any of the above technical solutions, and details are not repeated herein.
According to the technical scheme, the explicit system operation interface of the terminal is associated with the implicit hidden operation interface, after the application program of the terminal is arranged on the hidden operation interface, the corresponding hidden application program can be opened by clicking the corresponding position of the application icon of the application program on the system operation interface and the hidden operation interface, so that the hidden application program can be normally used, namely the use safety of the terminal is improved, and the use experience of a user can be improved.
Drawings
FIG. 1 shows a flow diagram of a method of operation of an application program of an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for opening a hidden application according to a first open command according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for unlocking a hidden operation interface according to an embodiment of the present invention;
FIG. 4 is a schematic diagram illustrating a system operation interface and a hidden operation interface of a terminal according to an embodiment of the present invention;
fig. 5 is a second schematic diagram illustrating a comparison between a system operation interface and a hidden operation interface of the terminal according to the embodiment of the present invention;
fig. 6 is a third schematic diagram illustrating a comparison between a system operation interface and a hidden operation interface of a terminal according to an embodiment of the present invention;
FIG. 7 shows a schematic block diagram of an application operating device of an embodiment of the present invention;
FIG. 8 shows a schematic block diagram of the control module shown in FIG. 7.
Detailed Description
So that the manner in which the above recited objects, features and advantages of the present invention can be understood in detail, a more particular description of the invention, briefly summarized above, may be had by reference to the embodiments thereof which are illustrated in the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
FIG. 1 shows a flow diagram of a method of operation of an application program of an embodiment of the present invention.
As shown in fig. 1, the application program operation method according to the embodiment of the present invention includes the following steps:
and 102, setting an application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction.
And 104, receiving a first opening instruction input by a user at a second position of a current display page of the system operation interface.
And 106, opening the hidden application program according to the first opening instruction, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position.
In the technical scheme, after the hidden application program is hidden according to the related setting operation of the user and the application icon is set at the first position of the current hidden page of the hidden operation interface of the terminal, the hidden application program can be opened to carry out normal operation when the user inputs a first opening instruction at the second position of the system operation interface displayed by the terminal and the current display page corresponding to the current hidden page, wherein the first position and the second position are corresponding, for example, the current hidden page and the current display page are respectively the third page of the hidden operation interface, and the first position and the second position are respectively the positions at the lower right corner of the corresponding page, so that the corresponding hidden application program can be operated and opened at the corresponding page of the system operation interface by associating the explicit system operation interface of the terminal with the implicit hidden operation interface, by using the hidden application program normally, the use safety of the terminal can be improved, and the use experience of a user can be improved.
According to a specific embodiment of the present invention, after the hidden application program is set on the current hidden page of the hidden operation interface, the touch point coordinate of the position where the application icon of the hidden application program is located is obtained, and the touch point coordinate is associated with the touch point coordinate of the same position of the current display page of the system operation interface corresponding to the current hidden page, so as to implement the opening instruction received through the touch point coordinate of the current display page to associate and open the hidden application program.
For step 106 in the above embodiment, the following specific embodiments may be implemented, as shown in fig. 2, including:
step 1062, detecting whether the application icons of other application programs are displayed at the second position of the currently displayed page.
Step 1064, when it is not detected that the application icon of the other application program is displayed at the second position, opening the hidden application program according to the first opening instruction.
In the technical scheme, when a first opening instruction for opening the hidden application program is input at a second position of a currently displayed page of a system operation interface of the terminal, whether application icons of other application programs are displayed at the position is detected, if not, the hidden application program can be directly opened according to the first opening instruction for relevant operation, and the condition that the application icons of other application programs cannot be displayed at the second position, corresponding to the first position where the application icons of the hidden application programs are displayed, of the currently displayed page is the necessary premise that the application programs in the terminal can still be normally used after being hidden is indicated.
If it is detected in step 1062 that the application icon of the other application program is displayed at the second position, the other application program can only be opened correspondingly according to the first opening instruction.
Further, in the above embodiment, the method further includes: when the fact that the application icons of the other application programs are displayed at the second position is detected, the application icons of the other application programs are moved to other positions according to the received moving instruction, and the hidden application programs are opened according to the first opening instruction.
In the technical scheme, when the application icons of other application programs are detected to be displayed at the second position of the current display page of the system operation interface of the terminal, the application icons can be moved to other positions through a moving instruction input by a user, and then a first opening instruction can be continuously input to smoothly open the hidden application program for related operation, namely, the hidden application program can be opened at the corresponding display page of the explicit system operation interface in other effective modes after a path capable of opening the hidden application program is blocked, so that the use experience of the user is further improved.
In any of the above embodiments, the following process steps are further included, as shown in fig. 3:
in step S30, it is determined whether the decryption key input by the user matches the preset key.
Step S32, when it is determined that the decryption key matches a preset key, entering the hidden operation interface, where the preset key and the hidden operation interface are stored correspondingly.
In the technical scheme, the hidden operation interface of the terminal is encrypted, identity authentication is required before the hidden operation interface is accessed to operate each time, only when the input decryption key is matched with the preset key, the hidden application program is allowed to be operated in the hidden operation interface, for example, the hidden application program is cancelled, namely, other people except the terminal user cannot enter the hidden operation interface at will, the use safety of the hidden application program is improved, and the use experience of a user is improved.
The key may be a digital key, a pattern key, a fingerprint identification key, an iris identification key, or the like.
In any of the above embodiments, further comprising: receiving an operation instruction input by a user on the hidden operation interface; and executing corresponding operation on the hidden application program according to the operation instruction.
In the technical scheme, after the user enters the hidden operation interface, the hidden application program can be correspondingly operated, such as opened for use, moved, deleted and the like, that is, under the hidden operation interface, the user can safely and securely perform any operation on the hidden application program without being limited by the right.
The following describes an embodiment of the present invention with reference to fig. 4 to 6.
As shown in fig. 4, if the currently displayed page of the system operation interface is a first page, the currently hidden page of the corresponding hidden operation interface is also the first page, where the hidden applications are a property isolation system application and a fingerprint application, and when the two applications are opened in the system operation interface, the two applications can be opened by clicking corresponding points on the first page at second positions corresponding to the first positions where the two applications are located, and the two applications cannot be opened by clicking corresponding points on other pages.
In addition, as shown in fig. 4, an application icon of an alarm clock application is displayed at a position of the currently displayed page corresponding to the position of the application icon of the fingerprint application of the currently hidden page, and if the alarm clock application can only be opened by directly clicking the position, at this time, if the application icon of the alarm clock application can be moved to other positions first if the fingerprint application is to be opened, as shown in fig. 5, and then the fingerprint application can be opened by clicking the position again.
In the specific embodiment, a function of "hidden application" is added in the setting of the operation interface, a user can enter the hidden operation interface through key verification, the hidden operation interface is consistent with a system operation interface (namely a normally displayed terminal desktop), the page numbers correspond to one another, after the application program is added into the hidden application program, an application icon of the hidden application program can be dragged randomly in the hidden interface, the hidden application program can be opened at a corresponding point on the system operation interface, the application icon of the hidden application program cannot be displayed, the hidden application program can be opened normally after the hidden application program is realized, and the application program can be used conveniently while secret management is performed on the application program.
The user may also implement the operation of adding a blank page in the hidden operation interface, as shown in fig. 6, if the file management application is on the third page of the hidden operation interface, the application may be opened at a position corresponding to the third page of the system operation interface, and if the third page does not exist in the system operation interface, the application may not be opened.
Further, if the user forgets the position of the hidden application program, the user can view or cancel the hiding through entering the hidden operation interface, and due to the fact that the access key is set, the user cannot enter the hidden operation interface to view and the like unless the user himself/herself.
The dashed boxes shown in fig. 4 to 6 are used to identify that the hidden operation interface is located at the second position of the system operation interface corresponding to the first position of the hidden operation interface, and will not be displayed on the system operation interface during actual display.
Fig. 7 shows a schematic block diagram of an application operating device of an embodiment of the present invention.
As shown in fig. 7, the application operating apparatus 700 according to an embodiment of the present invention includes: a setting module 702, a first receiving module 704, and a control module 706.
The setting module 702 is configured to set an application icon of a hidden application program at a first position of a current hidden page of a hidden operation interface according to a received setting instruction; a first receiving module 704, configured to receive a first start instruction input by a user at a second position of a currently displayed page of the system operation interface; a control module 706, configured to open the hidden application according to a first open instruction received by the first receiving module 704, where the current display page corresponds to the current hidden page, and the second position corresponds to the first position.
In the technical scheme, after the hidden application program is hidden according to the related setting operation of the user and the application icon is set at the first position of the current hidden page of the hidden operation interface of the terminal, the hidden application program can be opened to carry out normal operation when the user inputs a first opening instruction at the second position of the system operation interface displayed by the terminal and the current display page corresponding to the current hidden page, wherein the first position and the second position are corresponding, for example, the current hidden page and the current display page are respectively the third page of the hidden operation interface, and the first position and the second position are respectively the positions at the lower right corner of the corresponding page, so that the corresponding hidden application program can be operated and opened at the corresponding page of the system operation interface by associating the explicit system operation interface of the terminal with the implicit hidden operation interface, by using the hidden application program normally, the use safety of the terminal can be improved, and the use experience of a user can be improved.
According to a specific embodiment of the present invention, after the hidden application program is set on the current hidden page of the hidden operation interface, the touch point coordinate of the position where the application icon of the hidden application program is located is obtained, and the touch point coordinate is associated with the touch point coordinate of the same position of the current display page of the system operation interface corresponding to the current hidden page, so as to implement the opening instruction received through the touch point coordinate of the current display page to associate and open the hidden application program.
As shown in fig. 8, the control module 706 in the above embodiment specifically includes: a detection sub-module 7062 and a promoter module 7064.
The detection sub-module 7062 is configured to detect whether an application icon of another application program is displayed at the second position of the currently displayed page; a start module 7064, configured to, when the detection sub-module 7062 does not detect that the application icon of the other application program is displayed at the second position, open the hidden application program according to the first start instruction.
In the technical scheme, when a first opening instruction for opening the hidden application program is input at a second position of a currently displayed page of a system operation interface of the terminal, whether application icons of other application programs are displayed at the position is detected, if not, the hidden application program can be directly opened according to the first opening instruction for relevant operation, and the condition that the application icons of other application programs cannot be displayed at the second position, corresponding to the first position where the application icons of the hidden application programs are displayed, of the currently displayed page is the necessary premise that the application programs in the terminal can still be normally used after being hidden is indicated.
Further, in the above technical solution, if the detection sub-module 7062 detects that the application icon of another application program is displayed at the second position, the start sub-module 7064 can only correspondingly open the other application program according to the first start instruction.
Further, the control module 706 in the above embodiment specifically further includes: a moving sub-module 7066, configured to, when the detection sub-module 7062 detects that the application icon of the other application program is displayed at the second position, move the application icon of the other application program to another position according to the received moving instruction, so that the sub-module 7064 opens the hidden application program according to the first opening instruction.
In the technical scheme, when the application icons of other application programs are detected to be displayed at the second position of the current display page of the system operation interface of the terminal, the application icons can be moved to other positions through a moving instruction input by a user, and then a first opening instruction can be continuously input to smoothly open the hidden application program for related operation, namely, the hidden application program can be opened at the corresponding display page of the explicit system operation interface in other effective modes after a path capable of opening the hidden application program is blocked, so that the use experience of the user is further improved.
The application operating apparatus 700 according to any of the above embodiments further includes: a judging module 708, configured to judge whether a decryption key input by a user matches a preset key; and the control module 706 is further configured to: when the determining module 708 determines that the decryption key matches a preset key, the hidden operation interface is entered, where the preset key and the hidden operation interface are stored correspondingly.
In the technical scheme, the hidden operation interface of the terminal is encrypted, identity authentication is required before the hidden operation interface is accessed to operate each time, only when the input decryption key is matched with the preset key, the hidden application program is allowed to be operated in the hidden operation interface, for example, the hidden application program is cancelled, namely, other people except the terminal user cannot enter the hidden operation interface at will, the use safety of the hidden application program is improved, and the use experience of a user is improved.
The key may be a digital key, a pattern key, a fingerprint identification key, an iris identification key, or the like.
The application operating apparatus 700 according to any of the above embodiments further includes: a second receiving module 710 and an executing module 712.
The second receiving module 710 is configured to receive an operation instruction input by a user on the hidden operation interface; an executing module 712, configured to execute a corresponding operation on the hidden application according to the operation instruction received by the second receiving module 710.
In the technical scheme, after the user enters the hidden operation interface, the hidden application program can be correspondingly operated, such as opened for use, moved, deleted and the like, that is, under the hidden operation interface, the user can safely and securely perform any operation on the hidden application program without being limited by the right.
The terminal according to the embodiment of the present invention may include the application operating device according to any one of the above technical solutions, and therefore, the terminal has all the advantages of the application operating device according to any one of the above technical solutions, and details thereof are not described herein again.
The technical scheme of the invention is described in detail with reference to the accompanying drawings, an explicit system operation interface of the terminal is associated with a hidden operation interface, after an application program of the terminal is arranged on the hidden operation interface, the corresponding hidden application program can be opened by clicking the corresponding position of the application icon of the application program arranged on the system operation interface and the hidden operation interface, so that the hidden application program can be normally used, that is, the use safety of the terminal is improved, and the use experience of a user can be improved.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (7)

1. An application operating method, comprising:
setting an application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction;
receiving a first opening instruction input by a user at a second position of a current display page of a system operation interface;
opening the hidden application program according to the first opening instruction, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position;
detecting whether application icons of other application programs are displayed at the second position of the current display page or not;
when the application icons of the other application programs are not detected to be displayed at the second position, opening the hidden application program according to the first opening instruction;
when the fact that the application icons of the other application programs are displayed at the second position is detected, the application icons of the other application programs are moved to other positions according to the received moving instruction, and the hidden application programs are opened according to the first opening instruction.
2. The method for operating an application program according to claim 1, further comprising:
judging whether a decryption key input by a user is matched with a preset key or not;
and entering the hidden operation interface when the decryption key is judged to be matched with a preset key, wherein the preset key and the hidden operation interface are correspondingly stored.
3. The method of operating an application program according to claim 2, further comprising:
receiving an operation instruction input by a user on the hidden operation interface;
and executing corresponding operation on the hidden application program according to the operation instruction.
4. An application operating device, comprising:
the setting module is used for setting the application icon of the hidden application program at a first position of a current hidden page of the hidden operation interface according to the received setting instruction;
the first receiving module is used for receiving a first opening instruction input by a user at a second position of a current display page of the system operation interface;
the control module is used for opening the hidden application program according to a first opening instruction received by the first receiving module, wherein the current display page corresponds to the current hidden page, and the second position corresponds to the first position;
the detection submodule is used for detecting whether application icons of other application programs are displayed at the second position of the current display page or not;
the starting module is used for opening the hidden application program according to the first opening instruction when the detection submodule does not detect that the application icons of the other application programs are displayed at the second position;
the control module specifically further comprises:
and the moving submodule is used for moving the application icons of the other application programs to other positions according to the received moving instruction when the detection submodule detects that the application icons of the other application programs are displayed at the second position, so that the hidden application programs are opened by the starting submodule according to the first opening instruction.
5. The application operating apparatus according to claim 4, further comprising:
the judging module is used for judging whether the decryption key input by the user is matched with the preset key; and
the control module is further configured to:
and when the judgment module judges that the decryption key is matched with a preset key, entering the hidden operation interface, wherein the preset key and the hidden operation interface are correspondingly stored.
6. The application operating apparatus according to claim 5, further comprising:
the second receiving module is used for receiving an operation instruction input by a user on the hidden operation interface;
and the execution module is used for executing corresponding operation on the hidden application program according to the operation instruction received by the second receiving module.
7. A terminal, comprising: an application operating device as claimed in any one of claims 4 to 6.
CN201610670691.5A 2016-08-15 2016-08-15 Application program operation method and device and terminal Active CN107766704B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610670691.5A CN107766704B (en) 2016-08-15 2016-08-15 Application program operation method and device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610670691.5A CN107766704B (en) 2016-08-15 2016-08-15 Application program operation method and device and terminal

Publications (2)

Publication Number Publication Date
CN107766704A CN107766704A (en) 2018-03-06
CN107766704B true CN107766704B (en) 2020-10-16

Family

ID=61259932

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610670691.5A Active CN107766704B (en) 2016-08-15 2016-08-15 Application program operation method and device and terminal

Country Status (1)

Country Link
CN (1) CN107766704B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014086210A1 (en) * 2012-12-07 2014-06-12 腾讯科技(深圳)有限公司 Touchscreen unlocking method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224171B (en) * 2015-09-22 2019-08-02 小米科技有限责任公司 Icon display method, device and terminal
CN105335048B (en) * 2015-10-09 2020-12-18 惠州Tcl移动通信有限公司 Electronic equipment with hidden application icon and method for hiding application icon
CN105549810A (en) * 2015-10-28 2016-05-04 东莞酷派软件技术有限公司 Application icon processing method and device, and terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014086210A1 (en) * 2012-12-07 2014-06-12 腾讯科技(深圳)有限公司 Touchscreen unlocking method and device

Also Published As

Publication number Publication date
CN107766704A (en) 2018-03-06

Similar Documents

Publication Publication Date Title
CN103823632B (en) A kind of unlocking screen method and its terminal
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
US20140184549A1 (en) Method of Defining Software Functions on an Electronic Device Having Biometric Detection
KR101622300B1 (en) Limiting the functionality of a software program based on a security model
US20120196573A1 (en) Mobile device, and security lock control method and program thereof
CN103440445A (en) Electronic equipment unlocking control method and system
CN104866752B (en) A kind of application guard method and user terminal
CN103927466A (en) Method and device for controlling mobile terminal
CN107038357A (en) User authority control method and mobile terminal
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
US20150047019A1 (en) Information processing method and electronic device
CN103426215B (en) For door lock management-control method and the system of unexpected relief
CN106372479A (en) Mobile terminal and method of controlling the same
CN104951677B (en) Information processing method and device
CN105094874A (en) Application starting method and system
CN104376241A (en) Information processing method and electronic device
CN108717508B (en) Information processing method and electronic equipment
CN104252352A (en) Information processing method and electronic equipment
CN106815504A (en) The method and terminal of a kind of unlock terminal
KR101392113B1 (en) Fingerprint locking system
CN106529264A (en) Application locking and unlocking method and apparatus
CN106775326A (en) A kind of screen control method and device for mobile terminal
CN106815502A (en) The method and apparatus for checking message
CN111095896A (en) Method and system for controlling access to authenticated functionality
CN105141750A (en) Screen locking method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant