CN108171034A - A kind of method and terminal for protecting privacy - Google Patents

A kind of method and terminal for protecting privacy Download PDF

Info

Publication number
CN108171034A
CN108171034A CN201711384554.6A CN201711384554A CN108171034A CN 108171034 A CN108171034 A CN 108171034A CN 201711384554 A CN201711384554 A CN 201711384554A CN 108171034 A CN108171034 A CN 108171034A
Authority
CN
China
Prior art keywords
terminal
input
user
interface
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711384554.6A
Other languages
Chinese (zh)
Inventor
樊永祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201711384554.6A priority Critical patent/CN108171034A/en
Publication of CN108171034A publication Critical patent/CN108171034A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the present invention provides a kind of method and terminal for protecting privacy, complex applied to the process that in field of terminal technology, can solve the problems, such as terminal unlatching privacy area.Concrete scheme is:Terminal receives first input of the user on predefined interface, and the first input on predefined interface is used to indicate terminal and opens privacy area, which is an interface in the desktop of terminal;In response to the first input, terminal acquires the biological characteristic of user;If biological characteristic and predefined biometric matches, terminal open privacy area.The method and terminal of protection privacy provided in an embodiment of the present invention, in the scene for the privacy protection function for being applied particularly to user's using terminal.

Description

A kind of method and terminal for protecting privacy
Technical field
The present embodiments relate to field of terminal technology more particularly to a kind of methods and terminal for protecting privacy.
Background technology
With the development of the communication technology, the intelligence degree of the terminals such as mobile phone, tablet computer is continuously improved, to meet user Various demands.Wherein, user has secret protection to some files stored in terminal (such as photo or video file etc.) Demand.
In the prior art, can include needing for hiding when terminal is in the scene of privacy protection mode, in the terminal Want the privacy area of the file of secret protection.Wherein, when user control terminal opens privacy area, the usual display reminding of terminal disappears It ceases that user is prompted to input specific cryptosystem or certain gestures;User inputs the specific cryptosystem or certain gestures so that terminal unlatching is hidden Private region, and the icon of the application program for needing secret protection (such as picture library application or Video Applications) can be dragged in the privacy In region, so as to which terminal can hide the icon of the application program by the privacy area, to carry out privacy to the application program Protection.When user uses the application program, terminal can show identical prompting message so that user can be by identical Input control terminal opens privacy area, so that terminal shows the icon of the application program in privacy area, so as to which user can be with The icon for operating the application program uses the application program.
The problem is that when user control terminal opens privacy area, terminal needs to receive user's input specifically Password or certain gestures could open privacy area.In this way, cause the process that terminal opens privacy area complex.
Invention content
The embodiment of the present invention provides a kind of method for protecting privacy, to solve the privacy protection function of user's using terminal When, terminal open privacy area process it is complex the problem of.
In order to solve the above-mentioned technical problem, the embodiment of the present invention is realized in:
In a first aspect, the embodiment of the present invention provides a kind of method for protecting privacy, including:Terminal receives user predefined The first input on interface, the first input on predefined interface are used to indicate terminal and open privacy area, the predefined boundary Face is an interface in the desktop of terminal;In response to the first input, terminal acquires the biological characteristic of user;If biological characteristic with Predefined biometric matches, terminal then open privacy area.
Second aspect, the embodiment of the present invention additionally provide a kind of terminal, which includes receiving module, acquisition module and open Open module.Wherein, receiving module, for receiving first input of the user on predefined interface, the on predefined interface One input is used to indicate terminal and opens privacy area, which is an interface in the desktop of terminal;Acquisition module, For the first input received in response to receiving module, the biological characteristic of user is acquired;Opening module, if being adopted for acquisition module The biological characteristic of collection and predefined biometric matches, then open privacy area.
The third aspect, an embodiment of the present invention provides a kind of terminal, which includes processor, memory and is stored in this On memory and the computer program that can run on the processor, realized as above when which is performed by the processor The step of stating the method for the protection privacy in first aspect.
Fourth aspect, an embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage mediums Computer program is stored in matter, is realized when which is executed by processor such as the protection privacy in above-mentioned first aspect The step of method.
The method and terminal of protection privacy provided in an embodiment of the present invention, terminal receive user on predefined interface It, can be with the biological characteristic of automatic collection user to open when first input, i.e. terminal meet the trigger condition for opening privacy area Privacy area is actively entered its biological characteristic or specific cryptosystem without user.In this way, can improve terminal opens privacy The flexibility in region so that the input that user control terminal opens privacy area is relatively simple.
Also, since the process that terminal opens privacy area will not show any prompt message to user, user is not It can know that terminal opens the process of privacy area, i.e. the process of terminal unlatching privacy area is more hidden.In this way, improve terminal To the secret protection effect for the icon that privacy area includes, that is, the privacy for improving the file that secret protection is needed to user is protected Protect effect.
Description of the drawings
Fig. 1 is a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention;
Fig. 2 is a kind of flow diagram one of the method for protection privacy provided in an embodiment of the present invention;
Fig. 2 a are a kind of flow diagram two of the method for protection privacy provided in an embodiment of the present invention;
Fig. 3 is the example schematic one at interface that a kind of terminal provided in an embodiment of the present invention is shown;
Fig. 4 is the example schematic two at interface that a kind of terminal provided in an embodiment of the present invention is shown;
Fig. 5 is the example schematic three at interface that a kind of terminal provided in an embodiment of the present invention is shown;
Fig. 6 is the example schematic four at interface that a kind of terminal provided in an embodiment of the present invention is shown;
Fig. 7 is a kind of possible structure diagram one of terminal provided in an embodiment of the present invention;
Fig. 8 is a kind of possible structure diagram two of terminal provided in an embodiment of the present invention;
Fig. 9 is a kind of hardware architecture diagram of terminal provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
The terms "and/or" is a kind of incidence relation for describing affiliated partner, and expression may have three kinds of relationships, For example, A and/or B, can represent:Individualism A exists simultaneously A and B, these three situations of individualism B.Symbol herein "/" represents that affiliated partner is relationship such as A/B expressions A or B either.
Term " first ", " second " and " third " in description and claims of this specification etc. is for distinguishing not Same object rather than the particular order for description object.For example, the first input, the second input and third input etc. are to use Particular order in distinguishing different inputs rather than for describing input.
In embodiments of the present invention, " illustrative " or " such as " etc. words for represent make example, illustration or explanation.This Be described as in inventive embodiments " illustrative " or " such as " any embodiment or designing scheme be not necessarily to be construed as comparing Other embodiments or designing scheme more preferably or more advantage.Specifically, use " illustrative " or " such as " etc. words purport Related notion is being presented in specific ways.
In the description of the embodiment of the present invention, unless otherwise indicated, the meaning of " multiple " refers to two or more, For example, multiple processing units refer to two or more processing unit;Multiple element refers to two or more Element etc..
During in order to solve the privacy protection function of user's using terminal, the process that terminal opens privacy area is more complicated Problem.The method of protection privacy provided in an embodiment of the present invention, terminal trigger the input of unlatching privacy area receiving user Later, can the specific password of user's input without display reminding message and be received with the biological characteristic of automatic collection user Or certain gestures, the complexity that terminal opens privacy area can be reduced.
Terminal provided in an embodiment of the present invention can be with operating system.For example, the terminal can be helped for individual digital Manage (personal digital assistant, PDA), tablet computer, mobile phone, net book etc..Aforesaid operations system can be Android (Android) operating system can be iOS operating systems, can also be other possible operating systems, and the present invention is implemented Example is not especially limited.
Below by taking Android operation system as an example, introduce it is provided in an embodiment of the present invention protection privacy method applied it is soft Part environment.
As shown in Figure 1, for a kind of configuration diagram of possible Android operation system provided in an embodiment of the present invention.Scheming In 1, the framework of Android operation system includes 4 layers, respectively:Application layer, application framework layer, system operation library layer and Inner nuclear layer (is specifically as follows Linux inner core).
Wherein, application layer includes each application program in Android operation system (including system application and the Tripartite's application program).For example, the system application installed in terminal provided in an embodiment of the present invention can include picture library application (letter Claim " picture library "), short message application (referred to as " short message "), setting application (referred to as " setting "), file management application (abbreviation " file pipe Reason "), camera applications (referred to as " camera ") and contact application (abbreviation " contact person ") etc..Terminal provided in an embodiment of the present invention The third party application of middle installation can include third party's file management application etc..
Above application process block rack-layer is the frame of application program, and developer can be in the frame in accordance with application program In the case of development philosophy, some application programs are developed based on application framework layer.
System operation library layer includes library (also referred to as system library) and Android operation system running environment.Library is mainly Android behaviour All kinds of resources needed for it are provided as system.Android operation system running environment is used to provide software loop for Android operation system Border.
Inner nuclear layer is the operating system layer of Android operation system, belongs to the bottom of Android operation system software level.It is interior Stratum nucleare provides core system service and hardware-related driver based on linux kernel for Android operation system.
By taking Android operation system as an example, in the embodiment of the present invention, developer can be based on above-mentioned Android as shown in Figure 1 The system architecture of operating system, the software program of the method for protection privacy provided in an embodiment of the present invention is realized in exploitation, so as to make The method for obtaining the protection privacy can be run based on Android operation system as shown in Figure 1.I.e. processor or terminal can lead to It crosses and the method that the software program realizes protection privacy provided in an embodiment of the present invention is run in the operating system of Android.
In general, terminal has touch screen, which can be used for receiving the input of user, and in response to the input To show the corresponding content of the input.The specific of each step in the method for protection privacy is realized in following embodiment to terminal Description can be by taking mobile phone as an example.
In a kind of specific embodiment provided by the invention, pass through the flow chart pair of the method for protection privacy shown in Fig. 2 The method of protection privacy provided in an embodiment of the present invention is described in detail.Wherein, although showing this in method flow diagram The logical order of the method for the protection privacy that inventive embodiments provide, but in some cases, can be to be different from herein Sequence performs shown or described step.For example, the method for protection privacy shown in Figure 2 can include S201-S203:
S201, terminal receive first input of the user on predefined interface.
It should be noted that the embodiment of the present invention, which provides terminal, has the function of secret protection, it is as useful in set in terminal The privacy area of the file of secret protection is needed in hiding user.During the privacy protection function of user's using terminal, it can control Terminal opens privacy area.
Wherein, above-mentioned the first input on predefined interface is used to indicate terminal and opens privacy area, i.e., this is first defeated Enter and this predefines trigger condition that privacy area is opened at interface for terminal.Above-mentioned predefined interface is one in the desktop of terminal A interface.
It is understood that above-mentioned predefined interface can be set with user during using terminal, alternatively, above-mentioned Predefined interface can be terminal default setting.
Optionally, above-mentioned predefined interface includes privacy area.At this point, predefined interface can include one or more not The file of secret protection or the icon of application program are needed, does not need to the icon of the camera applications of secret protection such as.Certainly, this is hidden Any icon may not currently be included in private region, user can add the file for needing secret protection into the privacy area, So that the privacy area includes the corresponding icon of the private file.
Optionally, above-mentioned predefined interface does not include privacy area, which, which can be located in the desktop of terminal, removes Interface (being denoted as hiding interface) except current each interface (such as predefined interface).At this point, privacy area is not opened in terminal When, which does not show that this hides interface.
S202, it is inputted in response to first, terminal acquires the biological characteristic of user.
It is emphasized that terminal receive user's instruction terminal open privacy area trigger condition after, It, i.e., will not display reminding information in the current interface of terminal without prompting user with the biological characteristic of automatic collection user So that user will not know that terminal open the process of privacy area.
Illustratively, above-mentioned biological characteristic can be the face characteristic of user or the human eye iris feature etc. of user, one A biological characteristic being capable of one user of unique mark.
For example, terminal can have the components such as camera, for acquiring the face characteristic of user.Wherein, terminal can not Show that it opens the process of the face characteristic of camera acquisition user, i.e. terminal does not show view-finder and camera shooting of camera Collected face characteristic etc..Also, terminal, which does not need to show, such as " is please placed in face area in view-finder " prompting letter Breath, but detected automatically by the camera of terminal and acquire the face characteristic of user.Certainly, user does not need to input specific finger Line or specific password open privacy area with control terminal.
If S203, biological characteristic and predefined biometric matches, terminal open privacy area.
Wherein, above-mentioned predefined biological characteristic is usually the biological characteristic of owner user.Certainly, above-mentioned predefined biology is special Sign can also be the biological characteristic of the pre-set pre-set user in addition to owner user.
Illustratively, as shown in figure 3, by taking mobile phone 30 as an example, user can be supplied to be used in " setting " in mobile phone 30 Predefined biological characteristic is set, the option of predefined face characteristic is such as set.At this point, user is to the predefined people of the setting The option of face feature is inputted so that mobile phone 30 acquires and stores the predefined face characteristic of user.
Specifically, currently collecting the biological characteristic of user and predefined biometric matches in terminal, i.e. the biology is special Levy for owner user biological characteristic or above-mentioned pre-set user biological characteristic when, terminal can open privacy area so that The user can obtain the file for the secret protection that the privacy area includes or privacy be needed to protect to privacy area addition The file of shield.
It is understood that the biological characteristic of user and predefined biological characteristic mismatch are currently collected in terminal, i.e., When the biological characteristic is for the biological characteristic of the biological characteristic of owner user or above-mentioned pre-set user, terminal will not open privacy Region, the i.e. user cannot obtain the file for the secret protection that the privacy area includes.At this point, terminal will not show any carry Show information, i.e. user will not learn that terminal opens privacy area failure.
It should be noted that the method and terminal of protection privacy provided in an embodiment of the present invention, terminal receive user and exist The first input on predefined interface, i.e., can be with automatic collection user's when terminal meets the trigger condition for opening privacy area Biological characteristic is actively entered its biological characteristic or specific cryptosystem to open privacy area, without user.In this way, it can carry High terminal opens the flexibility of privacy area so that the input that user control terminal opens privacy area is relatively simple.
Also, since the process that terminal opens privacy area will not show any prompt message to user, user is not It can know that terminal opens the process of privacy area, i.e. the process of terminal unlatching privacy area is more hidden.In this way, improve terminal To the secret protection effect for the icon that privacy area includes, that is, the privacy for improving the file that secret protection is needed to user is protected Protect effect.
Optionally, it is user that above-mentioned first input, which is touch-screen input or first input of the user on predefined interface, Either the first input is gravity input or first of the user on predefined interface for fingerprint input on predefined interface Input the key-press input on predefined interface for user.
Illustratively, above-mentioned touch-screen input for user to the pressing input of the touch screen of mobile phone, long-press input, slide it is defeated Enter, click input, suspend input (input of the user near touch screen) etc..Fingerprint input is user to the fingerprint recognition of mobile phone The sliding fingerprint of device, clicks fingerprint and double-clicks fingerprint etc. long-press fingerprint.Gravity input is rolling of the user to mobile phone specific direction The inputs such as dynamic, specific times shakings.Key-press input corresponds to user to buttons such as the power keys, volume key, Home key of mobile phone Click input, double-click input, long-press input, combination button input etc. inputs.
Wherein, it can be a variety of inputs that terminal provided in an embodiment of the present invention, which receives user in the first input of predetermined interface, In one kind, the embodiment of the present invention is not construed as limiting this.
Optionally, interface is predefined as first interface (first interface i.e. from left to right) in the desktop of terminal, alternatively, Predefined interface is the last one interface in the desktop of terminal.
Illustratively, when predefining first interface in the desktop that interface is terminal, above-mentioned first input can be to use Input of the family on first interface, such as the input to the right slided of the user to first interface.Similar, predefine boundary When face is the last one interface in the desktop of terminal, above-mentioned first input can be that user is defeated on the last one interface Enter, such as the input to the left slided of the user to the last one interface.
Certainly, above-mentioned predefined interface can also be to be removed in first interface and the last one interface in the desktop of terminal Other interfaces.For example, first input of the user on predefined interface can be long-press input of the user on predefined interface, Such as in the long-press input for predefining a preset region on interface.
In a kind of possible realization method, terminal can also receive user and select needs before privacy area is opened The input of the private file of protection.Illustratively, as shown in Figure 2 a, the method for protection privacy provided in an embodiment of the present invention, It can also include S204-S206 before above-mentioned S201:
S204, terminal receive the second input of user, and the second input selects the input of private file for user.
It is understood that the embodiment of the present invention provide private file can be all files in application program or Person's partial document.The quantity of the private file of the second input selection of above-mentioned user can be one or more.
Illustratively, it is assumed that it is a photo in " picture library ", the embodiment of the present invention that user, which needs the file of secret protection, The terminal of offer can support to select the photo as private file.
It is illustrated in figure 3 a kind of example schematic at the interface that terminal is shown.Wherein, the 3a in Fig. 3 shows mobile phone 30 The interface 301 that touch screen is shown, the interface 301 include the icon 3011 of " picture library ".At this point, the touch screen in mobile phone 30 receives After being inputted to user to the selection of the icon 3011 of " picture library ", in response to the input, mobile phone 30 is in touch-control screen display such as Fig. 3 In 3b shown in interface 302.Wherein, the photo in " picture library ", such as photo are shown in the interface 302 shown in the 3b in Fig. 3 3021 and picture 3022.At this point, the photo 3021 and picture 3022 are open file, you can with the text shown to all users Part.
It should be noted that the icon 3011 of " picture library " that the interface 301 shown in 3a in Fig. 3 includes is above-mentioned picture 3021 access information.In general, user is to open and should obtain picture 3021 after the icon 3011 of " picture library ".
Further, to photo in the interface 302 for receiving shown in the 3b of user in figure 3 in the touch screen of mobile phone 30 After 3021 selection input, in response to the input, interface 303 of the mobile phone 30 in touch-control screen display such as Fig. 3 shown in 3c.Its In, " menu " option 3031 is shown in the interface 303 in Fig. 3 shown in 3c.
Further, the touch screen of mobile phone 30 receives " menu " option in interface 303 of the user in figure 3 shown in 3c After 3031 selection input, in response to the input, interface 304 of the mobile phone 30 in touch-control screen display such as Fig. 3 shown in 3d.Its In, " pull-up menu " 3041 shown in the interface 304 in Fig. 3 shown in 3d includes " being set as privacy " option 3042.
Further, the touch screen of mobile phone 30 receives user and " is set as to what is shown in the interface 304 shown in 3d in Fig. 3 After the selection input of privacy " option 3042, for mobile phone 30 in response to the input, it is private file to determine above-mentioned picture 3021.It needs The selection of " being set as privacy " option 3042 is inputted it is noted that the second input provided in the present invention can be above-mentioned user, Private file is above-mentioned picture 3021.
It is similar, determine the input that picture 3021 is private file with reference to above-mentioned mobile phone 30, user can also to one or Multiple need other photos of secret protection to carry out identical input so that mobile phone 30 determines that other photos are private file.
It should be noted that the example of the second input provided by the invention does not show the embodiment in above-described embodiment, also Can be other inputs.For example, the multiple pictures in user's simultaneous selection " picture library ", the touch-control screen display of mobile phone 30 are above-mentioned One " being set as privacy " option;After user carries out selection input to " the being set as privacy " option, in response to the input handset 30 It is private file that can determine the multiple pictures simultaneously.Specifically, the embodiment of the present invention can be with to the detailed description of the second input With reference to above-described embodiment to the associated description of the first input, which is not described herein again.
Certainly, the private file provided in the embodiment of the present invention is also not necessarily limited to the example in above-described embodiment, can also be Alternative document, for example, file including short message in the file including associated person information, " short message " in " contact person " etc.. Wherein, with reference to above-mentioned mobile phone 30 determine " picture library " in photo 3021 be private file associated description, the embodiment of the present invention this In mobile phone 30 is determined the alternative document be private file process be not described in detail.
S205, it is inputted in response to second, terminal is according to predefined rule, the corresponding icon of generation private file.
Wherein, corresponding first icon of above-mentioned first private file is the entrance of the first private file that terminal provides, and is made Can as needed first icon be inputted by obtaining user, to obtain the first private file.
S206, terminal are in the corresponding icon of privacy area addition private file.
Optionally, for terminal in the corresponding icon of privacy area addition private file, terminal can not show the icon, i.e., It is not turned on privacy area;Alternatively, terminal can show the icon, that is, open privacy area.
By taking mobile phone 30 as an example, the interface that the touch screen of mobile phone 30 is shown can include a privacy area, hidden for hiding The corresponding icon of private file.Wherein, due to the corresponding icon of a private file be the private file entrance, mobile phone 30 hidden icons can realize the secret protection to private file.Specifically, in the case where privacy area is not turned on, hand The touch screen of machine 30 does not show the icon so that user can not obtain the icon, i.e. user can not obtain above-mentioned private file.
Wherein, after the corresponding icon of a private file is added to privacy area by terminal, terminal show this is hidden The file that secret protection is not needed in application program belonging to private file does not include the private file.For example, referring to above-mentioned Fig. 3 In each interface for showing of the touch screen of mobile phone 30 that shows, terminal hides above-mentioned 3021 corresponding icon of picture in privacy area Later, the interface 302 as shown in the 3b in Fig. 3 will no longer be shown picture 3021.
It is understood that terminal, after privacy area adds the corresponding icon of above-mentioned private file, terminal is opened hidden Private region is to show the icon.Specifically, the S203 that the method that privacy is protected in above-described embodiment provides could alternatively be S203 ':
S203 ', terminal show private file corresponding icon in privacy area.
It should be noted that in the method for protection privacy provided in an embodiment of the present invention, terminal is shown in unlatching privacy area When showing the corresponding icon of private file, the frame of the privacy area can be shown, can not also show the frame of the privacy area.
The corresponding icon of private file provided in an embodiment of the present invention is shown in privacy area, is referred specifically to the icon and is existed It is shown on interface where privacy area.
Optionally, when the corresponding icon of private file for multiple and multiple icon cannot at above-mentioned predefined interface or When all being shown on above-mentioned hiding interface, then the icon having more can predefine interface at this or this hides the next of interface It is shown on interface.
Wherein, it is that terminal shows the file that the privacy area includes or the figure of application program that terminal, which opens privacy area, Mark.
Illustratively, the first private file is the picture 3021 and picture 3022 shown in 3a in Fig. 3 in above-mentioned Fig. 3.This When, the corresponding icon of private file can be the icon that mobile phone 30 is generated for picture 3021 and picture 3022, i.e. the icon is The access information of picture 3021 and picture 3022.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, needs in user in application program Partial document carry out in the scene of secret protection, user is selected after needing the file of secret protection, and terminal can generate this The corresponding icon of file so that access information of the icon as the private file.So as to which terminal hides this by privacy area The corresponding icon of file can realize hiding this document, the i.e. underground display this document of terminal, realize the privacy to this document Protection.In this way, in user needs to carry out the scene of secret protection to the partial document in application program, terminal can only be hidden Without hiding other files for not needing to secret protection in the application program, privacy is carried out improving terminal for the partial document While the flexibility of protection, the user experience during privacy protection function of user's using terminal can also be improved.
In a kind of possible realization method, terminal by the corresponding icon hiding of private file after privacy area, The icon (private file) can also be prompted the user with by secret protection.Illustratively, it is provided in an embodiment of the present invention The method for protecting privacy after above-mentioned S203, can also include S203a:
S203a, terminal show the first prompt message.
Wherein, above-mentioned first prompt message can be used for prompting the user with the private file of user's selection and be protected by privacy Shield.
For example, the choosing of " being set as privacy " option 3042 shown in above-mentioned user is to the interface 304 shown in the 3d in Fig. 3 After selecting input, the prompt message of " be set as privacy success " can also be popped up on the touch screen of mobile phone 30.
In this way, user control terminal by the corresponding icon hiding of private file after privacy area, prompt the user with and set The successful prompt message of privacy is put, is conducive to improve the user experience during privacy protection function of user's using terminal.
It is pre- based on during terminal generation icon corresponding with private file in a kind of possible realization method Definition rule can include one or more in following rule 1- rules 3.
Rule 1 is private file one icon of generation for belonging to same application program.
Wherein, multiple files, the difference in user obtains the application program can be included in a usual application program During file, it is required to open the icon of the application program.That is, the corresponding entrance of file in same application program is equal Icon for the application program.
So as to which terminal can generate the corresponding icon of the private file according to the application program belonging to private file.More When a private file belongs to same application program, terminal can generate an icon to this to a private file so that should The entrance of multiple private files is one, user to be facilitated to obtain multiple private file.
Illustratively, each interface shown with reference to the touch screen of mobile phone 30 shown in Fig. 3 in above-described embodiment, in user After picture 3021 in the interface 302 as shown in the 3b in Fig. 3 and picture 3022 are selected as private file, in response to the input, Mobile phone 30 can determine that picture 3021 and picture 3022 belong to " picture library ", be given birth to so as to be directed to picture 3021 and picture 3022 Into one for hiding icon (i.e. access information).
It should be noted that according to above-mentioned regular 1, the corresponding icon of terminal generation private file can be with the private file The icon of application program belonging to script is similar.For example, the corresponding icon of the private file can be the icon of the application program On be added to a symbol.In addition, the title of the corresponding icon of the private file can also be with the type of the application program.Example Such as, entitled " picture library " of the icon of the application program, the title of the corresponding icon of the private file can be " privacy picture library ".
Illustratively, if Fig. 4 is the example schematic at interface that a kind of terminal provided in an embodiment of the present invention is shown.Its In, with reference to above-described embodiment, by taking mobile phone 30 as an example, the interface 401 shown in the 4a in Fig. 4 is the last one main boundary of mobile phone 30 Face, i.e., predefined interface is the last one interface.For picture 3021 and scheme for mobile phone 30 in the corresponding icon of private file In the case of the icon that piece 3022 generates, the touch screen of mobile phone 30 receive user to the execution input 4011 at the interface 401 (to The input of left slip) after, mobile phone 30 can independently acquire the biological characteristic of user.Mobile phone 30 is determining collected biological characteristic In the case of predefined biometric matches, interface 402 that can be in touch-control screen display such as Fig. 4 shown in 4b, the interface 402 include the icon 4021 of " privacy picture library ".Wherein, the icon 4021 of " privacy picture library " can be picture 3021 and picture 3022 access information.
Rule 2 is private file one icon of generation for belonging to same file type.
Wherein, the file type of a file can include compressed file type and uncompressed file type, alternatively, one The file type of file can include picture/mb-type, video type and text type etc..
Certainly, this file type provided of the embodiment of the present invention can also be the division of alternative document type, however it is not limited to The above-mentioned example to file type describes.For example, the file type of the file in an application program can include foreground type And background type.When usual user enters the application program by the icon of application program shown in main interface, user obtains The application program file be foreground file;And the file of the application program is got by file management application in user File for backstage.
Wherein, the file type of the file in different application can be identical.For example, it is mounted with to chat in terminal (" mailbox ") is applied using 1 (" chat 1 ") and mailbox, the file of a private file (being denoted as private file 1) in " chat 1 " Type is that the file type of a private file (being denoted as private file 2) in text type, " mailbox " is also text type.This When, terminal can be directed to the private file 1 and private file 2 generates an icon so that terminal hides the figure in privacy area Mark.
It should be noted that according to above-mentioned regular 2, terminal is the figure for the private file generation for belonging to same file type Mark can be the pattern of a file.The title of above-mentioned icon can be what terminal was generated according to this document type, such as this article Part type be text type, this document folder entitled " privacy text ".Alternatively, the title of above-mentioned icon can also be by user certainly Oneself is set.
Rule 3 is private file one icon of generation for belonging to same file path.
Wherein, terminal can should answer in generation when installing an application program in the internal storage location (or memory) of terminal With the corresponding file path of program so that terminal preserves the file on the application program backstage under this document path, such as the application The configuration file of program.
The file type of file in different application can also be identical.For example, it is mounted with that chat should in terminal With 1 (" chat 1 ") and chat application 2 (" chat 2 ").The file of a private file (being denoted as private file 3) in " chat 1 " Path is that the file path of a private file (being denoted as private file 4) in file path 1, " chat 2 " is also file path 1.At this point, terminal can be directed to the private file 3 and private file 4 generates an icon so that terminal is hidden in privacy area The icon.
It should be noted that according to above-mentioned regular 3, terminal is the figure for the private file generation for belonging to same file path The pattern of mark or a file.The title of above-mentioned icon can be terminal according to this document coordinates measurement, such as figure Target title can be this document path.Alternatively, the title of above-mentioned icon can also be set by user oneself.
Wherein, terminal can also combine multiple rules in regular 3 terminals of above-mentioned rule 1-, such as binding rule 1 and rule 2 Icon is generated to private file, the embodiment of the present invention is not described in detail this, is referred to above-mentioned in rule 1- rules 3 Each rule associated description.
In a kind of possible realization method, according to the above-mentioned description to regular 1- rules 3, it is known that provided by the invention hidden The quantity of private file can be multiple, and multiple private file can be the file in an application program, alternatively, multiple hidden Private file can be the file in multiple application programs.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, terminal can be according to a variety of predefined The corresponding icon of rule generation private file so that the process of secret protection is more flexible.Also, it needs to protect in user more In the case of a file, terminal can also need document to be protected according to the needs of user to belonging in different application Generate an icon so that user, which facilitates, obtains multiple file, improves user of the user when using privacy protection function Experience.
In a kind of possible realization method, terminal to private file carry out secret protection before, can with technology by User's triggering terminal opens the input of privacy protection mode.Illustratively, the method for secret protection provided by the invention, above-mentioned Before S203, specifically before S201, S301 and S302 can also be included:
S301, terminal receive the input that user opens privacy mode.
S302, the input that privacy mode is opened in response to user, terminal open privacy protection mode.
Illustratively, by taking mobile phone 30 as an example, a user in " setting " of mobile phone 30 can be provided and open the hidden of mobile phone 30 The option (such as button or icon) of private protected mode.At this point, user can control mobile phone 30 to open secret protection by the option Pattern.
Wherein, it is provided by the invention protection privacy method in, terminal can provide one for user open terminal it is hidden The option (i.e. access information) of private protected mode so that user can independently choose whether to need to open terminal according to demand Privacy protection mode.So, in the scene of file that secret protection is not needed in user, user can select to close eventually The privacy protection mode at end so that the file in terminal in application program is open file, facilitates the file in management terminal While, user is facilitated to obtain the file in application program.
In another specific embodiment provided by the invention, it is hidden that your region of the terminal unlatching meaning so that touch screen is shown After the corresponding icon of private file, user can input the icon to obtain the private file.At this point, user may Think that current private file has not needed to secret protection, it at this time can be with control terminal so that the private file is switched to public affairs Open the file of display.Specifically, the method for protection privacy provided in an embodiment of the present invention, after above-mentioned S203 or S203 ', also It can include S401-S404:
S401, terminal receive the third input of user, input of the third input for user's corresponding icon to private file.
Illustratively, as shown in figure 5, the example at the interface signal shown for another terminal provided in an embodiment of the present invention Figure.
Fig. 5 includes mobile phone 30 shown in the 5a in above-mentioned Fig. 5 in the interface of touch-control screen display 501, the interface 501 Include the icon 4021 of " privacy picture library ".Illustratively, user can carry out selection input to the icon 4021 of " privacy picture library ", The selection of mobile phone 30 to be controlled to be somebody's turn to do the icon 4021 of " privacy picture library ".
S402, it is inputted in response to third, terminal shows private file in privacy area.
Illustratively, the selection of the icon 4021 of " privacy picture library " of the mobile phone 30 in user is received to Fig. 5 shown in 5a After input, interface 502 that can be in touch-control screen display such as Fig. 5 shown in 5b, which includes above-mentioned picture 3021 With picture 3022.
S403, terminal receive the 4th input of user, and the 4th input inputs the selection of private file for user.
Wherein, it when it is open file that user, which is needed the file access pattern of secret protection, can be selected with control terminal Need the private file restored.
Illustratively, if user needs to include above-mentioned interface 502 under the scene that above-mentioned picture 3021 removes, Yong Huke Input interface 502 to be selected to include above-mentioned picture 3021 so that boundary of the mobile phone 30 in touch-control screen display such as Fig. 5 shown in 5c Face 503.The interface 503 includes " removing privacy " option 5021, " deletion " option 5022 and " menu " option 5023.At this point, The input that selects of " removing privacy " option 5021 that user includes interface 503 can be the above-mentioned 4th input.
S404, it is inputted in response to the 4th, terminal removes private file from privacy area, so that the private file is restored For open file.
Wherein, when the corresponding private file of an icon is multiple, terminal is by a private file from privacy area After removal, the icon is further included in the privacy area of terminal.When the corresponding private file of an icon is one, terminal will After the private file is removed from privacy area, the icon that the privacy area of terminal includes is also while removed.
Illustratively, after the click input of " removing privacy " option 5021 included in above-mentioned user to interface 503, The touch screen of mobile phone 30 can show the interface 504 as shown in the 5d in Fig. 5, and picture 3022 is only included in the interface 504, without Including picture 3021.At this point, picture 3021 has reverted to open file.
It should be noted that the method for protection privacy provided in an embodiment of the present invention, terminal are not only supported to need user The file of secret protection carries out secret protection, and the file access pattern that can also support not needing to user into secret protection is open text The secret protection demand of user can be flexibly met in part, be conducive to improve the use during privacy protection mode of user's using terminal It experiences at family.
In a kind of possible realization method, terminal can be carried after private file is removed privacy area with user Show that the private file has reverted to open file.Illustratively, the method for protection privacy provided in an embodiment of the present invention, it is above-mentioned After S404, S404a can also be included:
S404a, terminal show the second prompting message.
Wherein, above-mentioned second prompting message be used for prompt user select do not needed to the private file of secret protection Revert to open file.
For example, the clicking operation of " removing privacy " option 5021 included in above-mentioned user to interface 503 so that picture 3021 are moved out of after privacy area, and the prompt message of " removing privacy success " can also be popped up on the touch screen of mobile phone 30, is had User experience during conducive to the privacy protection mode for improving user's using terminal.
In a kind of possible realization method, for terminal after privacy area is opened, terminal can be on privacy area One access information for entering the application program belonging to private file of display.Illustratively, the S402 provided in above-described embodiment It could alternatively be S402a:
S402a, it is inputted in response to third, terminal shows private file and access information in privacy area.
Wherein, above-mentioned access information is used to open the application program belonging to above-mentioned private file.
Illustratively, as shown in fig. 6, the example at the interface signal shown for another terminal provided in an embodiment of the present invention Figure.Mobile phone 30 is shown in 6a in Fig. 6 at the interface of touch-control screen display 601, which includes 3022 He of picture " picture library " option 6011.Further, after " picture library " option 6011 included in user to interface 601, mobile phone 30 is touching The interface 602 as shown in the 6b in Fig. 6 of screen display is controlled, is " the figure for being used to show open photo in system in the interface 602 The interface in library ".
Wherein, terminal can also show that one enters message into the application program belonging to private file on privacy area Breath, can facilitate user to check private file and open file, when being conducive to improve the privacy protection mode of user's using terminal User experience.
In a kind of possible realization method, the method for protection privacy provided in an embodiment of the present invention can also be in user When needing to hide the access information of entire application program, support user that the icon of the application program is dragged in privacy area, with The All Files in the terminal-pair application program is made to carry out secret protection.The present invention without detailed description, is referred to this To the associated description of the partial document in terminal ecret protection application program in above-described embodiment.
In a kind of specific embodiment of the present invention, as shown in fig. 7, a kind of terminal provided in an embodiment of the present invention is possible Structure diagram.Terminal 70 shown in Fig. 7 includes receiving module 701, acquisition module 702 and opening module 703.
Wherein, receiving module 701 is used to receive first input of the user on predefined interface, on predefined interface First input is used to indicate terminal and opens privacy area, which is an interface in the desktop of terminal;Acquire mould Block 702 is used for the first input received in response to receiving module 701, acquires the biological characteristic of user;Opening module 703, is used for If the biological characteristic that acquisition module 702 acquires and predefined biometric matches, open privacy area.
In a kind of possible realization method, touch-screen input that above-mentioned first input is user on predefined interface or The input of person first is that fingerprint input or first input of the user on predefined interface are weight of the user on predefined interface Power inputs or the first input is key-press input of the user on predefined interface.
In a kind of possible realization method, above-mentioned predefined interface is first interface in the desktop of terminal, alternatively, Above-mentioned predefined interface is the last one interface in the desktop of terminal.
In a kind of possible realization method, the terminal 70 with reference to shown in Fig. 7 can also be wrapped in the terminal 70 shown in Fig. 8 Include generation module 704 and add module 705.Wherein, receiving module 701 are additionally operable to before the first input of user is received, connect The second input of user is received, the second input needs the input of the private file of secret protection for user's selection;Generation module 704, For the second input received in response to receiving module 701, according to predefined rule, the corresponding icon of generation private file;Add Add module 705, for the icon generated in privacy area addition generation module 704.
In a kind of possible realization method, above-mentioned opening module 703 is additionally operable to show the first icon in privacy area.
In a kind of possible realization method, above-mentioned predefined rule is following at least one:It is answered to belong to same With the private file of program generate an icon, be belong to same file type private file generate an icon and Private file to belong to same file path generates an icon.
In a kind of possible realization method, above-mentioned receiving module 701 is additionally operable to open privacy area in opening module 703 Later, the third input of user is received, third input is input of the user to the first icon;Opening module 703 is additionally operable to ring It should show that private file and access information, the access information are used in privacy area in the third input that receiving module 701 receives Open the application program belonging to the private file.
Terminal provided in an embodiment of the present invention can realize each process that terminal is realized in above method embodiment, to keep away Exempt to repeat, which is not described herein again.
The terminal of protection privacy provided in an embodiment of the present invention, it is first defeated on predefined interface that terminal receives user Enter, i.e., it, can be with the biological characteristic of automatic collection user to open privacy zone when terminal meets the trigger condition for opening privacy area Domain is actively entered its biological characteristic or specific cryptosystem without user.In this way, can improve terminal opens privacy area Flexibility so that the input that user control terminal opens privacy area is relatively simple.
Also, since the process that terminal opens privacy area will not show any prompt message to user, user is not It can know that terminal opens the process of privacy area, i.e. the process of terminal unlatching privacy area is more hidden.In this way, improve terminal To the secret protection effect for the icon that privacy area includes, that is, the privacy for improving the file that secret protection is needed to user is protected Protect effect.
In a kind of specific embodiment of the present invention, a kind of hardware of Fig. 9 terminals of each embodiment to realize the present invention Structure diagram, the terminal 100 include but not limited to:Radio frequency unit 101, network module 102, audio output unit 103, input Unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor The components such as 110 and power supply 111.It will be understood by those skilled in the art that the terminal structure shown in Fig. 9 was not formed to end The restriction at end, terminal can include either combining certain components or different component cloth than illustrating more or fewer components It puts.In embodiments of the present invention, terminal includes but not limited to mobile phone, tablet computer, laptop, palm PC, vehicle-mounted end End, wearable device and pedometer etc..
Wherein, user input unit 107, for receiving the first of user the input, which selects privacy for user The input of file, terminal are in privacy protection mode.Processor 110, in response to the first input, according to predefined rule, Generate the corresponding icon of private file;The icon is hidden in the privacy area of terminal.
Wherein, terminal provided herein of the embodiment of the present invention is used to perform corresponding method presented above.
The terminal of protection privacy provided in an embodiment of the present invention, it is first defeated on predefined interface that terminal receives user Enter, i.e., it, can be with the biological characteristic of automatic collection user to open privacy zone when terminal meets the trigger condition for opening privacy area Domain is actively entered its biological characteristic or specific cryptosystem without user.In this way, can improve terminal opens privacy area Flexibility so that the input that user control terminal opens privacy area is relatively simple.
Also, since the process that terminal opens privacy area will not show any prompt message to user, user is not It can know that terminal opens the process of privacy area, i.e. the process of terminal unlatching privacy area is more hidden.In this way, improve terminal To the secret protection effect for the icon that privacy area includes, that is, the privacy for improving the file that secret protection is needed to user is protected Protect effect.
It should be understood that the embodiment of the present invention in, radio frequency unit 101 can be used for receive and send messages or communication process in, signal Send and receive, specifically, by from base station downlink data receive after, handled to processor 110;In addition, by uplink Data are sent to base station.In general, radio frequency unit 101 includes but not limited to antenna, at least one amplifier, transceiver, coupling Device, low-noise amplifier, duplexer etc..In addition, radio frequency unit 101 can also by radio communication system and network and other set Standby communication.
Terminal has provided wireless broadband internet to the user by network module 102 and has accessed, and such as user is helped to receive and dispatch electricity Sub- mail, browsing webpage and access streaming video etc..
It is that audio output unit 103 can receive radio frequency unit 101 or network module 102 or in memory 109 The audio data of storage is converted into audio signal and exports as sound.Moreover, audio output unit 103 can also provide and end The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that end 100 performs.Sound Frequency output unit 103 includes loud speaker, buzzer and receiver etc..
Input unit 104 is used to receive audio or video signal.Input unit 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the image data of video obtained in image capture mode by image capture apparatus (such as camera) carry out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or network module 102.Mike Wind 1042 can receive sound, and can be audio data by such acoustic processing.Treated audio data can be The form output of mobile communication base station can be sent to via radio frequency unit 101 by being converted in the case of telephone calling model.
Terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein, ambient light sensor can be according to ambient light Light and shade adjusts the brightness of display panel 1061, and proximity sensor can close display panel when terminal 100 is moved in one's ear 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (generally three axis) and add The size of speed can detect that size and the direction of gravity when static, can be used to identify terminal posture (such as horizontal/vertical screen switching, Dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;Sensor 105 can be with Including fingerprint sensor, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, hygrometer, thermometer, Infrared ray sensor etc., details are not described herein.
Display unit 106 is used to show by information input by user or be supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used Display panel 1061 is configured in forms such as (Organic Light-Emitting Diode, OLED).
User input unit 107 can be used for receiving the number inputted or character information and the user of generation and terminal sets It puts and the input of key signals that function control is related.Specifically, user input unit 107 include touch panel 1071 and other Input equipment 1072.Touch panel 1071, also referred to as touch screen, collect user on it or neighbouring touch operation (such as User is using any suitable objects such as finger, stylus or attachment on touch panel 1071 or near touch panel 1071 Operation).Touch panel 1071 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus is examined The touch orientation of user is surveyed, and detects the signal that touch operation is brought, transmits a signal to touch controller;Touch controller from Touch information is received on touch detecting apparatus, and is converted into contact coordinate, then gives processor 110, receives processor 110 The order sent simultaneously is performed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch panel 1071.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072. Specifically, other input equipments 1072 can include but is not limited to physical keyboard, function key (such as volume control button, switch Button etc.), trace ball, mouse, operating lever, details are not described herein.
Further, touch panel 1071 can be covered on display panel 1061, when touch panel 1071 is detected at it On or near touch operation after, send to processor 110 with determine touch event type, be followed by subsequent processing device 110 according to touch The type for touching event provides corresponding visual output on display panel 1061.Although in fig.9, touch panel 1071 and display Panel 1061 is the component independent as two to realize the function that outputs and inputs of terminal, but in certain embodiments, it can The function that outputs and inputs of terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not limited herein specifically It is fixed.
Interface unit 108 is the interface that external device (ED) is connect with terminal 100.For example, external device (ED) can include it is wired or Wireless head-band earphone port, external power supply (or battery charger) port, wired or wireless data port, memory card port, For connecting the port of the device with identification module, audio input/output (I/O) port, video i/o port, ear port Etc..Interface unit 108 can be used for receiving the input (for example, data information, electric power etc.) from external device (ED) and will One or more elements that the input received is transferred in terminal 100 or can be used for terminal 100 and external device (ED) it Between transmit data.
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of terminal, using various interfaces and the various pieces of the entire terminal of connection, is led to It crosses operation or performs the software program being stored in memory 109 and/or module and call and be stored in memory 109 Data perform the various functions of terminal and processing data, so as to carry out integral monitoring to terminal.Processor 110 may include one Or multiple processing units;Preferably, processor 110 can integrate application processor and modem processor, wherein, using processing The main processing operation system of device, user interface and application program etc., modem processor mainly handles wireless communication.It can manage Solution, above-mentioned modem processor can not also be integrated into processor 110.
Terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 can be with It is logically contiguous by power-supply management system and processor 110, so as to by power-supply management system realize management charging, electric discharge, with And the functions such as power managed.
In addition, terminal 100 includes some unshowned function modules, details are not described herein.
Preferably, the embodiment of the present invention also provides a kind of terminal, and including processor 110, memory 109 is stored in storage It is real when which is performed by processor 110 on device 109 and the computer program that can be run on the processor 110 Each process of the embodiment of the method for existing above-mentioned protection privacy, and identical technique effect can be reached, it is repeated to avoid, here not It repeats again.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored on computer readable storage medium Calculation machine program, the computer program realize each process of the embodiment of the method for above-mentioned protection privacy when being executed by processor, and Identical technique effect can be reached, repeated to avoid, which is not described herein again.Wherein, the computer readable storage medium, such as Read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic Dish or CD etc..
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or device institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), used including some instructions so that a station terminal (can be mobile phone, computer services Device, air conditioner or network equipment etc.) perform method described in each embodiment of the present invention.
The embodiment of the present invention is described above in conjunction with attached drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned specific embodiment is only schematical rather than restricted, those of ordinary skill in the art Under the enlightenment of the present invention, present inventive concept and scope of the claimed protection are not being departed from, can also made very much Form is belonged within the protection of the present invention.

Claims (15)

  1. A kind of 1. method for protecting privacy, which is characterized in that including:
    Terminal receives first input of the user on predefined interface, and first input on predefined interface is used to indicate The terminal opens privacy area, and the predefined interface is an interface in the desktop of the terminal;
    In response to the described first input, the terminal acquires the biological characteristic of the user;
    If the biological characteristic and predefined biometric matches, the terminal open privacy area.
  2. 2. according to the method described in claim 1, it is characterized in that, it is described first input for user on the predefined interface The touch-screen input fingerprint input or described first defeated that either first input is user on the predefined interface Enter the gravity for being user on predefined interface input or first input is user on the predefined interface Key-press input.
  3. 3. method according to claim 1 or 2, which is characterized in that the predefined interface is in the desktop of the terminal First interface, alternatively, the predefined interface for the terminal desktop in the last one interface.
  4. 4. according to the method described in claim 1, it is characterized in that, receive the of user on predefined interface in the terminal Before one input, further include:
    The terminal receives the second input of the user, and second input needs the hidden of secret protection for user selection The input of private file;
    In response to the described second input, the terminal generates the corresponding icon of the private file according to predefined rule;
    The terminal adds the icon in the privacy area.
  5. 5. according to the method described in claim 4, it is characterized in that, the terminal opens the privacy area, including:
    The terminal shows the icon in the privacy area.
  6. 6. method according to claim 4 or 5, which is characterized in that the predefined rule is following at least one:
    Private file to belong to same application program generates an icon, is the private file for belonging to same file type One icon of generation and the private file to belong to same file path generate an icon.
  7. 7. according to the method described in claim 6, it is characterized in that, after the terminal unlatching privacy area, further include:
    The terminal receives the third input of the user, and the third input is input of the user to the icon;
    It is inputted in response to the third, the terminal shows the private file and access information in the privacy area, described Access information is used to open the application program belonging to the private file.
  8. 8. a kind of terminal, which is characterized in that including:
    Receiving module, it is described first defeated on predefined interface for receiving first input of the user on predefined interface Enter to be used to indicate the terminal and open privacy area, the predefined interface is an interface in the desktop of the terminal;
    Acquisition module for the first input received in response to the receiving module, acquires the biological characteristic of the user;
    Opening module, if the biological characteristic and predefined biometric matches for acquisition module acquisition, are opened Privacy area.
  9. 9. terminal according to claim 8, which is characterized in that first input is user on the predefined interface The touch-screen input fingerprint input or described first defeated that either first input is user on the predefined interface Enter the gravity for being user on predefined interface input or first input is user on the predefined interface Key-press input.
  10. 10. terminal according to claim 8 or claim 9, which is characterized in that the predefined interface is in the desktop of the terminal First interface, alternatively, the predefined interface for the terminal desktop in the last one interface.
  11. 11. terminal according to claim 8, which is characterized in that
    The receiving module is additionally operable to before the first input of user is received, and receives the second input of the user, and described the Two inputs need the input of the private file of secret protection for user selection;
    The terminal further includes:
    Generation module, for second input received in response to the receiving module, according to predefined rule, described in generation The corresponding icon of first private file;
    Add module, for adding the icon of the generation module generation in the privacy area.
  12. 12. terminal according to claim 11, which is characterized in that
    The opening module, specifically for showing the icon in the privacy area.
  13. 13. the terminal according to claim 11 or 12, which is characterized in that the predefined rule is following at least one Kind:
    Private file to belong to same application program generates an icon, is the private file for belonging to same file type One icon of generation and the private file to belong to same file path generate an icon.
  14. 14. terminal according to claim 13, which is characterized in that the receiving module is additionally operable in the opening module After opening the privacy area, the third input of the user is received, the third input is the user to the icon Input;
    The opening module, the third for being additionally operable to receive in response to the receiving module are inputted, are shown in the privacy area Show the private file and access information, the access information is used to open the application program belonging to the private file.
  15. 15. a kind of terminal, which is characterized in that including processor, memory and be stored on the memory and can be at the place The computer program run on reason device is realized when the computer program is performed by the processor as appointed in claim 1 to 7 The step of method of protection privacy described in one.
CN201711384554.6A 2017-12-20 2017-12-20 A kind of method and terminal for protecting privacy Pending CN108171034A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711384554.6A CN108171034A (en) 2017-12-20 2017-12-20 A kind of method and terminal for protecting privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711384554.6A CN108171034A (en) 2017-12-20 2017-12-20 A kind of method and terminal for protecting privacy

Publications (1)

Publication Number Publication Date
CN108171034A true CN108171034A (en) 2018-06-15

Family

ID=62523088

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711384554.6A Pending CN108171034A (en) 2017-12-20 2017-12-20 A kind of method and terminal for protecting privacy

Country Status (1)

Country Link
CN (1) CN108171034A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device
CN109635542A (en) * 2018-11-30 2019-04-16 华为技术有限公司 A kind of bio-identification exchange method, graphical interaction interface and relevant apparatus
CN111176512A (en) * 2019-12-31 2020-05-19 维沃移动通信有限公司 Icon processing method and electronic equipment
WO2020156441A1 (en) * 2019-01-29 2020-08-06 维沃移动通信有限公司 Privacy space operation method and terminal device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014200735A1 (en) * 2013-06-09 2014-12-18 Apple Inc. Device, method, and graphical user interface for managing folders with multiple pages
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN107066864A (en) * 2017-03-31 2017-08-18 宇龙计算机通信科技(深圳)有限公司 A kind of application icon display methods and its equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014200735A1 (en) * 2013-06-09 2014-12-18 Apple Inc. Device, method, and graphical user interface for managing folders with multiple pages
CN104951682A (en) * 2015-06-05 2015-09-30 小米科技有限责任公司 Privacy protection method and device
CN106484301A (en) * 2016-10-31 2017-03-08 维沃移动通信有限公司 A kind of method of hiden application and terminal
CN107066864A (en) * 2017-03-31 2017-08-18 宇龙计算机通信科技(深圳)有限公司 A kind of application icon display methods and its equipment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063504A (en) * 2018-07-02 2018-12-21 北京珠穆朗玛移动通信有限公司 Access method, mobile terminal and the storage medium of secret file
CN109063504B (en) * 2018-07-02 2024-02-23 北京珠穆朗玛移动通信有限公司 Private file access method, mobile terminal and storage medium
CN109376545A (en) * 2018-09-17 2019-02-22 麒麟合盛网络技术股份有限公司 Method for secret protection and device
CN109635542A (en) * 2018-11-30 2019-04-16 华为技术有限公司 A kind of bio-identification exchange method, graphical interaction interface and relevant apparatus
US11500534B2 (en) 2018-11-30 2022-11-15 Huawei Technologies Co., Ltd. Biometric recognition interaction method, graphics interaction interface, and related apparatus
WO2020156441A1 (en) * 2019-01-29 2020-08-06 维沃移动通信有限公司 Privacy space operation method and terminal device
CN111176512A (en) * 2019-12-31 2020-05-19 维沃移动通信有限公司 Icon processing method and electronic equipment

Similar Documents

Publication Publication Date Title
CN108171034A (en) A kind of method and terminal for protecting privacy
CN110456953A (en) File interface switching method and terminal device
CN109542282A (en) A kind of interface display method and terminal device
CN109582475A (en) A kind of sharing method and terminal
CN108763317A (en) A kind of auxiliary chooses the method and terminal device of picture
CN110007822A (en) A kind of interface display method and terminal device
CN110457879A (en) Object displaying method and terminal device
CN110489385A (en) A kind of information processing method and terminal device
CN110231900A (en) A kind of application icon display methods and terminal
CN109085968A (en) A kind of screenshotss method and terminal device
CN108446338A (en) A kind of method and terminal preserving browsing record
CN109408072A (en) A kind of application program delet method and terminal device
CN109522278A (en) A kind of file memory method and terminal device
CN110049187A (en) A kind of display methods and terminal device
CN108228902A (en) A kind of document display method and mobile terminal
CN110046013A (en) A kind of interface display method and terminal device
CN110069305A (en) A kind of screen interface switching method and terminal device
CN110147174A (en) A kind of control method and terminal device
CN110457935A (en) A kind of authority configuring method and terminal device
CN109284064A (en) A kind of interface display method and terminal device
CN108153460A (en) A kind of icon hiding method and terminal
CN109358931A (en) A kind of interface display method and terminal
CN108287745A (en) A kind of display methods and terminal device at the interfaces WebApp
CN108170329A (en) A kind of display control method and terminal device
CN110505340A (en) A kind of message method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180615