CN108573169A - Nearest task list display methods and device, storage medium, electronic equipment - Google Patents
Nearest task list display methods and device, storage medium, electronic equipment Download PDFInfo
- Publication number
- CN108573169A CN108573169A CN201810317727.0A CN201810317727A CN108573169A CN 108573169 A CN108573169 A CN 108573169A CN 201810317727 A CN201810317727 A CN 201810317727A CN 108573169 A CN108573169 A CN 108573169A
- Authority
- CN
- China
- Prior art keywords
- task list
- privacy
- application
- information
- recent task
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012545 processing Methods 0.000 claims abstract description 31
- 238000004590 computer program Methods 0.000 claims description 15
- 230000010365 information processing Effects 0.000 claims description 6
- 230000006870 function Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 230000003068 static effect Effects 0.000 description 4
- 230000001133 acceleration Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000005236 sound signal Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000010897 surface acoustic wave method Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Human Computer Interaction (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Storage Device Security (AREA)
Abstract
This application involves a kind of nearest task list display methods and device, electronic equipment, computer readable storage mediums, receive the instruction for accessing nearest task list, the privacy information in nearest task list is handled according to the instruction for accessing nearest task list, the nearest task list after processing is shown.When nearest task list includes privacy information; these privacy informations are handled first; it is allowed to not include privacy information; then the nearest task list after processing is being shown; to avoid privacy information from being leaked in nearest task list, and then strictly protect the individual privacy of user.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for displaying a recent task list, a storage medium, and an electronic device.
Background
With the popularization of mobile terminals and the rapid development of mobile internet, the usage amount of users of mobile terminals is increasing. People communicate through the mobile terminal to exchange information, and some privacy is necessarily generated in the information exchange process. Privacy is generally a personal information that is not related to public interests, group interests, and that a party is unwilling or inconvenient to know. The last page visited by all applications recently used by the user is generally displayed in the traditional recent task list, which does not protect the privacy of the user to a certain extent.
Disclosure of Invention
The embodiment of the application provides a recent task list display method and device, a storage medium and electronic equipment, which can protect information displayed in a recent task list.
A recent task list display method, comprising:
receiving an instruction for accessing a recent task list;
processing the privacy information in the recent task list according to the instruction for accessing the recent task list;
and displaying the latest task list after the processing.
A recent task list display apparatus, the apparatus comprising:
the recent task list access instruction receiving module is used for receiving an instruction for accessing the recent task list;
the privacy information processing module is used for processing the privacy information in the latest task list according to the instruction for accessing the latest task list;
and the recent task list display module is used for displaying the processed recent task list.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the recent task list display method as set out above.
An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor executing the computer program to perform the steps of the recent task list display method as described above.
The recent task list display method and device, the storage medium and the electronic equipment receive the instruction for accessing the recent task list, process the privacy information in the recent task list according to the instruction for accessing the recent task list, and display the processed recent task list. When the latest task list contains the privacy information, the privacy information is processed firstly to enable the privacy information not to contain the privacy information, and then the latest task list after processing is displayed, so that the privacy information is prevented from being leaked in the latest task list, and the personal privacy of a user is strictly protected.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram of the internal structure of an electronic device in one embodiment;
FIG. 2 is a flow diagram of a recent tasks list display method in one embodiment;
FIG. 3 is a flowchart of the method of FIG. 2 for processing private information in the recent task list;
FIG. 4 is a diagram illustrating a recent task list display apparatus according to an embodiment;
FIG. 5 is a schematic diagram of the configuration of the privacy information processing module of FIG. 4;
fig. 6 is a block diagram of a portion of the structure of a handset associated with an electronic device provided in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
Fig. 1 is a schematic diagram of an internal structure of an electronic device in one embodiment. As shown in fig. 1, the electronic device includes a processor, a memory, and a network interface connected by a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole electronic equipment. The memory is used for storing data, programs and the like, and at least one computer program is stored on the memory, and the computer program can be executed by the processor to realize the latest task list display method suitable for the electronic device provided by the embodiment of the application. The Memory may include a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random-Access-Memory (RAM). For example, in one embodiment, the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program is executable by a processor for implementing a recent task list display method provided in the following embodiments. The internal memory provides a cached execution environment for the operating system computer programs in the non-volatile storage medium. The network interface may be an ethernet card or a wireless network card, etc. for communicating with an external electronic device. The electronic device may be a mobile phone, a tablet computer, or a personal digital assistant or a wearable device, etc.
In one embodiment, as shown in fig. 2, a recent task list display method is provided, which is described by taking the method as an example applied to the electronic device in fig. 1, and includes:
at step 220, an instruction to access the recent task list is received.
After the general user uses the application on the electronic device, the application used by the user is shown in the latest task list. The electronic device is generally provided with a mode for triggering display of the recent task list, for example, some electronic devices (mobile phones) can display a recent task list page by touching a touch key at the lower left corner, some electronic devices can display a recent task list page by long-pressing a home key (home page key), and of course, some electronic devices can display a recent task list page by clicking some options, and other modes are also included. After the user sends the instruction for accessing the latest task list to the electronic device in the above manner, the electronic device receives the instruction for accessing the latest task list.
And step 240, processing the privacy information in the latest task list according to the instruction for accessing the latest task list.
After the electronic device receives an instruction for accessing the latest task list, if the electronic device has both a privacy space and a standard space, it is determined whether a privacy application exists in the latest task list. Generally, a privacy space on an electronic device is a standard space on the electronic device, the privacy of the privacy space is better than that of the standard space, the privacy space generally needs to be accessed after specific identity authentication, and a lot of privacy applications hidden by users are stored in the privacy space. And the standard space is a space which can be directly accessed after the user opens the electronic device.
If the privacy application exists in the latest task list, the privacy application in the latest task list needs to be processed, so that the privacy application in the latest task list does not display privacy information or does not display the privacy application in the latest task list directly. Such that the user is unable to discover the private information generated by the user using the privacy application in the recent task list. Of course, the privacy information may include information of a privacy application, and may also include privacy information of a general application (i.e., a non-privacy application). If the private information refers to private information of a general application (i.e., a non-private application), it is also necessary to process the private information so that the private information is not displayed in the latest task list.
And step 260, displaying the latest task list after the processing.
After the privacy information in the latest task list is processed, the latest task list after processing is displayed. The recent task list displayed at this time does not include the privacy information.
In the embodiment of the application, an instruction for accessing the latest task list is received, the privacy information in the latest task list is processed according to the instruction for accessing the latest task list, and the processed latest task list is displayed. When the latest task list contains the privacy information, the privacy information is processed firstly to enable the privacy information not to contain the privacy information, and then the latest task list after processing is displayed, so that the privacy information is prevented from being leaked in the latest task list, and the personal privacy of a user is strictly protected.
In one embodiment, as shown in fig. 3, processing the privacy information in the recent task list according to the instruction for accessing the recent task list includes:
and 242, judging whether the privacy application exists in the latest task list according to the instruction for accessing the latest task list.
In step 244, if the privacy application exists, the privacy application is processed.
After the electronic device receives an instruction for accessing the latest task list, if the electronic device has both a privacy space and a standard space, it is determined whether a privacy application exists in the latest task list. For example, a user has stored a strange, pay-for-your-own privacy application in the privacy space, and then when the user has recently used a strange, the user himself or herself or others will be shown in the recent task list when accessing the recent task list. Obviously, the purpose of storing this application in the private space by the user is not to let other users have access to or knowledge of the relevant information at will. Therefore, the privacy applications that are displayed in the latest task list after being used recently need to be processed, so that the privacy information of the privacy applications is not displayed in the latest task list, and the user and other users cannot know the relevant information.
In the embodiment of the application, whether privacy applications exist in the latest task list is judged, if the privacy applications exist, the privacy information of the privacy applications needs to be further processed, so that the privacy information of the privacy applications is not displayed in the latest task list, and a user and other users cannot know the related information. The method is characterized in that whether the latest task list needs to be processed or not is directly obtained by judging whether the latest task list has privacy applications or not. This way of determining can be a simple and straightforward way to derive whether the most recent task list needs to be processed, and in general, private applications will be processed, while non-private applications will not be processed. Since the non-private application is inherently accessible to the user himself or another user without specific authentication.
In one embodiment, the privacy application is processed in step 244, including:
privacy information of the privacy application is hidden.
In the embodiment of the application, the hiding of the privacy information of the privacy application may include a completely hiding manner, that is, the privacy application is removed from the recent task list, so that the privacy application is not displayed in the recent task list. A partial hiding manner may also be included, i.e. hiding titles and thumbnails of the privacy application in the interface displayed in the recent task list, the titles and thumbnails containing privacy information. The privacy information of the privacy application can be hidden through the complete hiding and partial hiding modes, so that the privacy information of the privacy application is not displayed in the latest task list, and the user and other users cannot know the related information.
In one embodiment, hiding the private information of the privacy application includes:
and eliminating the privacy application from the recent task list so that the privacy application is not displayed in the recent task list.
Specifically, after a user uses strange persons in the privacy space recently, an instruction for accessing the recent task list is received, and then the strange person privacy application in the recent task list is removed according to the instruction for accessing the recent task list, namely, any information of the strange person privacy application is not displayed in the recent task list, and an interface corresponding to the strange person does not appear. For example, when a user has recently visited six applications including WeChat, Mei Tuo, QQ, where to go, knowing, and privacy application strangeness, the interfaces corresponding to the six applications should be displayed in the original recent task list respectively, but because the privacy application strangeness is processed, only five application interfaces are displayed in the recent task list after processing, and strange interfaces are not displayed.
In the embodiment of the application, when the privacy application is detected to exist in the latest task list, the privacy application is directly removed from the latest task list, so that the privacy application does not appear in the latest task list. This avoids the privacy information of the privacy application from being exposed in the recent task list directly from the source.
In one embodiment, hiding the private information of the privacy application further comprises:
and hiding titles and thumbnails of the privacy application in the interface displayed in the latest task list, wherein the titles and the thumbnails contain privacy information.
Specifically, an application typically includes a title of the application and a display page of the application at the time of the last use, which is called a thumbnail, in an interface displayed in the latest task list. In the case of a privacy application, the displayed title and the displayed page at the time of the last use contain much privacy information. Therefore, if the privacy applications are not directly removed from the latest task list, the privacy information of the privacy applications to be displayed in the latest task list is processed to avoid the exposure of the privacy information. Specifically, the title and the thumbnail of the private information are hidden, for example, the title and the thumbnail are not displayed, but a blank page is used for displaying, so that the purpose of hiding the title and the thumbnail of the private information is achieved. Of course, the titles and thumbnails of the private information may be hidden in other reasonable manners.
In the embodiment of the application, the privacy application is not directly removed from the latest task list, so that in order to avoid exposing the privacy information, the title and the thumbnail of the privacy information are hidden, for example, the title and the thumbnail are not displayed, but a blank page is used for displaying, and therefore the purpose of hiding the title and the thumbnail of the privacy information is achieved. By adopting the method, the purpose of protecting the privacy information of the privacy application can be realized, and meanwhile, the privacy application is actually displayed in the recent task list, so that if the user accesses the recent task list, the user can enter a privacy space by clicking the blank page and then further inputting the authentication information for authentication, thereby accessing the privacy application. This provides a quick access to the privacy applications.
In one embodiment, processing a privacy application includes: and disguising the privacy information of the privacy application.
In the embodiment of the application, camouflage means fake decoration, and measures are taken to conceal true pictures. Therefore, when the privacy information of the privacy application is disguised, the title and the thumbnail displayed in the latest task list by another non-privacy application can be directly used for disguising. However, if the title and the thumbnail displayed in the latest task list by the non-privacy application are actually clicked, the disguised privacy application cannot be directly accessed through the title and the thumbnail displayed in the latest task list by the non-privacy application, only one static interface is displayed at the time, and at the time, if the static interface is clicked by a user, information is displayed to prompt the user to further perform identity authentication, the user can enter a privacy space, and the privacy application is accessed. In fact, the non-private application is not actually displayed in the recent task list.
In one embodiment, disguising information of a privacy application includes:
and replacing the title and the thumbnail of the interface displayed in the latest task list by the privacy application by using a preset title and a preset thumbnail, wherein the preset title and the preset thumbnail do not contain privacy information.
Specifically, a way of disguising the information of the privacy application is also provided, because the title of the application and the thumbnail of the interface left when the application is last used are generally displayed in the latest task list, and therefore, at the time of disguising, only the title of the privacy application and the thumbnail of the interface left when the application is last used need to be disguised. Of course, portions of the thumbnail that relate to privacy may be disguised, while portions that do not relate to privacy may not be disguised. For example, when disguising the recently used private application pay treasure, the title of the displayed pay treasure in the recent task list may be replaced with another non-private application similar to the page design of the pay treasure, and the other non-private application is preferably not present in the recent task list, so that the title of the non-private application may be directly used to replace the title of the pay treasure to achieve the disguising effect. Then, the thumbnail of the payment treasure is further disguised, for example, the parts related to money or payment information, such as the transaction amount or account balance, in the thumbnail are replaced, and the parts related to money or payment information can be replaced by a preset animal image or mosaic to cover, so that information related to user privacy is prevented from being leaked.
In the embodiment of the application, the title and the thumbnail of the interface displayed in the latest task list are replaced by the preset title and the thumbnail, a part of information of the privacy application can be kept, but the information related to privacy is replaced, so that the doubt of others caused by the fact that any information is not displayed directly is avoided, the privacy information is replaced, and meanwhile, the safety of the privacy information of a user is guaranteed.
In a specific embodiment, a recent task list display method is provided, as follows:
step one, receiving an instruction for accessing a latest task list;
step two, judging whether privacy applications exist in the recent task list or not according to the instruction for accessing the recent task list, and entering step three if the privacy applications do not exist in the recent task list; if not, entering the step four;
step three, if no privacy application exists in the recent task list, detecting whether the non-privacy application of the recent task list contains privacy information, generally screening images or characters, and if the privacy information exists, hiding or replacing the privacy information;
and step four, if the privacy application exists in the recent task list, the privacy application is removed from the recent task list, so that the privacy application is not displayed in the recent task list.
In the embodiment of the application, the privacy information contained in the privacy application recently visited by the user is processed, and the privacy information contained in the non-privacy application recently visited by the user is processed, so that the privacy of the user is protected to the maximum extent.
In one embodiment, as shown in fig. 4, there is provided a recent task list display apparatus 400 including: a recent task list access instruction receiving module 410, a privacy information processing module 420, and a recent task list display module 430. Wherein,
a recent task list access instruction receiving module 410, configured to receive an instruction to access a recent task list;
the privacy information processing module 420 is configured to process the privacy information in the latest task list according to an instruction for accessing the latest task list;
a recent task list display module 430, configured to display the recent task list after processing.
In one embodiment, as shown in fig. 5, the private information processing module 420 further includes:
the privacy application judging module 422 is configured to judge whether a privacy application exists in the recent task list according to an instruction for accessing the recent task list;
and a processing module 424, configured to process the privacy application if the privacy application exists.
In one embodiment, the processing module 424 is further configured to hide the privacy information of the privacy application.
In one embodiment, the processing module 424 is further configured to cull the privacy application from the recent task list, so that the privacy application is not displayed in the recent task list.
In one embodiment, the processing module 424 is further configured to hide titles and thumbnails of the privacy application in the interface displayed in the recent task list, where the titles and thumbnails contain privacy information.
In one embodiment, the processing module 424 is further configured to disguise private information of the privacy application.
In one embodiment, the processing module 424 is further configured to replace the title and the thumbnail of the interface displayed in the latest task list by a preset title and a preset thumbnail, where the preset title and the preset thumbnail do not contain the privacy information.
The division of each module in the recent task list display apparatus is only for illustration, and in other embodiments, the recent task list display apparatus may be divided into different modules as needed to complete all or part of the functions of the recent task list display apparatus.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the steps of the recent task list display method provided by the above embodiments.
In one embodiment, an electronic device is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps of the recent task list display method provided in the foregoing embodiments are implemented.
Embodiments of the present application further provide a computer program product, which when run on a computer, causes the computer to execute the steps of the recent task list display method provided in the foregoing embodiments. A
The embodiment of the application also provides the electronic equipment. As shown in fig. 6, for convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the technology are not disclosed, please refer to the method part of the embodiments of the present application. The electronic device may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, a wearable device, and the like, taking the electronic device as the mobile phone as an example:
fig. 6 is a block diagram of a partial structure of a mobile phone related to an electronic device provided in an embodiment of the present application. Referring to fig. 6, the handset includes: radio Frequency (RF) circuit 610, memory 620, input unit 630, display unit 640, sensor 650, audio circuit 660, wireless fidelity (WiFi) module 670, processor 680, and power supply 690. Those skilled in the art will appreciate that the handset configuration shown in fig. 6 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The RF circuit 610 may be used for receiving and transmitting signals during information transmission or communication, and may receive downlink information of the base station and then process the downlink information to the processor 680; the uplink data may also be transmitted to the base station. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE)), e-mail, Short Messaging Service (SMS), and the like.
The memory 620 may be used to store software programs and modules, and the processor 680 may execute various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 620. The memory 620 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function (such as an application program for a sound playing function, an application program for an image playing function, and the like), and the like; the data storage area may store data (such as audio data, an address book, etc.) created according to the use of the mobile phone, and the like. Further, the memory 620 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone 600. Specifically, the input unit 630 may include a touch panel 631 and other input devices 632. The touch panel 631, which may also be referred to as a touch screen, may collect touch operations performed by a user on or near the touch panel 631 (e.g., operations performed by the user on or near the touch panel 631 using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. In one embodiment, the touch panel 631 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 680, and can receive and execute commands sent by the processor 680. In addition, the touch panel 631 may be implemented using various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 630 may include other input devices 632 in addition to the touch panel 631. In particular, other input devices 632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), and the like.
The display unit 640 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 640 may include a display panel 641. In one embodiment, the Display panel 641 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. In one embodiment, the touch panel 631 can cover the display panel 641, and when the touch panel 631 detects a touch operation thereon or nearby, the touch panel is transmitted to the processor 680 to determine the type of the touch event, and then the processor 680 provides a corresponding visual output on the display panel 641 according to the type of the touch event. Although in fig. 6, the touch panel 631 and the display panel 641 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 631 and the display panel 641 may be integrated to implement the input and output functions of the mobile phone.
The handset 600 may also include at least one sensor 650, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 641 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 641 and/or the backlight when the mobile phone is moved to the ear. The motion sensor can comprise an acceleration sensor, the acceleration sensor can detect the magnitude of acceleration in each direction, the magnitude and the direction of gravity can be detected when the mobile phone is static, and the motion sensor can be used for identifying the application of the gesture of the mobile phone (such as horizontal and vertical screen switching), the vibration identification related functions (such as pedometer and knocking) and the like; the mobile phone may be provided with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor.
Audio circuit 660, speaker 661, and microphone 662 can provide an audio interface between a user and a cell phone. The audio circuit 660 may transmit the electrical signal converted from the received audio data to the speaker 661, and convert the electrical signal into an audio signal through the speaker 661 for output; on the other hand, the microphone 662 converts the collected sound signal into an electrical signal, which is received by the audio circuit 660 and converted into audio data, which is then processed by the audio data output processor 680 and then transmitted to another mobile phone via the RF circuit 610, or the audio data is output to the memory 620 for subsequent processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 670, and provides wireless broadband Internet access for the user. Although fig. 6 shows WiFi module 670, it is understood that it is not an essential component of handset 600 and may be omitted as desired.
The processor 680 is a control center of the mobile phone, and connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 620 and calling data stored in the memory 620, thereby performing overall monitoring of the mobile phone. In one embodiment, processor 680 may include one or more processing units. In one embodiment, processor 680 may integrate an application processor and a modem processor, wherein the application processor primarily handles operating systems, user interfaces, applications, and the like; the modem processor handles primarily wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 680.
The handset 600 also includes a power supply 660 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 680 via a power management system that may be used to manage charging, discharging, and power consumption.
In one embodiment, the handset 600 may also include a camera, a bluetooth module, and the like.
Any reference to memory, storage, database, or other medium used herein may include non-volatile and/or volatile memory. Suitable non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM).
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A recent task list display method, comprising:
receiving an instruction for accessing a recent task list;
processing the privacy information in the recent task list according to the instruction for accessing the recent task list;
and displaying the latest task list after the processing.
2. The method of claim 1, wherein the processing the privacy information in the recent task list according to the instruction for accessing the recent task list comprises:
judging whether privacy applications exist in the recent task list or not according to the instruction for accessing the recent task list;
and if the privacy application exists, processing the privacy application.
3. The method of claim 2, wherein the processing the privacy application comprises:
and hiding the privacy information of the privacy application.
4. The method of claim 3, wherein hiding the private information of the private application comprises:
and eliminating the privacy application from the recent task list so that the privacy application is not displayed in the recent task list.
5. The method of claim 3, wherein hiding the private information of the private application further comprises:
hiding a title and a thumbnail of the privacy application in an interface displayed in the recent task list, wherein the title and the thumbnail contain privacy information.
6. The method of claim 2, wherein the processing the privacy application comprises:
and disguising the privacy information of the privacy application.
7. The method of claim 6, wherein disguising the information of the privacy application comprises:
and replacing the title and the thumbnail of the interface displayed in the recent task list by the privacy application with a preset title and a preset thumbnail, wherein the preset title and the preset thumbnail do not contain privacy information.
8. A recent task list display apparatus, characterized in that the apparatus comprises:
the recent task list access instruction receiving module is used for receiving an instruction for accessing the recent task list;
the privacy information processing module is used for processing the privacy information in the latest task list according to the instruction for accessing the latest task list;
and the recent task list display module is used for displaying the processed recent task list.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the recent task list display method according to any one of claims 1 to 7.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the recent task list display method of any one of claims 1 to 7 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810317727.0A CN108573169A (en) | 2018-04-10 | 2018-04-10 | Nearest task list display methods and device, storage medium, electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810317727.0A CN108573169A (en) | 2018-04-10 | 2018-04-10 | Nearest task list display methods and device, storage medium, electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108573169A true CN108573169A (en) | 2018-09-25 |
Family
ID=63574620
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810317727.0A Pending CN108573169A (en) | 2018-04-10 | 2018-04-10 | Nearest task list display methods and device, storage medium, electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108573169A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948368A (en) * | 2019-03-27 | 2019-06-28 | 努比亚技术有限公司 | A kind of privacy authority control method, equipment and computer readable storage medium |
CN110443036A (en) * | 2019-08-13 | 2019-11-12 | 杭州安恒信息技术股份有限公司 | A kind of method and apparatus that program carries out mimicry camouflage |
CN110837654A (en) * | 2019-07-31 | 2020-02-25 | Oppo广东移动通信有限公司 | Privacy information acquisition method and related equipment |
CN111783175A (en) * | 2020-07-10 | 2020-10-16 | 深圳传音控股股份有限公司 | Display interface privacy protection method, terminal and computer readable storage medium |
CN114491685A (en) * | 2022-02-17 | 2022-05-13 | 高创(苏州)电子有限公司 | Recent task list display method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106127009A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | The display packing of a kind of icon and terminal |
CN106303031A (en) * | 2016-08-15 | 2017-01-04 | 捷开通讯(深圳)有限公司 | The processing method of a kind of terminal, system and terminal |
CN106371785A (en) * | 2016-08-30 | 2017-02-01 | 捷开通讯(深圳)有限公司 | Processing method of display mode, system and terminal |
CN106778124A (en) * | 2016-11-25 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | The application method and device of a kind of hiden application |
CN106936999A (en) * | 2017-03-22 | 2017-07-07 | 北京珠穆朗玛移动通信有限公司 | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently |
CN107463809A (en) * | 2017-07-21 | 2017-12-12 | 北京小米移动软件有限公司 | The display methods and device of application icon |
-
2018
- 2018-04-10 CN CN201810317727.0A patent/CN108573169A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106127009A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | The display packing of a kind of icon and terminal |
CN106303031A (en) * | 2016-08-15 | 2017-01-04 | 捷开通讯(深圳)有限公司 | The processing method of a kind of terminal, system and terminal |
CN106371785A (en) * | 2016-08-30 | 2017-02-01 | 捷开通讯(深圳)有限公司 | Processing method of display mode, system and terminal |
CN106778124A (en) * | 2016-11-25 | 2017-05-31 | 宇龙计算机通信科技(深圳)有限公司 | The application method and device of a kind of hiden application |
CN106936999A (en) * | 2017-03-22 | 2017-07-07 | 北京珠穆朗玛移动通信有限公司 | Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently |
CN107463809A (en) * | 2017-07-21 | 2017-12-12 | 北京小米移动软件有限公司 | The display methods and device of application icon |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109948368A (en) * | 2019-03-27 | 2019-06-28 | 努比亚技术有限公司 | A kind of privacy authority control method, equipment and computer readable storage medium |
CN109948368B (en) * | 2019-03-27 | 2023-09-22 | 努比亚技术有限公司 | Privacy authority control method, device and computer readable storage medium |
CN110837654A (en) * | 2019-07-31 | 2020-02-25 | Oppo广东移动通信有限公司 | Privacy information acquisition method and related equipment |
CN110443036A (en) * | 2019-08-13 | 2019-11-12 | 杭州安恒信息技术股份有限公司 | A kind of method and apparatus that program carries out mimicry camouflage |
CN111783175A (en) * | 2020-07-10 | 2020-10-16 | 深圳传音控股股份有限公司 | Display interface privacy protection method, terminal and computer readable storage medium |
CN114491685A (en) * | 2022-02-17 | 2022-05-13 | 高创(苏州)电子有限公司 | Recent task list display method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108536783B (en) | Data processing method and device, terminal and computer readable storage medium | |
CN108616652B (en) | Data protection method and device, terminal and computer readable storage medium | |
CN108521494B (en) | Terminal control method and device, readable storage medium and terminal | |
CN108334755A (en) | Private space creation method and device, storage medium, electronic equipment | |
CN108573169A (en) | Nearest task list display methods and device, storage medium, electronic equipment | |
CN109800602B (en) | Privacy protection method, mobile terminal and computer readable storage medium | |
CN106331370B (en) | A kind of data transmission method and terminal device | |
CN108549698B (en) | File processing method and device, mobile terminal and computer readable storage medium | |
CN107484154B (en) | Data switching method and device, terminal and computer readable storage medium | |
CN108632454B (en) | Information processing method and device, computer readable storage medium and terminal | |
CN111064654A (en) | Message display method and electronic equipment | |
CN109472157B (en) | Application data storage method, mobile terminal and computer storage medium | |
CN108537025B (en) | Privacy protection method and device, computer readable storage medium and terminal | |
CN108509788B (en) | Information sharing method and device, computer readable storage medium and terminal | |
CN107623612B (en) | Flow display method and device, computer equipment and computer readable storage medium | |
CN106534586A (en) | Mobile terminal and contact person information processing method and device thereof | |
CN107194217B (en) | User data access control method, apparatus and computer-readable storage medium | |
CN108900692B (en) | Screen display method and device, electronic equipment and computer readable storage medium | |
CN107577933B (en) | Application login method and device, computer equipment and computer readable storage medium | |
CN107231469B (en) | Terminal application management method, terminal and computer readable storage medium | |
CN108595977A (en) | User mode controlling method and device, readable storage medium storing program for executing, terminal | |
CN112805988A (en) | Call control method and device, computer readable storage medium and electronic equipment | |
CN111159738B (en) | Authority configuration method, application login method and device | |
CN110430252B (en) | Resource data processing method and device, equipment and readable storage medium | |
CN112163194A (en) | Authorization method of application permission, mobile terminal and computer storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180925 |
|
RJ01 | Rejection of invention patent application after publication |