CN108573169A - Nearest task list display methods and device, storage medium, electronic equipment - Google Patents

Nearest task list display methods and device, storage medium, electronic equipment Download PDF

Info

Publication number
CN108573169A
CN108573169A CN201810317727.0A CN201810317727A CN108573169A CN 108573169 A CN108573169 A CN 108573169A CN 201810317727 A CN201810317727 A CN 201810317727A CN 108573169 A CN108573169 A CN 108573169A
Authority
CN
China
Prior art keywords
task list
privacy
nearest task
nearest
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810317727.0A
Other languages
Chinese (zh)
Inventor
张伟杰
张俊
谭春宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201810317727.0A priority Critical patent/CN108573169A/en
Publication of CN108573169A publication Critical patent/CN108573169A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus

Abstract

This application involves a kind of nearest task list display methods and device, electronic equipment, computer readable storage mediums, receive the instruction for accessing nearest task list, the privacy information in nearest task list is handled according to the instruction for accessing nearest task list, the nearest task list after processing is shown.When nearest task list includes privacy information; these privacy informations are handled first; it is allowed to not include privacy information; then the nearest task list after processing is being shown; to avoid privacy information from being leaked in nearest task list, and then strictly protect the individual privacy of user.

Description

Nearest task list display methods and device, storage medium, electronic equipment
Technical field
This application involves field of computer technology, more particularly to a kind of nearest task list display methods and device, deposit Storage media, electronic equipment.
Background technology
With universal and mobile Internet the rapid development of mobile terminal, user's usage amount of mobile terminal is increasingly Greatly.People are communicated by mobile terminal, are carried out information interchange, necessarily be will produce during this information interchange Privacy.Privacy is usually a kind of unrelated with public interest, group interest, and party is reluctant that other people know or other people inconvenience are known Personal information.User can be generally the most recently used in traditional nearest task list the last accession pages of all applications into Row display, this will to a certain extent not protect the privacy of user well.
Invention content
The embodiment of the present application provides a kind of nearest task list display methods and device, storage medium, electronic equipment, can be with Information shown in nearest task list is protected.
A kind of nearest task list display methods, including:
Receive the instruction for accessing nearest task list;
The privacy information in the nearest task list is handled according to the instruction for accessing nearest task list;
Nearest task list after processing is shown.
A kind of nearest task list display device, described device include:
Nearest task list access instruction receiving module, for receiving the instruction for accessing nearest task list;
Privacy information processing module is used for according to the instruction for accessing nearest task list to the nearest task list In privacy information handled;
Nearest task list display module, for showing the nearest task list after processing.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of task list display methods recently as described above is realized when row.
A kind of electronic equipment, including memory, processor and storage are on a memory and the meter that can run on a processor The step of calculation machine program, processor executes task list display methods recently as described above when executing computer program.
Above-mentioned nearest task list display methods and device, storage medium, electronic equipment receive and access nearest task list Instruction, the privacy information in nearest task list is handled according to the instruction for accessing nearest task list, it will be handled Nearest task list afterwards is shown.When nearest task list includes privacy information, these privacy informations are carried out first Processing is allowed to not include privacy information, then show the nearest task list after processing, to avoid privacy from believing Breath is leaked in nearest task list, and then strictly protects the individual privacy of user.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with Obtain other attached drawings according to these attached drawings.
Fig. 1 is the internal structure chart of electronic equipment in one embodiment;
Fig. 2 is the flow chart of nearest task list display methods in one embodiment;
Fig. 3 is the flow chart for carrying out processing method in Fig. 2 to the privacy information in nearest task list;
Fig. 4 is the structural schematic diagram of nearest task list display device in one embodiment;
Fig. 5 is the structural schematic diagram of privacy information processing module in Fig. 4;
Fig. 6 is the block diagram of the part-structure of the relevant mobile phone of electronic equipment provided in one embodiment.
Specific implementation mode
It is with reference to the accompanying drawings and embodiments, right in order to make the object, technical solution and advantage of the application be more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, and It is not used in restriction the application.
Fig. 1 is the internal structure schematic diagram of electronic equipment in one embodiment.As shown in Figure 1, the electronic equipment includes logical Cross processor, memory and the network interface of system bus connection.Wherein, which is used to provide calculating and control ability, Support the operation of entire electronic equipment.Memory for storing data, program etc., at least one computer journey is stored on memory Sequence, the computer program can be executed by processor, to realize that is provided in the embodiment of the present application is suitable for the nearest of electronic equipment Task list display methods.Memory may include magnetic disc, CD, read-only memory (Read-Only Memory, ROM) etc. Non-volatile memory medium or random access memory (Random-Access-Memory, RAM) etc..For example, implementing at one In example, memory includes non-volatile memory medium and built-in storage.Non-volatile memory medium is stored with operating system and meter Calculation machine program.The computer program can be performed by processor, most for realization one kind that each embodiment is provided below Nearly task list display methods.Built-in storage provides high speed for the operating system computer program in non-volatile memory medium and delays The running environment deposited.Network interface can be Ethernet card or wireless network card etc., for being communicated with external electronic equipment. The electronic equipment can be mobile phone, tablet computer or personal digital assistant or Wearable etc..
In one embodiment, it as shown in Fig. 2, providing a kind of nearest task list display methods, applies in this way It is illustrated for electronic equipment in Fig. 1, including:
Step 220, the instruction for accessing nearest task list is received.
After general user has used application on an electronic device, all can show user in nearest task list is made Used application.It is generally provided with triggering on electronic equipment and shows the mode of nearest task list, such as the electronic equipment having (mobile phone), which touches lower left corner membrane keyboard, can show the nearest task list page, and some electronic equipments can pass through long-press home Key (homepage key) can show the nearest task list page, certainly also have electronic equipment by some click some options to It shows the nearest task list page, further includes other modes certainly.It is had issued through the above way to electronic equipment in user After the instruction for accessing nearest task list, electronic equipment is received by the instruction for accessing nearest task list.
Step 240, the privacy information in nearest task list is handled according to the instruction for accessing nearest task list.
After receiving the instruction for accessing nearest task list in electronic equipment, if both there is privacy in the electronic equipment Space, but there are normed spaces, then will first determine whether to whether there is privacy application in nearest task list.It is electric under normal circumstances Private space in sub- equipment is for the normed space on electronic equipment, and private space is relative to normed space Privacy it is more preferable, private space is generally required by can just enter after specific authentication, is stored in private space Many users be hidden after privacy application.And normed space be then user open electronic equipment after can directly into The space that row accesses.
If there are privacies in nearest task list if with regard to needing to the privacy application in nearest task list Reason so that the privacy application in nearest task list does not show privacy information or directly do not show this in nearest task list Privacy application.So that user can not have found that user is believed using privacy using generated privacy in nearest task list Breath.Certainly, privacy information may include the information of privacy application, can also include the privacy of common application (i.e. non-privacy application) Information.If privacy information refers to the privacy information of common application (i.e. non-privacy application), then being also required to this partial information It is handled, is allowed to not shown in nearest task list.
Step 260, the nearest task list after processing is shown.
After handling the privacy information in nearest task list, the nearest task list after processing is carried out Display.Privacy information is not just included in shown nearest task list at this time.
In the embodiment of the present application, the instruction for accessing nearest task list is received, according to the instruction for accessing nearest task list Privacy information in nearest task list is handled, the nearest task list after processing is shown.Appoint recently When being engaged in list comprising privacy information, these privacy informations are handled first, are allowed to not include privacy information, it then will processing Nearest task list later is being shown, to avoid privacy information from being leaked in nearest task list, so that it is stringent Ground protects the individual privacy of user.
In one embodiment, as shown in figure 3, according to the instruction of nearest task list is accessed in nearest task list Privacy information is handled, including:
Step 242, judged to whether there is privacy application in nearest task list according to the instruction for accessing nearest task list.
Step 244, if there are privacy application, privacy application is handled.
After receiving the instruction for accessing nearest task list in electronic equipment, if both there is privacy in the electronic equipment Space, but there are normed spaces, then will first determine whether to whether there is privacy application in nearest task list.For example, user is Through the privacies such as footpath between fields footpath between fields, Alipay have been applied storage in private space, then after user has used footpath between fields footpath between fields recently, then When user oneself or other people access nearest task list when will be shown in nearest task list.Obviously, user The purpose that this is applied storage in private space is exactly not want to allow other users that can arbitrarily access or know relevant information.Cause This, needs to handle that will be shown after nearest use to the privacy application in nearest task list so that privacy is answered Privacy information do not shown in nearest task list so that user itself can not all know to other users it is related Information.
In the embodiment of the present application, first determines whether to whether there is privacy application in nearest task list, be answered if there is privacy With then needing the privacy information further applied to privacy to handle so that the privacy information of privacy application is not appointed recently It is shown in business list, so that user itself and other users can not all know relevant information.This method is to pass through judgement It whether there is privacy application in nearest task list, whether need to handle nearest task list to immediately arrive at.This Kind of judgment mode can by simply directly obtain whether need to nearest task list handled it is a kind of in a manner of, and general feelings Privacy application can namely be handled under condition, without handling non-privacy application.Because non-privacy application is original Exactly user itself or other users can directly access without specific authentication.
In one embodiment, privacy application is handled in step 244, including:
The privacy information of privacy application is hidden.
In the embodiment of the present application, the privacy information of privacy application is hidden, may include completely hiding mode, Privacy is applied and is rejected in nearest task list, so that privacy application is not shown in nearest task list. It can also include the hiding mode in part, i.e., privacy is applied to title and contracting in shown interface in nearest task list Sketch map is hidden, and title and thumbnail include privacy information.In such a way that above-mentioned completely hiding and part hides The privacy information that privacy is applied is hidden by realization so that the privacy information of privacy application does not carry out in nearest task list It has been shown that, so that user itself and other users can not all know relevant information.
In one embodiment, the privacy information of privacy application is hidden, including:
Privacy is applied and is rejected in nearest task list, so that privacy application does not carry out in nearest task list Display.
Specifically, after user has used footpath between fields footpath between fields in private space recently, nearest task list is accessed receiving Instruction, then according to the instruction of the nearest task list of access, to the footpath between fields footpath between fields in nearest task list, this privacy application is picked It removes, i.e., will not carry out any information of display this privacy of footpath between fields footpath between fields application in nearest task list, be not in that footpath between fields footpath between fields corresponds to Interface.For example, when user have accessed recently wechat, U.S. group, QQ, go where net, know, also have privacy have six altogether using footpath between fields footpath between fields A application should show this corresponding interface of six applications in original nearest task list, but because answer privacy respectively It is handled with footpath between fields footpath between fields, therefore, the interface of five applications just can be only shown in nearest task list after the treatment, without It can show the interface on footpath between fields footpath between fields.
In the embodiment of the present application, when detecting the presence of privacy in nearest task list in application, just by the privacy application It is directly rejected from nearest task list, so as not to appear in nearest task list.So just directly from source The privacy information for avoiding privacy application is exposed in nearest task list.
In one embodiment, the privacy information of privacy application is hidden, further includes:
Privacy is applied in nearest task list title and thumbnail in shown interface are hidden, title and Thumbnail includes privacy information.
Specifically, it all can include a mark applied that general one, which is applied in shown interface in nearest task list, The display page in the last time use of time is inscribed and applies, which is known as thumbnail.If being applied if it is privacy, All can include many privacy informations in the display page of shown title and the last time use of time.Therefore, if do not adopted Directly the mode rejected in nearest task list is applied to handle privacy with above-mentioned, then in order to avoid privacy is believed Breath is exposed, and must be handled that will show the privacy information to the privacy application in nearest task list.Particularly as It is to be hidden to the title and thumbnail of privacy information, such as do not show title and thumbnail, and carried out using blank page It has been shown that, the purpose being hidden to the title and thumbnail that realize to privacy information.It is of course also possible to use other are rationally Mode the title and thumbnail of privacy information are hidden.
In the embodiment of the present application, not using it is above-mentioned directly privacy is applied rejected in nearest task list by the way of It is handled, then in order to avoid privacy information is exposed, the title and thumbnail of privacy information is hidden, such as not Show title and thumbnail, and shown using blank page, to realize to the title of privacy information and thumbnail into The hiding purpose of row.The purpose that may be implemented to protect the privacy information that privacy is applied using this method, while nearest Privacy application is actually showing in task list, so nearest task list is accessed if it is user, then using Family, which clicks after this blank page further input authentication information and carries out verification, can enter private space, from And the privacy application is accessed.Thus an efficiently entrance is provided for quick access privacy application.
In one embodiment, privacy application is handled, including:The privacy information of privacy application is pretended.
In the embodiment of the present application, camouflage, which is meant, pretends, and take measures hidden truth.Therefore, privacy applied When privacy information is pretended, so that it may shown directly to use another non-privacy to apply in nearest task list Title and thumbnail are pretended.And if reality click the non-privacy apply in nearest task list shown title and When thumbnail, title and thumbnail shown in nearest task list can not be applied by the non-privacy by be directly entered The privacy application pretended only shows a static interface at this time, and user is if if clicking this static interfaces at this time It will show that information alert user further carries out authentication and can then enter private space, the privacy application is accessed. In fact, not shown in nearest task list to the non-privacy application reality.
In one embodiment, the information of privacy application is pretended, including:
Title and thumbnail preset title and the contracting at shown interface in nearest task list are applied to privacy Sketch map is replaced, and privacy information is not included in preset title and thumbnail.
Specifically, a kind of mode that the information applied to privacy is pretended also is provided, because generally being arranged in nearest task The generally title of application that is shown conducted in table and finally using the application when thumbnail at interface that leaves, therefore, When camouflage, also only need the title applied to privacy and finally using the application when thumbnail at interface that leaves carry out it is pseudo- Dress.Part to privacy involved in thumbnail can certainly be pretended, and for not being related to the part of privacy then not Pretended.For example, when pretending to most recently used privacy application Alipay, then it can be in nearest task list In the title of shown Alipay be replaced, replace with other non-privacies similar with the Pages Design of Alipay Using, and other non-privacy applications do not appear in nearest task list preferably, then can be directly non-hidden by this The title of private application is used for replacing the title of Alipay, to achieve the effect that camouflage.Then further to the breviary of Alipay Figure is pretended, for example, to arrived involved in thumbnail transaction amount or account balance etc. it is related to wealth or with disbursement letter manner of breathing The part of pass is all replaced, and be could alternatively be image or mosaic of preset animal etc. and is covered, to avoid being related to Information to privacy of user is revealed.
In the embodiment of the present application, the title at shown interface in nearest task list and thumbnail is applied to use to privacy Preset title and thumbnail are replaced, and can retain the information of a part of privacy application, but to being related to privacy Information is replaced, and therefore, other people suspection will not be all caused without displaying because of direct any information, to privacy Information is replaced, while also ensuring the safety of the privacy information of user.
In a specific embodiment, a kind of nearest task list display methods is provided, as follows:
Step 1 receives the instruction for accessing nearest task list;
Step 2 judges in nearest task list according to the instruction for accessing nearest task list with the presence or absence of privacy application, If being not present, three are entered step;It is not present, then enters step four;
Privacy application is not present in nearest task list for step 3, then detecting the non-privacy application of nearest task list is No includes privacy information, general using being screened to image or word, carries out the privacy information if there are privacy information It hides or replaces;
Step 4, there are privacy applications in nearest task list, then apply to privacy and picked in nearest task list It removes, so that privacy application is not shown in nearest task list.
In the embodiment of the present application, place both has been carried out using included privacy information to the privacy that user accesses recently Reason is also simultaneously handled the non-privacy that user accesses recently using included privacy information, thus to greatest extent Ground protects the privacy of user.
In one embodiment, as shown in figure 4, providing a kind of nearest task list display device 400, device includes: Nearest task list access instruction receiving module 410, privacy information processing module 420 and nearest task list display module 430. Wherein,
Nearest task list access instruction receiving module 410, for receiving the instruction for accessing nearest task list;
Privacy information processing module 420 is used for the instruction according to the nearest task list of access in nearest task list Privacy information is handled;
Nearest task list display module 430, for showing the nearest task list after processing.
In one embodiment, as shown in figure 5, privacy information processing module 420, further includes:
Privacy application judgment module 422, for being judged in nearest task list according to the instruction for accessing nearest task list With the presence or absence of privacy application;
Processing module 424 is handled privacy application for if there are privacy applications.
In one embodiment, processing module 424 are additionally operable to be hidden the privacy information that privacy is applied.
In one embodiment, processing module 424 are additionally operable to apply privacy and be rejected in nearest task list, So that privacy application is not shown in nearest task list.
In one embodiment, processing module 424 are additionally operable to applying privacy into shown boundary in nearest task list Title and thumbnail in face are hidden, and title and thumbnail include privacy information.
In one embodiment, processing module 424 are additionally operable to pretend the privacy information that privacy is applied.
In one embodiment, processing module 424 are additionally operable to apply privacy on shown boundary in nearest task list The title and thumbnail in face are replaced with preset title and thumbnail, and privacy is not included in preset title and thumbnail and is believed Breath.
The division of modules is only used for for example, in other embodiment in above-mentioned nearest task list display device In, nearest task list display device can be divided into different modules as required, it is aobvious to complete above-mentioned nearest task list All or part of function of showing device.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated The step of nearest task list display methods that the various embodiments described above are provided is realized when machine program is executed by processor.
In one embodiment, a kind of electronic equipment is provided, including memory, processor and storage are on a memory simultaneously The computer program that can be run on a processor realizes that the various embodiments described above are provided most when processor executes computer program The step of nearly task list display methods.
The embodiment of the present application also provides a kind of computer program products, when run on a computer so that calculate Machine executes the step of nearest task list display methods that the various embodiments described above are provided.、
The embodiment of the present application also provides a kind of electronic equipment.As shown in fig. 6, for convenience of description, illustrating only and this Apply for that the relevant part of embodiment, particular technique details are not disclosed, please refers to the embodiment of the present application method part.The electronics is set Include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS for that can be The arbitrary terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, Wearable, using electronic equipment as mobile phone For:
Fig. 6 is the block diagram with the part-structure of the relevant mobile phone of electronic equipment provided by the embodiments of the present application.With reference to figure 6, Mobile phone includes:Radio frequency (Radio Frequency, RF) circuit 610, input unit 630, display unit 640, passes memory 620 Sensor 650, voicefrequency circuit 660, Wireless Fidelity (wireless fidelity, WiFi) module 670, processor 680, Yi Ji electricity The components such as source 690.It, can be with it will be understood by those skilled in the art that handset structure shown in fig. 6 does not constitute the restriction to mobile phone Including than illustrating more or fewer components, either combining certain components or different components arrangement.
Wherein, RF circuits 610 can be used for receiving and sending messages or communication process in, signal sends and receivees, can be by base station After downlink information receives, handled to processor 680;The data of uplink can also be sent to base station.In general, RF circuits include but Be not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 610 can also be communicated with network and other equipment by radio communication.Above-mentioned channel radio Letter can use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE)), Email, Short message service (Short Messaging Service, SMS) etc..
Memory 620 can be used for storing software program and module, and processor 680 is stored in memory 620 by operation Software program and module, to execute various function application and the data processing of mobile phone.Memory 620 can include mainly Program storage area and data storage area, wherein program storage area can storage program area, the application journey needed at least one function Sequence (such as the application program of sound-playing function, application program of image player function etc.) etc.;Data storage area can store root Created data (such as audio data, address list etc.) etc. are used according to mobile phone.In addition, memory 620 may include high speed Random access memory, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or Other volatile solid-state parts.
Input unit 630 can be used for receiving the number or character information of input, and generate the user setting with mobile phone 600 And the related key signals input of function control.Specifically, input unit 630 may include touch panel 631 and other inputs Equipment 632.Touch panel 631, alternatively referred to as touch screen collect user on it or neighbouring touch operation (such as user Use the operation of any suitable object or attachment such as finger, stylus on touch panel 631 or near touch panel 631), And corresponding attachment device is driven according to preset formula.In one embodiment, touch panel 631 may include touching inspection Survey two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation The signal brought, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and will It is converted into contact coordinate, then gives processor 680, and can receive order that processor 680 is sent and be executed.In addition, The multiple types such as resistance-type, condenser type, infrared ray and surface acoustic wave may be used and realize touch panel 631.In addition to touch surface Plate 631, input unit 630 can also include other input equipments 632.Specifically, other input equipments 632 may include but not It is limited to one or more in physical keyboard, function key (such as volume control button, switch key etc.) etc..
Display unit 640 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 640 may include display panel 641.In one embodiment, liquid crystal display (Liquid may be used Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 641.In one embodiment, touch panel 631 can cover display panel 641, when touch panel 631 is examined It measures and sends processor 680 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 680 provide corresponding visual output according to the type of touch event on display panel 641.Although in figure 6, touch panel 631 be to realize input and the input function of mobile phone as two independent components with display panel 641, but in certain implementations In example, can be integrated by touch panel 631 and display panel 641 and that realizes mobile phone output and input function.
Mobile phone 600 may also include at least one sensor 650, such as optical sensor, motion sensor and other sensings Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 641, and proximity sensor can close display panel when mobile phone is moved in one's ear 641 and/or backlight.Motion sensor may include acceleration transducer, can detect by acceleration transducer and adds in all directions The size of speed can detect that size and the direction of gravity when static, can be used to identify application (such as the horizontal/vertical screen of mobile phone posture Switching), Vibration identification correlation function (such as pedometer, tap) etc.;In addition, mobile phone can also configure gyroscope, barometer, humidity Other sensors such as meter, thermometer, infrared sensor etc..
Voicefrequency circuit 660, loud speaker 661 and microphone 662 can provide the audio interface between user and mobile phone.Audio-frequency electric The transformed electric signal of the audio data received can be transferred to loud speaker 661 by road 660, and sound is converted to by loud speaker 661 Signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, is turned after being received by voicefrequency circuit 660 It is changed to audio data, then by after the processing of audio data output processor 680, another mobile phone can be sent to through RF circuits 610, or Person exports audio data to memory 620 so as to subsequent processing.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 670 Part, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 6 is shown WiFi module 670, but it is understood that, and it is not belonging to must be configured into for mobile phone 600, it can omit as needed.
Processor 680 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 620, and call and be stored in memory 620 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.In one embodiment, it handles Device 680 may include one or more processing units.In one embodiment, processor 680 can integrate application processor and modulation Demodulation processor, wherein the main processing operation system of application processor, user interface and application program etc.;Modulation /demodulation is handled Device mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone 600 further includes the power supply 660 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity Management system and processor 680 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system The functions such as management.
In one embodiment, mobile phone 600 can also include camera, bluetooth module etc..
Used in this application may include to any reference of memory, storage, database or other media is non-volatile And/or volatile memory.Suitable nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), Electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include arbitrary access Memory (RAM), it is used as external cache.By way of illustration and not limitation, RAM is available in many forms, such as It is static RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM).
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously Cannot the limitation to the application the scope of the claims therefore be interpreted as.It should be pointed out that for those of ordinary skill in the art For, under the premise of not departing from the application design, various modifications and improvements can be made, these belong to the guarantor of the application Protect range.Therefore, the protection domain of the application patent should be determined by the appended claims.

Claims (10)

1. a kind of nearest task list display methods, which is characterized in that including:
Receive the instruction for accessing nearest task list;
The privacy information in the nearest task list is handled according to the instruction for accessing nearest task list;
Nearest task list after processing is shown.
2. according to the method described in claim 1, it is characterized in that, described according to the instruction pair for accessing nearest task list Privacy information in the nearest task list is handled, including:
Judge to whether there is privacy application in the nearest task list according to the instruction for accessing nearest task list;
If there are privacy application, the privacy application is handled.
3. according to the method described in claim 2, it is characterized in that, described handle the privacy application, including:
The privacy information of privacy application is hidden.
4. according to the method described in claim 3, it is characterized in that, the privacy information progress to privacy application is hidden It hides, including:
The privacy is applied and is rejected in the nearest task list, so that privacy application is not appointed recently described It is shown in business list.
5. according to the method described in claim 3, it is characterized in that, the privacy information progress to privacy application is hidden It hides, further includes:
The privacy is applied title and thumbnail in shown interface in the nearest task list are hidden, institute It includes privacy information to state title and thumbnail.
6. according to the method described in claim 2, it is characterized in that, described handle the privacy application, including:
The privacy information of privacy application is pretended.
7. according to the method described in claim 6, it is characterized in that, it is described to the privacy application information pretend, wrap It includes:
The title and the preset title of thumbnail at shown interface in the nearest task list are applied to the privacy It is replaced with thumbnail, privacy information is not included in the preset title and thumbnail.
8. a kind of nearest task list display device, which is characterized in that described device includes:
Nearest task list access instruction receiving module, for receiving the instruction for accessing nearest task list;
Privacy information processing module is used for according to the instruction for accessing nearest task list in the nearest task list Privacy information is handled;
Nearest task list display module, for showing the nearest task list after processing.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt The step of nearest task list display methods as described in any one of claim 1 to 7 is realized when processor executes.
10. a kind of electronic equipment, including memory, processor and storage are on a memory and the calculating that can run on a processor Machine program, which is characterized in that the processor is realized when executing the computer program described in any one of claim 1 to 7 Nearest task list display methods the step of.
CN201810317727.0A 2018-04-10 2018-04-10 Nearest task list display methods and device, storage medium, electronic equipment Pending CN108573169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810317727.0A CN108573169A (en) 2018-04-10 2018-04-10 Nearest task list display methods and device, storage medium, electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810317727.0A CN108573169A (en) 2018-04-10 2018-04-10 Nearest task list display methods and device, storage medium, electronic equipment

Publications (1)

Publication Number Publication Date
CN108573169A true CN108573169A (en) 2018-09-25

Family

ID=63574620

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810317727.0A Pending CN108573169A (en) 2018-04-10 2018-04-10 Nearest task list display methods and device, storage medium, electronic equipment

Country Status (1)

Country Link
CN (1) CN108573169A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948368A (en) * 2019-03-27 2019-06-28 努比亚技术有限公司 A kind of privacy authority control method, equipment and computer readable storage medium
CN110443036A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of method and apparatus that program carries out mimicry camouflage
CN110837654A (en) * 2019-07-31 2020-02-25 Oppo广东移动通信有限公司 Privacy information acquisition method and related equipment
CN111783175A (en) * 2020-07-10 2020-10-16 深圳传音控股股份有限公司 Display interface privacy protection method, terminal and computer readable storage medium
CN114491685A (en) * 2022-02-17 2022-05-13 高创(苏州)电子有限公司 Recent task list display method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106303031A (en) * 2016-08-15 2017-01-04 捷开通讯(深圳)有限公司 The processing method of a kind of terminal, system and terminal
CN106371785A (en) * 2016-08-30 2017-02-01 捷开通讯(深圳)有限公司 Processing method of display mode, system and terminal
CN106778124A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The application method and device of a kind of hiden application
CN106936999A (en) * 2017-03-22 2017-07-07 北京珠穆朗玛移动通信有限公司 Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN107463809A (en) * 2017-07-21 2017-12-12 北京小米移动软件有限公司 The display methods and device of application icon

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106127009A (en) * 2016-06-30 2016-11-16 宇龙计算机通信科技(深圳)有限公司 The display packing of a kind of icon and terminal
CN106303031A (en) * 2016-08-15 2017-01-04 捷开通讯(深圳)有限公司 The processing method of a kind of terminal, system and terminal
CN106371785A (en) * 2016-08-30 2017-02-01 捷开通讯(深圳)有限公司 Processing method of display mode, system and terminal
CN106778124A (en) * 2016-11-25 2017-05-31 宇龙计算机通信科技(深圳)有限公司 The application method and device of a kind of hiden application
CN106936999A (en) * 2017-03-22 2017-07-07 北京珠穆朗玛移动通信有限公司 Display methods, mobile terminal and the readable storage medium storing program for executing of record list are accessed recently
CN107463809A (en) * 2017-07-21 2017-12-12 北京小米移动软件有限公司 The display methods and device of application icon

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109948368A (en) * 2019-03-27 2019-06-28 努比亚技术有限公司 A kind of privacy authority control method, equipment and computer readable storage medium
CN109948368B (en) * 2019-03-27 2023-09-22 努比亚技术有限公司 Privacy authority control method, device and computer readable storage medium
CN110837654A (en) * 2019-07-31 2020-02-25 Oppo广东移动通信有限公司 Privacy information acquisition method and related equipment
CN110443036A (en) * 2019-08-13 2019-11-12 杭州安恒信息技术股份有限公司 A kind of method and apparatus that program carries out mimicry camouflage
CN111783175A (en) * 2020-07-10 2020-10-16 深圳传音控股股份有限公司 Display interface privacy protection method, terminal and computer readable storage medium
CN114491685A (en) * 2022-02-17 2022-05-13 高创(苏州)电子有限公司 Recent task list display method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN103616981B (en) application processing method, device and mobile terminal
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN104427074B (en) A kind of methods, devices and systems for showing incoming information
CN103702297B (en) Short message enhancement, apparatus and system
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN103763112B (en) A kind of user identity protection method and apparatus
CN108563932A (en) Application control method and apparatus, readable storage medium storing program for executing, terminal
CN108537037A (en) Privacy control method and device, computer readable storage medium, terminal
CN108573168A (en) Private space starts method and apparatus, storage medium, electronic equipment
CN107635262A (en) Terminal connects switching method, device, electronic equipment and the storage medium of network
CN107346397A (en) Information processing method and related product
CN104699501B (en) A kind of method and device for running application program
CN104917796A (en) Credit account creating method, system and method
CN107493378A (en) Method and apparatus, computer equipment and the readable storage medium storing program for executing that application program logs in
CN107025434A (en) A kind of fingerprint register method and mobile terminal
CN106611152A (en) User identity determination method and apparatus
CN108491733A (en) Method and apparatus, storage medium, electronic equipment are recommended in privacy application
CN107067239A (en) Apps server and its information processing method and device
CN107133507A (en) A kind of privacy services system access method, device and mobile terminal
CN104899488B (en) Numeric value transfer and device
CN108509788A (en) Information sharing method and device, computer readable storage medium, terminal
CN106533917A (en) Relation chain processing method, device and system
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal
CN108012029A (en) A kind of information processing method, equipment and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180925

RJ01 Rejection of invention patent application after publication