CN110210186A - A kind of latent function starting method and system - Google Patents
A kind of latent function starting method and system Download PDFInfo
- Publication number
- CN110210186A CN110210186A CN201810165762.5A CN201810165762A CN110210186A CN 110210186 A CN110210186 A CN 110210186A CN 201810165762 A CN201810165762 A CN 201810165762A CN 110210186 A CN110210186 A CN 110210186A
- Authority
- CN
- China
- Prior art keywords
- function
- latent
- predetermined registration
- registration operation
- maniflest
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 230000006870 function Effects 0.000 claims description 167
- 238000005516 engineering process Methods 0.000 claims description 14
- 238000013507 mapping Methods 0.000 claims description 14
- 210000003462 vein Anatomy 0.000 claims description 6
- 238000004891 communication Methods 0.000 description 29
- 238000012545 processing Methods 0.000 description 22
- 230000008569 process Effects 0.000 description 19
- 238000010586 diagram Methods 0.000 description 8
- 238000010295 mobile communication Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 210000001508 eye Anatomy 0.000 description 3
- 230000007774 longterm Effects 0.000 description 3
- 230000036299 sexual function Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- XEGGRYVFLWGFHI-UHFFFAOYSA-N bendiocarb Chemical compound CNC(=O)OC1=CC=CC2=C1OC(C)(C)O2 XEGGRYVFLWGFHI-UHFFFAOYSA-N 0.000 description 1
- 230000027455 binding Effects 0.000 description 1
- 238000009739 binding Methods 0.000 description 1
- 210000005252 bulbus oculi Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
Abstract
The embodiment of the present application discloses a kind of latent function starting method and system, is related to intelligent terminal technical field.The described method includes: obtaining the predetermined registration operation of terminal maniflest function;Judge whether to pass through user information authentication;If so, determining latent function to be concealed;It is associated with the starting entrance that the predetermined registration operation corresponds to the latent function;If it is not, executing the maniflest function.The latent function of the application starts method and system, by being associated with the predetermined registration operation of terminal maniflest function to the starting entrance of corresponding latent function, to be further ensured that the safety of Information hiding, improves user experience.
Description
Technical field
This application involves intelligent terminal technical field more particularly to electronic equipment and its latent function starting method and it is
System.
Background technique
With the rapid development of Internet technology and mobile communication technology, work, life and the intelligent terminal breath of people ceases
It is related.Currently, mobile terminal (for example, portable electronic device) often stores a large amount of compared to other electronic equipments
People's information.However, the bulk information of portable electronic device storage always exists the security risk of information leakage.For example, when using
The display information of family lost mobile terminal, mobile terminal is easy to be stolen.Currently, although intelligent terminal can be by being arranged body
The protection information security such as part identification or hiding information, however, identification or hiding information etc. are held due to covering up accordingly because lacking
Easily it is cracked or finds.
Accordingly, it is desired to provide a kind of latent function starts method and system, by by the predetermined registration operation of terminal maniflest function
It is associated with to the starting entrance of corresponding latent function, to be further ensured that the safety of Information hiding, improves user experience.
Summary of the invention
According to a first aspect of the present application, some embodiments of the present application provide a kind of information latent function starting side
Method is applied in terminal (for example, electronic equipment), the method may include: obtain the predetermined registration operation of terminal maniflest function;Sentence
It is disconnected whether to pass through user information authentication;If so, determining latent function to be concealed;It is associated with the predetermined registration operation and corresponds to the recessiveness
The starting entrance of function;If it is not, executing the maniflest function.
In some embodiments, the method may include: obtain terminal maniflest function operation;Judge whether described pre-
If operation;If predetermined registration operation, judge whether to pass through user information authentication;If being started described default by user information authentication
Operate the corresponding latent function.
In some embodiments, the predetermined registration operation for obtaining terminal maniflest function includes: to obtain setting predetermined registration operation
Instruction;Determine the predetermined registration operation of the maniflest function.
In some embodiments, described to judge whether to authenticate use including the use of biological identification technology by user information authentication
Family information, the biological identification technology include recognition of face, Application on Voiceprint Recognition, iris recognition, hand vein recognition, fingerprint recognition.
In some embodiments, determination latent function to be concealed includes: the terminal function for obtaining user's selection, institute
State the application program that terminal function includes terminal;Determine that the terminal function is latent function to be concealed.
In some embodiments, it includes: to build that the association predetermined registration operation, which corresponds to the starting entrance of the latent function,
Found the predetermined registration operation of the maniflest function and the mapping relations of the latent function;Store the mapping relations.
In some embodiments, the corresponding latent function of the starting predetermined registration operation includes: to obtain described show
The mapping relations of the predetermined registration operation of sexual function and the latent function;According to the mapping relations, start the predetermined registration operation pair
The latent function answered.
In some embodiments, the method may further include: if not predetermined registration operation, executes the dominant function
Energy;If not executing the maniflest function by user information authentication.
In some embodiments, the execution maniflest function includes: to execute institute according to the feature of the maniflest function
State the corresponding function of operation;The maniflest function includes the application program of terminal.
According to a second aspect of the present application, a system is provided, comprising: a memory is configured as storing data
And instruction;One is established the processor communicated with memory, wherein when executing the instruction in memory, the processor quilt
It is configured that the predetermined registration operation for obtaining terminal maniflest function;Judge whether to pass through user information authentication;If so, determination is to be concealed
Latent function;It is associated with the starting entrance that the predetermined registration operation corresponds to the latent function;If it is not, executing the maniflest function.
Therefore, method and system are started according to the latent function of some embodiments of the present application, by by the dominant function of terminal
The predetermined registration operation of energy is associated with to the starting entrance of corresponding latent function, to be further ensured that the safety of Information hiding, is improved and is used
Family experience.
Detailed description of the invention
To more fully understand and illustrating some embodiments of the present application, below with reference to the description of attached drawing reference implementation example,
In the drawings, same digital number indicates corresponding part in the accompanying drawings.
Fig. 1 is the illustrative diagram of the Environment System provided according to some embodiments of the present application.
Fig. 2 is the exemplary cell schematic diagram of the terminal function configuration provided according to some embodiments of the present application.
Fig. 3 is that the setting latent function provided according to some embodiments of the present application starts the exemplary process diagram of method.
Fig. 4 is the exemplary process diagram of the latent function starting method provided according to some embodiments of the present application.
Specific embodiment
It is described as the application defined in requirement and its equivalent that has the right convenient for Integrated Understanding below with reference to attached drawing
Various embodiments.These embodiments include various specific details in order to understand, but these are considered only as illustratively.Cause
This, it will be appreciated by those skilled in the art that carrying out variations and modifications without departing from this to various embodiments described herein
The scope and spirit of application.In addition, briefly and to be explicitly described the application, the application will be omitted to known function and structure
Description.
The term used in following description and claims and phrase are not limited to literal meaning, and being merely can
Understand and consistently understands the application.Therefore, for those skilled in the art, it will be understood that provide to the various implementations of the application
The description of example is only the purpose to illustrate, rather than limits the application of appended claims and its Equivalent definitions.
Below in conjunction with the attached drawing in some embodiments of the application, technical solutions in the embodiments of the present application carries out clear
Chu is fully described by, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.
Based on the embodiment in the application, obtained by those of ordinary skill in the art without making creative efforts all
Other embodiments shall fall in the protection scope of this application.
It should be noted that the term used in the embodiment of the present application is the mesh for being only in description specific embodiment
, it is not intended to be limiting the application." one " of the embodiment of the present application and singular used in the attached claims,
"one", "an", " described " and "the" be also intended to including most forms, unless the context clearly indicates other meaning.Also
It should be appreciated that term "and/or" used herein refer to and include one or more mutually bindings list any of project or
All possible combinations.Express " first ", " second ", " first " and " second " is for modifying respective element without examining
Worry sequence or importance are used only for distinguishing a kind of element and another element, without limiting respective element.
Can be electronic equipment according to the terminal of some embodiments of the application, the electronic equipment may include smart phone,
PC (PC, such as tablet computer, desktop computer, notebook, net book, palm PC PDA), mobile phone, e-book
Reader, portable media player (PMP), audio/video player (MP3/MP4), video camera, virtual reality device
(VR) and the combination of one or more of wearable device etc..According to some embodiments of the present application, the wearable device
Including type of attachment (such as wrist-watch, ring, bracelet, glasses or wear-type device (HMD)), integrated type (such as electronics clothes
Dress), decorated type (such as pad skin, tatoo or built in electronic device) etc. one or more of combination.The application's
In some embodiments, the electronic equipment be can be flexibly, be not limited to above equipment, or can be in above-mentioned various equipment
One or more of combinations.In this application, term " user " can indicate the people using electronic equipment or use electronic equipment
Equipment (such as artificial intelligence electronic equipment).
The embodiment of the present application provides a kind of latent function starting method and system.The application is implemented in order to facilitate understanding
Example, is described in detail the embodiment of the present application below with reference to attached drawing.
Fig. 1 is the illustrative diagram of the Environment System 100 provided according to some embodiments of the present application.Such as Fig. 1
Shown, Environment System 100 may include electronic equipment 110, network 120 and server 130 etc..Electronic equipment 110 can be with
Including bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and physics
Key 117 etc..In some embodiments of the present application, electronic equipment 110 can be omitted one or more elements, or can be into one
Step includes one or more other elements.
Bus 111 may include circuit.The circuit can be with one or more element (examples in interconnection electronics 110
Such as, bus 111, processor 112, memory 113, input/output module 114, display 115, communication module 116 and secondary or physical bond
117).The circuit can also be realized between one or more elements in electronic equipment 110 communication (for example, obtain and/or
Send data).
Processor 112 may include one or more coprocessors (Co-processor), application processor (AP,
Application Processor) and communication processor (Communication Processor).As an example, processor
112 can execute to the control of one or more elements of electronic equipment 110 and/or data processing (for example, communicating relevant behaviour
Make).
Memory 113 can store data.The data may include other with one or more of electronic equipment 110
The relevant instruction of element or data.For example, the data may include the initial data before processor 112 is handled, intermediate data
And/or treated data.Memory 113 may include impermanent memory memory and/or permanent memory memory.Make
For example, memory 113 can store the mapping between the iris information of user, the predetermined registration operation of maniflest function and latent function
Relationship etc..
According to some embodiments of the present application, memory 113 can store software and/or program.Described program can wrap
It includes kernel, middleware, Application Programming Interface (API, Application Programming Interface) and/or applies journey
Sequence (or " application ").
At least part of the kernel, the middleware or the Application Programming Interface may include operating system (OS,
Operating System).As an example, the kernel be can control or be managed for executing other programs (in for example,
Between part, Application Programming Interface and application program) in realize operation or function system resource (for example, bus 111, processor
112, memory 113 etc.).In addition, the kernel can provide interface.The interface can by the middleware, described answer
With one or more elements of programming interface or application program access electronic equipment 110 to control or management system resource.
The middleware can be used as the middle layer of data transmission.Data transmission can permit Application Programming Interface or
Application program is with the kernel communication to exchange data.As an example, the middleware can handle from the application program
One or more task requests of acquisition.For example, the middleware can distribute electronic equipment to one or more application program
The priority of 110 system resource (for example, bus 111, processor 112, memory 113 etc.), and processing it is one or
Multiple tasks request.The Application Programming Interface can be the application program for control from the kernel or the middleware
The interface of function is provided.The Application Programming Interface also may include one or more interfaces or function (for example, instruction).It is described
Function can be used for starting control, data channel control, security control, communication control, document control, window control, text control
System, image procossing, information processing etc..
As an example, memory 113 may include Tee OS storage (Trusted Execution Environment
Operating System), cell phone system memory, mobile phone memory card etc..It is empty that the Tee OS storage can be safe storage
Between, for storing security information (for example, iris information etc.).As an example, when electronic equipment is lost, the letter of Tee OS storage
Breath can not be cracked, to guarantee the safety of iris information.The cell phone system memory may include mobile phone running memory
With mobile phone inoperative memory etc..The inoperative memory can be the ROM (Read Only Memory) of mobile phone.The mobile phone is deposited
Card storage may include SD card (Secure Digital Memory Card), Micro SD card, Mini SD card, TF card (Trans
Flash Card), CF card (Compact Flash Card), mmc card (MultiMedia Card), RS-MMC card, M2 card
(Memory StickMicro), MS card etc..
What input/output module 114 can be inputted to the transmission of the other elements of electronic equipment 110 from user or external equipment
Instruction or data.Input/output module 114 can also be defeated by the instruction or data that obtain from the other elements of electronic equipment 110
Out to user or external equipment.In some embodiments, input/output module 114 may include input unit, and user can lead to
Cross the input unit input information or instruction.
Display 115 can show content.The content can to user show various types (for example, text, image,
Video, icon and/or symbol etc. or several combinations).Display 115 may include liquid crystal display (LCD, Liquid
Crystal Display), light emitting diode (LED, Light-Emitting Diode) display, Organic Light Emitting Diode
(OLED, Organic Light Emitting Diode) display, Micro Electro Mechanical System (MEMS, Micro Electro
Mechanical Systems) display or electric paper display etc. or several combinations.Display 115 may include display
Screen, touch screen etc..The display screen can be with the maniflest function of display terminal.In some embodiments, display 115 can be shown
Virtual key.The input of the available virtual key of touch screen.Display 115 can be obtained defeated by the touch screen
Enter.The input may include touch input, gesture input, action input, close input, electronic pen or user body part
It inputs (for example, hovering input).
Communication module 116 can configure the communication between equipment.In some embodiments, network environment 100 can be into one
Step includes electronic equipment 140.As an example, the communication between the equipment may include electronic equipment 110 and other equipment (example
Such as, server 130 or electronic equipment 140) between communication.For example, communication module 116 can by wireless communication or cable modem
Letter is connected to network 120, communicates with other equipment (for example, server 130 or electronic equipment 140) realization.
The wireless communication may include microwave communication and/or satellite communication etc..The wireless communication may include honeycomb
Communication is (for example, global mobile communication (GSM, Global System for Mobile Communications), CDMA
(CDMA, Code Division MultipleAccess), 3G (Third Generation) Moblie (3G, The 3rd Generation
Telecommunication), forth generation mobile communication (4G), the 5th third-generation mobile communication (5G)), Long Term Evolution (LTE,
Long Term Evolution), Long Term Evolution upgrade version (LTE-A, LTE-Advanced), wideband code division multiple access
(WCDMA, Wideband Code Division MultipleAccess), Universal Mobile Communication System (UMTS, Universal
Mobile Telecommunications System), WiMAX (WiBro, Wireless Broadband) etc. or several
Combination.According to some embodiments of the present application, the wireless communication may include WLAN (WiFi, Wireless
Fidelity), bluetooth, low-power consumption bluetooth (BLE, Bluetooth Low Energy), ZigBee protocol (ZigBee), near-field communication
(NFC, Near Field Communication), magnetic safe transmission, radio frequency and body area network (BAN, BodyAreaNetwork)
Deng or several combinations.According to some embodiments of the present application, the wire communication may include Global Navigation Satellite System
(Glonass/GNSS, Global Navigation Satellite System), global positioning system (GPS, Global
Position System), Beidou navigation satellite system or Galileo (European Global Satellite Navigation System) etc..The cable modem
Letter may include universal serial bus
(USB, Universal Serial Bus), high-definition media interface (HDMI, High-Definition Multimedia
Interface), proposed standard 232 (RS-232, Recommend Standard 232), and/or plain old telephone service
One of (POTS, Plain Old Telephone Service) etc. or several combinations.
Secondary or physical bond 117 can be used for user's interaction.Secondary or physical bond 117 may include one or more entity keys.In some realities
It applies in example, user can be with the function of customized secondary or physical bond 117.As an example, secondary or physical bond 117 can send instruction.Described instruction
It may include the instruction of starting terminal latent function, certification user information instruction etc..The certification user information may include iris
Identification, recognition of face, Application on Voiceprint Recognition, fingerprint recognition, hand vein recognition etc., for example, the iris recognition may include iris typing
When write-in user iris information, iris verification when read iris information etc. of user.
In some embodiments, electronic equipment 110 may further include sensor.The sensor may include but not
It is limited to photosensitive sensor, acoustic sensor, gas sensor, chemical sensor, voltage sensitive sensor, temp-sensitive sensor, fluid to pass
Sensor, biosensor, laser sensor, Hall sensor, intelligence sensor, position sensor etc. or several combinations.
In some embodiments, electronic equipment 110 may further include infrared equipment, image capture device etc..As
Example, the infrared equipment can identify by infrared ray mode of delivery, and blink, watch the technologies such as identification acquisition eyes attentively
Information.For example, the infrared equipment authenticates user information by acquiring the blink movement of user.As an example, described image
Acquiring equipment may include camera, iris device etc..The functions such as eyeball tracking may be implemented in the camera.The iris dress
It sets and can use iris recognition technology progress authentication (for example, certification user information).The iris device may include rainbow
Film camera, the available iris information of iris camera, the iris information can store in memory 113.
Network 120 may include communication network.The communication network may include computer network (for example, local area network
(LAN, Local Area Network) or wide area network (WAN, WideArea Network)), internet and/or telephone network
Deng or several combinations.Network 120 can be to the other equipment in Environment System 100 (for example, electronic equipment 110, clothes
Business device 130, electronic equipment 140 etc.) send information.
Server 130 can connect the other equipment in Environment System 100 (for example, electronic equipment by network 120
110, electronic equipment 140 etc.).In some embodiments, when electronic equipment 110 is lost, server 130 can pass through network
120 send starting iris read write command to electronic equipment 110;When iris verification failure, server 130 can pass through network
120 further lock electronic equipment 110.In some embodiments, when user information authentication success, server 130 can be to
Electronic equipment 110 sends starting terminal latent function instruction etc..In some embodiments, server 130 can be to multiple terminals (example
Such as, electronic equipment 110 and electronic equipment 140) send shared information.
Electronic equipment 140 can be identical or different with electronic equipment 110 type.According to some embodiments of the present application,
Some or all of execution operation can be in another equipment or multiple equipment (for example, electronic equipment 140 in electronic equipment 110
And/or server 130) in execute.In some embodiments, when electronic equipment 110 be automatically or in response to request execute it is a kind of or
When multiple functions and/or service, electronic equipment 110 can request other equipment (for example, electronic equipment 140 and/or server
130) substitution executes function and/or service.In some embodiments, electronic equipment 110 is in addition to executing function or service, further
Execute relative one or more functions.In some embodiments, other equipment are (for example, electronic equipment 140 and/or clothes
Business device 130) requested function or other relevant one or more functions can be executed, implementing result can be sent to electricity
Sub- equipment 110.Electronic equipment 110 can repeat result or be further processed implementing result, to provide requested function
Or service.As an example, cloud computing, distributed computing technology and/or client-server end, which can be used, in electronic equipment 110 calculates meter
Calculation etc. or several combinations.In some embodiments, according to the difference of cloud computing service property, the cloud computing may include
Public cloud, private clound and mixed cloud etc..In some embodiments, when electronic equipment 110 is lost, electronic equipment 140 can be to
Electronic equipment 110 sends positioning instruction, to obtain the location information of electronic equipment 110.In some embodiments, electronic equipment
110 can establish with electronic equipment 140 and connect, for example, shared information etc..
It should be noted that the description for Environment System 100 above only for convenience of description can not be this Shen
It please be limited within the scope of illustrated embodiment.It is appreciated that the principle based on this system can for those skilled in the art
Any combination can be carried out to each element, or constitute subsystem and connect with other elements under the premise of without departing substantially from the principle,
Various modifications and variations in form and details are carried out to the implementation above method and systematic difference field.For example, network environment
System 100 may further include database etc..In another example electronic equipment 110 can not include secondary or physical bond 117 etc..It is all such
The deformation of class, within the scope of protection of this application.
Fig. 2 is the exemplary cell block diagram of the functions of the equipments configuration provided according to some embodiments of the present application.Such as Fig. 2 institute
Show, processor 112 may include processing module 200, and the processing module 200 may include acquiring unit 210, analytical unit
220, determination unit 230, control unit 240, storage unit 250.
According to some embodiments of the present application, the available information of acquiring unit 210.In some embodiments, the letter
Breath can include but is not limited to text, picture, audio, video, movement, gesture, sound, eyes (for example, iris information etc.), gas
Breath, light etc. or several combinations.In some embodiments, the information can include but is not limited to input information, system information
And/or communication information etc..As an example, acquiring unit 210 can pass through the touch of input/output module 114, display 115
Screen, secondary or physical bond 117 and/or sensor obtain the input information of electronic equipment 110.The input information may include other equipment
The input of (for example, electronic equipment 140) and/or user, for example, the input of key-press input, touch-control, gesture input, action input, remote
Journey input, transmission input, eyes input, voice input, breath input, light input etc. or several combinations.The input information
Obtaining widget can include but is not limited to infrared equipment, image capture device, sensor etc. or several combinations.As showing
Example, acquiring unit 210 can obtain iris information etc. by image capture device (for example, iris camera etc.).In another example obtaining
Take the predetermined registration operation of the available terminal maniflest function of unit 210.
In some embodiments, acquiring unit 210 can obtain the communication information by network 120.The communication information can
To include application software information, signal of communication (for example, voice signal, vision signal etc.), short message etc..In some embodiments
In, acquiring unit 210 can obtain system information by network 120, memory 113 and/or sensor.The system information can
To include but is not limited to the information that stores of the system mode of electronic equipment 110, presupposed information, memory 113 (for example, iris is recognized
Demonstrate,prove information etc.) etc. or several combinations.
In some embodiments, the information may include instruction.Described instruction includes user instruction and/or system command
Deng or several combinations.Described instruction may include triggering command, certification instruction, fill in instruction etc. or several combinations.Institute
Stating certification instruction may include certification user information, starting terminal latent function instruction etc..As an example, acquiring unit 210 can
Start the instruction of terminal latent function to obtain user by secondary or physical bond 117 or virtual key.
According to some embodiments of the present application, analytical unit 220 can analyze information.In some embodiments, analysis is single
Whether member 220 can use the user information that close guarantor's function determines that movement implementer and electronic equipment store consistent.The close guarantor
Function may include password identification and/or biological identification technology.The password identification may include numerical ciphers set by user,
Sound password, gesture password, track password, touch-control password etc..The bio-identification may include iris recognition, recognition of face,
Fingerprint recognition, Application on Voiceprint Recognition, hand vein recognition etc..
According to some embodiments of the present application, determination unit 230 can determine information.In some embodiments, it determines single
Member 230 can determine latent function to be concealed.In some embodiments, determination unit 230 can determine the behaviour of maniflest function
Whether work and predetermined registration operation are consistent etc..In some embodiments, determination unit 230 can determine the associated recessive function of maniflest function
Energy is equal.
According to some embodiments of the present application, control unit 240 can control electronic equipment.In some embodiments, it controls
Unit 240 processed can lock electronic equipment, unlock electronic equipment and/or foundation or the communication connection for disconnecting electronic equipment.It is described
Locking electronic equipment may include the function of limiting electronic equipment.In some embodiments, control unit 240 can be associated with dominant
The predetermined registration operation of function corresponds to the starting entrance of latent function.In some embodiments, control unit 240 can execute dominant function
The corresponding latent function of predetermined registration operation of energy.
According to some embodiments of the present application, storage unit 250 can store information.In some embodiments, storage is single
Member 250 can store the predetermined registration operation of maniflest function and the mapping relations of latent function.In some embodiments, storage unit
250 can store user information, to authenticate user information, for example, client iris information, user's face information, user fingerprints are believed
Breath, user's venous information, user's voiceprint etc..
According to some embodiments of the present application, processing module 200 may further include display unit, the display unit
It can show information.In some embodiments, display unit can be a part of display.As an example, display unit can
With the maniflest function of display terminal.In another example display unit can show the predetermined registration operation of the maniflest function.For another example aobvious
Show that unit can be with the latent function etc. of display terminal.
It should be noted that the unit in processing module 200 is described above, it only for convenience of description, can not be this
Application is limited within the scope of illustrated embodiment.It is appreciated that for those skilled in the art, the principle based on this system,
Any combination may be carried out to each unit, or constitute submodule and other units company under the premise of without departing substantially from the principle
It connects, various modifications and variations in form and details is carried out to the function of implementing above-mentioned module and unit.For example, processing module
200 can not include analytical unit 220 or storage unit 250, execute corresponding function by determination unit 230 or memory 113
Energy is equal.In another example processing module 200 may further include display unit etc..Suchlike deformation, in the guarantor of the application
Within the scope of shield.
Fig. 3 is that the setting latent function provided according to some embodiments of the present application starts the exemplary process diagram of method.
As shown in figure 3, process 300 can be realized by processing module 200.
301, the predetermined registration operation of terminal maniflest function is obtained.Operation 301 can pass through the acquiring unit of processing module 200
210 realize.In some embodiments, the predetermined registration operation for obtaining terminal maniflest function may include obtaining setting predetermined registration operation
Instruction, and determine the predetermined registration operation of the maniflest function.The maniflest function may include terminal show terminal function,
Application program etc..The predetermined registration operation may include the operation associated of the maniflest function.As an example, acquiring unit 210 can
To obtain the instruction of setting predetermined registration operation by secondary or physical bond or virtual key.In some embodiments, acquiring unit 210 is available
One or more predetermined registration operations of maniflest function.
302, judge whether to pass through user information authentication.Operation 302 can pass through the analytical unit of processing module 200
220 realize.In some embodiments, analytical unit 220 can use cryptographic function or biological identification technology certification user information.
In some embodiments, the biological identification technology may include recognition of face, Application on Voiceprint Recognition, iris recognition, hand vein recognition, refer to
Line identification.
If, into operation 303,303, determining latent function to be concealed by user information authentication.Operation 303 can be with
It is realized by the determination unit 230 of processing module 200.Determination latent function to be concealed may include obtaining user's selection
Terminal function, the terminal function includes the application program of terminal;And determine that the terminal function is recessiveness to be concealed
Function.In some embodiments, determination unit 230 can determine one or more to be concealed hidden according to the selection of terminal user
Sexual function.
304, it is associated with the starting entrance that the predetermined registration operation corresponds to the latent function.Operation 304 can pass through processing
The control unit 240 of module 200 is realized.The starting entrance that the association predetermined registration operation corresponds to the latent function can wrap
Include the mapping relations of the predetermined registration operation and the latent function of establishing the maniflest function;And the storage mapping relations.?
In some embodiments, control unit 240 can be associated with opening for the corresponding one or more latent functions of one or more predetermined registration operations
Dynamic entrance.
If, 305, not executing the maniflest function into operation 305 by user information authentication.Operation 305 can lead to
The control unit 240 for crossing processing module 200 is realized.In some embodiments, control unit 240 can be according to the maniflest function
Feature, execute the corresponding function of the operation.The maniflest function may include terminal function, the application program that terminal is shown
Deng.
It should be noted that the description for process 300 above can not only for convenience of description be limited in the application
Within the scope of illustrated embodiment.It is appreciated that the principle based on this system may not carry on the back for those skilled in the art
Under the premise of from the principle, any combination is carried out to each operation, or constitute sub-process and other operative combinations, in implementation
The function of stating process and operation carries out various modifications and variations in form and details.For example, process 300 may be performed simultaneously behaviour
Make 303 and operation 304 etc..Suchlike deformation, within the scope of protection of this application.
Fig. 4 is the exemplary process diagram of the latent function starting method provided according to some embodiments of the present application.Such as Fig. 4
Shown, process 400 can be realized by processing module 200.
401, the operation of terminal maniflest function is obtained.Operation 401 can pass through the acquiring unit 210 of processing module 200
It realizes.In some embodiments, acquiring unit 210 can obtain the operation of user by touch screen.As an example, the operation
It may include the operation associated of the maniflest function.
402, judge whether predetermined registration operation.Operation 402 can be realized by the determination unit 230 of processing module 200.?
In some embodiments, determination unit 230 may determine that whether the operation is consistent with the predetermined registration operation of terminal storage.It is described default
Operation can be arranged by the operation 301 in process 300.
If so, entering operation 403,403, judge whether to pass through user information authentication.Operation 403 can be by handling mould
The analytical unit 220, and/or determination unit 230 of block 200 are realized.In some embodiments, analytical unit 220 can use close
It protects function and authenticates user information.Close guarantor's function may include password identification and/or biological identification technology.The password identification
It may include numerical ciphers set by user, sound password, gesture password, track password, touch-control password etc..The bio-identification
Technology may include recognition of face, Application on Voiceprint Recognition, iris recognition, hand vein recognition, fingerprint recognition.
If, into operation 404,404, starting the corresponding latent function of the predetermined registration operation by user information authentication.
Operation 404 can be realized by the control unit 240 of processing module 200.The starting predetermined registration operation is corresponding described hidden
Sexual function may include the predetermined registration operation for obtaining the maniflest function and the mapping relations of the latent function;And according to described
Mapping relations start the corresponding latent function of the predetermined registration operation.In some embodiments, control unit 240 can open
Move the corresponding one or more latent functions of one or more predetermined registration operation.
If not predetermined registration operation, 405, does not execute the maniflest function into operation 405 by user information authentication.
Operation 405 can be realized by the control unit 240 of processing module 200.In some embodiments, control unit 240 can root
According to the feature of the maniflest function, the corresponding function of the operation is executed.The maniflest function may include the end that terminal is shown
Hold function, application program etc..
It should be noted that the description for process 400 above can not only for convenience of description be limited in the application
Within the scope of illustrated embodiment.It is appreciated that the principle based on this system may not carry on the back for those skilled in the art
Under the premise of from the principle, any combination is carried out to each operation, or constitute sub-process and other operative combinations, in implementation
The function of stating process and operation carries out various modifications and variations in form and details.For example, process 400 may be performed simultaneously behaviour
Make 402 and operation 403 etc..Suchlike deformation, within the scope of protection of this application.
In conclusion starting method and system according to the latent function of the embodiment of the present application, by by terminal maniflest function
Predetermined registration operation be associated with to the starting entrance of corresponding latent function, to be further ensured that the safety of Information hiding, improve user
Experience.
It should be noted that the above embodiments are intended merely as example, the application is not limited to such example, but can
To carry out various change.
It should be noted that in the present specification, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Finally, it is to be noted that, it is above-mentioned it is a series of processing not only include with sequence described here in temporal sequence
The processing of execution, and the processing including executing parallel or respectively rather than in chronological order.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
It is completed by the relevant hardware of computer program instructions, the program can be stored in a computer readable storage medium,
The program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for magnetic disk,
CD, read-only memory (Read-Only Memory, ROM) or random access memory (RandomAccess Memory, RAM) etc..
Above disclosed is only some preferred embodiments of the application, and the right model of the application cannot be limited with this
It encloses, those skilled in the art can understand all or part of the processes for realizing the above embodiment, and wants according to the application right
Made equivalent variations is sought, is still belonged to the scope covered by the invention.
Claims (10)
1. a kind of latent function starts method characterized by comprising
Obtain the predetermined registration operation of terminal maniflest function;
Judge whether to pass through user information authentication;
If so, determining latent function to be concealed;
It is associated with the starting entrance that the predetermined registration operation corresponds to the latent function;
If it is not, executing the maniflest function.
2. latent function according to claim 1 starts method, which is characterized in that further comprise:
Obtain the operation of terminal maniflest function;
Judge whether the predetermined registration operation;
If predetermined registration operation, judge whether to pass through user information authentication;
If starting the corresponding latent function of the predetermined registration operation by user information authentication.
3. latent function according to claim 1 starts method, which is characterized in that described to obtain the pre- of terminal maniflest function
If operation includes:
Obtain the instruction of setting predetermined registration operation;
Determine the predetermined registration operation of the maniflest function.
4. latent function according to claim 1 starts method, which is characterized in that described to judge whether to pass through user information
Certification authenticates user information including the use of biological identification technology, and the biological identification technology includes recognition of face, Application on Voiceprint Recognition, rainbow
Film identification, hand vein recognition, fingerprint recognition.
5. latent function according to claim 1 starts method, which is characterized in that determination latent function to be concealed
Include:
The terminal function of user's selection is obtained, the terminal function includes the application program of terminal;
Determine that the terminal function is latent function to be concealed.
6. latent function according to claim 2 starts method, which is characterized in that the association predetermined registration operation is corresponding
The starting entrance of the latent function includes:
Establish the predetermined registration operation of the maniflest function and the mapping relations of the latent function;
Store the mapping relations.
7. latent function according to claim 6 starts method, which is characterized in that the starting predetermined registration operation is corresponding
The latent function include:
Obtain the predetermined registration operation of the maniflest function and the mapping relations of the latent function;
According to the mapping relations, start the corresponding latent function of the predetermined registration operation.
8. latent function according to claim 2 starts method, which is characterized in that further comprise:
If not predetermined registration operation, executes the maniflest function;
If not executing the maniflest function by user information authentication.
9. latent function according to claim 8 starts method, which is characterized in that described to execute the maniflest function packet
It includes: according to the feature of the maniflest function, executing the corresponding function of the operation;The maniflest function includes the application journey of terminal
Sequence.
10. a system characterized by comprising
One memory, is configured as storing data and instruction;
One is established the processor communicated with memory, wherein when executing the instruction in memory, the processor is configured
Are as follows:
Obtain the predetermined registration operation of terminal maniflest function;
Judge whether to pass through user information authentication;
If so, determining latent function to be concealed;
It is associated with the starting entrance that the predetermined registration operation corresponds to the latent function;
If it is not, executing the maniflest function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810165762.5A CN110210186A (en) | 2018-02-28 | 2018-02-28 | A kind of latent function starting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810165762.5A CN110210186A (en) | 2018-02-28 | 2018-02-28 | A kind of latent function starting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110210186A true CN110210186A (en) | 2019-09-06 |
Family
ID=67778552
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810165762.5A Pending CN110210186A (en) | 2018-02-28 | 2018-02-28 | A kind of latent function starting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110210186A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103778363A (en) * | 2014-01-20 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for protecting application |
CN104732157A (en) * | 2015-03-31 | 2015-06-24 | 酷派软件技术(深圳)有限公司 | Method and device for hiding and opening applications |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
CN106155560A (en) * | 2016-07-28 | 2016-11-23 | 广东小天才科技有限公司 | A kind of application controls method and device based on touch-control, user terminal |
CN106295274A (en) * | 2016-07-27 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of application control method and device |
US20170003863A1 (en) * | 2015-06-30 | 2017-01-05 | Lenovo (Beijing) Limited | Methods and apparatuses for setting application property and message processing |
CN106484231A (en) * | 2016-09-30 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application hides |
CN107402763A (en) * | 2017-07-27 | 2017-11-28 | 深圳市泰衡诺科技有限公司 | A kind of icon control method and control system based on intelligent terminal |
CN107423585A (en) * | 2017-07-31 | 2017-12-01 | 上海爱优威软件开发有限公司 | The concealed application method and system of a kind of application |
CN107729722A (en) * | 2017-10-31 | 2018-02-23 | 深圳依偎控股有限公司 | The secrecy operating method and system of a kind of application program |
-
2018
- 2018-02-28 CN CN201810165762.5A patent/CN110210186A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103778363A (en) * | 2014-01-20 | 2014-05-07 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and method for protecting application |
CN104732157A (en) * | 2015-03-31 | 2015-06-24 | 酷派软件技术(深圳)有限公司 | Method and device for hiding and opening applications |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
US20170003863A1 (en) * | 2015-06-30 | 2017-01-05 | Lenovo (Beijing) Limited | Methods and apparatuses for setting application property and message processing |
CN106295274A (en) * | 2016-07-27 | 2017-01-04 | 宇龙计算机通信科技(深圳)有限公司 | A kind of application control method and device |
CN106155560A (en) * | 2016-07-28 | 2016-11-23 | 广东小天才科技有限公司 | A kind of application controls method and device based on touch-control, user terminal |
CN106484231A (en) * | 2016-09-30 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application hides |
CN107402763A (en) * | 2017-07-27 | 2017-11-28 | 深圳市泰衡诺科技有限公司 | A kind of icon control method and control system based on intelligent terminal |
CN107423585A (en) * | 2017-07-31 | 2017-12-01 | 上海爱优威软件开发有限公司 | The concealed application method and system of a kind of application |
CN107729722A (en) * | 2017-10-31 | 2018-02-23 | 深圳依偎控股有限公司 | The secrecy operating method and system of a kind of application program |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109636401A (en) | A kind of method of payment and system based on the micro- expression of user | |
CN107425579A (en) | A kind of intelligent charging method and system | |
CN109492412A (en) | The encryption storage method and system of file | |
CN109472122A (en) | A kind of multimedia messages reminding method and system | |
CN107315681A (en) | Application program self-starting test system, medium and method | |
CN107786979A (en) | A kind of multiple terminals shared communication method and system | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
CN107423585A (en) | The concealed application method and system of a kind of application | |
CN107085678A (en) | A kind of display methods and its terminal | |
CN107862518A (en) | A kind of method of payment and system based on terminal location | |
CN107944245A (en) | A kind of eyeball tracking iris unlocking method and system | |
CN107404484A (en) | A kind of method, apparatus and system of mechanical release authority | |
CN206908680U (en) | Intelligent terminal with secure log function | |
CN109189536A (en) | A kind of terminal applies display methods and system | |
CN108897479A (en) | A kind of terminal touch control method and system | |
CN107592398A (en) | A kind of intelligent information storage method and system | |
CN108021350A (en) | A kind of terminal output volume method of adjustment and system | |
CN107704843A (en) | A kind of simple eye iris verification method and system | |
CN108010519A (en) | A kind of information search method and system | |
CN108449511A (en) | A kind of presentation of information update method and system | |
CN108509017A (en) | A kind of control method and system of terminal applies | |
CN108874465A (en) | A kind of application starting method and system based on caching | |
CN107563162A (en) | A kind of concealed unlocking method and system | |
CN108881417A (en) | A kind of user interaction approach and system based on local area network | |
CN110210186A (en) | A kind of latent function starting method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190906 |
|
WD01 | Invention patent application deemed withdrawn after publication |