CN110839110B - Message protection method, mobile terminal and readable storage medium - Google Patents
Message protection method, mobile terminal and readable storage medium Download PDFInfo
- Publication number
- CN110839110B CN110839110B CN201911130654.5A CN201911130654A CN110839110B CN 110839110 B CN110839110 B CN 110839110B CN 201911130654 A CN201911130654 A CN 201911130654A CN 110839110 B CN110839110 B CN 110839110B
- Authority
- CN
- China
- Prior art keywords
- message
- new
- application
- display layer
- new message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/7243—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality with interactive means for internal management of messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a message protection method, a mobile terminal and a computer readable storage medium, wherein a received new message is acquired; judging whether the application to which the new message belongs to a message manager or not; if yes, shielding the prompt when the new message is received. After the mobile terminal receives the new message, the prompt function of the application to which the new message belongs for the new message is shielded, so that the detailed information of the new message is not directly displayed, the safety of the message is improved, and the privacy of a user is protected from being revealed.
Description
Technical Field
The present invention relates to the field of mobile terminal messaging technologies, and in particular, to a message protection method, a mobile terminal, and a readable storage medium.
Background
With the development of application development technology, the variety and number of applications are also rapidly increasing. The user generally sets the application as an opening permission notification, the mobile terminal receives the new message and displays the detailed information of the new message in real time, and the security of the message is not high; if the user does not carry the mobile phone with him or borrows the mobile phone from other people, it is easy to cause the leakage of the message or the privacy of the user.
Disclosure of Invention
The invention mainly aims to provide a message protection method, a mobile terminal and a computer storage medium, and aims to solve the technical problems that in the prior art, after a mobile terminal receives a new message, the mobile terminal directly displays detailed information of the new message, the message security is not high, and the leakage of the message or the privacy of a user is easy to cause.
To achieve the above object, an embodiment of the present invention provides a message protection method, including the steps of:
acquiring a received new message;
judging whether the application to which the new message belongs to a message manager or not;
if yes, shielding the prompt when the new message is received.
Optionally, the step of masking the prompt when the new message is received includes:
acquiring a receiving prompt of each new message;
and shielding each receiving prompt.
Optionally, after the step of masking each of the received prompts, the steps include:
a notification is output to prompt the message manager to view each of the new messages.
Optionally, after the step of masking the prompt when the new message is received, the method includes:
and saving the new message to the message manager.
Optionally, after the step of saving the new message to the message manager, the method includes:
acquiring the new message viewing request and displaying the new message;
taking the new message as a checked message;
and acquiring and executing an operation request of the checked message, wherein the operation request comprises saving or deleting the checked message and the message manager.
Optionally, the step of saving the new message to the message manager includes:
saving the new message in a first display layer of the message manager;
storing an icon of an application to which the new message belongs in a second display layer below the first display layer;
and storing the new message number identifier in a third display layer below the second display layer.
Optionally, the step of saving the icon of the application to which the new message belongs in a second display layer below the first display layer includes:
retrieving and hiding the application to which the new message belongs from the second display layer to the first display layer;
and orderly displaying icons of the applications to which the new messages belong on the first display layer according to the priorities of the applications to which the new messages belong.
Optionally, the step of storing the new message number identifier in a third display layer below the second display layer includes:
counting the number of new messages received by an application to which the new messages belong;
and calling the number identifier of the new message in the third display layer, and displaying the number identifier in the first display layer corresponding to the area of the application to which the new message belongs.
The invention also provides a mobile terminal, which comprises: the message protection system comprises a memory, a processor and a message protection program stored on the memory and capable of running on the processor, wherein the message protection program realizes the steps of the message protection method when being executed by the processor.
The present invention also provides a computer storage medium having stored thereon a message protection program which, when executed by a processor, implements the steps of the message protection method as described above.
When the mobile terminal receives a new message, the method firstly acquires the received new message; judging whether the application to which the new message belongs to a message manager or not; if so, the prompt when the new message is received is shielded, so that the detailed information of the new message is not directly displayed, the detailed information of the new message cannot be directly checked on the main interface of the mobile terminal, the leakage of the new message or the prompt of the new message when other people hold or check the mobile terminal is avoided, the problem of low message safety is solved, and the privacy of the message and the user is protected from leakage.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
In order to more clearly illustrate the embodiments of the invention or the technical solutions of the prior art, the drawings which are used in the description of the embodiments or the prior art will be briefly described, and it will be obvious to a person skilled in the art that other drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a schematic diagram of an alternative hardware architecture of a mobile terminal according to an embodiment of the present invention;
FIG. 2 is a flow chart of a first embodiment of the message protection method of the present invention;
FIG. 3 is a flow chart of a second embodiment of the message protection method of the present invention;
FIG. 4 is a flow chart of a third embodiment of the message protection method of the present invention;
FIG. 5 is a flow chart of a fourth embodiment of the message protection method of the present invention;
FIG. 6 is a flowchart of a fifth embodiment of a message protection method according to the present invention;
FIG. 7 is a flowchart of a message protection method according to a sixth embodiment of the present invention;
FIG. 8 is a schematic diagram of an application scenario of an embodiment of a message protection method according to the present invention;
fig. 9 is a schematic diagram of another application scenario of an embodiment of the message protection method of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
In the following description, suffixes such as "module", "component", or "unit" for representing elements are used only for facilitating the description of the present invention, and have no specific meaning per se. Thus, "module," "component," or "unit" may be used in combination.
Mobile terminals may be implemented in a variety of forms. For example, the mobile terminals described in the present invention may include mobile terminals such as cell phones, tablet computers, notebook computers, palm computers, personal digital assistants (Personal Digital Assistant, PDA), and the like.
In the following description, a mobile terminal will be taken as an example, and reference is made to fig. 1, which is a schematic hardware structure of a mobile terminal for implementing various embodiments of the present invention, where the mobile terminal 100 may include: an RF (Radio Frequency) unit 101, a WiFi module 102, an audio output unit 103, an a/V (audio/video) input unit 104, a sensor 105, a display unit 106, a user input unit 107, an interface unit 108, a memory 109, a processor 110, and a power supply 111. Those skilled in the art will appreciate that the mobile terminal structure shown in fig. 1 is not limiting of the mobile terminal and that the mobile terminal may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be used for receiving and transmitting signals during the information receiving or communication process, specifically, after receiving downlink information of the base station, processing the downlink information by the processor 110; and, the uplink data is transmitted to the base station. Typically, the radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication, global System for Mobile communications), GPRS (General Packet Radio Service ), CDMA2000 (Code Division Multiple Access, CDMA 2000), WCDMA (Wideband Code Division Multiple Access ), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, time Division synchronous code Division multiple Access), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency Division Duplex Long term evolution), and TDD-LTE (Time Division Duplexing-Long Term Evolution, time Division Duplex Long term evolution), etc.
WiFi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to send and receive e-mails, browse web pages, access streaming media and the like through the WiFi module 102, so that wireless broadband Internet access is provided for the user. Although fig. 1 shows a WiFi module 102, it is understood that it does not belong to the necessary constitution of a mobile terminal, and can be omitted entirely as required within a range that does not change the essence of the invention.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the WiFi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a talk mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output (e.g., a call signal reception sound, a message reception sound, etc.) related to a specific function performed by the mobile terminal 100. The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive an audio or video signal. The a/V input unit 104 may include a graphics processor (Graphics Processing Unit, GPU) 1041 and a microphone 1042, the graphics processor 1041 processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the WiFi module 102. The microphone 1042 can receive sound (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, and the like, and can process such sound into audio data. The processed audio (voice) data may be converted into a format output that can be transmitted to the mobile communication base station via the radio frequency unit 101 in the case of a telephone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting the audio signal.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and the proximity sensor can turn off the display panel 1061 and/or the backlight when the mobile terminal 100 moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the acceleration in all directions (generally three axes), and can detect the gravity and direction when stationary, and can be used for applications of recognizing the gesture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer gesture calibration), vibration recognition related functions (such as pedometer and knocking), and the like; as for other sensors such as fingerprint sensors, pressure sensors, iris sensors, molecular sensors, gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. that may also be configured in the mobile phone, the detailed description thereof will be omitted.
The display unit 106 is used to display information input by a user or information provided to the user. The display unit 106 may include a display panel 1061, and the display panel 1061 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and to generate key signal inputs related to user settings and function control of the mobile terminal. In particular, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect touch operations thereon or thereabout by a user (e.g., operations of the user on the touch panel 1071 or thereabout by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 110, and can receive and execute commands sent from the processor 110. Further, the touch panel 1071 may be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. The user input unit 107 may include other input devices 1072 in addition to the touch panel 1071. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, mouse, joystick, etc., as specifically not limited herein.
Further, the touch panel 1071 may overlay the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or thereabout, the touch panel 1071 is transferred to the processor 110 to determine the type of touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of touch event. Although in fig. 1, the touch panel 1071 and the display panel 1061 are two independent components for implementing the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 may be integrated with the display panel 1061 to implement the input and output functions of the mobile terminal, which is not limited herein.
The interface unit 108 serves as an interface through which at least one external device can be connected with the mobile terminal 100. For example, the external devices may include a wired or wireless headset port, an external power (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and an external device.
The memory 109 may be used to store software programs as well as various data, and the memory 109 may be a computer storage medium, the memory 109 storing the message protection program of the present invention. The memory 109 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 109 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by running or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Such as processor 110, executes a message protection program in memory 109 to perform the steps of the various embodiments of the message protection method of the present invention.
Processor 110 may include one or more processing units; alternatively, the processor 110 may integrate an application processor that primarily handles operating systems, user interfaces, applications, etc., with a modem processor that primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
The mobile terminal 100 may further include a power supply 111 (e.g., a battery) for supplying power to the respective components, and optionally, the power supply 111 may be logically connected to the processor 110 through a power management system, so as to perform functions of managing charging, discharging, and power consumption management through the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described herein. The mobile terminal 100 can be connected with other terminal devices through bluetooth to realize communication and information interaction.
In the message protection system shown in fig. 1, the processor 110 is configured to execute a message protection program stored in the memory 109, and implement the following steps:
acquiring a received new message;
judging whether the application to which the new message belongs to a message manager or not;
if yes, shielding the prompt when the new message is received.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
acquiring a receiving prompt of each new message;
and shielding each receiving prompt.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
a notification is output to prompt the message manager to view each of the new messages.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
and saving the new message to the message manager.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
acquiring the new message viewing request and displaying the new message;
taking the new message as a checked message;
and acquiring and executing an operation request of the checked message, wherein the operation request comprises saving or deleting the checked message and the message manager.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
saving the new message in a first display layer of the message manager;
storing an icon of an application to which the new message belongs in a second display layer below the first display layer;
and storing the new message number identifier in a third display layer below the second display layer.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
retrieving and hiding the application to which the new message belongs from the second display layer to the first display layer;
and orderly displaying icons of the applications to which the new messages belong on the first display layer according to the priorities of the applications to which the new messages belong.
Further, the processor 110 may call a message protection program stored in the memory 109, and further perform the following operations:
counting the number of new messages received by an application to which the new messages belong;
and calling the number identifier of the new message in the third display layer, and displaying the number identifier in the first display layer corresponding to the area of the application to which the new message belongs.
Based on the above mobile terminal hardware structure, various embodiments of the method of the present invention are provided.
The present invention provides a message protection method, which is applied to a mobile terminal, and in a first embodiment of the message protection method, referring to fig. 2, the message protection method includes:
step S10, acquiring a received new message;
the execution body of the invention can be a message manager, and a user firstly needs to open the permission notification authority of the message manager in the mobile terminal, so that the notification information of the message manager can be displayed in the mobile terminal; the user also needs to open the communication authority between the message manager and the protection application, namely the application which the user wants to carry out message protection, so that the message manager can carry out real-time communication with the protection application; when the mobile terminal receives a new message, wherein the new message refers to a message which is received by the mobile terminal in real time and not yet viewed by a user, the message manager firstly acquires the new message received by the mobile terminal.
Step S20, judging whether the application to which the new message belongs to a message manager;
the application to which the new message belongs refers to an application in the mobile terminal, which has a subordinate relation with the new message, namely the new message is a message received by the application to which the new message belongs; the message manager processes the new message received by the mobile terminal to improve the message security, and after a user clicks the message manager, the message protection function corresponding to the application installed by the mobile terminal is started, namely the protection function of the application is started; the message manager firstly acquires the new message received by the mobile terminal, then judges whether the application to which the new message belongs has started the message protection function, and if the message protection function is in a starting state, the message protection function is started on behalf of the application to which the new message belongs.
And step S30, if yes, shielding the prompt when the new message is received.
If the application to which the new message belongs has already started the message protection function, the message manager shields the prompt function of the application to which the new message belongs; if the application to which the new message belongs does not open the message protection function, the message manager does not perform any processing on the prompt function of the new message for the application to which the new message belongs.
In this embodiment, a received new message is acquired; judging whether the application to which the new message belongs to a message manager or not; if so, the prompt when the new message is received is shielded, so that the detailed information of the new message is not directly displayed, the detailed information of the new message cannot be directly checked on the main interface of the mobile terminal, the leakage of the new message or the prompt of the new message when other people hold or check the mobile terminal is avoided, the problem of low message safety is solved, and the privacy of the message and the user is protected from leakage.
Further, on the basis of the first embodiment of the message protection method of the present invention, a second embodiment of the message protection method is provided, referring to fig. 3, step S30 includes:
step S31, obtaining a receiving prompt of each new message;
step S32, shielding each receiving prompt.
In this embodiment, when it is determined that the application to which the new message belongs to an application in a message manager, receiving prompts of the new messages are acquired, and then the prompts are shielded, so that the prompts when the new message is received are shielded, and information security is improved.
Further, on the basis of the second embodiment of the message protection method of the present invention, a third embodiment of the message protection method is provided, and referring to fig. 4, after the step of saving the new message to the message manager, the method includes:
step A10, acquiring a new message viewing request and displaying a new message;
step A20, taking the new message as the checked message;
step A30, obtaining and executing the operation request of the checked information, wherein the operation request comprises saving or deleting the checked information and the checked information in the information manager.
In this embodiment, after the user looks at the masked message, the user may choose to save or delete the new message. The deletion may include a delete request or a bulk delete request; the deletion request or batch deletion request of the new message refers to that after a user clicks one message or selects a plurality of messages in the application to which the new message belongs, the message is selected to be deleted, and the corresponding instruction received by the message manager is the deletion request or batch deletion request of the new message; the user can delete the messages singly or in batches, so that the simplicity of deleting operation of the user is improved.
Further, on the basis of the third embodiment of the message protection method of the present invention, a fourth embodiment of the message protection method is provided, and referring to fig. 5, after the step of saving the new message to the message manager, the method includes:
step A01, storing the new message in a first display layer of a message manager;
the related information of the new message of the message manager is displayed on a related interface of the protection application, wherein the related interface comprises three display layers, namely a first display layer, a second display layer and a third display layer; the first display layer is arranged from top to bottom on the mobile terminal screen to the third display layer, namely the first display layer is arranged at the top layer of the mobile terminal screen; the first display layer is visible to a user; the second display layer is below the first display layer and is invisible to the user; the third display layer is below the second display layer and is also invisible to the user; first, the message manager saves notification information of a new message to a first display layer of an association interface of a protection application.
Step A02, storing the icon of the application to which the new message belongs in a second display layer below the first display layer;
and the message manager stores the notification information of the new message in the first display layer of the associated interface of the protection application, then stores the icon of the protection application in the second display layer, and keeps the icon of the protection application consistent with the icon of the application in the mobile terminal, thereby conforming to the reading habit of the user.
And step A03, storing the new message number identification in a third display layer below the second display layer.
The new message number identification may represent 1 to 99 new messages with all integers of 1 to 99; the number of new messages is represented by 99+ for all numbers exceeding 99.
In this embodiment, a total of 3 display layers including a first display layer, a second display layer, and a third display layer are provided, and information and roles on each display layer are different:
the information on the first display layer is notification information of the new message and is mainly used for notifying a user that the message manager has protected the new message and prompting the user to check;
the information on the second display layer is an icon for protecting the application and is consistent with the icon of the application in the mobile terminal; when a user starts a message protection function of an application, a message manager adds an icon of the application to a second display layer, and the icon of the application is displayed on the first display layer after the application acquires a new message;
the information on the third display layer is the identification representing the number of the new messages, and the message manager sets 100 identifications of all integers from 1 to 99 and +numbers; when the number of the new messages corresponding to the application to which each new message belongs is required to be represented, the message manager directly calls the identifier corresponding to the number in the third layer, and then the identifier is displayed in the first layer; and each identifier can be repeatedly called, so that the utilization rate of resources is increased.
The message manager places different information on different display layers, is beneficial to classifying and managing different types of information (characters, icons and number identifiers), is convenient for the message manager to quickly classify and display the notification information of the new message, and improves the processing speed of the message manager on the notification information of the new message.
Further, on the basis of the fourth embodiment of the message protection method of the present invention, a fifth embodiment of the message protection method is provided, and referring to fig. 6, step a02 includes:
step A021, retrieving the application to which the new message belongs from the second display layer and hiding the application in the first display layer;
after the message manager adds the icon of the protection application to the second display layer, checking whether the application to which the new message belongs opens the message protection function, and when the message protection function is in an open state, indicating that the user opens the message protection function; when the message protection function is in a closed state, the user is indicated to not open the message protection function; when the application to which the new message belongs opens the protection function, the icon of the application to which the new message belongs is fetched from the second display layer and then hidden in the first display layer.
And step A022, orderly displaying icons of the applications to which the new messages belong on a first display layer according to the priorities of the applications to which the new messages belong.
The priority refers to that the user can set a sequence for the display sequence of the protection application; the message manager retrieves the icon of the application to which the new message belongs from the second display layer and then hides the icon in the first display layer, and displays the icons of the applications to which the new messages belong in the first display layer in a top-down and left-right order according to the priority of the applications to which the new message belongs. For example, the user sets the priorities of the protection application D, the protection application C, the protection application B, and the protection application a from high to low in sequence, and if 4 protection applications all have new messages at the same time, the display order of the 4 applications on the first display layer is the protection application D, the application C, the application B, and the application a in sequence.
In this embodiment, first, it is determined whether an application to which a new message belongs to a protection application, and if so, an icon of the application is fetched from the second display layer and then hidden in the first display layer; and then, after comparing the priorities, orderly displaying the icons of the application to which each new message belongs on the first display layer, so that the display sequence of the icons accords with the priority set by the user, the browsing efficiency of the user is improved, the viewing habit of the user is more conformed, and the user experience is improved.
Further, on the basis of the fifth embodiment of the message protection method of the present invention, a sixth embodiment of the message protection method is provided, and referring to fig. 7, step a03 includes:
step A031, counting the number of new messages received by the application to which the new messages belong;
after the message manager adds the new message number identifier to the third display layer, the message manager counts the number of new messages received by the application to which the new message of each new message belongs.
And A032, calling the number identifier of the new message in the third display layer, and displaying the number identifier in the area of the first display layer, to which the application corresponding to the new message belongs.
After counting the number of the new messages received by the application to which the new message of each new message belongs, calling a number identifier with the same meaning as the number representation of each new message from a third display layer, and displaying the number identifier in the area of the application to which the new message belongs in the first display layer. For example, if the number of new messages of the application a to which the new message belongs is 1 and the number of new messages of the application B to which the new message belongs is 2, the message manager calls 1 from the third display layer to be placed under the icon of the application a in the first display layer, and calls 2 from the third display layer to be placed under the icon of the application B in the first display layer.
In this embodiment, the number of new messages received by the application to which the new messages belong is counted first, and then the number identifier of the new messages in the third display layer is called and displayed in the area where the application to which the corresponding new messages belong in the first display layer, so that the user can visually see how many new messages are received by the application to which each new message belongs, and the browsing efficiency of the user is improved.
To assist in understanding the overall technical solution of the embodiment of the present invention, referring to fig. 8, the message manager first obtains the permission of the mobile terminal to allow notification; when the message protection functions of the application C, the application B and the application A are started, namely, the protection requests of the application C, the application B and the application A are detected, and the application C, the application B and the application A are added to a protection application list according to the protection requests; acquiring a protection application: communication authorities of the application C, the application B and the application A; when a protection application is detected: priority adjustment requests of application C, application B, application a: the application A priority is higher than the application B, and the application B priority is higher than the application C; then adjusting the priority from high to low into an application A, an application B and an application C according to the priority adjustment request; finally, after the new messages received by the mobile terminal are obtained, 1 new message belonging to the application A and 3 new messages belonging to the application C are judged, the icon of the application A and the icon of the application C are displayed from left to right on the first display layer, 1 is displayed in the area where the icon of the application A is located, and 3 is displayed in the area where the icon of the application C is located. Referring to fig. 9, after acquiring the new message received by the mobile terminal again, it is determined that there are 2 new messages belonging to the application B, and the priority of the application B is higher than that of the application C, then the icon of the application a, the icon of the application B, and the icon of the application C are displayed on the first display layer from left to right, and the icon of the application a is displayed in the area where the icon of the application a is located, the icon of the application B is displayed in the area where the icon of the application B is located, and the icon of the application C is displayed in the area where the icon of the application C is located.
In addition, the invention also provides a mobile terminal, which comprises: the mobile terminal display control program, when executed by the processor 110, implements the steps of the message protection method embodiments described above.
Furthermore, the present invention provides a computer readable storage medium storing one or more programs, where the one or more programs are further executable by one or more processors to implement the steps of the embodiments of the message protection method described above.
The expansion content of the specific implementation manners of the mobile terminal and the readable storage medium (i.e., the computer readable storage medium) of the present invention is basically the same as that of the above embodiments of the message protection method, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a mobile terminal (which may be a mobile phone) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.
Claims (8)
1. A message protection method, the message protection method comprising:
acquiring a received new message;
judging whether the application to which the new message belongs to a message manager or not;
if yes, shielding a prompt when the new message is received;
after the step of masking the prompt when the new message is received, comprising:
saving the new message to the message manager;
wherein the step of saving the new message to the message manager comprises:
saving the new message in a first display layer of the message manager;
storing an icon of an application to which the new message belongs in a second display layer below the first display layer;
and storing the new message number identifier in a third display layer below the second display layer.
2. The message protection method of claim 1, wherein the step of masking the hint when the new message is received comprises:
acquiring a receiving prompt of each new message;
and shielding each receiving prompt.
3. The message protection method of claim 2, wherein said step of masking each of said received prompts comprises:
a notification is output to prompt the message manager to view each of the new messages.
4. The message protection method of claim 1, wherein after the step of saving the new message to the message manager, comprising:
acquiring the new message viewing request and displaying the new message;
taking the new message as a checked message;
and acquiring and executing an operation request of the checked message, wherein the operation request comprises saving or deleting the checked message and the message manager.
5. The message protection method of claim 1, wherein the step of saving the icon of the application to which the new message belongs in a second display layer below the first display layer comprises:
retrieving and hiding the application to which the new message belongs from the second display layer to the first display layer;
and orderly displaying icons of the applications to which the new messages belong on the first display layer according to the priorities of the applications to which the new messages belong.
6. The message protection method of claim 1, wherein the third display layer step of storing the new message number identifier below the second display layer comprises:
counting the number of new messages received by an application to which the new messages belong;
and calling the number identifier of the new message in the third display layer, and displaying the number identifier in the first display layer corresponding to the area of the application to which the new message belongs.
7. A mobile terminal, the mobile terminal comprising: memory, a processor and a message protection program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the message protection method according to any one of claims 1 to 6.
8. A storage medium having stored thereon a message protection program which, when executed by a processor, implements the steps of the message protection method according to any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911130654.5A CN110839110B (en) | 2019-11-18 | 2019-11-18 | Message protection method, mobile terminal and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911130654.5A CN110839110B (en) | 2019-11-18 | 2019-11-18 | Message protection method, mobile terminal and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110839110A CN110839110A (en) | 2020-02-25 |
CN110839110B true CN110839110B (en) | 2023-09-26 |
Family
ID=69576892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911130654.5A Active CN110839110B (en) | 2019-11-18 | 2019-11-18 | Message protection method, mobile terminal and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110839110B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503502A (en) * | 2016-10-13 | 2017-03-15 | 北京珠穆朗玛移动通信有限公司 | Notification message processing method and its mobile terminal based on dual system |
CN106534572A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Information display method and device and terminal |
CN107391989A (en) * | 2017-07-10 | 2017-11-24 | 珠海市魅族科技有限公司 | Message treatment method, device, terminal and storage medium |
CN109040409A (en) * | 2013-06-19 | 2018-12-18 | 华为终端(东莞)有限公司 | A kind of method and device of data and Message Processing |
CN109800602A (en) * | 2019-01-25 | 2019-05-24 | 努比亚技术有限公司 | Method for secret protection, mobile terminal and computer readable storage medium |
-
2019
- 2019-11-18 CN CN201911130654.5A patent/CN110839110B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109040409A (en) * | 2013-06-19 | 2018-12-18 | 华为终端(东莞)有限公司 | A kind of method and device of data and Message Processing |
CN106503502A (en) * | 2016-10-13 | 2017-03-15 | 北京珠穆朗玛移动通信有限公司 | Notification message processing method and its mobile terminal based on dual system |
CN106534572A (en) * | 2016-11-30 | 2017-03-22 | 广东欧珀移动通信有限公司 | Information display method and device and terminal |
CN107391989A (en) * | 2017-07-10 | 2017-11-24 | 珠海市魅族科技有限公司 | Message treatment method, device, terminal and storage medium |
CN109800602A (en) * | 2019-01-25 | 2019-05-24 | 努比亚技术有限公司 | Method for secret protection, mobile terminal and computer readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110839110A (en) | 2020-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220276909A1 (en) | Screen projection control method and electronic device | |
CN109800602B (en) | Privacy protection method, mobile terminal and computer readable storage medium | |
CN111027030B (en) | Permission setting method and terminal device | |
CN110855830A (en) | Information processing method and electronic equipment | |
CN111124221B (en) | File sending method and terminal equipment | |
CN109918930A (en) | A kind of information protecting method and terminal device | |
CN108595946B (en) | Privacy protection method and terminal | |
CN108958936B (en) | Application program switching method, mobile terminal and computer readable storage medium | |
CN110752981B (en) | Information control method and electronic equipment | |
CN109062634B (en) | Application starting method and mobile terminal | |
CN111064654A (en) | Message display method and electronic equipment | |
CN110597437A (en) | Screen capturing method and terminal equipment | |
CN111131607A (en) | Information sharing method, electronic equipment and computer readable storage medium | |
CN109992941B (en) | Authority management method and terminal equipment | |
CN109992192B (en) | Interface display method and terminal equipment | |
CN111562959A (en) | Icon management method and electronic equipment | |
CN111125680A (en) | Permission setting method and terminal equipment | |
CN111131189A (en) | Data protection method and electronic equipment | |
CN109947617B (en) | Method, terminal and readable storage medium for monitoring display content of application interface | |
CN110032422B (en) | Application management method, terminal equipment and computer readable storage medium | |
CN109815678B (en) | Permission configuration method and mobile terminal | |
CN109547330B (en) | Information sharing method and device | |
CN110099362A (en) | Based reminding method, wearable device and the storage medium of wearable device message | |
CN110839110B (en) | Message protection method, mobile terminal and readable storage medium | |
CN111475067B (en) | Message indication method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |