WO2019056338A1 - Application hiding system, hiding method, and starting method - Google Patents

Application hiding system, hiding method, and starting method Download PDF

Info

Publication number
WO2019056338A1
WO2019056338A1 PCT/CN2017/103095 CN2017103095W WO2019056338A1 WO 2019056338 A1 WO2019056338 A1 WO 2019056338A1 CN 2017103095 W CN2017103095 W CN 2017103095W WO 2019056338 A1 WO2019056338 A1 WO 2019056338A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
hidden
gesture
information
fingerprint
Prior art date
Application number
PCT/CN2017/103095
Other languages
French (fr)
Chinese (zh)
Inventor
陈月漫
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/103095 priority Critical patent/WO2019056338A1/en
Publication of WO2019056338A1 publication Critical patent/WO2019056338A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present invention relates to the field of mobile communications technologies, and in particular, to a hidden system, a hiding method, and a starting method for an application.
  • the application in the private space is particularly inconvenient, because the information such as SMS in the application cannot be notified. For example, after setting Alipay or WeChat to a private space and calling it on the US group, you cannot connect to Alipay or WeChat in a private space. If you want to use the related functions normally, you need to remove the application to the private space first, which is inflexible and has poor performance.
  • the object of the present invention is to provide a hidden system, a hiding method and a starting method for an application program, so as to effectively improve the security performance of the device.
  • the present invention provides a hidden system of an application
  • the hidden system of the application includes: a startup module for entering a hidden editing mode of the application according to a preset operation; and a gesture setting module for receiving and unlocking An input operation of the gesture, and identifying the unlocking gesture to generate first associated information; an association module, configured to associate the first associated information with an application to be hidden; and a hiding module, configured to complete the association After that, the application to be hidden is hidden.
  • the gesture setting module includes: a gesture receiving module, configured to receive an unlocking gesture provided by an input operation; and a gesture recognition module, configured to identify the received unlocking gesture to generate first associated information.
  • the hidden system of the application further includes: a fingerprint setting module, configured to receive an input operation of the fingerprint information, and identify the fingerprint information to generate second associated information.
  • the fingerprint setting module includes: a fingerprint receiving module, configured to receive fingerprint information provided by an input operation; and a fingerprint identification module, configured to identify the received fingerprint information to generate second associated information;
  • the second association information is associated with an application to be hidden.
  • the gesture setting module performs an input operation and recognition of at least two unlock gestures, and generates first association information when at least two recognition results are the same; and/or, the fingerprint setting module performs fingerprint information at least twice Input operation and recognition, and generate second association information when the recognition results are at least twice.
  • the present invention also provides a method for hiding an application, comprising: starting into a hidden editing mode; setting an unlocking gesture, and identifying the unlocking gesture to generate first associated information; and the first associated information and the to-be-hidden Should Associated with the application; after the association is completed, the application to be hidden is hidden.
  • the method for hiding the application further includes: setting fingerprint information, and identifying the fingerprint information to generate second association information; and correlating the first association information and the second association information with the application to be hidden Union.
  • the step of setting an unlocking gesture and identifying the unlocking gesture to generate first associated information includes: performing an input operation of at least two unlocking gestures; identifying the at least two unlocking gestures; at least twice The first associated information is generated when the recognition result is the same;
  • the step of setting the fingerprint information and identifying the fingerprint information to generate the second association information comprises: performing at least two input operations of the fingerprint information; identifying the at least two fingerprint information; at least twice When the recognition result is the same, the second association information is generated.
  • the invention also provides a method for starting a hidden application, comprising: receiving an input operation of a gesture and identifying the gesture; and when the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, starting and Describe the hidden application.
  • the method for starting the hidden application further includes: receiving an input operation of the fingerprint information, and identifying the fingerprint information; and when the identified fingerprint information is the same as the fingerprint information corresponding to the hidden application, and the identified The hidden application is launched when the gesture is the same as the unlock gesture corresponding to the hidden application.
  • the hidden system, the hiding method, and the starting method of the application according to the present invention have the following advantages compared with the prior art:
  • the hidden system, the hiding method and the starting method of the application program of the present invention can conveniently and quickly hide or start the application by setting an unlocking gesture, thereby improving the security performance of the device; and also setting the unlocking gesture and the fingerprint information at the same time. This further improves security, and because only the required application is hidden (that is, the application will no longer be displayed on the user interface in the hidden state), and there is no restriction on the hidden application and other applications. Or the mutual communication of components, thus also improving the usability of the device.
  • FIG. 1 is a schematic structural diagram of an implementation manner of a hidden system of an application program according to the present invention
  • FIG. 2 is a schematic structural diagram of another implementation manner of a hidden system of an application in the present invention.
  • FIG. 3 is a schematic flowchart of an implementation manner of a hiding method of an application program according to the present invention.
  • FIG. 4 is a schematic flowchart diagram of another implementation manner of a hiding method of an application in the present invention.
  • FIG. 5 is a schematic flowchart diagram of an implementation manner of a method for starting a hidden application according to the present invention
  • FIG. 6 is a schematic flowchart diagram of another implementation manner of a method for starting a hidden application in the present invention.
  • the terms “including”, “comprising”, “having”, or any other variants are intended to encompass a non-exclusive inclusion, such that a process, method, article, or terminal device that includes a plurality of elements includes not only those elements but also Includes other elements not explicitly listed, or elements that are inherent to such a process, method, item, or terminal device.
  • An element defined by the phrase “including” or “comprising” does not exclude the presence of additional elements in the process, method, article or terminal device including the element.
  • “greater than”, “less than”, “exceeded”, etc. are understood as not including the number; “above”, “below”, “inside”, etc. are understood to include the number.
  • FIG. 1 is a schematic structural diagram of a hidden system of an application provided by the present invention, where the hidden system of the application is included in a portable electronic device.
  • the electronic device includes, but is not limited to, a handheld computer, a tablet computer, a mobile phone, a smart phone, a media player, a personal digital assistant (PDA), etc., and a combination of two or more of them.
  • the electronic device typically includes a memory, a memory controller, one or more processing units (CPUs), peripheral interfaces, RF circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, others Output or control device, as well as external ports. These components communicate over one or more communication buses or signal lines.
  • the electronic device in this embodiment is only an example.
  • the components of the electronic device may have more or fewer components in the embodiment, or have different component configurations; and various components.
  • This can be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
  • the electronic device can also include a power system for powering various components.
  • the power system can include a power management system, one or more power sources (eg, battery, alternating current (AC)), charging system, power failure detection circuit, power converter or inverter, power status indicator (eg, light emitting diode (LED) )), as well as any other components associated with power generation, management, and distribution in portable devices.
  • the electronic device can be a device that performs a predetermined set of function operations on the device all through a touch screen or touch pad.
  • the touch screen and touchpad as the primary input/control device for operation of the device, the number of physical input/control devices (eg, push buttons, dials, etc.) on the device can be reduced.
  • the device includes a touch screen, a touch pad, a push switch for powering on/off the device and locking the device, a volume adjustment lever button, and a slide switch for cutting the ringer profile.
  • the button can be used to turn the device on/off by pressing the push button and holding the button in a pressed state for a predetermined time interval, or can be used by pressing the button and releasing the button before a predetermined time interval elapses. This button is used to lock the device.
  • the device may also accept input of fingerprint information by fingerprinting to activate or deactivate certain functions.
  • the hidden system of the application may include: a startup module 10, a gesture setting module 20, an association module 30, and a hiding module 40.
  • the startup module 10 is configured to enter a hidden edit mode of the application according to a preset operation.
  • the The boot module can be implemented by software and/or hardware.
  • the preset operation may be a preset related operation, for example, a smart phone including a touch screen, and the preset operation may be a long press, a slide, a double tap, and the like, which is not limited by the present invention.
  • the gesture setting module 20 is configured to receive an input operation of an unlocking gesture, and identify the unlocking gesture to generate first associated information.
  • the gesture setting module 20 may include: a gesture receiving module and a gesture recognition module (not shown), the gesture receiving module is configured to receive an unlocking gesture provided by an input operation; and the gesture recognition module And configured to identify the received unlocking gesture to generate first associated information.
  • the gesture setting module can be implemented by a touch screen or a touch pad.
  • the touch screen provides an output interface and an input interface between the device and the user.
  • the touch screen controller receives/transmits electrical signals from/to the touch screen.
  • the touch screen displays the visual output to the user. This visual output can include text, graphics, video, and any combination thereof.
  • the touch screen accepts user input based on tactile and/or tactile contact.
  • the touch screen forms a touch sensitive surface that accepts user input.
  • the touch screen and the touch screen controller (along with any associated modules and/or sets of instructions in the memory) detect contact on the touch screen (and any movement or interruption of the touch) and transform the detected contact into and out of Interaction of user interface objects such as one or more soft keys on the touch screen.
  • the point of contact between the touch screen and the user corresponds to one or more fingers of the user.
  • the touch screen can use LCD (Liquid Crystal Display) technology or LPD (Light Emitting Polymer Display) technology, although other display technologies can be used in other embodiments.
  • Touch screens and touch screen controllers can detect contact and its movement or interruption using any of a variety of touch sensitive technologies including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays. Or other technique for determining one or more points in contact with the touch screen.
  • the prompt of the corresponding gesture input is displayed to the user by the touch screen; the user performs the tactile output through the touch screen, that is, sets the corresponding unlocking gesture.
  • the "tactile output” refers to a physical displacement of a device relative to a previous location of the device, a physical displacement of a component of the device (eg, a touch-sensitive surface) relative to another component of the device (eg, a housing), or a component relative The shift of the centroid of the device to be detected by the user through the user's touch sensing.
  • the tactile output generated by the physical displacement will be interpreted by the user as a tactile sense corresponding to the physical characteristics of the device or the perceived change in the components of the device.
  • the movement of a touch sensitive surface eg, a touch sensitive display or trackpad
  • the user will feel a tactile sensation, such as "down click” or "up click", even if there is no physical association associated with a touch-sensitive surface that is physically pressed (eg, displaced) by the user's movement. Movement of the actuator button.
  • the movement of the touch-sensitive surface is optionally interpreted or sensed by the user as "roughness" of the touch-sensitive surface, even if the smoothness of the touch-sensitive surface does not change. While such user interpretation of the touch will be affected by the user's personalized sensory perception, there may be sensory perceptions of the touch that is common to most users.
  • the generated haptic output corresponds to the device or The physical displacement of its components, which will generate the sensory perception described for the average (or average) user.
  • the association module 30 is connected to the gesture setting module 20 for associating the first association information with an application to be hidden.
  • the hiding module 40 is connected to the association module 30, and is configured to hide the application to be hidden after the association is completed.
  • the unlocking gesture, the first associated information, and the like may all be stored in a memory, that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
  • a memory that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
  • the memory can include high speed random access memory and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
  • the memory may also include memory remote from one or more processors, such as network attached memory accessed via RF circuitry or external ports and a communication network (not shown), where the communication network may be the Internet One or more internal networks, a local area network (LAN), a wide area network (WLAN), a storage area network (SAN), etc., or a suitable combination thereof.
  • the memory controller can control access to the memory by other components of the device, such as the CPU and peripheral interfaces.
  • the gesture setting module 20 performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when the recognition results of at least two times are the same.
  • the hidden system of the application of the embodiment directly operates the application that needs to be hidden, which not only effectively improves the security performance of the device, but also avoids the problem that the hidden application cannot communicate with other programs; in addition, Entering the correct unlock gesture can quickly launch a hidden application, greatly improving the efficiency of launching hidden applications.
  • FIG. 2 is a schematic structural diagram showing another implementation manner of the hidden system of the application in the present invention.
  • the hidden system of the application in this embodiment is similar to the hidden system shown in FIG.
  • the method also includes an activation module 10, a gesture setting module 20, an association module 30, and a hiding module 40.
  • the hidden system of the application of the embodiment further includes: a fingerprint setting module 50.
  • the fingerprint setting module 50 is connected to the association module 30 for receiving an input operation of fingerprint information, and identifying the fingerprint information to generate second associated information.
  • the fingerprint setting module includes: a fingerprint receiving module and a fingerprint identification module (not shown).
  • the fingerprint receiving module is configured to receive fingerprint information provided by an input operation; the fingerprint identification module is configured to identify the received fingerprint information to generate second associated information.
  • the association module 30 is further configured to associate the second association information with an application to be hidden. More specifically, in the embodiment, the association module 30 may associate the first association information generated by the gesture setting module 20 and the second association information generated by the fingerprint setting module 50 with the application to be hidden at the same time, so that when needed When launching a hidden application, not only the correct unlock gesture but also the correct fingerprint information is required, otherwise the hidden application will not be started, which further improves the security performance of the device.
  • the fingerprint setting module 50 in this embodiment may be implemented by combining hardware and software components.
  • the fingerprint module is collected and recognized by a fingerprint module based on the principle of capacitive sensing recognition.
  • the specific principle is: through the micro electric field of the human body and A micro-current is formed between the capacitive sensors, and the peaks and valleys of the fingerprint form a capacitance difference, thereby drawing a fingerprint image. This is because the fingerprint of the finger is uneven, and the capacitance value changes on the surface of the semiconductor, and the fingerprint is collected by the change of the capacitance value.
  • the fingerprint module can also be used to generate the second associated information, such as an optical fingerprint module, which utilizes the principle of folding and reflection of light, the light is emitted from the bottom toward the prism, and is emitted through the prism, and the emitted light is The angle of refraction on the uneven lines of the finger surface of the finger and the brightness of the reflected light will be different.
  • the CMOS or CCD optics collects picture information of different brightness levels to complete the fingerprint collection.
  • the RF fingerprint module utilizes bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image.
  • bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image.
  • the anti-counterfeiting fingerprint ability is strong, and the radio frequency identification principle only responds to the human dermis skin, fundamentally eliminating the problem of artificial fingerprints.
  • the gesture setting module performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when at least two recognition results are the same; and at the same time, the fingerprint setting module may perform at least The input operation and recognition of the fingerprint information are performed twice, and the second related information is generated when the recognition results of at least two times are the same.
  • the present invention also provides a hidden method of an application, the hidden method of the application being applicable to an electronic device including the aforementioned hidden system.
  • the electronic device includes, but is not limited to, a handheld computer, a tablet computer, a mobile phone, a smart phone, a media player, a personal digital assistant (PDA), etc., and a combination of two or more of them.
  • the electronic device typically includes a memory, a memory controller, one or more processing units (CPUs), peripheral interfaces, RF circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, others Output or control device, as well as external ports. These components communicate over one or more communication buses or signal lines.
  • the electronic device in this embodiment is only an example.
  • the components of the electronic device may have more or fewer components in the embodiment, or have different component configurations; and various components.
  • This can be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
  • the hidden method of the application includes:
  • Step S10 starting to enter the hidden editing mode; in this embodiment, the step may be implemented by software and/or hardware.
  • the preset operation may be a preset related operation, for example, a smart phone including a touch screen, the preset operation It can be a long press, a slide, a double tap, etc., and the present invention does not limit this. For example, you can enter the hidden editing mode of the application to be hidden by long pressing the application to be hidden (such as long press 8s).
  • an unlocking gesture is set, and the unlocking gesture is identified to generate first associated information.
  • the unlocking gesture may be implemented by the foregoing gesture setting module.
  • the gesture setting module can be implemented by a touch screen or a touch pad.
  • the touch screen provides an output interface and an input interface between the device and the user.
  • the touch screen controller receives/transmits electrical signals from/to the touch screen.
  • the touch screen displays the visual output to the user. This visual output can include text, graphics, video, and any combination thereof.
  • the touch screen accepts user input based on tactile and/or tactile contact.
  • the touch screen forms a touch sensitive surface that accepts user input.
  • the touch screen and the touch screen controller (along with any associated modules and/or sets of instructions in the memory) detect contact on the touch screen (and any movement or interruption of the touch) and transform the detected contact into and out of Interaction of user interface objects such as one or more soft keys on the touch screen.
  • the point of contact between the touch screen and the user corresponds to one or more fingers of the user.
  • the touch screen can use LCD (Liquid Crystal Display) technology or LPD (Light Emitting Polymer Display) technology, although other display technologies can be used in other embodiments.
  • Touch screens and touch screen controllers can detect contact and its movement or interruption using any of a variety of touch sensitive technologies including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays. Or other technique for determining one or more points in contact with the touch screen.
  • Step S30 associating the first associated information with an application to be hidden
  • Step S40 After the association is completed, the application to be hidden is hidden.
  • the unlocking gesture, the first associated information, and the like may all be stored in a memory, that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
  • a memory that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
  • the memory can include high speed random access memory and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices.
  • the memory may also include memory remote from one or more processors, such as network attached memory accessed via RF circuitry or external ports and a communication network (not shown), where the communication network may be the Internet One or more intranets, bureaus Domain network (LAN), wide area network (WLAN), storage area network (SAN), etc., or a suitable combination thereof.
  • the memory controller can control access to the memory by other components of the device, such as the CPU and peripheral interfaces.
  • the input operation and recognition of the unlocking gesture are performed at least twice, and the first related information is generated when the recognition results of at least two times are the same.
  • a schematic flowchart of another implementation manner of the hidden method of the application of the present invention is similar to the implementation manner of the hidden method shown in FIG. 3.
  • the hidden method of the application includes: step S10, starting Entering the hidden editing module; step S20, setting an unlocking gesture, and identifying the unlocking gesture to generate first associated information; further, the hiding method of the application further includes: step S50, setting fingerprint information, and The fingerprint information is identified to generate the second association information. Finally, step S60 is performed to associate the first association information and the second association information with the application to be hidden.
  • the step S50 can be implemented by combining hardware and software components.
  • the fingerprint is collected and recognized by a fingerprint module based on the principle of capacitive sensing recognition.
  • the specific principle is: forming a micro-electric field between the human body and the capacitive sensor.
  • the current, the peaks and valleys of the fingerprint form a difference in capacitance, which in turn depicts a fingerprint image. This is because the fingerprint of the finger is uneven, and the capacitance value changes on the surface of the semiconductor, and the fingerprint is collected by the change of the capacitance value.
  • the fingerprint module can also be used to generate the second associated information, such as an optical fingerprint module, which utilizes the principle of folding and reflection of light, the light is emitted from the bottom toward the prism, and is emitted through the prism, and the emitted light is The angle of refraction on the uneven lines of the finger surface of the finger and the brightness of the reflected light will be different.
  • the CMOS or CCD optics collects picture information of different brightness levels to complete the fingerprint collection.
  • the RF fingerprint module utilizes bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image.
  • bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image.
  • the anti-counterfeiting fingerprint ability is strong, and the radio frequency identification principle only responds to the human dermis skin, fundamentally eliminating the problem of artificial fingerprints.
  • the step S20: setting an unlocking gesture, and identifying the unlocking gesture to generate the first associated information includes: performing an input operation of at least two unlocking gestures; performing the at least two unlocking gestures Knowledge And generating the first association information when the recognition results of the at least two times are the same;
  • the step S50: the step of setting the fingerprint information, and identifying the fingerprint information to generate the second association information comprises: performing at least twice Input operation of fingerprint information; identifying the at least two fingerprint information; generating second association information when the recognition results of at least two times are the same.
  • the gesture setting module performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when at least two recognition results are the same; and at the same time, the fingerprint setting module may perform at least The input operation and recognition of the fingerprint information are performed twice, and the second related information is generated when the recognition results of at least two times are the same.
  • step S20 and the step S50 may also be changed.
  • the setting of the fingerprint information is performed first (ie, step S50 is performed first), and then the setting of the unlocking gesture is performed (step S20), the present invention. There is no limit to this.
  • the first association information and the second association information are simultaneously associated with the application to be hidden, so that when the hidden application needs to be started, not only the correct unlocking gesture but also the correct Fingerprint information, otherwise hidden applications will not be launched, further improving the security of the device.
  • FIG. 5 is a schematic flowchart diagram of an implementation manner of a method for starting a hidden application according to the present invention.
  • the startup method of the hidden application includes:
  • Step S70 receiving an input operation of the gesture, and identifying the gesture
  • Step S80 When the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, the hidden application is started.
  • the startup method of the embodiment corresponds to the hidden method of the application shown in FIG. 3, and only needs to recognize the gesture.
  • the recognized gesture is the same as the unlock gesture corresponding to the hidden application, the startup gesture can be started.
  • Hidden applications that effectively improve the startup efficiency of hidden applications.
  • FIG. 6 is a schematic flowchart diagram of another implementation manner of a method for starting a hidden application according to the present invention.
  • Place The method for starting the hidden application may further include: step S90: receiving an input operation of the fingerprint information, and identifying the fingerprint information;
  • step S80 is executed: when the identified fingerprint information is the same as the fingerprint information corresponding to the hidden application, and the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, the hidden application is started.
  • step S70 in this embodiment may be implemented by a touch screen, and the fingerprint recognition process of step S90 may be implemented by the foregoing fingerprint module.
  • the principles of the gesture recognition and fingerprint recognition have been described in detail in the foregoing, and are not described herein again.
  • the startup method of the embodiment corresponds to the hidden method of the application shown in FIG. 4, and not only the recognition of the gesture but also the identification of the fingerprint information is required, and the recognized gesture and the fingerprint information are corresponding to the hidden application.
  • the unlocking gesture and the fingerprint information are the same, the hidden application can be started, thereby further improving the security performance of the device.
  • the hidden system, the hiding method, and the starting method of the application provided by the present invention can conveniently and quickly hide or start the application by setting an unlocking gesture, thereby improving the security performance of the device; Setting the unlock gesture and fingerprint information further enhances security, and because only the required application is hidden (ie, in the hidden state, the application will no longer be displayed on the user interface) without limiting hiding
  • the post-application communicates with other applications or components, thus increasing the usability of the device.
  • the testing method and system of the electronic device of the present invention have the following advantages: the application can be hidden or started quickly, which not only effectively improves the security performance of the device, but also improves the hiding. Or the efficiency of the startup.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

An application hiding system, a hiding method, and a starting method. The application hiding system comprises: a starting module (10) used for entering an editing mode of application hiding according to a preset operation; a gesture setting module (20) used for receiving an input operation of an unlocking gesture, and identifying the unlocking gesture to generate first association information; an association module (30) used for associating the first association information with an application to be hidden; and a hiding module (40) used for hiding the application to be hidden after the association is completed. The hiding system only hides an application and does not limit the functionality of the application, thereby not only effectively protecting the privacy in the application, but also improving the performance of a device.

Description

应用程序的隐藏系统、隐藏方法及启动方法Application hidden system, hidden method and startup method 技术领域Technical field
本发明涉及移动通信技术领域,尤其涉及一种应用程序的隐藏系统、隐藏方法及启动方法。The present invention relates to the field of mobile communications technologies, and in particular, to a hidden system, a hiding method, and a starting method for an application.
背景技术Background technique
随着技术的发展和进步,智能电子设备为我们的生活带来了极大的便利。以智能手机为例,随着智能手机的功能越来越强大,也导致设备本身存在着越来越大的安全隐患,比如手机中的联系人、短信、图库等信息很容易被窃取。With the development and advancement of technology, intelligent electronic devices have brought great convenience to our lives. Taking smartphones as an example, as the functions of smart phones become more and more powerful, there are also more and more security risks in the devices themselves. For example, contacts, text messages, and pictures in mobile phones are easily stolen.
目前大部分人都会对移动终端本身进行加密,而且对设备的加密的也有很多方式:例如设置锁屏图案,或者设置锁屏密码,只有当输入的图案或密码与预设的图案或密码相同时,才会对移动终端解密。但这种仅仅对设备本身的加密方式仍然不能起到很好的隐私保护作用。如果密码或预设图案被其他人,即可对移动终端中的各种应用进行操作,从而导致信息的泄露。At present, most people encrypt the mobile terminal itself, and there are many ways to encrypt the device: for example, setting a lock screen pattern, or setting a lock screen password, only when the input pattern or password is the same as the preset pattern or password. The mobile terminal will be decrypted. However, this method of encrypting the device itself still does not provide a good privacy protection. If the password or the preset pattern is used by others, the various applications in the mobile terminal can be operated, resulting in leakage of information.
另外,现在也有一结加密软件,可以对相应的应用进行加密。例如,可以先在移动终端上下载一个加密软件,以在手机上建立一个私密空间应用;然后在加密软件上设置相关密码,最后可以将需要隐藏的应用添加到私密空间中。在使用时,需要输入正确的密码,否则私密空间不会被打开。但是这种方式存在以下缺陷:In addition, there is now a knot encryption software that can encrypt the corresponding application. For example, you can first download an encryption software on the mobile terminal to create a private space application on the mobile phone; then set the relevant password on the encryption software, and finally add the application that needs to be hidden to the private space. When using, you need to enter the correct password, otherwise the private space will not be opened. But this approach has the following drawbacks:
1)需要下载安装私密空间软件,过程繁琐且占用内存空间;1) Need to download and install the private space software, the process is cumbersome and takes up memory space;
2)需要启动隐藏的程序时,需要先输入正确的密码,然后再通过点击相关的应用才可以打开,流程复杂,效率较低;2) When you need to start a hidden program, you need to enter the correct password first, and then you can open it by clicking on the relevant application. The process is complicated and the efficiency is low;
3)私密空间内的应用使用特别不方便,因为应用在里面的短信等信息无法通知到外 面,比如说,将支付宝或微信等设置到私密空间后,在美团上叫外卖,则无法连接到私密空间中的支付宝或微信。若想正常使用相关功能,还需要先将应用移除到私密空间之外,使用不灵活,性能较差。3) The application in the private space is particularly inconvenient, because the information such as SMS in the application cannot be notified. For example, after setting Alipay or WeChat to a private space and calling it on the US group, you cannot connect to Alipay or WeChat in a private space. If you want to use the related functions normally, you need to remove the application to the private space first, which is inflexible and has poor performance.
因此,如何在不影响应用的正常功能下有效地对应用进行加密就成为本领域技术人员亟待解决的问题之一。Therefore, how to effectively encrypt an application without affecting the normal function of the application becomes one of the problems to be solved by those skilled in the art.
发明的公开Disclosure of invention
本发明的目的是提供一种应用程序的隐藏系统、隐藏方法及启动方法,以有效的提高设备的安全性能。The object of the present invention is to provide a hidden system, a hiding method and a starting method for an application program, so as to effectively improve the security performance of the device.
为实现上述目的,本发明提供一种应用程序的隐藏系统,所述应用程序的隐藏系统包括:启动模块,用于根据预设操作进入应用程序的隐藏编辑模式;手势设置模块,用于接收解锁手势的输入操作,并对所述解锁手势进行识别以生成第一关联信息;关联模块,用于将所述第一关联信息与待隐藏的应用相关联;隐藏模块,用于在完成所述关联后,将所述待隐藏的应用进行隐藏。To achieve the above objective, the present invention provides a hidden system of an application, the hidden system of the application includes: a startup module for entering a hidden editing mode of the application according to a preset operation; and a gesture setting module for receiving and unlocking An input operation of the gesture, and identifying the unlocking gesture to generate first associated information; an association module, configured to associate the first associated information with an application to be hidden; and a hiding module, configured to complete the association After that, the application to be hidden is hidden.
所述手势设置模块包括:手势接收模块,用于接收由输入操作提供的解锁手势;手势识别模块,用于识别接收到的所述解锁手势以生成第一关联信息。The gesture setting module includes: a gesture receiving module, configured to receive an unlocking gesture provided by an input operation; and a gesture recognition module, configured to identify the received unlocking gesture to generate first associated information.
所述的应用程序的隐藏系统还包括:指纹设置模块,用于接收指纹信息的输入操作,并对所述指纹信息进行识别以生成第二关联信息。The hidden system of the application further includes: a fingerprint setting module, configured to receive an input operation of the fingerprint information, and identify the fingerprint information to generate second associated information.
所述指纹设置模块包括:指纹接收模块,用于接收由输入操作提供的指纹信息;指纹识别模块,用于识别接收到的所述指纹信息以生成第二关联信息;所述关联模块还用于所述第二关联信息与待隐藏的应用相关联。The fingerprint setting module includes: a fingerprint receiving module, configured to receive fingerprint information provided by an input operation; and a fingerprint identification module, configured to identify the received fingerprint information to generate second associated information; The second association information is associated with an application to be hidden.
所述手势设置模块进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息;和/或,所述指纹设置模块进行至少两次的指纹信息的输入操作和识别,并在至少两次的识别结果相同时生成第二关联信息。The gesture setting module performs an input operation and recognition of at least two unlock gestures, and generates first association information when at least two recognition results are the same; and/or, the fingerprint setting module performs fingerprint information at least twice Input operation and recognition, and generate second association information when the recognition results are at least twice.
本发明还提供一种应用程序的隐藏方法,包括:启动进入隐藏编辑模式;设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息;将所述第一关联信息与待隐藏的应 用相关联;在完成所述关联后,将所述待隐藏的应用进行隐藏。The present invention also provides a method for hiding an application, comprising: starting into a hidden editing mode; setting an unlocking gesture, and identifying the unlocking gesture to generate first associated information; and the first associated information and the to-be-hidden Should Associated with the application; after the association is completed, the application to be hidden is hidden.
所述的应用程序的隐藏方法还包括:设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息;将所述第一关联信息以及第二关联信息与所述待隐藏的应用相关联。The method for hiding the application further includes: setting fingerprint information, and identifying the fingerprint information to generate second association information; and correlating the first association information and the second association information with the application to be hidden Union.
所述设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息的步骤包括:至少进行两次解锁手势的输入操作;对所述至少两次的解锁手势进行识别;在至少两次的识别结果相同时生成第一关联信息;The step of setting an unlocking gesture and identifying the unlocking gesture to generate first associated information includes: performing an input operation of at least two unlocking gestures; identifying the at least two unlocking gestures; at least twice The first associated information is generated when the recognition result is the same;
所述设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息的步骤包括:至少进行两次指纹信息的输入操作;对所述至少两次的指纹信息进行识别;在至少两次的识别结果相同时生成第二关联信息。The step of setting the fingerprint information and identifying the fingerprint information to generate the second association information comprises: performing at least two input operations of the fingerprint information; identifying the at least two fingerprint information; at least twice When the recognition result is the same, the second association information is generated.
本发明还提供一种隐藏的应用程序的启动方法,包括:接收手势的输入操作,并对所述手势进行识别;当识别到的手势与隐藏的应用所对应的解锁手势相同时,启动与所述隐藏的应用程序。The invention also provides a method for starting a hidden application, comprising: receiving an input operation of a gesture and identifying the gesture; and when the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, starting and Describe the hidden application.
所述的隐藏的应用程序的启动方法还包括:接收指纹信息的输入操作,并对所述指纹信息进行识别;当识别到的指纹信息与隐藏的应用所对应的指纹信息相同、且识别到的手势与隐藏的应用所对应的解锁手势相同时,启动所述隐藏的应用程序。The method for starting the hidden application further includes: receiving an input operation of the fingerprint information, and identifying the fingerprint information; and when the identified fingerprint information is the same as the fingerprint information corresponding to the hidden application, and the identified The hidden application is launched when the gesture is the same as the unlock gesture corresponding to the hidden application.
综上所述,本发明所述的应用程序的隐藏系统、隐藏方法及启动方法,与现有技术相比,具有以下优点:In summary, the hidden system, the hiding method, and the starting method of the application according to the present invention have the following advantages compared with the prior art:
本发明的应用程序的隐藏系统、隐藏方法及启动方法,通过设置解锁手势可以方便快捷的进行应用程序的隐藏或启动,从而提高了设备的安全性能;而且还可以同时设置解锁手势和指纹信息,这样进一步的提高了安全性,并且,由于只是将需要的应用程序进行了隐藏(即在隐藏状态下,应用程序将不再显示于用户界面上),而没有限制隐藏后的应用程序与其他应用或组件的相互通讯,因此也提高了设备的实用性。The hidden system, the hiding method and the starting method of the application program of the present invention can conveniently and quickly hide or start the application by setting an unlocking gesture, thereby improving the security performance of the device; and also setting the unlocking gesture and the fingerprint information at the same time. This further improves security, and because only the required application is hidden (that is, the application will no longer be displayed on the user interface in the hidden state), and there is no restriction on the hidden application and other applications. Or the mutual communication of components, thus also improving the usability of the device.
附图的简要说明BRIEF DESCRIPTION OF THE DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图进行简单介绍,显而易见的,下面描述中的附图是本发明的一 些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art description will be briefly described below. It is obvious that the drawings in the following description are Invention one For some embodiments, other drawings may be obtained from those skilled in the art without any inventive labor.
图1为本发明中的应用程序的隐藏系统的一实现方式的结构示意图;1 is a schematic structural diagram of an implementation manner of a hidden system of an application program according to the present invention;
图2为本发明中的应用程序的隐藏系统的另一实现方式的结构示意图;2 is a schematic structural diagram of another implementation manner of a hidden system of an application in the present invention;
图3为本发明中的应用程序的隐藏方法的一实现方式的流程示意图;3 is a schematic flowchart of an implementation manner of a hiding method of an application program according to the present invention;
图4为本发明中的应用程序的隐藏方法的另一实现方式的流程示意图;4 is a schematic flowchart diagram of another implementation manner of a hiding method of an application in the present invention;
图5为本发明中的隐藏的应用程序的启动方法的一实现方式的流程示意图;FIG. 5 is a schematic flowchart diagram of an implementation manner of a method for starting a hidden application according to the present invention; FIG.
图6为本发明中的隐藏的应用程序的启动方法的另一实现方式的流程示意图。FIG. 6 is a schematic flowchart diagram of another implementation manner of a method for starting a hidden application in the present invention.
实现本发明的最佳方式The best way to implement the invention
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described in conjunction with the drawings in the embodiments of the present invention. It is a partial embodiment of the invention, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
需要说明的是,在本文中,诸如“第一”、“第二”、“第三”等关系术语(如果存在)仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。应该理解这样使用的术语在适当情况下可以互换,以便这里描述的本发明的实施例,例如能够以除了在这里图示或描述的那些以外的顺序实施。此外,术语“包括”、“包含”、“具有”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者终端设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者终端设备所固有的要素。在没有更多限制的情况下,由语句“包括……”或“包含……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者终端设备中还存在另外的要素。此外,在本文中,“大于”、“小于”、“超过”等理解为不包括本数;“以上”、“以下”、“以内”等理解为包括本数。It should be noted that, herein, relational terms such as "first," "second," "third," and the like, if any, are used merely to distinguish one entity or operation from another. There is no requirement or implied that there is any such actual relationship or order between these entities or operations. It is to be understood that the terms so used are interchangeable, as appropriate, such that the embodiments of the invention described herein can be implemented, for example, in a sequence other than those illustrated or described herein. In addition, the terms "including", "comprising", "having", or any other variants are intended to encompass a non-exclusive inclusion, such that a process, method, article, or terminal device that includes a plurality of elements includes not only those elements but also Includes other elements not explicitly listed, or elements that are inherent to such a process, method, item, or terminal device. An element defined by the phrase "including" or "comprising" does not exclude the presence of additional elements in the process, method, article or terminal device including the element. In addition, in this document, “greater than”, “less than”, “exceeded”, etc. are understood as not including the number; “above”, “below”, “inside”, etc. are understood to include the number.
以下结合图1~图6,以具体地实施例对本发明的技术方案进行详细说明。下面这几个 具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例不再赘述。The technical solutions of the present invention will be described in detail below with reference to FIGS. 1 to 6 in a specific embodiment. The following The specific embodiments may be combined with each other, and the same or similar concepts or processes may not be described in some embodiments.
如图1所示,为本发明所提供的一种应用程序的隐藏系统的结构示意图,所述应用程序的隐藏系统被包含于便携式电子设备中。所述电子设备包括但不限于手持电脑、平板电脑、移动电话、智能手机、媒体播放器、个人数字助理(PDA)等等,还包括其中两项或多项的组合。所述电子设备通常包括存储器、存储器控制器、一个或多个处理单元(CPU)、外设接口、RF电路、音频电路、扬声器、麦克风、输入/输出(I/O)子系统、触摸屏、其他输出或控制设备,以及外部端口。这些组件通过一条或多条通信总线或信号线进行通信。FIG. 1 is a schematic structural diagram of a hidden system of an application provided by the present invention, where the hidden system of the application is included in a portable electronic device. The electronic device includes, but is not limited to, a handheld computer, a tablet computer, a mobile phone, a smart phone, a media player, a personal digital assistant (PDA), etc., and a combination of two or more of them. The electronic device typically includes a memory, a memory controller, one or more processing units (CPUs), peripheral interfaces, RF circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, others Output or control device, as well as external ports. These components communicate over one or more communication buses or signal lines.
应当理解,本实施例中的电子设备只是一个实例,具体应用中,电子设备的组件可以本实施例中的电子设备具有更多或更少的组件,或具有不同的组件配置;并且各种组件可以用硬件、软件或软硬件的组合来实现,包括一个或多个信号处理和/或专用集成电路。It should be understood that the electronic device in this embodiment is only an example. In a specific application, the components of the electronic device may have more or fewer components in the embodiment, or have different component configurations; and various components. This can be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
所述电子设备还可以包括用于为各种组件供电的电源系统。该电源系统可以包括电源管理系统、一个或多个电源(例如电池、交流电(AC))、充电系统、电源故障检测电路、电源转换器或逆变器、电源状态指示器(例如发光二极管(LED)),以及与便携式设备中的电能生成、管理和分布相关联的其他任何组件。The electronic device can also include a power system for powering various components. The power system can include a power management system, one or more power sources (eg, battery, alternating current (AC)), charging system, power failure detection circuit, power converter or inverter, power status indicator (eg, light emitting diode (LED) )), as well as any other components associated with power generation, management, and distribution in portable devices.
在某些实施例中,电子设备可以是这样一个设备:设备上的预定功能集合操作全部通过触摸屏或触摸板来执行。通过将触摸屏和触摸板作为用于设备的操作的主要输入/控制设备来使用,可以减少设备上的物理输入/控制设备(例如按压按钮、拨号盘等等)的数量。在一个实施例中,设备包括触摸屏、触摸板、用于为设备通电/断电以及锁定设备的按压开关、音量调节拨杆按钮,以及用于切振铃配置文件的滑动开关。通过按下按压按钮并且在预定时间间隔将该按钮保持于按下状态,可以使用该按钮来接通/切断设备电源,或者,通过按下按钮并且在经过预定时间间隔之前释放该按钮,可以使用该按钮来锁定设备。在可替换实施例中,设备还可以通过指纹识别来接受指纹信息的输入,以便激活或停用某些功能。In some embodiments, the electronic device can be a device that performs a predetermined set of function operations on the device all through a touch screen or touch pad. By using the touch screen and touchpad as the primary input/control device for operation of the device, the number of physical input/control devices (eg, push buttons, dials, etc.) on the device can be reduced. In one embodiment, the device includes a touch screen, a touch pad, a push switch for powering on/off the device and locking the device, a volume adjustment lever button, and a slide switch for cutting the ringer profile. The button can be used to turn the device on/off by pressing the push button and holding the button in a pressed state for a predetermined time interval, or can be used by pressing the button and releasing the button before a predetermined time interval elapses. This button is used to lock the device. In an alternate embodiment, the device may also accept input of fingerprint information by fingerprinting to activate or deactivate certain functions.
本实施例中,所述应用程序的隐藏系统可以包括:启动模块10、手势设置模块20、关联模块30和隐藏模块40。In this embodiment, the hidden system of the application may include: a startup module 10, a gesture setting module 20, an association module 30, and a hiding module 40.
所述启动模块10用于根据预设操作进入应用程序的隐藏编辑模式。本实施例中,所述 启动模块可以由软件和/或硬件实现。所述预设操作可以是预先设定的相关操作,以包含触摸屏的智能手机为例,所述预设操作可以是长按、滑动、双击等等,本发明对此不做限制。例如,可以通过长按待隐藏的应用程序(如长按8s)后,即进入待隐藏的应用程序的隐藏编辑模式。The startup module 10 is configured to enter a hidden edit mode of the application according to a preset operation. In this embodiment, the The boot module can be implemented by software and/or hardware. The preset operation may be a preset related operation, for example, a smart phone including a touch screen, and the preset operation may be a long press, a slide, a double tap, and the like, which is not limited by the present invention. For example, you can enter the hidden editing mode of the application to be hidden by long pressing the application to be hidden (such as long press 8s).
所述手势设置模块20用于接收解锁手势的输入操作,并对所述解锁手势进行识别以生成第一关联信息。本实施例中,所述手势设置模块20可以包括:手势接收模块和手势识别模块(图中未示出),所述手势接收模块用于接收由输入操作提供的解锁手势;所述手势识别模块用于识别接收到的所述解锁手势以生成第一关联信息。The gesture setting module 20 is configured to receive an input operation of an unlocking gesture, and identify the unlocking gesture to generate first associated information. In this embodiment, the gesture setting module 20 may include: a gesture receiving module and a gesture recognition module (not shown), the gesture receiving module is configured to receive an unlocking gesture provided by an input operation; and the gesture recognition module And configured to identify the received unlocking gesture to generate first associated information.
所述手势设置模块可以由触摸屏或者触摸板来实现。触摸屏在设备与用户之间同时提供输出接口和输入接口。触摸屏控制器接收/发送来自/去往触摸屏的电信号。该触摸屏则向用户显示可视输出。这个可视输出可以包括文本、图形、视频及其任意组合。The gesture setting module can be implemented by a touch screen or a touch pad. The touch screen provides an output interface and an input interface between the device and the user. The touch screen controller receives/transmits electrical signals from/to the touch screen. The touch screen displays the visual output to the user. This visual output can include text, graphics, video, and any combination thereof.
所述触摸屏基于触觉和/或触知接触来接受用户的输入。该触摸屏形成一个接受用户输入的触摸敏感表面。该触摸屏和触摸屏控制器(连同存储器中任何相关联的模块和/或指令集一起)检测触摸屏上的接触(以及所述触摸的任何移动或中断),并且将检测到的接触变换成与显示在触摸屏上的诸如一个或多个软按键之类的用户界面对象的交互。在一个示例性实施例中,触摸屏与用户之间的接触点对应于用户的一个或多个手指。该触摸屏可以使用LCD(液晶显示器)技术或LPD(发光聚合物显示器)技术,但在其他实施例中可使用其他显示技术。触摸屏和触摸屏控制器可以使用多种触敏技术中的任何一种来检测接触及其移动或中断,这些触敏技术包括但不限于电容、电阻、红外和声表面波技术,以及其他接近传感器阵列,或用于确定与触摸屏相接触的一个或多个点的其他技术。The touch screen accepts user input based on tactile and/or tactile contact. The touch screen forms a touch sensitive surface that accepts user input. The touch screen and the touch screen controller (along with any associated modules and/or sets of instructions in the memory) detect contact on the touch screen (and any movement or interruption of the touch) and transform the detected contact into and out of Interaction of user interface objects such as one or more soft keys on the touch screen. In an exemplary embodiment, the point of contact between the touch screen and the user corresponds to one or more fingers of the user. The touch screen can use LCD (Liquid Crystal Display) technology or LPD (Light Emitting Polymer Display) technology, although other display technologies can be used in other embodiments. Touch screens and touch screen controllers can detect contact and its movement or interruption using any of a variety of touch sensitive technologies including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays. Or other technique for determining one or more points in contact with the touch screen.
当通过启动模块10进入应用程序的隐藏编辑模式后,由触摸屏向用户显示相应的手势输入的提示;用户通过触摸屏进行触感输出,即设置相应的解锁手势。所述“触感输出”指的是设备相对于设备的先前位置的物理位移、设备的组件(例如,触敏表面)相对于设备的另一组件(例如,外壳)的物理移位、或者组件相对于将由用户通过用户的触摸感测检测的设备的质心的移位。After entering the hidden editing mode of the application through the startup module 10, the prompt of the corresponding gesture input is displayed to the user by the touch screen; the user performs the tactile output through the touch screen, that is, sets the corresponding unlocking gesture. The "tactile output" refers to a physical displacement of a device relative to a previous location of the device, a physical displacement of a component of the device (eg, a touch-sensitive surface) relative to another component of the device (eg, a housing), or a component relative The shift of the centroid of the device to be detected by the user through the user's touch sensing.
例如,在设备或设备的组件与对触摸敏感的用户的表面(例如,用户的手的手指、手 掌或其他部分)接触的情况下,物理位移所生成的触觉输出将由用户解释为对应于设备的物理特性或设备的组件中的感知改变的触觉感测。例如,触敏表面(例如,触敏显示器或触控板)的移动可选地被用户解释为物理致动器按钮的“向下点击”或“向上点击”。在一些情况下,用户将感觉到触感,诸如“向下点击”或“向上点击”,即使不存在与通过用户的移动在物理上按压(例如,移位)的触敏表面相关联的物理致动器按钮的移动。作为另一示例,触敏表面的移动由用户可选地解释或感测为触敏表面的“粗糙度”,即使触敏表面的平滑度没有改变。尽管用户对触摸的这样的解释将受到用户的个性化的感官知觉的影响,但是可以存在对大多数用户来说是共同的触摸的感官知觉。因此,当触觉输出被描述为对应于用户的具体感官知觉(例如,“向上点击”、“向下点击”、“粗糙度”)时,除非另有说明,所生成的触觉输出对应于设备或其组件的物理位移,这将生成对于一般(或平均)用户来说所描述的感官知觉。For example, on the surface of a device or device and the surface of a user sensitive to touch (eg, the finger or hand of the user's hand) In the case of a palm or other portion of the contact, the tactile output generated by the physical displacement will be interpreted by the user as a tactile sense corresponding to the physical characteristics of the device or the perceived change in the components of the device. For example, the movement of a touch sensitive surface (eg, a touch sensitive display or trackpad) is optionally interpreted by the user as a "down click" or "up click" of the physical actuator button. In some cases, the user will feel a tactile sensation, such as "down click" or "up click", even if there is no physical association associated with a touch-sensitive surface that is physically pressed (eg, displaced) by the user's movement. Movement of the actuator button. As another example, the movement of the touch-sensitive surface is optionally interpreted or sensed by the user as "roughness" of the touch-sensitive surface, even if the smoothness of the touch-sensitive surface does not change. While such user interpretation of the touch will be affected by the user's personalized sensory perception, there may be sensory perceptions of the touch that is common to most users. Thus, when the haptic output is described as corresponding to a particular sensory perception of the user (eg, "up click", "down click", "roughness"), unless otherwise stated, the generated haptic output corresponds to the device or The physical displacement of its components, which will generate the sensory perception described for the average (or average) user.
所述关联模块30连接所述手势设置模块20,用于将所述第一关联信息与待隐藏的应用相关联。所述隐藏模块40连接所述关联模块30,用于在完成所述关联后,将所述待隐藏的应用进行隐藏。The association module 30 is connected to the gesture setting module 20 for associating the first association information with an application to be hidden. The hiding module 40 is connected to the association module 30, and is configured to hide the application to be hidden after the association is completed.
本实施例中,所述解锁手势、第一关联信息等均可以存储于存储器中,即所述电子设备可以包括存储器、存储器控制器、一个或多个处理单元(CPU)、外设接口、RF电路、音频电路、扬声器、麦克风、输入/输出(I/O)子系统、触摸屏、其他输出或控制设备,以及外部端口。这些组件通过一条或多条通信总线或信号线进行通信。In this embodiment, the unlocking gesture, the first associated information, and the like may all be stored in a memory, that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
所述存储器可包括高速随机存取存储器,并且还可包括非易失性存储器,例如一个或多个磁盘存储设备、闪存设备或其他非易失性固态存储设备。在某些实施例中,存储器还可以包括远离一个或多个处理器的存储器,例如经由RF电路或外部端口以及通信网络(未示出)访问的网络附加存储器,其中所述通信网络可以是因特网、一个或多个内部网、局域网(LAN)、广域网(WLAN)、存储局域网(SAN)等,或其适当组合。存储器控制器可控制设备的诸如CPU和外设接口之类的其他组件对存储器的访问。The memory can include high speed random access memory and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices. In some embodiments, the memory may also include memory remote from one or more processors, such as network attached memory accessed via RF circuitry or external ports and a communication network (not shown), where the communication network may be the Internet One or more internal networks, a local area network (LAN), a wide area network (WLAN), a storage area network (SAN), etc., or a suitable combination thereof. The memory controller can control access to the memory by other components of the device, such as the CPU and peripheral interfaces.
在本实施例中,所述手势设置模块20进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息。 In this embodiment, the gesture setting module 20 performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when the recognition results of at least two times are the same.
通过设置至少两次的输入操作和识别,可以防止操作失误导致的解锁手势的输入错误,如果两次的识别结果不相同,则不会生成第一关联信息,并且还可以对此次手势设置的错误操作进行提示,并提供新的手势输入操作界面,以方便用户进行重新设置。By setting the input operation and recognition at least twice, it is possible to prevent an input error of the unlock gesture caused by the operation error, and if the recognition results of the two times are not the same, the first associated information is not generated, and the gesture can also be set for the gesture. The wrong operation prompts and provides a new gesture input operation interface for the user to reset.
本实施例的应用程序的隐藏系统对需要隐藏的应用程序进行直接操作,不仅有效地提高了设备的安全性能,而且避免了隐藏后的应用程序无法与其他程序进行数据通讯的问题;另外,通过输入正确的解锁手势即可快速的启动已隐藏的应用程序,从面大大提高了启动隐藏应用程序的效率。The hidden system of the application of the embodiment directly operates the application that needs to be hidden, which not only effectively improves the security performance of the device, but also avoids the problem that the hidden application cannot communicate with other programs; in addition, Entering the correct unlock gesture can quickly launch a hidden application, greatly improving the efficiency of launching hidden applications.
参考图2,图2示出了本发明中的应用程序的隐藏系统另一实现方式的结构示意图,如图所示,本实施例中的应用程序的隐藏系统与图1所示的隐藏系统相似,也包括:启动模块10、手势设置模块20、关联模块30和隐藏模块40。并且,本实施例的应用程序的隐藏系统还包括了包括:指纹设置模块50。Referring to FIG. 2, FIG. 2 is a schematic structural diagram showing another implementation manner of the hidden system of the application in the present invention. As shown in the figure, the hidden system of the application in this embodiment is similar to the hidden system shown in FIG. The method also includes an activation module 10, a gesture setting module 20, an association module 30, and a hiding module 40. Moreover, the hidden system of the application of the embodiment further includes: a fingerprint setting module 50.
所述指纹设置模块50连接所述关联模块30,用于接收指纹信息的输入操作,并对所述指纹信息进行识别以生成第二关联信息。The fingerprint setting module 50 is connected to the association module 30 for receiving an input operation of fingerprint information, and identifying the fingerprint information to generate second associated information.
具体地,在本实施例中,所述指纹设置模块包括:指纹接收模块和指纹识别模块(图中未示出)。所述指纹接收模块用于接收由输入操作提供的指纹信息;所述指纹识别模块用于识别接收到的所述指纹信息以生成第二关联信息。Specifically, in this embodiment, the fingerprint setting module includes: a fingerprint receiving module and a fingerprint identification module (not shown). The fingerprint receiving module is configured to receive fingerprint information provided by an input operation; the fingerprint identification module is configured to identify the received fingerprint information to generate second associated information.
所述关联模块30还用于所述第二关联信息与待隐藏的应用相关联。更具体地,在本实施例中,所述关联模块30可以将手势设置模块20生成的第一关联信息以及指纹设置模块50生成的第二关联信息同时与待隐藏的应用相关联,这样当需要对隐藏的应用程序进行启动时,不仅需要正确的解锁手势,还需要正确的指纹信息,否则隐藏的应用程序不会被启动,从而进一步提高了设备的安全性能。The association module 30 is further configured to associate the second association information with an application to be hidden. More specifically, in the embodiment, the association module 30 may associate the first association information generated by the gesture setting module 20 and the second association information generated by the fingerprint setting module 50 with the application to be hidden at the same time, so that when needed When launching a hidden application, not only the correct unlock gesture but also the correct fingerprint information is required, otherwise the hidden application will not be started, which further improves the security performance of the device.
本实施例中的指纹设置模块50可以由指硬件和软件组件结合起来实现,例如:通过是基于电容传感识别原理的指纹模块对指纹进行采集和识别,具体原理为:通过人体的微电场与电容传感器间形成微电流,指纹的波峰和波谷形成电容高低差,进而描绘出指纹图像。这是由于手指指纹是凹凸不平的,在半导体表面电容数值是变化的,通过电容数值变化来采集指纹。 The fingerprint setting module 50 in this embodiment may be implemented by combining hardware and software components. For example, the fingerprint module is collected and recognized by a fingerprint module based on the principle of capacitive sensing recognition. The specific principle is: through the micro electric field of the human body and A micro-current is formed between the capacitive sensors, and the peaks and valleys of the fingerprint form a capacitance difference, thereby drawing a fingerprint image. This is because the fingerprint of the finger is uneven, and the capacitance value changes on the surface of the semiconductor, and the fingerprint is collected by the change of the capacitance value.
当然,还也可以采用其他原理的指纹模块来生成第二关联信息,比如:光学指纹模块,其利用光的折摄和反射原理,光从底部射向三棱镜,并经棱镜射出,射出的光线在手指表面指纹凹凸不平的线纹上折射的角度及反射回去的光线明暗就会不一样。CMOS或者CCD的光学器件就会收集到不同明暗程度的图片信息,就完成指纹的采集。Of course, other principles of the fingerprint module can also be used to generate the second associated information, such as an optical fingerprint module, which utilizes the principle of folding and reflection of light, the light is emitted from the bottom toward the prism, and is emitted through the prism, and the emitted light is The angle of refraction on the uneven lines of the finger surface of the finger and the brightness of the reflected light will be different. The CMOS or CCD optics collects picture information of different brightness levels to complete the fingerprint collection.
再比如,射频指纹模块,其利用生物射频指纹识别技术,通过传感器本身发射出微量射频信号,穿透手指的表皮层去控测里层的纹路,来获得最佳的指纹图像。防伪指纹能力强,射频识别原理只对人的真皮皮肤有反应,从根本上杜绝了人造指纹的问题。For example, the RF fingerprint module utilizes bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image. The anti-counterfeiting fingerprint ability is strong, and the radio frequency identification principle only responds to the human dermis skin, fundamentally eliminating the problem of artificial fingerprints.
本实施例中,所述手势设置模块进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息;同时,所述指纹设置模块也可以进行至少两次的指纹信息的输入操作和识别,并在至少两次的识别结果相同时生成第二关联信息。In this embodiment, the gesture setting module performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when at least two recognition results are the same; and at the same time, the fingerprint setting module may perform at least The input operation and recognition of the fingerprint information are performed twice, and the second related information is generated when the recognition results of at least two times are the same.
通过设置至少两次的输入操作和识别,可以防止操作失误导致的解锁手势(或指纹信息)的输入错误,如果两次的识别结果不相同,则不会生成第一关联信息,并且还可以对此次手势设置(指纹设置)的错误操作进行提示,并提供新的手势(指纹)输入操作界面,以方便用户进行重新设置。By setting at least two input operations and recognition, it is possible to prevent an input error of an unlocking gesture (or fingerprint information) caused by an operation error, and if the two recognition results are not the same, the first associated information is not generated, and The wrong operation of the gesture setting (fingerprint setting) is prompted, and a new gesture (fingerprint) input operation interface is provided to facilitate the user to reset.
本发明还提供一种应用程序的隐藏方法,该应用程序的隐藏方法可应用于包含前述隐藏系统的电子设备。所述电子设备包括但不限于手持电脑、平板电脑、移动电话、智能手机、媒体播放器、个人数字助理(PDA)等等,还包括其中两项或多项的组合。所述电子设备通常包括存储器、存储器控制器、一个或多个处理单元(CPU)、外设接口、RF电路、音频电路、扬声器、麦克风、输入/输出(I/O)子系统、触摸屏、其他输出或控制设备,以及外部端口。这些组件通过一条或多条通信总线或信号线进行通信。The present invention also provides a hidden method of an application, the hidden method of the application being applicable to an electronic device including the aforementioned hidden system. The electronic device includes, but is not limited to, a handheld computer, a tablet computer, a mobile phone, a smart phone, a media player, a personal digital assistant (PDA), etc., and a combination of two or more of them. The electronic device typically includes a memory, a memory controller, one or more processing units (CPUs), peripheral interfaces, RF circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, others Output or control device, as well as external ports. These components communicate over one or more communication buses or signal lines.
应当理解,本实施例中的电子设备只是一个实例,具体应用中,电子设备的组件可以本实施例中的电子设备具有更多或更少的组件,或具有不同的组件配置;并且各种组件可以用硬件、软件或软硬件的组合来实现,包括一个或多个信号处理和/或专用集成电路。It should be understood that the electronic device in this embodiment is only an example. In a specific application, the components of the electronic device may have more or fewer components in the embodiment, or have different component configurations; and various components. This can be implemented in hardware, software, or a combination of hardware and software, including one or more signal processing and/or application specific integrated circuits.
如图3所示,所述应用程序的隐藏方法包括:As shown in FIG. 3, the hidden method of the application includes:
步骤S10,启动进入隐藏编辑模式;本实施例中,该步骤可以由软件和/或硬件实现。所述预设操作可以是预先设定的相关操作,以包含触摸屏的智能手机为例,所述预设操作 可以是长按、滑动、双击等等,本发明对此不做限制。例如,可以通过长按待隐藏的应用程序(如长按8s)后,即进入待隐藏的应用程序的隐藏编辑模式。Step S10, starting to enter the hidden editing mode; in this embodiment, the step may be implemented by software and/or hardware. The preset operation may be a preset related operation, for example, a smart phone including a touch screen, the preset operation It can be a long press, a slide, a double tap, etc., and the present invention does not limit this. For example, you can enter the hidden editing mode of the application to be hidden by long pressing the application to be hidden (such as long press 8s).
步骤S20,设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息;具体地,在本实施例中,可以由前述的手势设置模块实现。所述手势设置模块可以由触摸屏或者触摸板来实现。触摸屏在设备与用户之间同时提供输出接口和输入接口。触摸屏控制器接收/发送来自/去往触摸屏的电信号。该触摸屏则向用户显示可视输出。这个可视输出可以包括文本、图形、视频及其任意组合。In step S20, an unlocking gesture is set, and the unlocking gesture is identified to generate first associated information. Specifically, in this embodiment, the unlocking gesture may be implemented by the foregoing gesture setting module. The gesture setting module can be implemented by a touch screen or a touch pad. The touch screen provides an output interface and an input interface between the device and the user. The touch screen controller receives/transmits electrical signals from/to the touch screen. The touch screen displays the visual output to the user. This visual output can include text, graphics, video, and any combination thereof.
所述触摸屏基于触觉和/或触知接触来接受用户的输入。该触摸屏形成一个接受用户输入的触摸敏感表面。该触摸屏和触摸屏控制器(连同存储器中任何相关联的模块和/或指令集一起)检测触摸屏上的接触(以及所述触摸的任何移动或中断),并且将检测到的接触变换成与显示在触摸屏上的诸如一个或多个软按键之类的用户界面对象的交互。在一个示例性实施例中,触摸屏与用户之间的接触点对应于用户的一个或多个手指。该触摸屏可以使用LCD(液晶显示器)技术或LPD(发光聚合物显示器)技术,但在其他实施例中可使用其他显示技术。触摸屏和触摸屏控制器可以使用多种触敏技术中的任何一种来检测接触及其移动或中断,这些触敏技术包括但不限于电容、电阻、红外和声表面波技术,以及其他接近传感器阵列,或用于确定与触摸屏相接触的一个或多个点的其他技术。The touch screen accepts user input based on tactile and/or tactile contact. The touch screen forms a touch sensitive surface that accepts user input. The touch screen and the touch screen controller (along with any associated modules and/or sets of instructions in the memory) detect contact on the touch screen (and any movement or interruption of the touch) and transform the detected contact into and out of Interaction of user interface objects such as one or more soft keys on the touch screen. In an exemplary embodiment, the point of contact between the touch screen and the user corresponds to one or more fingers of the user. The touch screen can use LCD (Liquid Crystal Display) technology or LPD (Light Emitting Polymer Display) technology, although other display technologies can be used in other embodiments. Touch screens and touch screen controllers can detect contact and its movement or interruption using any of a variety of touch sensitive technologies including, but not limited to, capacitive, resistive, infrared, and surface acoustic wave technologies, as well as other proximity sensor arrays. Or other technique for determining one or more points in contact with the touch screen.
步骤S30,将所述第一关联信息与待隐藏的应用相关联;Step S30, associating the first associated information with an application to be hidden;
步骤S40,在完成所述关联后,将所述待隐藏的应用进行隐藏。Step S40: After the association is completed, the application to be hidden is hidden.
本实施例中,所述解锁手势、第一关联信息等均可以存储于存储器中,即所述电子设备可以包括存储器、存储器控制器、一个或多个处理单元(CPU)、外设接口、RF电路、音频电路、扬声器、麦克风、输入/输出(I/O)子系统、触摸屏、其他输出或控制设备,以及外部端口。这些组件通过一条或多条通信总线或信号线进行通信。In this embodiment, the unlocking gesture, the first associated information, and the like may all be stored in a memory, that is, the electronic device may include a memory, a memory controller, one or more processing units (CPUs), a peripheral interface, and an RF. Circuits, audio circuits, speakers, microphones, input/output (I/O) subsystems, touch screens, other output or control devices, and external ports. These components communicate over one or more communication buses or signal lines.
所述存储器可包括高速随机存取存储器,并且还可包括非易失性存储器,例如一个或多个磁盘存储设备、闪存设备或其他非易失性固态存储设备。在某些实施例中,存储器还可以包括远离一个或多个处理器的存储器,例如经由RF电路或外部端口以及通信网络(未示出)访问的网络附加存储器,其中所述通信网络可以是因特网、一个或多个内部网、局 域网(LAN)、广域网(WLAN)、存储局域网(SAN)等,或其适当组合。存储器控制器可控制设备的诸如CPU和外设接口之类的其他组件对存储器的访问。The memory can include high speed random access memory and can also include non-volatile memory, such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid state storage devices. In some embodiments, the memory may also include memory remote from one or more processors, such as network attached memory accessed via RF circuitry or external ports and a communication network (not shown), where the communication network may be the Internet One or more intranets, bureaus Domain network (LAN), wide area network (WLAN), storage area network (SAN), etc., or a suitable combination thereof. The memory controller can control access to the memory by other components of the device, such as the CPU and peripheral interfaces.
在本实施例中,进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息。In the present embodiment, the input operation and recognition of the unlocking gesture are performed at least twice, and the first related information is generated when the recognition results of at least two times are the same.
通过设置至少两次的输入操作和识别,可以防止操作失误导致的解锁手势的输入错误,如果两次的识别结果不相同,则不会生成第一关联信息,并且还可以对此次手势设置的错误操作进行提示,并提供新的手势输入操作界面,以方便用户进行重新设置。By setting the input operation and recognition at least twice, it is possible to prevent an input error of the unlock gesture caused by the operation error, and if the recognition results of the two times are not the same, the first associated information is not generated, and the gesture can also be set for the gesture. The wrong operation prompts and provides a new gesture input operation interface for the user to reset.
如图4所示,为本发明的应用程序的隐藏方法的另一实现方式的流程示意图,与图3所示的隐藏方法的实现方式相似,所述应用程序的隐藏方法包括:步骤S10,启动进入隐藏编辑模块;步骤S20,设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息;另外,所述应用程序的隐藏方法还包括:步骤S50,设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息;最后执行步骤S60,将所述第一关联信息以及第二关联信息与所述待隐藏的应用相关联。As shown in FIG. 4, a schematic flowchart of another implementation manner of the hidden method of the application of the present invention is similar to the implementation manner of the hidden method shown in FIG. 3. The hidden method of the application includes: step S10, starting Entering the hidden editing module; step S20, setting an unlocking gesture, and identifying the unlocking gesture to generate first associated information; further, the hiding method of the application further includes: step S50, setting fingerprint information, and The fingerprint information is identified to generate the second association information. Finally, step S60 is performed to associate the first association information and the second association information with the application to be hidden.
所述步骤S50可以由指硬件和软件组件结合起来实现,例如:通过是基于电容传感识别原理的指纹模块对指纹进行采集和识别,具体原理为:通过人体的微电场与电容传感器间形成微电流,指纹的波峰和波谷形成电容高低差,进而描绘出指纹图像。这是由于手指指纹是凹凸不平的,在半导体表面电容数值是变化的,通过电容数值变化来采集指纹。The step S50 can be implemented by combining hardware and software components. For example, the fingerprint is collected and recognized by a fingerprint module based on the principle of capacitive sensing recognition. The specific principle is: forming a micro-electric field between the human body and the capacitive sensor. The current, the peaks and valleys of the fingerprint form a difference in capacitance, which in turn depicts a fingerprint image. This is because the fingerprint of the finger is uneven, and the capacitance value changes on the surface of the semiconductor, and the fingerprint is collected by the change of the capacitance value.
当然,还也可以采用其他原理的指纹模块来生成第二关联信息,比如:光学指纹模块,其利用光的折摄和反射原理,光从底部射向三棱镜,并经棱镜射出,射出的光线在手指表面指纹凹凸不平的线纹上折射的角度及反射回去的光线明暗就会不一样。CMOS或者CCD的光学器件就会收集到不同明暗程度的图片信息,就完成指纹的采集。Of course, other principles of the fingerprint module can also be used to generate the second associated information, such as an optical fingerprint module, which utilizes the principle of folding and reflection of light, the light is emitted from the bottom toward the prism, and is emitted through the prism, and the emitted light is The angle of refraction on the uneven lines of the finger surface of the finger and the brightness of the reflected light will be different. The CMOS or CCD optics collects picture information of different brightness levels to complete the fingerprint collection.
再比如,射频指纹模块,其利用生物射频指纹识别技术,通过传感器本身发射出微量射频信号,穿透手指的表皮层去控测里层的纹路,来获得最佳的指纹图像。防伪指纹能力强,射频识别原理只对人的真皮皮肤有反应,从根本上杜绝了人造指纹的问题。For example, the RF fingerprint module utilizes bio-radio fingerprinting technology to emit a small amount of radio frequency signal through the sensor itself, and penetrates the skin layer of the finger to control the texture of the inner layer to obtain the best fingerprint image. The anti-counterfeiting fingerprint ability is strong, and the radio frequency identification principle only responds to the human dermis skin, fundamentally eliminating the problem of artificial fingerprints.
具体地,所述步骤S20:设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息的步骤包括:至少进行两次解锁手势的输入操作;对所述至少两次的解锁手势进行识 别;在至少两次的识别结果相同时生成第一关联信息;所述步骤S50:所述设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息的步骤包括:至少进行两次指纹信息的输入操作;对所述至少两次的指纹信息进行识别;在至少两次的识别结果相同时生成第二关联信息。Specifically, the step S20: setting an unlocking gesture, and identifying the unlocking gesture to generate the first associated information includes: performing an input operation of at least two unlocking gestures; performing the at least two unlocking gestures Knowledge And generating the first association information when the recognition results of the at least two times are the same; the step S50: the step of setting the fingerprint information, and identifying the fingerprint information to generate the second association information comprises: performing at least twice Input operation of fingerprint information; identifying the at least two fingerprint information; generating second association information when the recognition results of at least two times are the same.
本实施例中,所述手势设置模块进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息;同时,所述指纹设置模块也可以进行至少两次的指纹信息的输入操作和识别,并在至少两次的识别结果相同时生成第二关联信息。In this embodiment, the gesture setting module performs an input operation and recognition of at least two unlocking gestures, and generates first associated information when at least two recognition results are the same; and at the same time, the fingerprint setting module may perform at least The input operation and recognition of the fingerprint information are performed twice, and the second related information is generated when the recognition results of at least two times are the same.
通过设置至少两次的输入操作和识别,可以防止操作失误导致的解锁手势(或指纹信息)的输入错误,如果两次的识别结果不相同,则不会生成第一关联信息,并且还可以对此次手势设置(指纹设置)的错误操作进行提示,并提供新的手势(指纹)输入操作界面,以方便用户进行重新设置。By setting at least two input operations and recognition, it is possible to prevent an input error of an unlocking gesture (or fingerprint information) caused by an operation error, and if the two recognition results are not the same, the first associated information is not generated, and The wrong operation of the gesture setting (fingerprint setting) is prompted, and a new gesture (fingerprint) input operation interface is provided to facilitate the user to reset.
需要说明的是,所述步骤S20与步骤S50的设置顺序还可以变换,比如说,先进行指纹信息的设置(即先执行步骤S50),再进行解锁手势的设置(执行步骤S20),本发明对此不做限制。It should be noted that the setting sequence of the step S20 and the step S50 may also be changed. For example, the setting of the fingerprint information is performed first (ie, step S50 is performed first), and then the setting of the unlocking gesture is performed (step S20), the present invention. There is no limit to this.
在本实施例中,所述将第一关联信息以及第二关联信息同时与待隐藏的应用相关联,这样当需要对隐藏的应用程序进行启动时,不仅需要正确的解锁手势,还需要正确的指纹信息,否则隐藏的应用程序不会被启动,从而进一步提高了设备的安全性能。In this embodiment, the first association information and the second association information are simultaneously associated with the application to be hidden, so that when the hidden application needs to be started, not only the correct unlocking gesture but also the correct Fingerprint information, otherwise hidden applications will not be launched, further improving the security of the device.
如图5所示,为本发明隐藏的应用程序的启动方法的一实现方式的流程示意图。所述隐藏的应用程序的启动方法包括:FIG. 5 is a schematic flowchart diagram of an implementation manner of a method for starting a hidden application according to the present invention. The startup method of the hidden application includes:
步骤S70:接收手势的输入操作,并对所述手势进行识别;Step S70: receiving an input operation of the gesture, and identifying the gesture;
步骤S80:当识别到的手势与隐藏的应用所对应的解锁手势相同时,启动与所述隐藏的应用程序。Step S80: When the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, the hidden application is started.
本实施例的启动方法与图3所示的应用程序的隐藏方法相对应,只需要进行手势的识别,当识别到的手势与隐藏的应用所对应的解锁手势相同时,即可启动与所述隐藏的应用程序,从而有效的提高了隐藏的应用程序的启动效率。The startup method of the embodiment corresponds to the hidden method of the application shown in FIG. 3, and only needs to recognize the gesture. When the recognized gesture is the same as the unlock gesture corresponding to the hidden application, the startup gesture can be started. Hidden applications that effectively improve the startup efficiency of hidden applications.
如图6所示,为本发明隐藏的应用程序的启动方法的另一实现方式的流程示意图。所 述的隐藏的应用程序的启动方法还可以包括:步骤S90:接收指纹信息的输入操作,并对所述指纹信息进行识别;FIG. 6 is a schematic flowchart diagram of another implementation manner of a method for starting a hidden application according to the present invention. Place The method for starting the hidden application may further include: step S90: receiving an input operation of the fingerprint information, and identifying the fingerprint information;
然后执行步骤S80:当识别到的指纹信息与隐藏的应用所对应的指纹信息相同、且识别到的手势与隐藏的应用所对应的解锁手势相同时,启动所述隐藏的应用程序。Then, step S80 is executed: when the identified fingerprint information is the same as the fingerprint information corresponding to the hidden application, and the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, the hidden application is started.
本实施例中的步骤S70的手势识别过程可以由触摸屏实现,而步骤S90的指纹识别过程则可以由前述的指纹模块实现。所述手势识别及指纹识别的原理已在前述内容中进行了详细描述,在此不再赘述。The gesture recognition process of step S70 in this embodiment may be implemented by a touch screen, and the fingerprint recognition process of step S90 may be implemented by the foregoing fingerprint module. The principles of the gesture recognition and fingerprint recognition have been described in detail in the foregoing, and are not described herein again.
本实施例的启动方法与图4所示的应用程序的隐藏方法相对应,不仅需要进行手势的识别,还需要对指纹信息进行识别,当识别到的手势以及指纹信息均与隐藏的应用所对应的解锁手势以及指纹信息相同时,即可启动与所述隐藏的应用程序,从而进一步提高了设备的安全性能。The startup method of the embodiment corresponds to the hidden method of the application shown in FIG. 4, and not only the recognition of the gesture but also the identification of the fingerprint information is required, and the recognized gesture and the fingerprint information are corresponding to the hidden application. When the unlocking gesture and the fingerprint information are the same, the hidden application can be started, thereby further improving the security performance of the device.
综上所述,本发明所提供的应用程序的隐藏系统、隐藏方法及启动方法,通过设置解锁手势可以方便快捷的进行应用程序的隐藏或启动,从而提高了设备的安全性能;而且还可以同时设置解锁手势和指纹信息,这样进一步的提高了安全性,并且,由于只是将需要的应用程序进行了隐藏(即在隐藏状态下,应用程序将不再显示于用户界面上),而没有限制隐藏后的应用程序与其他应用或组件的相互通讯,因此也提高了设备的实用性。In summary, the hidden system, the hiding method, and the starting method of the application provided by the present invention can conveniently and quickly hide or start the application by setting an unlocking gesture, thereby improving the security performance of the device; Setting the unlock gesture and fingerprint information further enhances security, and because only the required application is hidden (ie, in the hidden state, the application will no longer be displayed on the user interface) without limiting hiding The post-application communicates with other applications or components, thus increasing the usability of the device.
本发明所述的电子设备的测试方法及系统,与现有技术相比,具有以下优点:可以快速的对应用程序进行隐藏或启动,其不仅有效的提高了设备的安全性能,并且提高了隐藏或启动的效率。Compared with the prior art, the testing method and system of the electronic device of the present invention have the following advantages: the application can be hidden or started quickly, which not only effectively improves the security performance of the device, but also improves the hiding. Or the efficiency of the startup.
本领域内的技术人员应明白,上述各实施例可提供为方法、装置、或计算机程序产品。这些实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。上述各实施例涉及的方法中的全部或部分步骤可以通过程序来指令相关的硬件完成,所述的程序可以存储于计算机设备可读取的存储介质中,用于执行上述各实施例方法所述的全部或部分步骤。Those skilled in the art will appreciate that the various embodiments described above can be provided as a method, apparatus, or computer program product. These embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware aspects. All or part of the steps involved in the foregoing embodiments may be implemented by a program to instruct related hardware, and the program may be stored in a storage medium readable by a computer device for performing the methods of the foregoing embodiments. All or part of the steps.
上述各实施例是参照根据实施例所述的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一 流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到计算机设备的处理器以产生一个机器,使得通过计算机设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The above embodiments are described with reference to flowcharts and/or block diagrams of methods, apparatus (systems), and computer program products according to the embodiments. It should be understood that each of the flowcharts and/or block diagrams can be implemented by computer program instructions. A combination of the processes and/or blocks, and the flows and/or blocks in the flowcharts and/or block diagrams. These computer program instructions can be provided to a processor of a computer device to produce a machine such that instructions executed by a processor of the computer device are generated for implementing one or more blocks or processes in a flow or flow diagram and/or block diagram of the flowchart The device for the function specified in the box.
尽管本发明的内容已经通过上述优选实施例作了详细介绍,但应当认识到上述的描述不应被认为是对本发明的限制。在本领域技术人员阅读了上述内容后,对于本发明的多种修改和替代都将是显而易见的。因此,本发明的保护范围应由所附的权利要求来限定。 Although the present invention has been described in detail by the preferred embodiments thereof, it should be understood that the foregoing description should not be construed as limiting. Various modifications and alterations of the present invention will be apparent to those skilled in the art. Therefore, the scope of the invention should be defined by the appended claims.

Claims (10)

  1. 一种应用程序的隐藏系统,其特征在于,包括:A hidden system for an application, comprising:
    启动模块,用于根据预设操作进入应用程序的隐藏编辑模式;a startup module for entering a hidden editing mode of the application according to a preset operation;
    手势设置模块,用于接收解锁手势的输入操作,并对所述解锁手势进行识别以生成第一关联信息;a gesture setting module, configured to receive an input operation of an unlock gesture, and identify the unlock gesture to generate first associated information;
    关联模块,用于将所述第一关联信息与待隐藏的应用相关联;An association module, configured to associate the first association information with an application to be hidden;
    隐藏模块,用于在完成所述关联后,将所述待隐藏的应用进行隐藏。And a hiding module, configured to hide the application to be hidden after the association is completed.
  2. 如权利要求1所述的应用程序的隐藏系统,其特征在于,所述手势设置模块包括:The hidden system of the application of claim 1, wherein the gesture setting module comprises:
    手势接收模块,用于接收由输入操作提供的解锁手势;a gesture receiving module, configured to receive an unlock gesture provided by an input operation;
    手势识别模块,用于识别接收到的所述解锁手势以生成第一关联信息。And a gesture recognition module, configured to identify the received unlock gesture to generate first associated information.
  3. 如权利要求1所述的应用程序的隐藏系统,其特征在于,还包括:指纹设置模块,用于接收指纹信息的输入操作,并对所述指纹信息进行识别以生成第二关联信息。The hidden system of the application of claim 1, further comprising: a fingerprint setting module, configured to receive an input operation of the fingerprint information, and identify the fingerprint information to generate second associated information.
  4. 如权利要求3所述的应用程序的隐藏系统,其特征在于,所述指纹设置模块包括:The hidden system of the application of claim 3, wherein the fingerprint setting module comprises:
    指纹接收模块,用于接收由输入操作提供的指纹信息;a fingerprint receiving module, configured to receive fingerprint information provided by an input operation;
    指纹识别模块,用于识别接收到的所述指纹信息以生成第二关联信息;a fingerprint identification module, configured to identify the received fingerprint information to generate second associated information;
    所述关联模块还用于所述第二关联信息与待隐藏的应用相关联。The association module is further configured to associate the second association information with an application to be hidden.
  5. 如权利要求1或4所述的应用程序的隐藏系统,其特征在于,所述手势设置模块进行至少两次的解锁手势的输入操作和识别,并在至少两次的识别结果相同时生成第一关联信息;和/或,所述指纹设置模块进行至少两次的指纹信息的输入操作和识别,并在至少两次的识别结果相同时生成第二关联信息。The hidden system of the application program according to claim 1 or 4, wherein the gesture setting module performs an input operation and recognition of at least two unlocking gestures, and generates a first when at least two recognition results are the same Correlation information; and/or, the fingerprint setting module performs input operation and recognition of the fingerprint information at least twice, and generates second association information when the recognition results of at least two times are the same.
  6. 一种应用程序的隐藏方法,其特征在于,包括:A hidden method of an application, comprising:
    启动进入隐藏编辑模式;Start into hidden editing mode;
    设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息;Setting an unlocking gesture, and identifying the unlocking gesture to generate first associated information;
    将所述第一关联信息与待隐藏的应用相关联; Associating the first associated information with an application to be hidden;
    在完成所述关联后,将所述待隐藏的应用进行隐藏。After the association is completed, the application to be hidden is hidden.
  7. 如权利要求6所述的应用程序的隐藏方法,其特征在于,还包括:The method for hiding an application according to claim 6, further comprising:
    设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息;Setting fingerprint information, and identifying the fingerprint information to generate second associated information;
    将所述第一关联信息以及第二关联信息与所述待隐藏的应用相关联。The first associated information and the second associated information are associated with the application to be hidden.
  8. 如权利要求6或7所述的应用程序的隐藏方法,其特征在于,所述设置解锁手势,并对所述解锁手势进行识别以生成第一关联信息的步骤包括:至少进行两次解锁手势的输入操作;对所述至少两次的解锁手势进行识别;在至少两次的识别结果相同时生成第一关联信息;The method for hiding an application according to claim 6 or 7, wherein the step of setting an unlocking gesture and identifying the unlocking gesture to generate first associated information comprises: performing at least two unlocking gestures Input operation; identifying the at least two unlocking gestures; generating first associated information when the at least two recognition results are the same;
    所述设置指纹信息,并对所述指纹信息进行识别以生成第二关联信息的步骤包括:至少进行两次指纹信息的输入操作;对所述至少两次的指纹信息进行识别;在至少两次的识别结果相同时生成第二关联信息。The step of setting the fingerprint information and identifying the fingerprint information to generate the second association information comprises: performing at least two input operations of the fingerprint information; identifying the at least two fingerprint information; at least twice When the recognition result is the same, the second association information is generated.
  9. 一种隐藏的应用程序的启动方法,其特征在于,包括:A method for launching a hidden application, comprising:
    接收手势的输入操作,并对所述手势进行识别;Receiving an input operation of a gesture and identifying the gesture;
    当识别到的手势与隐藏的应用所对应的解锁手势相同时,启动与所述隐藏的应用程序。When the recognized gesture is the same as the unlock gesture corresponding to the hidden application, the hidden application is launched.
  10. 如权利要求9所述的隐藏的应用程序的启动方法,其特征在于,还包括:The method for starting a hidden application according to claim 9, further comprising:
    接收指纹信息的输入操作,并对所述指纹信息进行识别;Receiving an input operation of the fingerprint information, and identifying the fingerprint information;
    当识别到的指纹信息与隐藏的应用所对应的指纹信息相同、且识别到的手势与隐藏的应用所对应的解锁手势相同时,启动所述隐藏的应用程序。 When the identified fingerprint information is the same as the fingerprint information corresponding to the hidden application, and the recognized gesture is the same as the unlocking gesture corresponding to the hidden application, the hidden application is started.
PCT/CN2017/103095 2017-09-25 2017-09-25 Application hiding system, hiding method, and starting method WO2019056338A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/103095 WO2019056338A1 (en) 2017-09-25 2017-09-25 Application hiding system, hiding method, and starting method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/103095 WO2019056338A1 (en) 2017-09-25 2017-09-25 Application hiding system, hiding method, and starting method

Publications (1)

Publication Number Publication Date
WO2019056338A1 true WO2019056338A1 (en) 2019-03-28

Family

ID=65809947

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/103095 WO2019056338A1 (en) 2017-09-25 2017-09-25 Application hiding system, hiding method, and starting method

Country Status (1)

Country Link
WO (1) WO2019056338A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN105825103A (en) * 2015-09-10 2016-08-03 维沃移动通信有限公司 Encryption setting method and decryption starting method of application program and electronic equipment
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617382A (en) * 2013-11-22 2014-03-05 北京奇虎科技有限公司 Privacy protection method and device
CN104182662A (en) * 2014-08-22 2014-12-03 广东欧珀移动通信有限公司 Mobile terminal, system and method for hiding and starting hidden application programs
CN105825103A (en) * 2015-09-10 2016-08-03 维沃移动通信有限公司 Encryption setting method and decryption starting method of application program and electronic equipment
CN106066950A (en) * 2016-05-23 2016-11-02 广东欧珀移动通信有限公司 Application program image target processing method and system

Similar Documents

Publication Publication Date Title
EP3779780B1 (en) Implementation of biometric authentication with first and second form of authentication
EP3745303B1 (en) Implementation of biometric authentication with error condition detection and display of an error indication
US9613245B1 (en) Device and method for authentication by a biometric sensor
RU2721361C1 (en) Method and device for unlocking fingerprint
EP2901247B1 (en) Portable device and control method thereof
US20170315651A1 (en) Biometric Initiated Communication
KR102080183B1 (en) Electronic device and method for unlocking in the electronic device
CN107223254B (en) Method, user device, and storage medium for hidden setting processing
KR102389147B1 (en) Embedded authentication systems in an electronic device
CN108475112B (en) Method and apparatus for using friction sound
US9513790B2 (en) Electronic device and method for unlocking screen of electronic device
KR20170136359A (en) Method for activiating a function using a fingerprint and electronic device including a touch display supporting the same
TWI492094B (en) Electronic device and method for controlling the electronic device via fingerprint recognition
TWI543013B (en) Electronic device
US20140184519A1 (en) Adapting user interface based on handedness of use of mobile computing device
TW201539234A (en) Security method for an electronic device
WO2017161824A1 (en) Method and device for controlling terminal
TWI610194B (en) Electronic device for fingerprint sensing and method for invoking applications thereof
US10282528B2 (en) Portable terminal and method of setting and releasing use restriction therefor
CN110263515B (en) Opening method of encrypted application and terminal equipment
CN108683809B (en) Screen locking method, device and system
CN106843588B (en) Screen control method and device
WO2018018858A1 (en) Unlock method and device, and computer storage medium
WO2019056338A1 (en) Application hiding system, hiding method, and starting method
US20180349592A1 (en) Beat assisted temporal pressure password

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17925669

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17925669

Country of ref document: EP

Kind code of ref document: A1