CN106503506A - A kind of method for information display and electronic equipment - Google Patents
A kind of method for information display and electronic equipment Download PDFInfo
- Publication number
- CN106503506A CN106503506A CN201610967452.6A CN201610967452A CN106503506A CN 106503506 A CN106503506 A CN 106503506A CN 201610967452 A CN201610967452 A CN 201610967452A CN 106503506 A CN106503506 A CN 106503506A
- Authority
- CN
- China
- Prior art keywords
- application program
- visitor
- electronic equipment
- user
- login interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 230000008569 process Effects 0.000 claims description 25
- 230000006870 function Effects 0.000 description 31
- 238000004891 communication Methods 0.000 description 6
- 238000003860 storage Methods 0.000 description 6
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 230000001010 compromised effect Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008878 coupling Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000004549 pulsed laser deposition Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- KLDZYURQCUYZBL-UHFFFAOYSA-N 2-[3-[(2-hydroxyphenyl)methylideneamino]propyliminomethyl]phenol Chemical compound OC1=CC=CC=C1C=NCCCN=CC1=CC=CC=C1O KLDZYURQCUYZBL-UHFFFAOYSA-N 0.000 description 1
- 208000031481 Pathologic Constriction Diseases 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 210000001215 vagina Anatomy 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1066—Hiding content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The present invention provides a kind of method for information display and electronic equipment, and the method includes:When visitor being detected to the access request of the first application program, create the second application program that there is identical function with first application program;Start second application program, show the login interface of second application program.The method for information display that the present invention is provided, when visitor uses electronic equipment access application, as application program shows login interface on screen, it is not easy to reveal the information of user, the privacy of information is preferably.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of method for information display and electronic equipment.
Background technology
With the fast development of electronic equipment, electronic equipment is widely used for people.Electronic equipment not only can be used
In communicating, taking pictures, social activity, acquisition information, storage information etc. is can be also used for, electronic equipment has become people and obtains information
Important channel.
In some scenes, such as when colleague, friend etc. meet, it may be desirable to exchange electronic equipment or there is user
Electronic equipment is lent the situation that other people use, such as user by electronic equipment lend other people log-in instant communication softwares or other
Application program etc.;In other scene, for example, electronic equipment is lent situation that other people use etc. in office's presence.
During other people are using consumer electronic devices, the information leakage of consumer electronic devices is easily caused.
It can be seen that, the private poor problem of current electronic equipment existence information.
Content of the invention
The embodiment of the present invention provides a kind of method for information display and electronic equipment, is easily revealed with solving electronic device information
Problem.
In a first aspect, a kind of method for information display is embodiments provided, including:
When visitor is detected to the access request of the first application program, create have with first application program identical
Second application program of function;
Start second application program, show the login interface of second application program.
Second aspect, the embodiment of the present invention also provide a kind of electronic equipment, including:
Creation module, should with described first for when visitor is detected to the access request of the first application program, creating
The second application program that there is identical function with program;
Display module, for starting second application program, shows the login interface of second application program.
So, in the embodiment of the present invention, when visitor is detected to the access request of the first application program, create with described
First application program has the second application program of identical function;Start second application program, show second application
The login interface of program.So, when visitor uses electronic equipment access application, as application program shows on screen
Login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Description of the drawings
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below will be to needed for embodiment of the present invention description
Accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention,
For those of ordinary skill in the art, without having to pay creative labor, can be being obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is a kind of flow chart of method for information display that first embodiment of the invention is provided;
Fig. 2 is a kind of flow chart of method for information display that second embodiment of the invention is provided;
Fig. 3 is the structure chart of a kind of electronic equipment that third embodiment of the invention is provided;
Fig. 4 is the structure chart of another kind of electronic equipment that third embodiment of the invention is provided;
Fig. 5 is the structure chart of another kind of electronic equipment that third embodiment of the invention is provided;
Fig. 6 is the structure chart of another kind of electronic equipment that third embodiment of the invention is provided;
Fig. 7 is the structure chart of another kind of electronic equipment that third embodiment of the invention is provided;
Fig. 8 is the structure chart of a kind of electronic equipment that fourth embodiment of the invention is provided.
Specific embodiment
Accompanying drawing in below in conjunction with the embodiment of the present invention, to the embodiment of the present invention in technical scheme carry out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.It is based on this
Embodiment in bright, the every other enforcement obtained under the premise of creative work is not made by those of ordinary skill in the art
Example, belongs to the scope of protection of the invention.
First embodiment
Referring to Fig. 1, Fig. 1 is a kind of flow chart of method for information display provided in an embodiment of the present invention, as shown in figure 1, bag
Include following steps:
Step 101, when visitor is detected to the access request of the first application program, create and first application program
There is the second application program of identical function.
In some scenes, such as colleague, friend's party etc. be under scene, and can there is user electronic equipment is lent other people makes
Situation, if now user by user using application program be set to hide easily allow other side produce estrangement, if not will letter
Breath is hidden and is easily caused information leakage.Other people when using application program login account need to exit the former account for logging in of user.
In the embodiment of the present invention, when visitor is detected to the access request of the first application program, create identical with the first application program
Second application program of function is used for visitor, during the second application program of guest access, shows login circle on electronic equipment screen
Face, does not show logon account information, it is not easy to cause user profile to reveal.
In this step, above-mentioned visitor can be the user after specific authentication, for example, by specific solution
The user of electronic equipment is accessed after lock cipher unblock, and wherein, the unlocking manner can be password unblock, or unlocked by fingerprint
Etc..
Above-mentioned visitor is to the behaviour that executes when the access request of the first application program can be the first application program of guest access
Make.For example, visitor needs access application A, can be come to visit by the icon with application program on finger point touching screen
Ask application program;Visitor can also execute double click operation come access application A etc. by the shortcut to application program A
Deng.
Above-mentioned second application program can be attending to anything else for the first application program, can replicate the first application program to obtain
The function phase of the second application program, the second application program and the first application program is same, it is also possible to show that on screen identical is fast
Prompt mode.So, when the second application program of guest access, can reach and access above-mentioned first application program identical experience
Sense.
Step 102, startup second application program, show the login interface of second application program.
After electronic equipment receives above-mentioned access request, start the second application program, the second application program is made in operation
State, and show the login interface of the second application program.
Above-mentioned login interface could be for the interface of logon account information, for example, show input account on login interface
Region with password.On login interface, the information of account before user input accounts information, is not shown.So, when visitor visits
When asking application program, show the login interface of application program on electronic equipment screen, and do not show the information of logon account, from
And the privacy of user profile can be protected.If in addition, user's login account on the first application program, visitor can be second
Login account on application program, user are without exiting listed account, convenient to operation, and Consumer's Experience sense is good.
The method of the embodiment of the present invention can apply to electronic equipment, for example:Mobile phone, computer, panel computer (Tablet
Personal Computer), kneetop computer (Laptop Computer), personal digital assistant (personal digital
Assistant, abbreviation PDA), mobile Internet access device (Mobile Internet Device, MID) or Wearable device
(Wearable Device) etc..
The method for information display of the embodiment of the present invention, when visitor is detected to the access request of the first application program, wound
Build the second application program that there is identical function with first application program;Start second application program, show described
The login interface of the second application program.So, when visitor uses electronic equipment access application, as application program is in screen
Show login interface on curtain, it is not easy to reveal the information of user, the privacy of information is preferably.
Second embodiment
Referring to Fig. 2, Fig. 2 is a kind of flow chart of method for information display provided in an embodiment of the present invention, as shown in Fig. 2 bag
Include following steps:
Step 201, the unlock instruction of receiving user's input, judge that the unlock instruction refers to for default visitor unblock
Order.
In some scenes, such as colleague, friend's party etc. be under scene, and can there is user electronic equipment is lent other people makes
Situation, if now user by user using application program be set to hide easily allow other side produce estrangement, if not will letter
Breath is hidden and is easily caused information leakage.Other people when using application program login account need to exit the former account for logging in of user.
When visitor being detected to the access request of the first application program, create the second application journey with the first application program identical function
Sequence is used for visitor, and the first application program and the second application program motion time do not create independent process, the first application program
Operation can not affect the use of the second application program.
Electronic equipment when not in use, is in the lock state, and now needs to be unlocked by being input into unlock instruction.The solution
Lock instruction can be password, such as numeral, letter, fingerprint etc., or other unlocking manners, for example, will be specific
Icon slides into predeterminated position etc..User can preset unlock instruction, and user input unlock instruction can be user's solution
The operation executed during lock.
User can arrange two unlock instructions, and one of unlock instruction can be unlocked for user, be as differentiation, this
Place is referred to as user's unlock instruction;Another unlock instruction is available for visitor's unblock to use, referred to herein as visitor's unlock instruction.Using not
When same unlock instruction is unlocked entrance electronic equipment, the information that electronic equipment shows is different.For example, user is using electricity
During sub- equipment, it is possible to use user's unlock instruction is unlocked;When user needs for electronic equipment to lend other people and uses, and not
When wishing that the information of user is checked by other people, it is possible to use visitor's unlock instruction is unlocked.
After electronic equipment receives unlock instruction, judge whether the instruction for receiving is visitor's unlock instruction, can pass through
Judge the unlock instruction for receiving degree whether same or like with default visitor's unlock instruction whether in default scope.
For example, default visitor's unlock instruction is 1234, if the instruction for receiving is 1234, judges that the unlock instruction is solved for visitor
Lock instruction.
When unlock instruction is unlocked by fingerprint, can be by whether judging with the similarity of default fingerprint in preset range
Inside determining whether visitor's unlock instruction.For example, user can arrange the finger of the user's unlock instruction used for user
Stricture of vagina, if the fingerprint that electronic equipment is received is mismatched with default fingerprint, i.e., when similarity is less than the threshold value of default similarity,
It is set to default visitor's unlock instruction.
For example, user's unlock instruction is the fingerprint for pre-setting, if the similarity of the fingerprint for receiving and default fingerprint
For 60%, it is 80% to preset similarity size, then judge that the unlock instruction for receiving is default visitor's unlock instruction.Herein
Only illustrate.
So, user can pass through to be input into different unlock instructions, realize user's free switching access module.
Step 202, when visitor is detected to the access request of the first application program, create and first application program
There is the second application program of identical function.
In this step, above-mentioned visitor can be the user after specific authentication, for example, by specific solution
The user of electronic equipment is accessed after lock cipher unblock, and the unlocking manner can be password unblock, or unlocked by fingerprint etc..
If judging, user identity, for visitor's identity, can enter guest mode.
Wherein, above-mentioned visitor is to the behaviour that executes when the access request of the first application program can be guest access application program
Make.For example, visitor needs access application A, can be come to visit by the icon with application program on finger point touching screen
Ask application program;Visitor can also execute double click operation come access application A etc. by the shortcut to application program A
Deng.
Above-mentioned second application program can be attending to anything else for the first application program, can replicate the first application program to obtain
The function phase of the second application program, the second application program and the first application program is same, it is also possible to show that on screen identical is fast
Prompt mode.So, when the second application program of guest access, can reach and access above-mentioned first application program identical experience
Sense.
Optionally, described when visitor is detected to the access request of the first application program, create and the described first application
Program has the second application program of identical function, including:
When visitor is detected to the access request of the first application program, judge first application program whether in stepping on
Record state;
If first application program is created, with first application program, there is identical function in logging status
Second application program.
Above-mentioned judge whether the first application program can judge whether there is account on an electronic device in logging status
Log on the first application program, first application program can be instant messaging application program, can be other application journeys
Sequence.Above-mentioned account can be the corresponding account of account that user is registered on first application program, for example, telephone number, i.e.
When communication account etc..Electronic equipment can carry out judging whether to be logged in account according to the data in process list.
If the first application program can be created and be applied with the first function of application identical second in logging status
Program, so, when visitor needs to access the first application program, listed account need not be exited by user, and visitor can be with
Using the second application program login account, simple operation, Consumer's Experience sense are good.
If in addition, the first application program is not on logging status, i.e., logging in the first application program without account, visit
Visitor can access the first application program, and when accessing first application program, the interface display of the first application program is login circle
Face, it is not easy to cause user profile to be revealed.
In this embodiment, when the first application program of guest access, if the first application program is in logging status,
Create and first the second application program of function of application identical, use for visitor.So, when visitor needs to access first should
When using program, the account for having logged in need not be exited by user, and visitor can use the second application program login account, operation
Convenient, Consumer's Experience sense is good.
After the establishment has the second application program of identical function with first application program, in the startup
Before second application program, methods described also includes:
Show second application program, and hide first application program.
After above-mentioned second application program is created, the icon of second application program can be shown on electronic equipment screen
Or shortcut, the icon of the first application program or shortcut to be hidden, the account on the first application program can be normal
Receive information, electronic equipment can not point out notification message.So, due to the second application program and the first function of application phase
With, when guest access needs to access the first application program, visitor can use the second application program to substitute the first application program,
Consumer's Experience sense is good, and the accounts information that logs on the first application program of user be not easy compromised, the safety of information compared with
Good.
In this embodiment, so, when other people are using the electronic equipment of user, apply due to concealing user first
The icon of program, the accounts information that user is logged in the first application program are also hidden, and can protect the login account of user
The information at family is not compromised, and other people can improve Consumer's Experience sense by the second application program access application.
Step 203, startup second application program, show the login interface of second application program.
After electronic equipment receives above-mentioned access request, start the second application program, the second application program is made in operation
State, and show the login interface of the second application program.
Above-mentioned login interface could be for the interface of logon account information, for example, show input account on login interface
Region with password.On login interface, the information of account before user input accounts information, is not shown.So, when visitor visits
When asking application program, show the login interface of application program on electronic equipment screen, and do not show the information of logon account, from
And the privacy of user profile can be protected.If in addition, user's login account on the first application program, visitor can be second
Login account on application program, user are without exiting the account for having logged in, convenient to operation, and Consumer's Experience sense is good.
Optionally, the login interface for starting second application program, showing second application program, including:
Start second application program, create the process of second application program;
The login interface for showing second application program using the process.
After electronic equipment starts the second application program, the process of the second application program is created, so that the second application program
Run using the process.As the second application program is run using independent process, so, when the first application program is in
During logging status, visitor can use the second application program login account, without will be listed in the first application program
Account is exited, and Consumer's Experience sense is good.Above-mentioned login interface could be for the interface of logon account information, for example, login interface
The upper region for showing input account and password.
The process of the second application program can be bound with the first application program, after binding, if delete first applying
Program, the second application program can also be deleted therewith.
In this embodiment, the process of the second application program is created, the login for showing application program using the process
Interface.So, when the first application program is in logging status, visitor can not use the second application program login account, and not
Need to exit listed account in the first application program, and the account in the first application program can normally receive letter
Breath, information private good, simple operation, Consumer's Experience sense are good.
The method for information display of the embodiment of the present invention on the basis of the corresponding embodiments of Fig. 1, the solution of receiving user's input
Lock instruction, judges the unlock instruction for default visitor's unlock instruction, i.e., visitor is carried out creating second after authentication
Application program is used for visitor.So, when user uses electronic equipment, it is possible to use the first application program logon account, visit
When visitor is using the electronic equipment, it is possible to use the second application program logon account.Guest login accounts information has not affected user
The accounts information of login, and logon account information will not be compromised, the privacy of information is preferably.
3rd embodiment
Referring to Fig. 3, Fig. 3 is the structure chart of a kind of electronic equipment that the present invention implements to provide, as shown in figure 3, electronic equipment
300 include:Creation module 301 and the first display module 302, wherein:
Creation module 301, for when visitor is detected to the access request of the first application program, creating and described first
Application program has the second application program of identical function;
First display module 302, for starting second application program, shows login circle of second application program
Face.
Optionally, as shown in figure 4, the creation module 301 includes:
Judging unit 3011, for when visitor is detected to the access request of the first application program, judging described first
Whether application program is in logging status;
First creating unit 3012, if create and described first in logging status for first application program
Application program has the second application program of identical function.
Optionally, as shown in figure 5, the electronic equipment 300 also includes:
Second display module 303, for showing second application program, and hides first application program.
Optionally, as shown in fig. 6, first display module 302 includes:
Second creating unit 3021, for starting second application program, creates the process of second application program;
Using unit 3022, for showing the login interface of second application program using the process.
Optionally, as shown in fig. 7, the electronic equipment 300 also includes:
Receiver module 304, for the unlock instruction of receiving user's input, judges that the unlock instruction is default visitor
Unlock instruction.
Electronic equipment 300 can realize each process that electronic equipment is realized in the embodiment of the method for Fig. 1 to Fig. 2, for keeping away
Exempt to repeat, repeat no more here.
The electronic equipment 300 of the embodiment of the present invention, when visitor is detected to the access request of the first application program, creates
There is the second application program of identical function with first application program;Start second application program, show described the
The login interface of two application programs.So, when visitor uses electronic equipment access application, as application program is in screen
Upper display login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Fourth embodiment
Referring to Fig. 8, Fig. 8 is the structure chart of the electronic equipment that the present invention implements to provide, as shown in figure 8, electronic equipment 800 is wrapped
Include:At least one processor 801, memorizer 802, at least one network interface 804 and user interface 803.In electronic equipment 800
Each component be coupled by bus system 805.It is understood that bus system 805 is used for realizing between these components
Connection communication.Bus system 805 also includes power bus, controlling bus and status signal bus in addition in addition to data/address bus is included.
But for the sake of for clear explanation, various buses are all designated as bus system 805 in fig. 8.
Wherein, user interface 803 can include display, keyboard or pointing device (for example, mouse, trace ball
(track ball), touch-sensitive plate or touch screen etc..
It is appreciated that the memorizer 802 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable P ROM, EPROM), Electrically Erasable Read Only Memory (Electrically EP ROM, EEPROM)
Or flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and which is used as outside
Cache.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous D RAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SD RAM, DDRSDRAM), enhancement mode Synchronous Dynamic Random Access Memory (Enhanced SD RAM, ESDRAM), synchronous connect
Connect dynamic random access memory (Synch link D RAM, SLDRAM) and direct rambus random access memory
(Direct Rambus RAM, DRRAM).The memorizer 802 of system and method described herein be intended to including but not limited to these
Memorizer with any other suitable type.
In some embodiments, memorizer 802 stores following element, can perform module or data structure, or
Person their subset, or their superset:Operating system 8021 and application program 8022.
Wherein, operating system 8021, comprising various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and process hardware based task.Application program 8022, comprising various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method is may be embodied in application program 8022.
In embodiments of the present invention, by call memorizer 802 storage program or instruction, specifically, can be application
The program stored in program 8022 or instruction, processor 801 are used for:
When visitor is detected to the access request of the first application program, create have with first application program identical
Second application program of function;
Start second application program, show the login interface of second application program.
The method that the embodiments of the present invention are disclosed is can apply in processor 801, or is realized by processor 801.
A kind of possibly IC chip of processor 801, the disposal ability with signal.During realization, said method each
Step can be completed by the instruction of the integrated logic circuit of the hardware in processor 801 or software form.Above-mentioned process
Device 801 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic,
Discrete hardware components.Can realize or execute disclosed each method in the embodiment of the present invention, step and logic diagram.General
Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with embodiment of the present invention institute
The step of disclosed method, can be embodied directly in hardware decoding processor and execute and complete, or with the hardware in decoding processor
And software module combination execution is completed.Software module may be located at random access memory, and flash memory, read only memory may be programmed read-only
In the ripe storage medium in this area such as memorizer or electrically erasable programmable memory, depositor.The storage medium is located at
Memorizer 802, processor 801 read the information in memorizer 802, the step of complete said method in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its
Combine to realize.For hardware is realized, processing unit can be realized in one or more special IC (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
Controller, microcontroller, microprocessor, for execute herein described function other electronic units or its combine in.
For software is realized, can be realized herein by the module (such as process, function etc.) of execution function described herein
Described technology.Software code is storable in memorizer and by computing device.Memorizer can within a processor or
Realize outside processor.
Optionally, processor 801 execute described when visitor is detected to the access request of the first application program, create with
First application program has the second application program of identical function, including:
When visitor is detected to the access request of the first application program, judge first application program whether in stepping on
Record state;
If first application program is created, with first application program, there is identical function in logging status
Second application program.
Optionally, processor 801 execute described establishment and first application program have identical function second should
After with program, before the startup second application program, methods described also includes:
Show second application program, and hide first application program.
Optionally, processor 801 executes the startup second application program, shows stepping on for second application program
Record interface, including:
Start second application program, create the process of second application program;
The login interface for showing second application program using the process.
Optionally, processor 801 was executed before the access request for detecting visitor to the first application program, described
Method also includes:
The unlock instruction of receiving user's input, judges that the unlock instruction is default visitor's unlock instruction.
Electronic equipment 800 can realize each process that electronic equipment is realized in previous embodiment, for avoiding repeating, here
Repeat no more.
The electronic equipment 800 of the embodiment of the present invention, when visitor is detected to the access request of the first application program, creates
There is the second application program of identical function with first application program;Start second application program, show described the
The login interface of two application programs.So, when visitor uses electronic equipment access application, as application program is in screen
Upper display login interface, it is not easy to reveal the information of user, the privacy of information is preferably.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Unit and algorithm steps, being capable of being implemented in combination in electronic hardware or computer software and electronic hardware.These functions are actually
Executed with hardware or software mode, the application-specific and design constraint depending on technical scheme.Professional and technical personnel
Each specific application can be used different methods to realize described function, but this realization is it is not considered that exceed
The scope of the present invention.
Those skilled in the art can be understood that, for convenience and simplicity of description, the system of foregoing description,
Device and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can pass through other
Mode is realized.For example, device embodiment described above is only that schematically for example, the division of the unit is only
A kind of division of logic function, can have when actually realizing other dividing mode, for example multiple units or component can in conjunction with or
Person is desirably integrated into another system, or some features can be ignored, or does not execute.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit
Connect, can be electrical, mechanical or other forms.
The unit that illustrates as separating component can be or may not be physically separate, aobvious as unit
The part for showing can be or may not be physical location, you can be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize embodiment of the present invention scheme
Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.
If the function is realized using in the form of SFU software functional unit and as independent production marketing or when using, can be with
It is stored in a computer read/write memory medium.Such understanding is based on, technical scheme is substantially in other words
The part contributed by prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, is used including some instructions so that a computer equipment (can be individual
People's computer, server, or network equipment etc.) execute all or part of step of each embodiment methods described of the invention.
And aforesaid storage medium includes:USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Claims (10)
1. a kind of method for information display, it is characterised in that include:
When visitor being detected to the access request of the first application program, create, with first application program, there is identical function
The second application program;
Start second application program, show the login interface of second application program.
2. the method for claim 1, it is characterised in that described when detect visitor please to the access of the first application program
When asking, the second application program that there is identical function with first application program is created, including:
When visitor is detected to the access request of the first application program, judge first application program whether in logging in shape
State;
If first application program is created and has the second of identical function with first application program in logging status
Application program.
3. method as claimed in claim 1 or 2, it is characterised in that there is phase with first application program in described establishment
After second application program of congenerous, before the startup second application program, methods described also includes:
Show second application program, and hide first application program.
4. method as claimed in claim 1 or 2, it is characterised in that the startup second application program, shows described the
The login interface of two application programs, including:
Start second application program, create the process of second application program;
The login interface for showing second application program using the process.
5. the method for claim 1, it is characterised in that described detect visitor please to the access of the first application program
Before asking, methods described also includes:
The unlock instruction of receiving user's input, judges that the unlock instruction is default visitor's unlock instruction.
6. a kind of electronic equipment, it is characterised in that include:
Creation module, for when visitor is detected to the access request of the first application program, creating and the described first application journey
Sequence has the second application program of identical function;
First display module, for starting second application program, shows the login interface of second application program.
7. electronic equipment as claimed in claim 6, it is characterised in that the creation module includes:
Judging unit, for when visitor is detected to the access request of the first application program, judging first application program
Whether logging status are in;
First creating unit, if create and first application program in logging status for first application program
There is the second application program of identical function.
8. electronic equipment as claimed in claims 6 or 7, it is characterised in that the electronic equipment also includes:
Second display module, for showing second application program, and hides first application program.
9. electronic equipment as claimed in claims 6 or 7, it is characterised in that first display module includes:
Second creating unit, for starting second application program, creates the process of second application program;
Using unit, for showing the login interface of second application program using the process.
10. electronic equipment as claimed in claim 6, it is characterised in that the electronic equipment also includes:
Receiver module, for the unlock instruction of receiving user's input, judges that the unlock instruction refers to for default visitor unblock
Order.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967452.6A CN106503506B (en) | 2016-10-31 | 2016-10-31 | A kind of information display method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610967452.6A CN106503506B (en) | 2016-10-31 | 2016-10-31 | A kind of information display method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106503506A true CN106503506A (en) | 2017-03-15 |
CN106503506B CN106503506B (en) | 2019-08-20 |
Family
ID=58321859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610967452.6A Active CN106503506B (en) | 2016-10-31 | 2016-10-31 | A kind of information display method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106503506B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111344675A (en) * | 2017-09-13 | 2020-06-26 | 深圳传音通讯有限公司 | Virtual system operation method based on intelligent terminal and virtual system |
CN112070946A (en) * | 2020-09-02 | 2020-12-11 | 平安信托有限责任公司 | Gate-based social application program control method, device, equipment and medium |
CN113906378A (en) * | 2019-06-01 | 2022-01-07 | 苹果公司 | User interface for accessing accounts |
US11601419B2 (en) | 2020-06-21 | 2023-03-07 | Apple Inc. | User interfaces for accessing an account |
US11995171B2 (en) | 2016-10-25 | 2024-05-28 | Apple Inc. | User interface for managing access to credentials for use in an operation |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103824004A (en) * | 2014-02-26 | 2014-05-28 | 可牛网络技术(北京)有限公司 | Application program protection method and device |
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
CN104992091A (en) * | 2015-06-05 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for accessing terminal end |
CN105224322A (en) * | 2015-09-25 | 2016-01-06 | 维沃移动通信有限公司 | A kind of attend to anything else method and terminal of application program |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
CN105824544A (en) * | 2015-11-30 | 2016-08-03 | 南京步步高通信科技有限公司 | Method for starting application program and terminal |
-
2016
- 2016-10-31 CN CN201610967452.6A patent/CN106503506B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104102882A (en) * | 2013-04-12 | 2014-10-15 | 腾讯科技(深圳)有限公司 | Protection method and device for privacy data of application program |
CN103824004A (en) * | 2014-02-26 | 2014-05-28 | 可牛网络技术(北京)有限公司 | Application program protection method and device |
CN104992091A (en) * | 2015-06-05 | 2015-10-21 | 小米科技有限责任公司 | Method and apparatus for accessing terminal end |
CN105224322A (en) * | 2015-09-25 | 2016-01-06 | 维沃移动通信有限公司 | A kind of attend to anything else method and terminal of application program |
CN105824544A (en) * | 2015-11-30 | 2016-08-03 | 南京步步高通信科技有限公司 | Method for starting application program and terminal |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11995171B2 (en) | 2016-10-25 | 2024-05-28 | Apple Inc. | User interface for managing access to credentials for use in an operation |
CN111344675A (en) * | 2017-09-13 | 2020-06-26 | 深圳传音通讯有限公司 | Virtual system operation method based on intelligent terminal and virtual system |
CN111344675B (en) * | 2017-09-13 | 2023-10-13 | 深圳传音通讯有限公司 | Virtual system operation method and virtual system based on intelligent terminal |
CN113906378A (en) * | 2019-06-01 | 2022-01-07 | 苹果公司 | User interface for accessing accounts |
CN113906378B (en) * | 2019-06-01 | 2022-10-28 | 苹果公司 | User interface for accessing accounts |
US12001858B2 (en) | 2019-06-01 | 2024-06-04 | Apple Inc. | User interface for accessing an account |
US11601419B2 (en) | 2020-06-21 | 2023-03-07 | Apple Inc. | User interfaces for accessing an account |
CN112070946A (en) * | 2020-09-02 | 2020-12-11 | 平安信托有限责任公司 | Gate-based social application program control method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN106503506B (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108647508B (en) | Method and system for automatic association of authentication credentials with biometric information | |
CN106503506A (en) | A kind of method for information display and electronic equipment | |
CN106164919B (en) | Browser-based identity with multiple logins | |
US20160307002A1 (en) | Method and apparatus for displaying information content | |
US10212158B2 (en) | Automatic association of authentication credentials with biometrics | |
US9819676B2 (en) | Biometric capture for unauthorized user identification | |
US20150199687A1 (en) | Continual authorization for secured functions | |
CN108171025B (en) | Method for realizing multi-user login mode, terminal and computer readable storage medium | |
US9959539B2 (en) | Continual authorization for secured functions | |
CN105701420B (en) | A kind of management method and terminal of user data | |
CN105519038A (en) | Data protection based on user input during device boot-up, user login, and device shut-down states | |
CN104375836A (en) | Method and device for showing lock screen window | |
CN107358111A (en) | A kind of method for secret protection and mobile terminal | |
CN106446634A (en) | Method for privacy protection of mobile terminal and mobile terminal | |
CN105956431A (en) | Application protection processing method and mobile terminal | |
CN107506637A (en) | Information displaying method and device, terminal and readable storage medium storing program for executing | |
CN106446709A (en) | Application program separating method and system | |
CN107103224A (en) | A kind of unlocking method and mobile terminal | |
US10372921B2 (en) | Dynamic security policies | |
CN107506198A (en) | The display methods and mobile terminal of a kind of mobile terminal | |
CN107679381A (en) | A kind of announcement information processing method and mobile terminal | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
US9858409B2 (en) | Enhancing security of a mobile device using pre-authentication sequences | |
CN107391987A (en) | Application guard method, device and electronic equipment based on living things feature recognition | |
KR20200082723A (en) | Vulnerability countermeasure virtual keyboard providing device and method and computer readable medium storing program of the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |