CN107317926A - The method and device of hiden application - Google Patents
The method and device of hiden application Download PDFInfo
- Publication number
- CN107317926A CN107317926A CN201710477010.8A CN201710477010A CN107317926A CN 107317926 A CN107317926 A CN 107317926A CN 201710477010 A CN201710477010 A CN 201710477010A CN 107317926 A CN107317926 A CN 107317926A
- Authority
- CN
- China
- Prior art keywords
- user
- application
- fingerprint
- touch
- application icon
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/04817—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72469—User interfaces specially adapted for cordless or mobile telephones for operating the device by selecting functions from two or more displayed items, e.g. menus or icons
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
Abstract
The present invention provides a kind of method and device of hiden application, and method includes:The touch fingerprint button operation of user is received, and touch time and touch number of times are detected;If it is that twice, current touch fingerprint is compared with default unblock fingerprint more than first threshold or touch number of times to detect the touch time;If the current touch fingerprint is consistent with the unblock fingerprint, seek the opinion of whether the user shows hiden application, if receiving the confirmation request of user, the application icon of all applications being hidden is included in main interface again.By realizing the display to hiden application to user fingerprints identification, it ensure that user needs the crypticity of hiding application, so as to protect the privacy of user.
Description
Technical field
The present invention relates to field of mobile terminals, more particularly to a kind of method and device of hiden application.
Background technology
With development in science and technology, mobile terminal is widely used in daily life, therefore installs in the terminal various
Using also increasingly increasing.Many applications may relate to the privacy of user, or due to some are personal, user be not desired to by
Certain application is placed in the main interface of mobile terminal.
Prior art provides a solution, i.e., by the way that by third-party hiding software, user is not desired into displaying
Using being hidden.
But, it will be often easy to be found or cracked by other people, and pass through using being hidden by the above method
Third party software is hidden, and often takes the internal memory of customer mobile terminal.
The content of the invention
The present invention provides a kind of method and device of hiden application, by realizing user fingerprints identification to hiden application
Display, ensure that user needs the crypticity of hiding application, so as to protect the privacy of user.
The first aspect of the invention is to provide a kind of method of hiden application, including:The touch fingerprint for receiving user is pressed
Button is operated, and touch time and touch number of times are detected;If detecting the touch time more than first threshold or touching number of times
Twice, then current touch fingerprint to be compared with default unblock fingerprint;If the current touch fingerprint and the unblock
Fingerprint is consistent, then seeks the opinion of whether the user shows hiden application, will be all hidden if receiving the confirmation request of user
The application icon of the application of Tibetan is shown in main interface again.
Another aspect of the present invention is to provide a kind of device of hiden application, including:Receiving module, for receiving user
Touch fingerprint button operation, and to the touch time and touch number of times detect;Detection module, if for detecting during touch
Between exceed first threshold or touch number of times for twice, then current touch fingerprint is compared with the default fingerprint that unlocks;First
Module is seeked the opinion of, if consistent with the unblock fingerprint for the current touch fingerprint, seeks the opinion of whether the user shows hidden
Application is hidden, if receiving the confirmation request of user, the application icon of all applications being hidden is included in main interface again
On.
The method and device for the hiden application that the present invention is provided, by by the unblock for touching fingerprint and mobile terminal of user
Fingerprint seeks the opinion of request compared to pair, and in the case of comparing successfully to user's transmission, has confirmed that whether user needs display hidden
Application is hidden, to prevent user wants hiding application from being cracked or being checked by other people, ensure that user needs hiding application
Crypticity, so as to protect the privacy of user.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention one is provided;
Fig. 2 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention two is provided;
Fig. 3 is the structural representation of the device for the hiden application that the embodiment of the present invention three is provided;
Fig. 4 is the structural representation of the device for the hiden application that the embodiment of the present invention four is provided.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention one is provided, as shown in figure 1, this method
Including:
101st, the touch fingerprint button operation of user is received, and touch time and touch number of times are detected.
In the present embodiment, when receiving the operation of user's touch fingerprint, then further acquisition user, which touches, refers to
The time of line button and number of times, and the time and number of times of user's touch fingerprint button are detected.
If the 102, detecting the touch time more than first threshold or touching number of times for twice, by current touch fingerprint with
Default unblock fingerprint is compared.
In the present embodiment, after being detected to the time of the touch fingerprint button of user and number of times, if detection
To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, then active user is touched into fingerprint
The fingerprint of button and the unblock fingerprint of mobile terminal are compared.Wherein, first threshold can voluntarily be set for user.
As a kind of enforceable mode, a fingerprint different from terminal unlocking fingerprint can be also pre-set, in detection
To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, by active user touch fingerprint press
The fingerprint of button is compared from the fingerprints different with terminal unlocking fingerprint pre-set.
If the 103, the current touch fingerprint is consistent with the unblock fingerprint, seeks the opinion of the user and whether show and hidden
Using if receiving the confirmation request of user, by the application icon of all applications being hidden again including in main interface.
In the present embodiment, if detecting active user touches the fingerprint of fingerprint button and the unblock fingerprint of mobile terminal
Unanimously, then pushed to user and seek the opinion of request, whether to seek the opinion of user to being shown with hiding application, if receiving user's
Confirm to indicate, then include all hiden applications in main interface.Further, if receive user deny indicate,
Hiden application is not handled.
Further, after current touch fingerprint is compared with default unblock fingerprint described in 102, in addition to:
If the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
Further, when the unblock fingerprint for detecting fingerprint and mobile terminal that active user touches fingerprint button differs
Cause, then prove that the user does not check the authority of hiden application, then in order to ensure the safety of user's hiden application, then not to hidden
Application is hidden to be handled.
Illustrated, if being provided with a certain social networking application in user terminal, but in the social networking application, related to practical application
And to the privacy of user, so that user is not desired to include it to be found by other people in main interface, now, user is carried out hidden
Hide.When user calls this to apply, first, user is touched in the main interface unlocked with the finger of preset fingerprint information
Fingerprint button, if detect user touch fingerprint button time more than two seconds, or user touch fingerprint button number of times be
When twice, whether the fingerprint of detection user's touch key-press and the unblock fingerprint or default finger-print cipher of terminal are consistent, if one
Cause, now, ejection circle's user oriented seeks the opinion of whether discharge hiden application, will be with hidden after the confirmation instruction for receiving user
The application of Tibetan is shown in main interface.If detect user touch fingerprint button fingerprint and mobile phone terminal unblock fingerprint or
Default finger-print cipher is inconsistent, then in order to protect the application of user safe, does not then handle it.
The method for the hiden application that the present embodiment is provided, by by the unblock fingerprint for touching fingerprint and mobile terminal of user
Request is seeked the opinion of to user's transmission compared to pair, and in the case of comparing successfully, has confirmed that whether user needs display is hiding should
With the application hidden with preventing user from wanting is cracked or checked by other people, ensure that user needs the hidden of hiding application
Secret property, so as to protect the privacy of user.
Fig. 2 is the schematic flow sheet of the method for the hiden application that the embodiment of the present invention two is provided, as shown in Fig. 2 implementing
On the basis of example one, before 101, in addition to:
201st, the duration of user's long-press application icon is obtained.
If the 202, the duration exceed Second Threshold, seek the opinion of the user whether hide the application icon it is corresponding should
With.
If the 203, the user confirms to hide, the corresponding application of the application icon is hidden.
In the present embodiment, when detecting the operation of user's click application icon, user is obtained first and clicks on application icon
Duration, if the duration that user clicks on application icon is very short, possible user only wishes to open a certain application, rather than to this
Operated using other are carried out.If the duration for detecting user's long-press application icon exceedes Second Threshold, send and levy to user
Whether inquiry is hidden to the corresponding application of the application icon, when receiving the hiding instruction of user, then by the application icon
Corresponding application is hidden.Wherein Second Threshold can manually be set for user, or the Default Value inside mobile terminal,
This is not restricted by the present invention.
Still illustrated with practical application, when user want to be involved in the application that privacy is not desired to be shown in main interface carry out it is hidden
When Tibetan, long-press is to be concealed first applies corresponding application icon, if detecting the time of user's long-press icon more than two seconds
When, then interface is ejected to seek the opinion of whether user is hidden the application, should if the confirmation for receiving user is indicated
Deleted using corresponding application icon from main interface, reached the purpose of hiden application.
Specifically, after 202, in addition to:
If the duration exceed the Second Threshold, seek the opinion of the user whether unload the application icon it is corresponding should
With;
If the user confirms unloading, the corresponding application of the application icon is unloaded.
As a kind of enforceable mode, if the duration for detecting user's long-press application icon exceedes Second Threshold,
Send to seek the opinion of to user and whether the corresponding application of the application icon is unloaded, when the unloading for receiving user is indicated, then
The corresponding application of the application icon is unloaded.
Optionally, support to hide and support the embodiment of unloading can be combined to implement.For example, when detecting user's long-press
When the duration of application icon exceedes Second Threshold, it can push and unload and hiding option to user by way of tab,
Assuming that user's selection is hidden, then processing is hidden, if selection unloading, corresponding to carry out unloading processing.In practical application, when treating
When processing application is applied for system, then do not support to carry out unloading operation to the application, accordingly, without the choosing for pushing unloading
.
Further, if the user confirms to hide in step 203, the corresponding application of the application icon, tool are hidden
Body includes:
If the user confirms to hide, by the data information memory of the application to back-end data, and main interface is deleted
On the application icon.
In the present embodiment, if receiving the hiding instruction of user, and the corresponding application progress of the application icon is hidden
After Tibetan, also need to be stored the corresponding data message of application to be concealed to back-end data, and delete answering on homepage
Use icon.
The method provided by present embodiment, the corresponding data message of application to be concealed is stored, Neng Goubao
Card user terminal data is not lost in, and deletes the application icon on homepage, and can realize will be using being hidden.So as to ensure
User terminal data can be realized in the case of not being lost in be hidden to application.
The method for the hiden application that the present embodiment is provided, by recognizing the duration of user's long-press application icon, and to user
Transmission seeks the opinion of request and determines whether to be hidden application, and the data message of hiden application is stored to protect user profile
Do not lose, the icon for deleting main interface is hidden with realizing to application, so as to ensure that user needs the hidden of hiding application
Secret property, so as to protect the privacy of user.
Fig. 3 is the structural representation of the device for the hiden application that the embodiment of the present invention three is provided, as shown in figure 3, the device
Including:
Receiving module 31, the touch fingerprint button for receiving user is operated, and is carried out to touching the time and touching number of times
Detection.
Detection module 32, if being twice, by currently for detecting the touch time more than first threshold or touch number of times
Fingerprint is touched to be compared with default unblock fingerprint.
First seeks the opinion of module 33, if consistent with the unblock fingerprint using the current touch fingerprint, seeks the opinion of the use
Whether family shows hiden application, if receiving the confirmation request of user, by the application drawing indicated weight of all applications being hidden
Newly it is shown in main interface.
In the present embodiment, it is when receiving module 31, which receives user, touches the operation of fingerprint, then further to obtain
User touches time and the number of times of fingerprint button, and the time and number of times of user's touch fingerprint button are detected.In detection
After module 32 is detected to the time of the touch fingerprint button of user and number of times, if detecting user touches fingerprint button
Time exceed first threshold, or touch number of times for twice when, then by active user touch fingerprint button fingerprint and mobile terminal
Unblock fingerprint be compared.Wherein, first threshold can voluntarily be set for user.
As a kind of enforceable mode, a fingerprint different from terminal unlocking fingerprint can be also pre-set, in detection
To user touch fingerprint button time exceed first threshold, or touch number of times for twice when, by active user touch fingerprint press
The fingerprint of button is compared from the fingerprints different with terminal unlocking fingerprint pre-set.
If first, which seeks the opinion of module 33, detects the fingerprint of active user's touch fingerprint button and the unblock fingerprint of mobile terminal
Unanimously, then pushed to user and seek the opinion of request, whether to seek the opinion of user to being shown with hiding application, if receiving user's
Confirm to indicate, then include all hiden applications in main interface.Further, if receive user deny indicate,
Hiden application is not handled.
Further, described device also includes comparing module, specifically for by current touch fingerprint and default unblock
After fingerprint is compared, if the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
Specifically, touching the fingerprint of fingerprint button and the unblock fingerprint of mobile terminal when comparing module detects active user
It is inconsistent, then prove that the user does not check the authority of hiden application, then it is in order to ensure the safety of user's hiden application, then not right
Hiden application is handled.
Illustrated, if being provided with a certain social networking application in user terminal, but in the social networking application, related to practical application
And to the privacy of user, so that user is not desired to include it to be found by other people in main interface, now, user is carried out hidden
Hide.When user calls this to apply, first, user is touched in the main interface unlocked with the finger of preset fingerprint information
Fingerprint button, if detect user touch fingerprint button time more than two seconds, or user touch fingerprint button number of times be
When twice, whether the fingerprint of detection user's touch key-press and the unblock fingerprint or default finger-print cipher of terminal are consistent, if one
Cause, now, ejection circle's user oriented seeks the opinion of whether discharge hiden application, will be with hidden after the confirmation instruction for receiving user
The application of Tibetan is shown in main interface.If detect user touch fingerprint button fingerprint and mobile phone terminal unblock fingerprint or
Default finger-print cipher is inconsistent, then in order to protect the application of user safe, does not then handle it.
The device for the hiden application that the present embodiment is provided, by by the unblock fingerprint for touching fingerprint and mobile terminal of user
Request is seeked the opinion of to user's transmission compared to pair, and in the case of comparing successfully, has confirmed that whether user needs display is hiding should
With the application hidden with preventing user from wanting is cracked or checked by other people, ensure that user needs the hidden of hiding application
Secret property, so as to protect the privacy of user.
Fig. 4 is the structural representation of the device for the hiden application that the embodiment of the present invention four is provided, as shown in figure 4, implementing
On the basis of example three, described device also includes:
Acquisition module 41, for receiving the touch fingerprint button operation of user, and enters to touch time and touch number of times
Before row detection, the duration of user's long-press application icon is obtained.
Second seeks the opinion of module 42, if exceeding Second Threshold for the duration, seeks the opinion of whether the user hides described
The corresponding application of application icon.
Hidden module 43, if confirming to hide for the user, hides the corresponding application of the application icon.
In the present embodiment, when detecting the operation of user's click application icon, acquisition module 41 obtains user's point first
The duration of application icon is hit, if the duration that user clicks on application icon is very short, possible user only wishes to open a certain application,
Rather than other operations are carried out to the application.If second, which seeks the opinion of module 42, detects the duration of user's long-press application icon more than
During two threshold values, then seek the opinion of and whether the corresponding application of the application icon is hidden to user's transmission, when hidden module 43 is received
To user hiding instruction when, then the corresponding application of the application icon is hidden.Wherein Second Threshold can be manual for user
Set, or the Default Value inside mobile terminal, this is not restricted by the present invention.
Still illustrated with practical application, when user want to be involved in the application that privacy is not desired to be shown in main interface carry out it is hidden
When Tibetan, long-press is to be concealed first applies corresponding application icon, if detecting the time of user's long-press icon more than two seconds
When, then interface is ejected to seek the opinion of whether user is hidden the application, should if the confirmation for receiving user is indicated
Deleted using corresponding application icon from main interface, reached the purpose of hiden application.
Further, described device also includes:
3rd seeks the opinion of module, for after the duration of user's long-press application icon is obtained, if the duration exceedes
The Second Threshold, then seek the opinion of whether the user unloads the corresponding application of the application icon;
Unload module, if confirming to unload for the user, unloads the corresponding application of the application icon.
As a kind of enforceable mode, if the 3rd seeks the opinion of module and detects the duration of user's long-press application icon more than
During two threshold values, then sent to user and seek the opinion of and whether the corresponding application of the application icon is unloaded, when receiving unloading for user
When carrying instruction, then the corresponding application of the application icon is unloaded.
Optionally, support to hide and support the embodiment of unloading can be combined to implement.For example, when detecting user's long-press
When the duration of application icon exceedes Second Threshold, it can push and unload and hiding option to user by way of tab,
Assuming that user's selection is hidden, then processing is hidden, if selection unloading, corresponding to carry out unloading processing.In practical application, when treating
When processing application is applied for system, then do not support to carry out unloading operation to the application, accordingly, without the choosing for pushing unloading
.
Further, hidden module 43, can specifically include:
Memory cell, if confirming to hide for the user, by the data information memory of the application to back-end data,
And delete the application icon in main interface.
In the present embodiment, if hidden module 43 receives the hiding instruction of user, and the application icon is corresponding
After being hidden, memory cell also needs to be stored the corresponding data message of application to be concealed to back-end data,
And delete the application icon on homepage.
The method provided by present embodiment, the corresponding data message of application to be concealed is stored, Neng Goubao
Card user terminal data is not lost in, and deletes the application icon on homepage, and can realize will be using being hidden.So as to ensure
User terminal data can be realized in the case of not being lost in be hidden to application.
The device for the hiden application that the present embodiment is provided, by recognizing the duration of user's long-press application icon, and to user
Transmission seeks the opinion of request and determines whether to be hidden application, and the data message of hiden application is stored to protect user profile
Do not lose, the icon for deleting main interface is hidden with realizing to application, so as to ensure that user needs the hidden of hiding application
Secret property, so as to protect the privacy of user.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the device of foregoing description
Specific work process, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
One of ordinary skill in the art will appreciate that:Realizing all or part of step of above-mentioned each method embodiment can lead to
The related hardware of programmed instruction is crossed to complete.Foregoing program can be stored in a computer read/write memory medium.The journey
Sequence upon execution, performs the step of including above-mentioned each method embodiment;And foregoing storage medium includes:ROM, RAM, magnetic disc or
Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than its limitations;To the greatest extent
The present invention is described in detail with reference to foregoing embodiments for pipe, it will be understood by those within the art that:Its according to
The technical scheme described in foregoing embodiments can so be modified, or which part or all technical characteristic are entered
Row equivalent substitution;And these modifications or replacement, the essence of appropriate technical solution is departed from various embodiments of the present invention technology
The scope of scheme.
Claims (10)
1. a kind of method of hiden application, it is characterised in that including:
The touch fingerprint button operation of user is received, and touch time and touch number of times are detected;
If it is twice, by current touch fingerprint and default solution more than first threshold or touch number of times to detect the touch time
Lock fingerprint is compared;
If the current touch fingerprint is consistent with the unblock fingerprint, seek the opinion of whether the user shows hiden application, if
The confirmation request of user is received, then is included the application icon of all applications being hidden in main interface again.
2. it is according to the method described in claim 1, it is characterised in that the touch fingerprint button operation for receiving user, and right
Before touch time and touch number of times are detected, in addition to:
Obtain the duration of user's long-press application icon;
If the duration exceedes Second Threshold, seek the opinion of whether the user hides the corresponding application of the application icon;
If the user confirms to hide, the corresponding application of the application icon is hidden.
3. method according to claim 2, it is characterised in that the duration of acquisition user's long-press application icon it
Afterwards, in addition to:
If the duration exceedes the Second Threshold, seek the opinion of whether the user unloads the corresponding application of the application icon;
If the user confirms unloading, the corresponding application of the application icon is unloaded.
4. method according to claim 2, it is characterised in that if the user confirms to hide, hide described answer
With the corresponding application of icon, including:
If the user confirms to hide, by the data information memory of the application to back-end data, and delete in main interface
The application icon.
5. the method according to any one of claim 1-4, it is characterised in that it is described by current touch fingerprint with it is default
After unblock fingerprint is compared, in addition to:
If the current touch fingerprint and the unblock fingerprint are inconsistent, without processing.
6. a kind of device of hiden application, it is characterised in that including:
Receiving module, the touch fingerprint button for receiving user is operated, and touch time and touch number of times are detected;
Detection module, if being that twice, current touch is referred to for detecting the touch time more than first threshold or touch number of times
Line is compared with default unblock fingerprint;
First seeks the opinion of module, if consistent with the unblock fingerprint for the current touch fingerprint, whether seeks the opinion of the user
Hiden application is shown, if receiving the confirmation request of user, the application icon of all applications being hidden is shown again
In main interface.
7. device according to claim 6, it is characterised in that described device also includes:
Acquisition module, for receiving the touch fingerprint button operation of user, and is detected to touch time and touch number of times
Before, the duration of user's long-press application icon is obtained;
Second seeks the opinion of module, if exceeding Second Threshold for the duration, seeks the opinion of whether the user hides the application drawing
The corresponding application of mark;
Hidden module, if confirming to hide for the user, hides the corresponding application of the application icon.
8. device according to claim 7, it is characterised in that described device also includes:
3rd seeks the opinion of module, for after the duration of user's long-press application icon is obtained, if the duration is more than described
Second Threshold, then seek the opinion of whether the user unloads the corresponding application of the application icon;
Unload module, if confirming to unload for the user, unloads the corresponding application of the application icon.
9. device according to claim 7, it is characterised in that the hidden module, including:
Memory cell, if confirming to hide for the user, by the data information memory of the application to back-end data, and is deleted
Except the application icon in main interface.
10. the device according to any one of claim 6-9, it is characterised in that described device also includes:
Comparing module, for after current touch fingerprint is compared with default unblock fingerprint, if the current touch
Fingerprint and the unblock fingerprint are inconsistent, then without processing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710477010.8A CN107317926A (en) | 2017-06-21 | 2017-06-21 | The method and device of hiden application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710477010.8A CN107317926A (en) | 2017-06-21 | 2017-06-21 | The method and device of hiden application |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107317926A true CN107317926A (en) | 2017-11-03 |
Family
ID=60182063
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710477010.8A Pending CN107317926A (en) | 2017-06-21 | 2017-06-21 | The method and device of hiden application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107317926A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109542305A (en) * | 2018-11-23 | 2019-03-29 | Oppo广东移动通信有限公司 | Application control method and relevant apparatus |
WO2019174155A1 (en) * | 2018-03-15 | 2019-09-19 | 平安科技(深圳)有限公司 | Display method for application icon, and terminal device |
WO2020108133A1 (en) * | 2018-11-30 | 2020-06-04 | 华为技术有限公司 | Biological recognition interaction method, graphical interaction interface, and related apparatus |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105320898A (en) * | 2015-09-30 | 2016-02-10 | 联想(北京)有限公司 | Information processing method and system |
CN105912185A (en) * | 2015-11-03 | 2016-08-31 | 乐视移动智能信息技术(北京)有限公司 | Method and device for unloading application program, and terminal device |
CN105930145A (en) * | 2016-04-12 | 2016-09-07 | 广东欧珀移动通信有限公司 | Information hiding method and mobile terminal |
CN106127009A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | The display packing of a kind of icon and terminal |
US20170083227A1 (en) * | 2015-09-23 | 2017-03-23 | Quixey, Inc. | Hidden Application Icons |
-
2017
- 2017-06-21 CN CN201710477010.8A patent/CN107317926A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170083227A1 (en) * | 2015-09-23 | 2017-03-23 | Quixey, Inc. | Hidden Application Icons |
CN105320898A (en) * | 2015-09-30 | 2016-02-10 | 联想(北京)有限公司 | Information processing method and system |
CN105912185A (en) * | 2015-11-03 | 2016-08-31 | 乐视移动智能信息技术(北京)有限公司 | Method and device for unloading application program, and terminal device |
CN105930145A (en) * | 2016-04-12 | 2016-09-07 | 广东欧珀移动通信有限公司 | Information hiding method and mobile terminal |
CN106127009A (en) * | 2016-06-30 | 2016-11-16 | 宇龙计算机通信科技(深圳)有限公司 | The display packing of a kind of icon and terminal |
Non-Patent Citations (1)
Title |
---|
不详: "《防止误删iOS图标》", 《电脑报》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019174155A1 (en) * | 2018-03-15 | 2019-09-19 | 平安科技(深圳)有限公司 | Display method for application icon, and terminal device |
CN109542305A (en) * | 2018-11-23 | 2019-03-29 | Oppo广东移动通信有限公司 | Application control method and relevant apparatus |
WO2020108133A1 (en) * | 2018-11-30 | 2020-06-04 | 华为技术有限公司 | Biological recognition interaction method, graphical interaction interface, and related apparatus |
US11500534B2 (en) | 2018-11-30 | 2022-11-15 | Huawei Technologies Co., Ltd. | Biometric recognition interaction method, graphics interaction interface, and related apparatus |
CN112069478A (en) * | 2019-06-10 | 2020-12-11 | Oppo广东移动通信有限公司 | Application control method, electronic device, and non-volatile computer-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3314493B1 (en) | Method and apparatus for enabling the touchscreen display of a mobile device | |
CN102467462B (en) | Method for protecting data stored in device and corresponding device | |
CN104679387B (en) | A kind of method for protecting privacy and terminal | |
CN107317926A (en) | The method and device of hiden application | |
CN103376932B (en) | Anti-misoperation system and method | |
CN104049806B (en) | A kind of touch control terminal and its control method and system | |
CN103366107A (en) | Method, device and mobile phone for protecting access permission of application program | |
CN105159547B (en) | A kind of man-machine interaction method and user terminal | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN105678147B (en) | Touch operation method and device | |
CN105677337A (en) | Application control method and device and terminal | |
CN105224194B (en) | A kind of data processing method and terminal | |
US9996682B2 (en) | Detecting and preventing illicit use of device | |
CN107995973A (en) | A kind of information processing method and device | |
CN104933339A (en) | Unlocking control method and mobile terminal | |
CN105005724B (en) | A kind of solution screen locking method and communicating terminal based on password | |
CN104809402A (en) | Fuzzy display method for information and terminal | |
WO2018107396A1 (en) | Fingerprint recognition method and terminal device | |
CN105912896A (en) | Application switching method and terminal | |
CN107133500A (en) | The encryption method and mobile terminal of a kind of application program | |
CN110263515B (en) | Opening method of encrypted application and terminal equipment | |
CN104933340B (en) | The sending method and mobile terminal of a kind of message | |
CN107656639A (en) | A kind of method, storage medium and mobile terminal for preventing maloperation touch-screen | |
CN104809373A (en) | Terminal unlocking method | |
CN106385507A (en) | Prompting method of social application, prompting device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171103 |