Movatterモバイル変換


[0]ホーム

URL:


CN105760737A - Control method for applications and terminal - Google Patents

Control method for applications and terminal
Download PDF

Info

Publication number
CN105760737A
CN105760737ACN201610099891.XACN201610099891ACN105760737ACN 105760737 ACN105760737 ACN 105760737ACN 201610099891 ACN201610099891 ACN 201610099891ACN 105760737 ACN105760737 ACN 105760737A
Authority
CN
China
Prior art keywords
application program
icon
app
user
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610099891.XA
Other languages
Chinese (zh)
Inventor
刘立荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co LtdfiledCriticalShenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610099891.XApriorityCriticalpatent/CN105760737A/en
Publication of CN105760737ApublicationCriticalpatent/CN105760737A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The embodiment of the invention discloses a control method for applications.The control method includes the steps that a preset interface is displayed, wherein the preset interface comprises at least one hidden or disguised first application program icon; when authentication information input by a user is acquired, whether the authentication information is matched with preset authentication information or not is judged; if yes, hiding of the first applications is relieved, or disguising of the first applications is relieved.Correspondingly, the embodiment of the invention further discloses a terminal.By means of the embodiment, the hidden or disguised applications can be decrypted after authentication succeeds, and therefore leakage of private information is avoided.

Description

The control method of a kind of application program and terminal
Technical field
The present invention relates to security technology area, particularly relate to control method and the terminal of a kind of application program.
Background technology
Along with the development of electronic technology, the terminal such as smart mobile phone and panel computer etc. has become the requisite carry-on articles of user.Meanwhile, terminal also becomes the personal objects of user, APP (the Application that terminal is installed, application program) more or less record the personal information having user, for instance: contact person APP records people's information of being related, dialing APP record has message registration, note APP record to have short message, Web bank APP to record the information that has money on deposit and social activity class APP record has chat record etc..These records have the APP of personal information, if being leafed through to by other people, it will have a strong impact on the emotion of user, notably have influence on property safety and happy family life.
Summary of the invention
The embodiment of the present invention provides control method and the terminal of a kind of application program, it is possible to avoid personal information compromised.
The control method of a kind of application program that the embodiment of the present invention provides, including:
The interface that display is preset, described default interface includes at least one and hides or the icon of the first application program of camouflage;
When getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches;
If so, then release hiding described first application program, or release the camouflage to described first application program.
Accordingly, the embodiment of the present invention additionally provides a kind of terminal, including:
Interface display unit, for showing that default interface, described default interface include at least one and hide or the icon of the first application program of camouflage;
Identity authenticating unit, for when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches;
Application decryption unit, for if so, then releasing hiding described first application program, or releases the camouflage to described first application program.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes at least one and hides or the icon of the first application program of camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release hiding or camouflage the first application program, it is possible to achieve hiding or camouflage application program could be deciphered after authentication success, thus avoiding personal information compromised.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, below the accompanying drawing used required during embodiment is described is briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the premise not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of the control method of a kind of application program that the embodiment of the present invention provides;
Fig. 2 is the schematic flow sheet of the control method of the another kind of application program that the embodiment of the present invention provides;
Fig. 3 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 4 is a kind of structural representation applying decryption unit that the embodiment of the present invention provides;
Fig. 5 is the structural representation of the another kind of terminal that the embodiment of the present invention provides;
Fig. 6 is a kind of schematic diagram deciphering application program that the embodiment of the present invention provides;
Fig. 7 is the schematic diagram of the another kind deciphering application program that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is a part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under not making creative work premise, broadly fall into the scope of protection of the invention.
The decryption method of the application program that the embodiment of the present invention provides is implemented in terminal, described terminal includes the electronic equipments such as smart mobile phone, panel computer, digital audio & video players, electronic reader, handheld game machine or vehicle electronic device, and described terminal can run APP.
Fig. 1 is the control method of a kind of application program in the embodiment of the present invention.The flow process of the decryption method of the application program in the present embodiment may include that as shown in the figure
S101, the interface that display is preset, described default interface includes at least one and hides or the icon of the first application program of camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes at least one and hides or the icon of an APP of camouflage.
Wherein, a described hiding APP refers to, does not show the APP of its icon, it is possible to preset by user in security domain interface.Such as: assume to be provided with Web bank APP in a secure domain, if this Web bank APP is set to hidden state by user in advance, then security domain interface will not show the icon of this Web bank APP.It addition, an APP of described camouflage refers to, it is possible to as the APP of the camouflage of other APP, the icon of an APP and the corresponding relation of other APP need to be pre-build by user.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of display camera APP, contact person's APP puppet is loaded on the icon of camera APP.
Concrete, the mode at terminal demonstration security domain interface may is that when terminal is in locking screen interface and gets the security domain entry instruction of user's input, is switched to security domain interface from locking screen interface;Or, when terminal is in conventional domain interface and gets the security domain switching command of user's input, from conventional domain changing interface to security domain interface.
S102, when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and terminal is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set.Such as: user is beforehand through the fingerprint identification module typing finger print information of oneself of terminal, and terminal is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and terminal is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and terminal is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, can select to trigger by user the opportunity of the authentication information of terminal acquisition user input, for instance: after terminal is switched to security domain interface, user selects to carry out authentication, and now terminal obtains the authentication information that user inputs.Optional again, the opportunity of the authentication information that terminal obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
It is to be noted, an APP for camouflage, terminal judge the authentication information of input whether with default checking information matches before, or after judging that the authentication information of input is not mated with the checking information preset, when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
S103, if so, then releases hiding described first application program, or releases the camouflage to described first application program.
Concrete, terminal if it is determined that the authentication information inputted and the checking information matches preset, then releases hiding an APP, or releases the camouflage to an APP.Implement in process:
Terminal releases the operation hidden to an APP: show the icon of an APP in security domain interface.Such as: assume that the APP hidden is calendar APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 6 (A) before the success of checking finger print information, after checking finger print information success, security domain interface shows calendar APP, as shown in Fig. 6 (B).
Terminal releases the operation to the camouflage of an APP: when getting the click commands that user's icon for an APP inputs, the corresponding relation according to the icon of the APP pre-build and the 2nd APP, starts the 2nd APP.Such as: assume that an APP of camouflage is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, terminal, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).Further alternative, terminal if it is determined that input authentication information with preset checking information matches, then the icon of an APP of display in security domain interface is replaced by the icon of the 2nd APP, such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes at least one and hides or the icon of the first application program of camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release hiding or camouflage the first application program, it is possible to achieve hiding or camouflage application program could be deciphered after authentication success, thus avoiding personal information compromised.
Fig. 2 is the control method of another kind of application program in the embodiment of the present invention.The flow process of the decryption method of the application program in the present embodiment may include that as shown in the figure
S201, sets up the icon of the first application program and the corresponding relation of the second application program.
After it is pointed out that terminal sets up the icon of an APP and the corresponding relation of the 2nd APP, the 2nd APP pseudo-can be loaded on the icon of an APP.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of a display camera APP.
S202, the interface that display is preset, described default interface includes the icon of the first application program of at least one camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes the icon of an APP of at least one camouflage.
S203, when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and terminal is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set, if so, then perform step S205, if it is not, then perform step S204.Such as: user is beforehand through the fingerprint identification module typing finger print information of oneself of terminal, and terminal is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and terminal is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and terminal is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, can select to trigger by user the opportunity of the authentication information of terminal acquisition user input, for instance: after terminal is switched to security domain interface, user selects to carry out authentication, and now terminal obtains the authentication information that user inputs.Optional again, the opportunity of the authentication information that terminal obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
S204, when getting user for the click commands of the icon input of described first application program of camouflage, starts described first application program.
Concrete, terminal judges authentication information whether with default checking information matches before, and after judging that authentication information is not mated with the checking information preset, when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
S205, when getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, start described second application program.
Concrete, terminal if it is determined that the authentication information inputted and the checking information matches preset, then releases the camouflage to an APP.Implement in process, terminal when getting the click commands that user's icon for an APP inputs, the corresponding relation according to the icon of the APP pre-build and the 2nd APP, start the 2nd APP.Such as: assume that an APP of camouflage is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, terminal, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).Further alternative, terminal if it is determined that input authentication information with preset checking information matches, then the icon of an APP of display in security domain interface is replaced by the icon of the 2nd APP, such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes the icon of the first application program of at least one camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release the camouflage to the first application program, it is possible to achieve the application program of camouflage could be deciphered after authentication success, thus avoiding personal information compromised.
Fig. 3 is the structural representation of a kind of terminal in the embodiment of the present invention.Terminal in the embodiment of the present invention at least can include interface display unit 310, identity authenticating unit 320 and application decryption unit 330 as shown in the figure, wherein:
Interface display unit 310, for showing that default interface, described default interface include at least one and hide or the icon of the first application program of camouflage.
Optionally, in the embodiment of the present invention, the system of terminal is provided with multiple territories environment (referred to as " territory "), is not wherein mutually isolated between same area, the APP in same area is not respectively mounted and operates in different memory spaces, thus the user data that same area is not deposited is different.General, territory can be divided into conventional domain and security domain, and it is higher that the access rights of security domain compare conventional domain, therefore is usually used in depositing some relatively important user data, it is seen that the user data privacy that in security domain, APP records is higher, it is necessary to lays special stress on protecting.It should be noted that user oriented operation interface, territory is referred to as interface, territory, say, that the user oriented operation interface of security domain is called security domain interface, the user oriented operation interface of conventional domain is called conventional domain interface.In the embodiment of the present invention, described default interface can be above-mentioned security domain interface, and this security domain interface includes at least one and hides or the icon of an APP of camouflage.
Wherein, a described hiding APP refers to, does not show the APP of its icon, it is possible to preset by user in security domain interface.Such as: assume to be provided with Web bank APP in a secure domain, if this Web bank APP is set to hidden state by user in advance, then security domain interface will not show the icon of this Web bank APP.It addition, an APP of described camouflage refers to, it is possible to as the APP of the camouflage of other APP, the icon of an APP and the corresponding relation of the 2nd APP need to be pre-build by user.Such as: assume APP and the two APP is installed in a secure domain, wherein an APP is camera APP, 2nd APP is contact person APP, if user has pre-build the icon of camera APP and the corresponding relation of contact person APP, then security domain interface will not show the icon of contact person APP, the icon of display camera APP, contact person's APP puppet is loaded on the icon of camera APP.
Concrete, interface display unit 310 shows that the mode at security domain interface may is that when terminal is in locking screen interface and gets the security domain entry instruction of user's input, is switched to security domain interface from locking screen interface;Or, when terminal is in conventional domain interface and gets the security domain switching command of user's input, from conventional domain changing interface to security domain interface.
Identity authenticating unit 320, for when getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches.
Optionally, described authentication information can be the checking information of character password, graphical passwords and gesture password etc., and the embodiment of the present invention does not limit.Preferably, described authentication information is the checking information utilizing biological identification technology, such as finger print information, iris information and face information.Advantage is in that, finger print information, iris information and face information can as the unique identifier of people, and other disabled users cannot steal this kind of authentication information, improves safety and the protection to privacy.
Concrete, user is provided with checking information in terminal in advance, and identity authenticating unit 320 is when getting the authentication information of user's input, it is judged that this authentication information whether with the checking information matches pre-set.Such as: user is beforehand through oneself the finger print information of fingerprint identification module typing of terminal, identity authenticating unit 320 is when getting the finger print information inputted by fingerprint identification module, it is judged that whether the finger print information of this input is consistent with the finger print information of typing in advance;And for example: user is beforehand through the photographic head typing iris information of oneself of terminal, and identity authenticating unit 320 is when getting the iris information inputted by photographic head, it is judged that whether the iris information of this input consistent with the iris information of typing in advance;And for example: user is beforehand through the photographic head typing face information of oneself of terminal, and identity authenticating unit 320 is when getting the face information inputted by photographic head, it is judged that whether the face information of this input consistent with the face information of typing in advance.
Optionally, identity authenticating unit 320 obtains and can select to trigger by user the opportunity of the authentication information of user's input, such as: after terminal is switched to security domain interface, user selects to carry out authentication, and now identity authenticating unit 320 obtains the authentication information of user's input.Optional again, the opportunity of the authentication information that identity authenticating unit 320 obtains user's input can also be determined voluntarily by terminal, such as: after terminal is switched to security domain interface, identity authenticating unit 320 is once detect that fingerprint identification module is touched, obtain the finger print information inputted by fingerprint identification module immediately, and it can be used as the authentication information that user inputs.
Application decryption unit 330, for if so, then releasing hiding described first application program, or releases the camouflage to described first application program.In implementing, described application decryption unit 330 can farther include the first decryption unit 331 and the second decryption unit 332 as shown in Figure 4, wherein:
First decryption unit 331, for showing the icon of hiding described first application program in described default interface.
Such as: assume that the APP hidden is calendar APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 6 (A) before the success of checking finger print information, after checking finger print information success, security domain interface shows calendar APP, as shown in Fig. 6 (B).
Second decryption unit 332, is used for when getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, starts described second application program.
Such as: assume that the APP hidden is camera APP, 2nd APP is contact person APP, and authentication information is finger print information, then shown in the security domain interface such as Fig. 7 (A) before the success of checking finger print information, after checking finger print information success, second decryption unit 332, when getting the click commands that user's icon for camera APP inputs, starts contact person APP, as shown in Fig. 7 (B).
Optionally, described application decryption unit 330 can farther include icon as shown in Figure 4 and change unit 333, for if so, then the icon of described first application program of display in described default interface being replaced by the icon of described second application program.
Such as: after checking finger print information success, the icon of camera APP is replaced by the icon of contact person APP, to facilitate user to check.
Referring to Fig. 3, the terminal in the embodiment of the present invention can also include application start unit 340 as shown in the figure, for when getting user for the click commands of the icon input of described first application program of camouflage, starting described first application program.
Concrete, identity authenticating unit 320 judge authentication information whether with default checking information matches before, and after judging that authentication information is not mated with the checking information preset, application start unit 340 is when getting user for the click commands of the icon input of an APP of camouflage, an APP will be started, the 2nd APP will not be started.Visible, the user not passing through authentication cannot start the 2nd APP, and this improves safety and the protection to privacy.
Fig. 5 is the structural representation of the another kind of terminal in the embodiment of the present invention, as it is shown in figure 5, this terminal may include that at least one processor 501, for instance CPU, and at least one communication bus 502, at least one user interface 503, memorizer 504.Wherein, communication bus 502 is for realizing the connection communication between these assemblies;User interface 503 can include touching display screen, button and fingerprint identification module or photographic head, for interacting with user, and obtains the authentication information of user;Memorizer 504 can be high-speed RAM memorizer, it is also possible to be non-volatile memorizer (non-volatilememory), for instance at least one disk memory.Optionally, memorizer 504 can also is that at least one is located remotely from the storage device of aforementioned processor 501.Storing batch processing code in memorizer 504, processor 501, for calling the program code of storage in memorizer 504, performs following operation:
The interface that display is preset, described default interface includes at least one and hides or the icon of the first application program of camouflage;
When getting the authentication information of user's input, it is judged that described authentication information whether with default checking information matches;
If so, then release hiding described first application program, or release the camouflage to described first application program.
Optionally, processor 501 release to described first application program hide concrete operations be:
Described default interface shows the icon of hiding described first application program.
Optional again, processor 501 releases the concrete operations of the camouflage to described first application program and is:
When getting the click commands that user's icon for described first application program inputs, the corresponding relation according to the icon of described first application program pre-build and the second application program, start described second application program.
Further, processor 501 judge described authentication information whether with default checking information matches after, also perform:
If so, then the icon of described first application program of display in described default interface is replaced by the icon of described second application program.
Optionally, processor 501 judge described authentication information whether with default checking information matches before, and after judging that described authentication information is not mated with the checking information preset, also perform:
When getting user for the click commands of the icon input of described first application program of camouflage, start described first application program.
In the embodiment of the present invention, terminal first shows default interface, described default interface includes at least one and hides or the icon of the first application program of camouflage, then the authentication information of user's input is obtained, then when judging this authentication information and the checking information matches preset, release hiding or camouflage the first application program, it is possible to achieve hiding or camouflage application program could be deciphered after authentication success, thus avoiding personal information compromised.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, can be by the hardware that computer program carrys out instruction relevant to complete, described program can be stored in a computer read/write memory medium, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-OnlyMemory, ROM) or random store-memory body (RandomAccessMemory, RAM) etc..
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device, it is possible to merge according to actual needs, divide and delete.
Unit described in the embodiment of the present invention, universal integrated circuit can be passed through, for instance CPU (CentralProcessingUnit, central processing unit), or realized by ASIC (ApplicationSpecificIntegratedCircuit, special IC).
Additionally, term " first ", " second " are only for descriptive purposes, and it is not intended that indicate or imply relative importance or the implicit quantity indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or implicitly include at least one this feature.In describing the invention, " multiple " are meant that at least two, for instance two, three etc., unless otherwise expressly limited specifically.
Above disclosed it is only present pre-ferred embodiments, certainly can not limit the interest field of the present invention, the equivalent variations therefore made according to the claims in the present invention with this, still belong to the scope that the present invention contains.

Claims (10)

CN201610099891.XA2016-02-232016-02-23Control method for applications and terminalPendingCN105760737A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201610099891.XACN105760737A (en)2016-02-232016-02-23Control method for applications and terminal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201610099891.XACN105760737A (en)2016-02-232016-02-23Control method for applications and terminal

Publications (1)

Publication NumberPublication Date
CN105760737Atrue CN105760737A (en)2016-07-13

Family

ID=56329748

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201610099891.XAPendingCN105760737A (en)2016-02-232016-02-23Control method for applications and terminal

Country Status (1)

CountryLink
CN (1)CN105760737A (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106250745A (en)*2016-07-292016-12-21东莞酷派软件技术有限公司 Function activation method, function activation device and terminal
CN106503506A (en)*2016-10-312017-03-15维沃移动通信有限公司A kind of method for information display and electronic equipment
CN106547590A (en)*2016-10-272017-03-29北京奇虎科技有限公司The startup method of privacy application program and starter
CN107066864A (en)*2017-03-312017-08-18宇龙计算机通信科技(深圳)有限公司A kind of application icon display methods and its equipment
CN107463809A (en)*2017-07-212017-12-12北京小米移动软件有限公司The display methods and device of application icon
WO2018032344A1 (en)*2016-08-162018-02-22陈银芳Time-based method and system for dynamically adjusting hidden app
WO2018049816A1 (en)*2016-09-142018-03-22中兴通讯股份有限公司Component processing method and device, and storage medium
CN108334755A (en)*2018-03-302018-07-27广东欧珀移动通信有限公司 Method and device for creating private space, storage medium, electronic device
CN108563932A (en)*2018-04-102018-09-21Oppo广东移动通信有限公司Application control method and device, readable storage medium and terminal
CN108572775A (en)*2018-04-102018-09-25Oppo广东移动通信有限公司Application operation method and device, storage medium and electronic equipment
CN108762463A (en)*2018-04-282018-11-06上海爱优威软件开发有限公司A kind of application management method and terminal based on electricity
CN109376545A (en)*2018-09-172019-02-22麒麟合盛网络技术股份有限公司Method for secret protection and device
CN111209576A (en)*2019-12-302020-05-29秒针信息技术有限公司Voice data protection method, device and system
CN113238691A (en)*2021-05-272021-08-10维沃移动通信(杭州)有限公司Application icon management method and device and electronic equipment
CN114721762A (en)*2022-04-192022-07-08杭州安司源科技有限公司Control method of application program
US11409334B2 (en)2018-06-202022-08-09Huawei Technologies Co., Ltd.Device with opening and closing performance
US11468154B2 (en)2018-06-012022-10-11Huawei Technologies Co., Ltd.Information content viewing method and terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103616986A (en)*2013-11-302014-03-05广东欧珀移动通信有限公司Method and system for displaying and hiding application icons and mobile terminal
CN103617382A (en)*2013-11-222014-03-05北京奇虎科技有限公司Privacy protection method and device
CN104915588A (en)*2015-06-112015-09-16深圳市湘海电子有限公司Privacy protection method and device for electronic equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN103617382A (en)*2013-11-222014-03-05北京奇虎科技有限公司Privacy protection method and device
CN103616986A (en)*2013-11-302014-03-05广东欧珀移动通信有限公司Method and system for displaying and hiding application icons and mobile terminal
CN104915588A (en)*2015-06-112015-09-16深圳市湘海电子有限公司Privacy protection method and device for electronic equipment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106250745A (en)*2016-07-292016-12-21东莞酷派软件技术有限公司 Function activation method, function activation device and terminal
WO2018032344A1 (en)*2016-08-162018-02-22陈银芳Time-based method and system for dynamically adjusting hidden app
WO2018049816A1 (en)*2016-09-142018-03-22中兴通讯股份有限公司Component processing method and device, and storage medium
CN106547590A (en)*2016-10-272017-03-29北京奇虎科技有限公司The startup method of privacy application program and starter
CN106503506B (en)*2016-10-312019-08-20维沃移动通信有限公司 Information display method and electronic device
CN106503506A (en)*2016-10-312017-03-15维沃移动通信有限公司A kind of method for information display and electronic equipment
CN107066864A (en)*2017-03-312017-08-18宇龙计算机通信科技(深圳)有限公司A kind of application icon display methods and its equipment
CN107463809A (en)*2017-07-212017-12-12北京小米移动软件有限公司The display methods and device of application icon
CN107463809B (en)*2017-07-212020-09-11北京小米移动软件有限公司 Application icon display method and device
CN108334755A (en)*2018-03-302018-07-27广东欧珀移动通信有限公司 Method and device for creating private space, storage medium, electronic device
CN108563932A (en)*2018-04-102018-09-21Oppo广东移动通信有限公司Application control method and device, readable storage medium and terminal
CN108572775A (en)*2018-04-102018-09-25Oppo广东移动通信有限公司Application operation method and device, storage medium and electronic equipment
CN108762463A (en)*2018-04-282018-11-06上海爱优威软件开发有限公司A kind of application management method and terminal based on electricity
US11468154B2 (en)2018-06-012022-10-11Huawei Technologies Co., Ltd.Information content viewing method and terminal
US11934505B2 (en)2018-06-012024-03-19Huawei Technologies Co., Ltd.Information content viewing method and terminal
US11409334B2 (en)2018-06-202022-08-09Huawei Technologies Co., Ltd.Device with opening and closing performance
CN109376545A (en)*2018-09-172019-02-22麒麟合盛网络技术股份有限公司Method for secret protection and device
CN111209576A (en)*2019-12-302020-05-29秒针信息技术有限公司Voice data protection method, device and system
CN113238691A (en)*2021-05-272021-08-10维沃移动通信(杭州)有限公司Application icon management method and device and electronic equipment
CN113238691B (en)*2021-05-272024-03-01维沃移动通信(杭州)有限公司Application icon management method and device and electronic equipment
CN114721762A (en)*2022-04-192022-07-08杭州安司源科技有限公司Control method of application program

Similar Documents

PublicationPublication DateTitle
CN105760737A (en)Control method for applications and terminal
US10540657B2 (en)Secure passcode entry user interface
US11394555B2 (en)Mobile terminal privacy protection method and protection apparatus, and mobile terminal
US9558491B2 (en)Scrambling passcode entry interface
CN105519038B (en)User input data protection method and system
US20140201831A1 (en)Method and apparatus for authenticating password of user terminal
CN105701420B (en)A kind of management method and terminal of user data
CN106355141B (en)Portable electronic device and operation method thereof
US9773240B1 (en)Fake sensor input for passcode entry security
CN105678147B (en)Touch operation method and device
CN106503507A (en)Method and mobile terminal that a kind of password shows
CN105809000A (en)Information processing method and electronic device
CN105005436A (en)Program processing method and mobile terminal
WO2016165537A1 (en)Method for controlling intelligent terminal and apparatus for controlling intelligent terminal
WO2015184894A2 (en)Method and device for implementing multi-user login mode
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
CN102592099A (en)Security identification method and electronic device thereof
JP2011192154A (en)Usb storage device
CN109800548B (en)Method and device for preventing personal information from being leaked
KR20130117371A (en)Method to unlock screen and perform secret task by finger tapping for touch screen devices
CN111279339A (en)Application locking method, terminal equipment and computer readable medium
US10691833B2 (en)Method and an apparatus for activating a predetermined function
CN111090868A (en) Terminal screen display control method, terminal and computer-readable storage medium
KR102751887B1 (en)Wearable apparatus for displaying content and method thereof
KR102238398B1 (en)Continuation certification method using multi biometric recognition access control units of user certification

Legal Events

DateCodeTitleDescription
C06Publication
PB01Publication
C10Entry into substantive examination
SE01Entry into force of request for substantive examination
WD01Invention patent application deemed withdrawn after publication
WD01Invention patent application deemed withdrawn after publication

Application publication date:20160713


[8]ページ先頭

©2009-2025 Movatter.jp