WO2016188152A1 - Application processing method and apparatus - Google Patents
Application processing method and apparatus Download PDFInfo
- Publication number
- WO2016188152A1 WO2016188152A1 PCT/CN2016/073863 CN2016073863W WO2016188152A1 WO 2016188152 A1 WO2016188152 A1 WO 2016188152A1 CN 2016073863 W CN2016073863 W CN 2016073863W WO 2016188152 A1 WO2016188152 A1 WO 2016188152A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- hidden
- information
- time information
- location information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Definitions
- This document relates to the field of processing technology of applications, and in particular, to a processing method and apparatus for an application.
- the main object of the present invention is to provide a processing method and apparatus for an application, which aims to solve the technical problem that the application is neglected or hidden.
- An application processing method includes the following steps:
- the application icon and the application data of the application corresponding to the location information and/or the time information in the hidden policy are hidden.
- the step of hiding the application icon and the application data of the application corresponding to the location information and/or the time information in the hidden policy includes:
- the application corresponding to the application icon is filtered on the read interface of the application, and the application data is filtered on the file reading interface to hide the application icon and the application data.
- the method further includes:
- the method further includes:
- the hidden policy includes at least one of the following information:
- Spatio-temporal information composed of the time information and the location information and an application corresponding to the spatio-temporal information that needs to be hidden.
- An application processing device includes a first acquisition module, a second acquisition module, and a hidden module, wherein:
- the first obtaining module is configured to: acquire a hidden policy of an application pre-configured by the terminal;
- the second acquiring module is configured to: acquire current location information and/or time information of the terminal;
- the hiding module is configured to: hide an application icon and application data of the application corresponding to the location information and/or time information in the hidden policy.
- the hiding module includes an acquiring unit and a hiding unit, where:
- the obtaining unit is configured to: acquire the location information and/or the time letter in the hidden policy Application icons and application data corresponding to the information;
- the hiding unit is configured to: filter the application corresponding to the application icon on the read interface of the application, and filter the application data on the file reading interface to hide the application icon and the application data.
- the device further includes a display module and an unhide module, wherein:
- the display module is configured to display an interface for the user to input the unhidden information after the currently displayed application icon and the application data are hidden;
- the un-hiding module is configured to: receive the input un-hidden information, and redisplay the hidden application icon and the application data according to the input information.
- the apparatus further includes a configuration module, wherein:
- the configuration module is configured to: acquire historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, And the operation data of the corresponding application configures the hidden policy.
- the hidden policy includes at least one of the following information:
- Spatio-temporal information composed of the time information and the location information and an application corresponding to the spatio-temporal information that needs to be hidden.
- a computer program comprising program instructions which, when executed by a computer, cause the computer to perform the processing of any of the above applications.
- the terminal pre-configures the hidden policy, and then acquires the current location information and/or time information of the terminal, and the spatio-temporal scene formed based on the location information and/or the time information will hide the corresponding application in the policy.
- Icon and application data are hidden, that is, In the space-time scenario, the important application or the unused application of the user is hidden, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user's operation.
- FIG. 1 is a schematic flow chart of a first embodiment of a processing method applied to the present invention
- FIG. 2 is a schematic diagram of a refinement process of step S103 in FIG. 1;
- FIG. 3 is a schematic flowchart of a second embodiment of a processing method applied to the present invention.
- FIG. 4 is a schematic flow chart of a third embodiment of a processing method applied to the present invention.
- FIG. 5 is a schematic diagram of functional modules of a first embodiment of a processing apparatus applied to the present invention.
- FIG. 6 is a schematic diagram of a refinement function module of the hidden module in FIG. 5;
- FIG. 7 is a schematic diagram of functional modules of a second embodiment of a processing apparatus applied to the present invention.
- FIG. 8 is a schematic diagram of functional modules of a third embodiment of a processing apparatus applied to the present invention.
- a processing method of the application includes:
- Step S101 Obtain a hidden policy of an application that is preset by the terminal.
- Step S102 Acquire current location information and/or time information of the terminal.
- the terminal may be a smart terminal such as a mobile phone or a tablet computer.
- the hidden policy of the application is pre-configured on the terminal, and the hidden policy includes time information, an application that needs to be hidden corresponding to the time information, location information, and an application that needs to be hidden corresponding to the location information, and time information and location information. Spatio-temporal information and the corresponding need to be hidden corresponding to the spatio-temporal information
- the hidden policy includes spatio-temporal information and an application corresponding to the spatio-temporal information that needs to be hidden.
- the hidden policy of the application may be configured by the terminal, and the terminal may collect the historical space-time information of the user and the unused application corresponding to the historical space-time information, and configure the unused applications as the corresponding requirements of the space-time information.
- the hidden application can be configured; in addition, it can also be configured by the user autonomously, and which time points and/or locations correspond to the applications that need to be hidden.
- the location information is determined by combining the basic functions of the terminal such as the map and the positional positioning to calibrate the position reference point
- the position range is determined by the effective radius on the basis of the reference point
- the position range may be the area within the effective radius, or may be An area outside the radius may also be a union or intersection of multiple areas.
- the network hotspot is mainly to set the credibility of the common WIFI network.
- the location range and network hotspots can be used together for location security judgments, or they can be used independently to determine security locations.
- time and location are a whole of time and space, and are generally considered together. The shift time must be the same as the location of the work (may be one or more).
- the three parameters of the location information, the WIFI hotspot, and the time period information may take only some parameters, or may be used in combination with three parameters, and may even select other types of parameters such as azimuth.
- Users can also set some strategies for their own security and convenience. For example, the scope of activities at home restricts access to office applications, which can prevent home users or elderly people from using terminals to affect important data.
- Step S103 hiding an application icon and application data corresponding to the location information and/or time information in the hidden policy.
- the application data is some data stored in an application corresponding to the application icon, for example, in the short message application, the application data is the short message data received or sent by the application, and in the camera application, the captured photo is the corresponding application. data. If the application corresponding to the current application icon is already running, but the related application data is not displayed, the application data does not need to be hidden, and the application icon is directly hidden.
- the location when the user carries the terminal, the location changes, and the time is also changed.
- the current time information is obtained, and the application corresponding to the time information in the hidden policy is obtained, and the application is in the terminal.
- the application icon and the application data displayed on the interface are hidden; or the current location information is obtained, the application corresponding to the location information in the hidden policy is obtained, and the application icon and the application data displayed on the terminal interface are hidden by the application; or Get current time
- the empty information is used to obtain an application corresponding to the time and space information in the hidden policy, and the application icon and the application data displayed on the terminal interface are hidden.
- the terminal after the application icon and the application data of the application are hidden, the user cannot directly use the hidden applications.
- the terminal is in the office area or the laboratory area, applications such as taking photos and recordings are hidden; in the evening rest period, the terminal hides all applications that interfere with the rest.
- the application used by the user has a certain rule, and according to the law, the visibility of the application and its data is restricted, and the important application of the user is at the location and/or The application that is not used under the time is hidden, which can avoid the user's manual operation to hide or limit, and reduce the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
- the terminal pre-configures the hidden policy, and then obtains the current location information and/or time information of the terminal, and the time-space scene formed based on the location information and/or the time information will hide the corresponding application icon and application in the policy.
- the data is hidden, that is, the important application or the unused application is hidden in the space-time scene, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user's operation.
- the foregoing step S103 includes:
- Step S1031 Obtain an application icon and application data corresponding to the location information and/or time information in the hidden policy.
- step S1032 the application corresponding to the application icon is filtered on the read interface of the application, and the application data is filtered on the file reading interface to hide the application icon and the application data.
- the application icon and the application data are obtained.
- the application is filtered on the application's read interface, and the application data is filtered on the file read interface.
- the application icon and the application data are not displayed on the upper layer interface of the terminal, thereby hiding the application icon and the application data. purpose.
- the method further includes:
- Step S104 after the currently displayed application icon and the application data are hidden, displaying an interface for the user to input the unhidden information;
- Step S105 receiving the input unhidden information, and redisplaying the hidden application icon and the application data according to the input information.
- the application icon and the application data of the application are displayed on the terminal interface, but if the current space-time scene happens to change, the application will be Hidden, that is, for the application and application data that the current user is using, if the visibility of the application and the application data changes due to changes in location and/or time, the terminal directly suspends the user to the application and application. Use the data to hide it. After the application is hidden, the terminal can jump out of the interface for the user to input the unhidden information, for example, the user inputs the unhidden password information. When the user enters the password in the interface, the hidden application is redisplayed. This way, to increase the flexibility of application hiding, further facilitate the user's operation.
- the password information is configured in a hidden policy, and the password information that needs to be hidden (ie, unhidden) is configured to be hidden when the space-time information and the application corresponding to the space-time information need to be hidden are configured.
- the password information may be character information, a fingerprint information of the user, or the like.
- the method further includes:
- Step S100 Acquire historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, and operation data of the application. Configure a hidden policy.
- the hidden policy of the application may be configured by the terminal, and the terminal collects historical time and space information of the user and operation data of the application corresponding to the historical space-time information, and operations from the applications.
- the data can be obtained in which time and space scenarios the user uses and which applications are not used or used less, and the unused or less used applications are configured as applications corresponding to the spatiotemporal scene that need to be hidden.
- the embodiment provides an embodiment for the user to modify the configured hidden policy, so as to improve the flexibility of the hidden policy configuration and further facilitate the operation of the user.
- the embodiment of the present invention further provides an application processing device.
- the processing device of the application includes:
- the first obtaining module 101 is configured to: acquire a hidden policy of the application pre-configured by the terminal;
- the second obtaining module 102 is configured to: acquire current location information and/or time information of the terminal;
- the terminal may be a smart terminal such as a mobile phone or a tablet computer.
- the hidden policy of the application is pre-configured on the terminal, and the hidden policy includes time information, an application that needs to be hidden corresponding to the time information, location information, and an application that needs to be hidden corresponding to the location information, and time information and location information. At least one of the spatio-temporal information and the application that needs to be hidden corresponding to the spatio-temporal information.
- the hidden policy includes spatio-temporal information and an application corresponding to the spatio-temporal information that needs to be hidden.
- the hidden policy of the application may be configured by the terminal, and the terminal may collect the historical space-time information of the user and the unused application corresponding to the historical space-time information, and configure the unused applications as the corresponding requirements of the space-time information.
- the hidden application can be configured; in addition, it can also be configured by the user autonomously, and which time points and/or locations correspond to the applications that need to be hidden.
- the location information is determined by combining the basic functions of the terminal such as the map and the positional positioning to calibrate the position reference point
- the position range is determined by the effective radius on the basis of the reference point
- the position range may be the area within the effective radius, or may be An area outside the radius may also be a union or intersection of multiple areas.
- the network hotspot is mainly to set the credibility of the common WIFI network.
- the location range and network hotspots can be used together for location security judgments, or they can be used independently to determine security locations.
- time and location are a whole of time and space, and are generally considered together. The shift time must be the same as the location of the work (may be one or more).
- the three parameters can take only some parameters, or three parameters can be used in combination, and even other types of parameters such as orientation can be selected. Users can also set some strategies for their own security and convenience. For example, the scope of activities at home restricts access to office applications, which can prevent home users or elderly people from using terminals to affect important data.
- the hiding module 103 is configured to hide the application icon and the application data of the application corresponding to the location information and/or the time information in the hidden policy.
- the application data is some data stored in an application corresponding to the application icon, for example, in the short message application, the application data is the short message data received or sent by the application, and in the camera application, the captured photo is the corresponding application. data. If the application corresponding to the current application icon is already running, but the related application data is not displayed, the application data does not need to be hidden, and the application icon is directly hidden.
- the location when the user carries the terminal, the location changes, and the time is also changed.
- the current time information is obtained, and the application corresponding to the time information in the hidden policy is obtained, and the application is in the terminal.
- the application icon and the application data displayed on the interface are hidden; or the current location information is obtained, the application corresponding to the location information in the hidden policy is obtained, and the application icon and the application data displayed on the terminal interface are hidden by the application; or
- Obtain the current space-time information obtain an application corresponding to the space-time information in the hidden policy, and hide the application icon and the application data displayed by the application on the terminal interface.
- the terminal after the application icon and the application data of the application are hidden, the user cannot directly use the hidden applications.
- the terminal is in the office area or the laboratory area, applications such as taking photos and recordings are hidden; in the evening rest period, the terminal hides all applications that interfere with the rest.
- the application used by the user has a certain rule, and according to the law, the visibility of the application and its data is restricted, and the important application of the user is at the location and/or The application that is not used under the time is hidden, which can avoid the user's manual operation to hide or limit, and reduce the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
- the terminal pre-configures the hidden policy, and then obtains the current location information and/or time information of the terminal, and the time-space scene formed based on the location information and/or the time information will hide the corresponding application icon and application in the policy.
- the data is hidden, that is, the important application or the unused application is hidden in the space-time scene, and the user is manually hidden or restricted.
- the operation reduces the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
- the hiding module 103 includes:
- the obtaining unit 1031 is configured to: acquire an application icon and application data corresponding to the location information and/or time information in the hidden policy;
- the hiding unit 1032 is configured to: filter the application corresponding to the application icon on the read interface of the application, and filter the application data on the file reading interface to hide the application icon and the application data.
- the application icon and the application data are obtained.
- the application is filtered on the application's read interface, and the application data is filtered on the file read interface.
- the application icon and the application data are not displayed on the upper layer interface of the terminal, thereby hiding the application icon and the application data. purpose.
- the other applications are non-restricted attributes, and therefore, the application and application data of the unrestricted attributes are displayed on the interface of the terminal, so that the user is
- the commonly used applications and application data are displayed in the current space-time scene, which is convenient for the user's operation.
- the processing device of the application further includes:
- the display module 104 is configured to: display an interface for the user to input the unhidden information after the currently displayed application icon and the application data are hidden;
- the un-hiding module 105 is configured to: receive the input un-hidden information, and redisplay the hidden application icon and the application data according to the input information.
- the application icon and the application data of the application are displayed on the terminal interface, but if the current space-time scene happens to change, the application will be Hidden, that is, for the application and application data that the current user is using, if the application and application data are changed due to factors such as location and/or time.
- the visibility changes and the terminal directly suspends the user's use of the application and application data to hide it.
- the terminal can jump out of the interface for the user to input the unhidden information, for example, the user inputs the unhidden password information.
- the hidden application is redisplayed. This way, to increase the flexibility of application hiding, further facilitate the user's operation.
- the password information is configured in a hidden policy, and the password information that needs to be hidden (ie, unhidden) is configured to be hidden when the space-time information and the application corresponding to the space-time information need to be hidden are configured.
- the password information may be character information, a fingerprint information of the user, or the like.
- the processing device of the application further includes:
- the configuration module 100 is configured to: obtain historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, The application's operational data configuration hides the policy.
- the hidden policy of the application may be configured by the terminal, and the terminal collects the historical space-time information of the user and the operation data of the application corresponding to the historical space-time information, and the time-space scenarios of the user can be obtained from the operation data of the application. Use which applications are used and which applications are not used or used less, and configure unused or less used applications as applications that need to be hidden corresponding to the spatiotemporal scene.
- the embodiment provides an embodiment for the user to modify the configured hidden policy, so as to improve the flexibility of the hidden policy configuration and further facilitate the operation of the user.
- the embodiment of the invention also discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the processing method of any of the above applications.
- the embodiment of the invention also discloses a carrier carrying the computer program.
- all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
- the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
- each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
- the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
- the terminal pre-configures the hidden policy, and then acquires the current location information and/or time information of the terminal, and the spatio-temporal scene formed based on the location information and/or the time information will hide the corresponding application in the policy.
- the icon and the application data are hidden, that is, the important application or the unused application is hidden in the space-time scene, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user. operating. Therefore, the present invention has strong industrial applicability.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Automation & Control Theory (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
本文涉及应用的处理技术领域,尤其涉及一种应用的处理方法及装置。This document relates to the field of processing technology of applications, and in particular, to a processing method and apparatus for an application.
随着终端技术的发展,终端界面上的应用越来越多,功能也越来越丰富,例如包括办公应用、理财应用、通信应用及其他游戏娱乐应用等等。当用户不希望某些重要的应用被他人使用,可以对这些应用进行隐藏,避免被他人看到或使用;或者当界面中的应用较多时,用户对界面中的应用进行整理,将其中的一部分删除或者移动到某一文件夹中,无论是隐藏还是整理操作,都需要用户手动操作,进行选择然后将其隐藏或整理,操作较麻烦。With the development of terminal technologies, more and more applications are on the terminal interface, and functions are becoming more and more abundant, such as office applications, financial applications, communication applications, and other game entertainment applications. When the user does not want some important applications to be used by others, they can be hidden from being seen or used by others; or when there are many applications in the interface, the user will organize the applications in the interface and part of them. Delete or move to a folder, whether it is hidden or organized, requires the user to manually operate, select and then hide or organize it, the operation is more troublesome.
上述内容仅用于辅助理解本发明的技术方案,并不代表承认上述内容是现有技术。The above content is only used to assist in understanding the technical solutions of the present invention, and does not constitute an admission that the above is prior art.
发明内容Summary of the invention
本发明的主要目的在于提供一种应用的处理方法及装置,旨在解决应用的整理或者隐藏操作麻烦的技术问题。The main object of the present invention is to provide a processing method and apparatus for an application, which aims to solve the technical problem that the application is neglected or hidden.
为实现上述目的,采用如下技术方案:In order to achieve the above objectives, the following technical solutions are adopted:
一种应用的处理方法,包括以下步骤:An application processing method includes the following steps:
获取终端预先配置的应用的隐藏策略;Obtaining a hidden policy of the application pre-configured by the terminal;
获取所述终端当前的位置信息和/或时间信息;Obtaining current location information and/or time information of the terminal;
将所述隐藏策略中与所述位置信息和/或时间信息对应的应用的应用图标及应用数据进行隐藏。The application icon and the application data of the application corresponding to the location information and/or the time information in the hidden policy are hidden.
可选地,所述将所述隐藏策略中与所述位置信息和/或时间信息对应的应用的应用图标及应用数据进行隐藏的步骤包括:Optionally, the step of hiding the application icon and the application data of the application corresponding to the location information and/or the time information in the hidden policy includes:
获取所述隐藏策略中与所述位置信息和/或时间信息对应的应用图标及 应用数据;Obtaining an application icon corresponding to the location information and/or time information in the hidden policy and Application data
在应用的读取接口将所述应用图标对应的应用进行过滤,及在文件读取接口将所述应用数据进行过滤,对所述应用图标及应用数据进行隐藏。The application corresponding to the application icon is filtered on the read interface of the application, and the application data is filtered on the file reading interface to hide the application icon and the application data.
可选地,该方法还包括:Optionally, the method further includes:
当当前所显示的应用图标及应用数据隐藏后,显示供用户输入取消隐藏的信息的界面;After the currently displayed application icon and the application data are hidden, an interface for the user to input the unhidden information is displayed;
接收输入的取消隐藏的信息,根据所输入的信息将所隐藏的应用图标及应用数据重新显示。Receiving the input unhidden information, and redisplaying the hidden application icon and application data according to the input information.
可选地,该方法还包括:Optionally, the method further includes:
获取终端的历史位置信息和/或时间信息,以及与所述历史位置信息和/或时间信息对应的应用的操作数据,根据所述历史位置信息和/或时间信息、及对应的应用的操作数据配置所述隐藏策略。Acquiring historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, and operation data of the corresponding application Configure the hidden policy.
可选地,所述隐藏策略包括以下信息中的至少一个:Optionally, the hidden policy includes at least one of the following information:
时间信息及与时间信息对应的需要进行隐藏的应用;Time information and applications corresponding to time information that need to be hidden;
位置信息及与位置信息对应的需要进行隐藏的应用;Location information and applications corresponding to location information that need to be hidden;
由所述时间信息和位置信息组成的时空信息及与该时空信息对应的需要进行隐藏的应用。Spatio-temporal information composed of the time information and the location information and an application corresponding to the spatio-temporal information that needs to be hidden.
一种应用的处理装置,包括第一获取模块、第二获取模块和隐藏模块,其中:An application processing device includes a first acquisition module, a second acquisition module, and a hidden module, wherein:
所述第一获取模块设置成:获取终端预先配置的应用的隐藏策略;The first obtaining module is configured to: acquire a hidden policy of an application pre-configured by the terminal;
所述第二获取模块设置成:获取所述终端当前的位置信息和/或时间信息;The second acquiring module is configured to: acquire current location information and/or time information of the terminal;
所述隐藏模块设置成:将所述隐藏策略中与所述位置信息和/或时间信息对应的应用的应用图标及应用数据进行隐藏。The hiding module is configured to: hide an application icon and application data of the application corresponding to the location information and/or time information in the hidden policy.
可选地,所述隐藏模块包括获取单元和隐藏单元,其中:Optionally, the hiding module includes an acquiring unit and a hiding unit, where:
所述获取单元设置成:获取所述隐藏策略中与所述位置信息和/或时间信 息对应的应用图标及应用数据;The obtaining unit is configured to: acquire the location information and/or the time letter in the hidden policy Application icons and application data corresponding to the information;
所述隐藏单元设置成:在应用的读取接口将所述应用图标对应的应用进行过滤,及在文件读取接口将所述应用数据进行过滤,对所述应用图标及应用数据进行隐藏。The hiding unit is configured to: filter the application corresponding to the application icon on the read interface of the application, and filter the application data on the file reading interface to hide the application icon and the application data.
可选地,该装置还包括显示模块和取消隐藏模块,其中:Optionally, the device further includes a display module and an unhide module, wherein:
所述显示模块设置成:当当前所显示的应用图标及应用数据隐藏后,显示供用户输入取消隐藏的信息的界面;The display module is configured to display an interface for the user to input the unhidden information after the currently displayed application icon and the application data are hidden;
所述取消隐藏模块设置成:接收输入的取消隐藏的信息,根据所输入的信息将所隐藏的应用图标及应用数据重新显示。The un-hiding module is configured to: receive the input un-hidden information, and redisplay the hidden application icon and the application data according to the input information.
可选地,该装置还包括配置模块,其中:Optionally, the apparatus further includes a configuration module, wherein:
所述配置模块设置成:获取终端的历史位置信息和/或时间信息,以及与所述历史位置信息和/或时间信息对应的应用的操作数据,根据所述历史位置信息和/或时间信息、及对应的应用的操作数据配置所述隐藏策略。The configuration module is configured to: acquire historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, And the operation data of the corresponding application configures the hidden policy.
可选地,所述隐藏策略包括以下信息中的至少一个:Optionally, the hidden policy includes at least one of the following information:
时间信息及与时间信息对应的需要进行隐藏的应用;Time information and applications corresponding to time information that need to be hidden;
位置信息及与位置信息对应的需要进行隐藏的应用;Location information and applications corresponding to location information that need to be hidden;
由所述时间信息和位置信息组成的时空信息及与该时空信息对应的需要进行隐藏的应用。Spatio-temporal information composed of the time information and the location information and an application corresponding to the spatio-temporal information that needs to be hidden.
一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行上述任意的应用的处理方法。A computer program comprising program instructions which, when executed by a computer, cause the computer to perform the processing of any of the above applications.
一种载有上述任意的计算机程序的载体。A carrier carrying any of the above computer programs.
本发明技术方案的应用的处理方法及装置,终端预先配置隐藏策略,然后获取终端当前的位置信息和/或时间信息,基于位置信息和/或时间信息形成的时空场景将隐藏策略中对应的应用图标及应用数据进行隐藏,也就是在该 时空场景下将用户重要的应用或者不使用的应用进行隐藏,免去用户手动进行隐藏或限制的操作,减少用户大量无谓的选择和查找,方便用户的操作。The processing method and device of the application of the technical solution of the present invention, the terminal pre-configures the hidden policy, and then acquires the current location information and/or time information of the terminal, and the spatio-temporal scene formed based on the location information and/or the time information will hide the corresponding application in the policy. Icon and application data are hidden, that is, In the space-time scenario, the important application or the unused application of the user is hidden, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user's operation.
附图概述BRIEF abstract
图1为本发明应用的处理方法第一实施例的流程示意图;1 is a schematic flow chart of a first embodiment of a processing method applied to the present invention;
图2为图1中步骤S103的细化流程示意图;2 is a schematic diagram of a refinement process of step S103 in FIG. 1;
图3为本发明应用的处理方法第二实施例的流程示意图;3 is a schematic flowchart of a second embodiment of a processing method applied to the present invention;
图4为本发明应用的处理方法第三实施例的流程示意图;4 is a schematic flow chart of a third embodiment of a processing method applied to the present invention;
图5为本发明应用的处理装置第一实施例的功能模块示意图;FIG. 5 is a schematic diagram of functional modules of a first embodiment of a processing apparatus applied to the present invention; FIG.
图6为图5中隐藏模块的细化功能模块示意图;6 is a schematic diagram of a refinement function module of the hidden module in FIG. 5;
图7为本发明应用的处理装置第二实施例的功能模块示意图;7 is a schematic diagram of functional modules of a second embodiment of a processing apparatus applied to the present invention;
图8为本发明应用的处理装置第三实施例的功能模块示意图。FIG. 8 is a schematic diagram of functional modules of a third embodiment of a processing apparatus applied to the present invention.
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The implementation, functional features, and advantages of the present invention will be further described in conjunction with the embodiments.
本发明的较佳实施方式Preferred embodiment of the invention
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。The following is an overview of the topics detailed in this document. This Summary is not intended to limit the scope of the claims.
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
本发明实施例提供一种应用的处理方法,参照图1,在一实施例中,该应用的处理方法包括:An embodiment of the present invention provides a processing method of an application. Referring to FIG. 1, in an embodiment, a processing method of the application includes:
步骤S101,获取终端预先配置的应用的隐藏策略;Step S101: Obtain a hidden policy of an application that is preset by the terminal.
步骤S102,获取所述终端当前的位置信息和/或时间信息;Step S102: Acquire current location information and/or time information of the terminal.
本实施例中,终端可以是手机或者平板电脑等智能终端。终端上预先配置应用的隐藏策略,该隐藏策略中包括时间信息及与时间信息对应的需要进行隐藏的应用、位置信息及与位置信息对应的需要进行隐藏的应用,以及时间信息和位置信息组成的时空信息及与该时空信息对应的需要进行隐藏的应 用中的至少一项,可选地,隐藏策略中包括时空信息及与该时空信息对应的需要进行隐藏的应用。In this embodiment, the terminal may be a smart terminal such as a mobile phone or a tablet computer. The hidden policy of the application is pre-configured on the terminal, and the hidden policy includes time information, an application that needs to be hidden corresponding to the time information, location information, and an application that needs to be hidden corresponding to the location information, and time information and location information. Spatio-temporal information and the corresponding need to be hidden corresponding to the spatio-temporal information Optionally, the hidden policy includes spatio-temporal information and an application corresponding to the spatio-temporal information that needs to be hidden.
本实施例中,应用的隐藏策略可以由终端自行进行配置,终端可以收集用户的历史时空信息及历史时空信息对应的未使用的应用,将这些未使用的应用配置为与该时空信息对应的需要进行隐藏的应用;另外,也可以由用户自主进行配置,将哪些时间点和/或地点对应需要进行隐藏的应用进行配置。In this embodiment, the hidden policy of the application may be configured by the terminal, and the terminal may collect the historical space-time information of the user and the unused application corresponding to the historical space-time information, and configure the unused applications as the corresponding requirements of the space-time information. The hidden application can be configured; in addition, it can also be configured by the user autonomously, and which time points and/or locations correspond to the applications that need to be hidden.
其中,位置信息的确定采用结合地图、位置定位等终端的基础功能来标定位置基准参考点,在参考点基础上通过有效半径来确定位置范围,位置范围可以是有效半径内的区域,也可以是半径外的区域,也可以是多个区域的并集或者交集。网络热点主要是设置常用WIFI网络的可信度。位置范围和网络热点可以一起用于位置安全性的判断,也可以分别独立的用于确定安全位置。一般而言,时间和位置是一个时空整体,一般是结合在一起考虑。如上班时间一定是和上班所在位置范围(可以是一个或多个)对应的。Wherein, the location information is determined by combining the basic functions of the terminal such as the map and the positional positioning to calibrate the position reference point, and the position range is determined by the effective radius on the basis of the reference point, and the position range may be the area within the effective radius, or may be An area outside the radius may also be a union or intersection of multiple areas. The network hotspot is mainly to set the credibility of the common WIFI network. The location range and network hotspots can be used together for location security judgments, or they can be used independently to determine security locations. In general, time and location are a whole of time and space, and are generally considered together. The shift time must be the same as the location of the work (may be one or more).
此外,对于隐藏策略,在参数选择上,位置信息、WIFI热点、时间段信息三个参数可以只取部分参数,也可以三个参数联合使用,甚至可以选取诸如方位等其它类型的参数。用户也可以针对自己的安全和自身便利性考虑设置一些策略,比如在家的活动范围限制访问办公应用,可以防止家中小孩或老人使用终端时误操作影响到重要数据等。In addition, for the hidden strategy, in the parameter selection, the three parameters of the location information, the WIFI hotspot, and the time period information may take only some parameters, or may be used in combination with three parameters, and may even select other types of parameters such as azimuth. Users can also set some strategies for their own security and convenience. For example, the scope of activities at home restricts access to office applications, which can prevent home users or elderly people from using terminals to affect important data.
步骤S103,将所述隐藏策略中与所述位置信息和/或时间信息对应的应用图标及应用数据进行隐藏。Step S103, hiding an application icon and application data corresponding to the location information and/or time information in the hidden policy.
本实施例中,应用数据为应用图标对应的应用的存储的一些数据,例如短信应用中,其应用数据为其接收或发送的短信数据,在相机应用中,所拍摄的照片为其对应的应用数据。其中,如果当前应用图标对应的应用已经运行,但是没有显示相关的应用数据,则是不需要将应用数据隐藏,而直接将应用图标进行隐藏即可。In this embodiment, the application data is some data stored in an application corresponding to the application icon, for example, in the short message application, the application data is the short message data received or sent by the application, and in the camera application, the captured photo is the corresponding application. data. If the application corresponding to the current application icon is already running, but the related application data is not displayed, the application data does not need to be hidden, and the application icon is directly hidden.
本实施例中,用户携带终端时位置会发生改变,时间也在不断地变化,本实施例可以首先获取当前的时间信息,获取隐藏策略中与该时间信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏;或者获取当前的位置信息,获取隐藏策略中与该位置信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏;或者获取当前的时 空信息,获取隐藏策略中与该时空信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏。In this embodiment, when the user carries the terminal, the location changes, and the time is also changed. In this embodiment, the current time information is obtained, and the application corresponding to the time information in the hidden policy is obtained, and the application is in the terminal. The application icon and the application data displayed on the interface are hidden; or the current location information is obtained, the application corresponding to the location information in the hidden policy is obtained, and the application icon and the application data displayed on the terminal interface are hidden by the application; or Get current time The empty information is used to obtain an application corresponding to the time and space information in the hidden policy, and the application icon and the application data displayed on the terminal interface are hidden.
本实施例中,应用的应用图标及应用数据隐藏后,用户不能直接使用这些已隐藏的应用。例如在上班时间段、终端在办公区域或实验室区域的范围内,拍照、录音等应用被隐藏;在晚上休息时间段,终端将干扰休息的所有应用进行隐藏等。In this embodiment, after the application icon and the application data of the application are hidden, the user cannot directly use the hidden applications. For example, during the working hours, the terminal is in the office area or the laboratory area, applications such as taking photos and recordings are hidden; in the evening rest period, the terminal hides all applications that interfere with the rest.
本实施例中,基于终端所处的位置和/或时间,用户使用的应用有一定的规律,根据这个规律来限制应用及其数据的可见性,将用户重要的应用或者在该位置和/或时间下不使用的应用进行隐藏,可以免去用户手动操作进行隐藏或限制,减少用户大量无谓的选择和查找,方便用户的操作。In this embodiment, based on the location and/or time of the terminal, the application used by the user has a certain rule, and according to the law, the visibility of the application and its data is restricted, and the important application of the user is at the location and/or The application that is not used under the time is hidden, which can avoid the user's manual operation to hide or limit, and reduce the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
与相关技术相比,本实施例终端预先配置隐藏策略,然后获取终端当前的位置信息和/或时间信息,基于位置信息和/或时间信息形成的时空场景将隐藏策略中对应的应用图标及应用数据进行隐藏,也就是在该时空场景下将用户重要的应用或者不使用的应用进行隐藏,免去用户手动进行隐藏或限制的操作,减少用户大量无谓的选择和查找,方便用户的操作。Compared with the related art, the terminal pre-configures the hidden policy, and then obtains the current location information and/or time information of the terminal, and the time-space scene formed based on the location information and/or the time information will hide the corresponding application icon and application in the policy. The data is hidden, that is, the important application or the unused application is hidden in the space-time scene, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user's operation.
在一可选的实施例中,如图2所示,在上述图1的实施例的基础上,上述步骤S103包括:In an optional embodiment, as shown in FIG. 2, based on the foregoing embodiment of FIG. 1, the foregoing step S103 includes:
步骤S1031,获取所述隐藏策略中与所述位置信息和/或时间信息对应的应用图标及应用数据;Step S1031: Obtain an application icon and application data corresponding to the location information and/or time information in the hidden policy.
步骤S1032,在应用的读取接口将所述应用图标对应的应用进行过滤,及在文件读取接口将所述应用数据进行过滤,对所述应用图标及应用数据进行隐藏。In step S1032, the application corresponding to the application icon is filtered on the read interface of the application, and the application data is filtered on the file reading interface to hide the application icon and the application data.
本实施例中,在应用的读取接口及文件读取接口分别添加限制属性,然后在获取隐藏策略中与位置信息和/或时间信息对应的应用图标及应用数据后,该应用图标及应用数据为限制属性,则在应用的读取接口将应用进行过滤,在文件读取接口将应用数据进行过滤,终端上层界面上将不显示该应用图标及应用数据,从而达到隐藏应用图标及应用数据的目的。In this embodiment, after the restriction attribute is added to the read interface and the file read interface of the application, and then the application icon and the application data corresponding to the location information and/or the time information in the hidden policy are obtained, the application icon and the application data are obtained. To limit the attribute, the application is filtered on the application's read interface, and the application data is filtered on the file read interface. The application icon and the application data are not displayed on the upper layer interface of the terminal, thereby hiding the application icon and the application data. purpose.
除了隐藏策略中与位置信息和/或时间信息对应的应用图标及应用数据外,其他的应用为非限制属性,因此,在终端的界面上显示非限制属性的应 用及应用数据,这样,将用户在当前时空场景下常用的应用及应用数据进行显示,方便用户的操作。In addition to the application icons and application data corresponding to the location information and/or time information in the hidden policy, other applications are unrestricted attributes, and therefore, the display of the unrestricted attributes on the interface of the terminal should be performed. Use and application data, so that the user's application and application data commonly used in the current space-time scene are displayed, which is convenient for the user's operation.
在一可选的实施例中,如图3所示,在上述图1的实施例的基础上,在上述步骤S103之后还包括:In an optional embodiment, as shown in FIG. 3, based on the foregoing embodiment of FIG. 1, after the step S103, the method further includes:
步骤S104,当当前所显示的应用图标及应用数据隐藏后,显示供用户输入取消隐藏的信息的界面;Step S104, after the currently displayed application icon and the application data are hidden, displaying an interface for the user to input the unhidden information;
步骤S105,接收输入的取消隐藏的信息,根据所输入的信息将所隐藏的应用图标及应用数据重新显示。Step S105, receiving the input unhidden information, and redisplaying the hidden application icon and the application data according to the input information.
本实施例中,如果用户当前正在使用某一应用,终端界面上显示该应用的应用图标及应用数据,但是如果当前的时空场景恰好发生变化,在变化后的时空场景下,该应用将会被隐藏掉,也就是说,对于当前用户正在使用的应用及应用数据,如果因为位置和/或时间等因素变化导致该应用及应用数据的可见性发生变化,终端会直接中止用户对该应用及应用数据的使用,将其进行隐藏。当该应用被隐藏后,终端可以跳出供用户输入取消隐藏的信息的界面,例如供用户输入取消隐藏的密码信息,当用户在该界面中输入密码后,刚才被隐藏掉的应用重新显示,通过这种方式,以提高应用隐藏的灵活性,进一步方便用户的操作。In this embodiment, if the user is currently using an application, the application icon and the application data of the application are displayed on the terminal interface, but if the current space-time scene happens to change, the application will be Hidden, that is, for the application and application data that the current user is using, if the visibility of the application and the application data changes due to changes in location and/or time, the terminal directly suspends the user to the application and application. Use the data to hide it. After the application is hidden, the terminal can jump out of the interface for the user to input the unhidden information, for example, the user inputs the unhidden password information. When the user enters the password in the interface, the hidden application is redisplayed. This way, to increase the flexibility of application hiding, further facilitate the user's operation.
本实施例中,上述的密码信息配置在隐藏策略中,在配置时空信息及与该时空信息对应的需要进行隐藏的应用的同时,配置需要进行隐藏的应用重新显示(即取消隐藏)的密码信息,密码信息可以是字符信息,也可以是用户的指纹信息等等。In this embodiment, the password information is configured in a hidden policy, and the password information that needs to be hidden (ie, unhidden) is configured to be hidden when the space-time information and the application corresponding to the space-time information need to be hidden are configured. The password information may be character information, a fingerprint information of the user, or the like.
在一可选的实施例中,如图4所示,在上述图1的实施例的基础上,在上述步骤S101之前还包括:In an optional embodiment, as shown in FIG. 4, on the basis of the foregoing embodiment of FIG. 1, before the step S101, the method further includes:
步骤S100,获取终端的历史位置信息和/或时间信息,以及与所述历史位置信息和/或时间信息对应的应用的操作数据,根据所述历史位置信息和/或时间信息、应用的操作数据配置隐藏策略。Step S100: Acquire historical location information and/or time information of the terminal, and operation data of the application corresponding to the historical location information and/or time information, according to the historical location information and/or time information, and operation data of the application. Configure a hidden policy.
本实施例中,应用的隐藏策略可以由终端自行进行配置,终端收集用户的历史时空信息及历史时空信息对应的应用的操作数据,从这些应用的操作 数据中可以获取到用户在哪些时空场景下使用哪些应用及未使用或较少使用哪些应用,将未使用或较少使用的应用配置为与该时空场景对应的需要进行隐藏的应用。In this embodiment, the hidden policy of the application may be configured by the terminal, and the terminal collects historical time and space information of the user and operation data of the application corresponding to the historical space-time information, and operations from the applications. The data can be obtained in which time and space scenarios the user uses and which applications are not used or used less, and the unused or less used applications are configured as applications corresponding to the spatiotemporal scene that need to be hidden.
另外,本实施例基于终端自行配置隐藏策略的同时,还提供供用户进行修改所配置的隐藏策略的实施例,以提高隐藏策略配置的灵活性,进一步方便用户的操作。In addition, the embodiment provides an embodiment for the user to modify the configured hidden policy, so as to improve the flexibility of the hidden policy configuration and further facilitate the operation of the user.
本发明实施例还提供一种应用的处理装置,如图5所示,在一实施例中,所述应用的处理装置包括:The embodiment of the present invention further provides an application processing device. As shown in FIG. 5, in an embodiment, the processing device of the application includes:
第一获取模块101,设置成:获取终端预先配置的应用的隐藏策略;The first obtaining
第二获取模块102,设置成:获取所述终端当前的位置信息和/或时间信息;The second obtaining
本实施例中,终端可以是手机或者平板电脑等智能终端。终端上预先配置应用的隐藏策略,该隐藏策略中包括时间信息及与时间信息对应的需要进行隐藏的应用、位置信息及与位置信息对应的需要进行隐藏的应用,以及时间信息和位置信息组成的时空信息及与该时空信息对应的需要进行隐藏的应用中的至少一项,可选地,隐藏策略中包括时空信息及与该时空信息对应的需要进行隐藏的应用。In this embodiment, the terminal may be a smart terminal such as a mobile phone or a tablet computer. The hidden policy of the application is pre-configured on the terminal, and the hidden policy includes time information, an application that needs to be hidden corresponding to the time information, location information, and an application that needs to be hidden corresponding to the location information, and time information and location information. At least one of the spatio-temporal information and the application that needs to be hidden corresponding to the spatio-temporal information. Optionally, the hidden policy includes spatio-temporal information and an application corresponding to the spatio-temporal information that needs to be hidden.
本实施例中,应用的隐藏策略可以由终端自行进行配置,终端可以收集用户的历史时空信息及历史时空信息对应的未使用的应用,将这些未使用的应用配置为与该时空信息对应的需要进行隐藏的应用;另外,也可以由用户自主进行配置,将哪些时间点和/或地点对应需要进行隐藏的应用进行配置。In this embodiment, the hidden policy of the application may be configured by the terminal, and the terminal may collect the historical space-time information of the user and the unused application corresponding to the historical space-time information, and configure the unused applications as the corresponding requirements of the space-time information. The hidden application can be configured; in addition, it can also be configured by the user autonomously, and which time points and/or locations correspond to the applications that need to be hidden.
其中,位置信息的确定采用结合地图、位置定位等终端的基础功能来标定位置基准参考点,在参考点基础上通过有效半径来确定位置范围,位置范围可以是有效半径内的区域,也可以是半径外的区域,也可以是多个区域的并集或者交集。网络热点主要是设置常用WIFI网络的可信度。位置范围和网络热点可以一起用于位置安全性的判断,也可以分别独立的用于确定安全位置。一般而言,时间和位置是一个时空整体,一般是结合在一起考虑。如上班时间一定是和上班所在位置范围(可以是一个或多个)对应的。Wherein, the location information is determined by combining the basic functions of the terminal such as the map and the positional positioning to calibrate the position reference point, and the position range is determined by the effective radius on the basis of the reference point, and the position range may be the area within the effective radius, or may be An area outside the radius may also be a union or intersection of multiple areas. The network hotspot is mainly to set the credibility of the common WIFI network. The location range and network hotspots can be used together for location security judgments, or they can be used independently to determine security locations. In general, time and location are a whole of time and space, and are generally considered together. The shift time must be the same as the location of the work (may be one or more).
此外,对于隐藏策略,在参数选择上,位置信息、WIFI热点、时间段信 息三个参数可以只取部分参数,也可以三个参数联合使用,甚至可以选取诸如方位等其它类型的参数。用户也可以针对自己的安全和自身便利性考虑设置一些策略,比如在家的活动范围限制访问办公应用,可以防止家中小孩或老人使用终端时误操作影响到重要数据等。In addition, for the hidden strategy, in the parameter selection, location information, WIFI hotspot, time period letter The three parameters can take only some parameters, or three parameters can be used in combination, and even other types of parameters such as orientation can be selected. Users can also set some strategies for their own security and convenience. For example, the scope of activities at home restricts access to office applications, which can prevent home users or elderly people from using terminals to affect important data.
隐藏模块103,设置成:将所述隐藏策略中与所述位置信息和/或时间信息对应的应用的应用图标及应用数据进行隐藏。The
本实施例中,应用数据为应用图标对应的应用的存储的一些数据,例如短信应用中,其应用数据为其接收或发送的短信数据,在相机应用中,所拍摄的照片为其对应的应用数据。其中,如果当前应用图标对应的应用已经运行,但是没有显示相关的应用数据,则是不需要将应用数据隐藏,而直接将应用图标进行隐藏即可。In this embodiment, the application data is some data stored in an application corresponding to the application icon, for example, in the short message application, the application data is the short message data received or sent by the application, and in the camera application, the captured photo is the corresponding application. data. If the application corresponding to the current application icon is already running, but the related application data is not displayed, the application data does not need to be hidden, and the application icon is directly hidden.
本实施例中,用户携带终端时位置会发生改变,时间也在不断地变化,本实施例可以首先获取当前的时间信息,获取隐藏策略中与该时间信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏;或者获取当前的位置信息,获取隐藏策略中与该位置信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏;或者获取当前的时空信息,获取隐藏策略中与该时空信息中对应的应用,将该应用在终端界面上显示的应用图标及应用数据进行隐藏。In this embodiment, when the user carries the terminal, the location changes, and the time is also changed. In this embodiment, the current time information is obtained, and the application corresponding to the time information in the hidden policy is obtained, and the application is in the terminal. The application icon and the application data displayed on the interface are hidden; or the current location information is obtained, the application corresponding to the location information in the hidden policy is obtained, and the application icon and the application data displayed on the terminal interface are hidden by the application; or Obtain the current space-time information, obtain an application corresponding to the space-time information in the hidden policy, and hide the application icon and the application data displayed by the application on the terminal interface.
本实施例中,应用的应用图标及应用数据隐藏后,用户不能直接使用这些已隐藏的应用。例如在上班时间段、终端在办公区域或实验室区域的范围内,拍照、录音等应用被隐藏;在晚上休息时间段,终端将干扰休息的所有应用进行隐藏等。In this embodiment, after the application icon and the application data of the application are hidden, the user cannot directly use the hidden applications. For example, during the working hours, the terminal is in the office area or the laboratory area, applications such as taking photos and recordings are hidden; in the evening rest period, the terminal hides all applications that interfere with the rest.
本实施例中,基于终端所处的位置和/或时间,用户使用的应用有一定的规律,根据这个规律来限制应用及其数据的可见性,将用户重要的应用或者在该位置和/或时间下不使用的应用进行隐藏,可以免去用户手动操作进行隐藏或限制,减少用户大量无谓的选择和查找,方便用户的操作。In this embodiment, based on the location and/or time of the terminal, the application used by the user has a certain rule, and according to the law, the visibility of the application and its data is restricted, and the important application of the user is at the location and/or The application that is not used under the time is hidden, which can avoid the user's manual operation to hide or limit, and reduce the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
与相关技术相比,本实施例终端预先配置隐藏策略,然后获取终端当前的位置信息和/或时间信息,基于位置信息和/或时间信息形成的时空场景将隐藏策略中对应的应用图标及应用数据进行隐藏,也就是在该时空场景下将用户重要的应用或者不使用的应用进行隐藏,免去用户手动进行隐藏或限制的 操作,减少用户大量无谓的选择和查找,方便用户的操作。Compared with the related art, the terminal pre-configures the hidden policy, and then obtains the current location information and/or time information of the terminal, and the time-space scene formed based on the location information and/or the time information will hide the corresponding application icon and application in the policy. The data is hidden, that is, the important application or the unused application is hidden in the space-time scene, and the user is manually hidden or restricted. The operation reduces the user's large number of unnecessary selections and searches, which is convenient for the user's operation.
在一可选的实施例中,如图6所示,在上述图5的实施例的基础上,所述隐藏模块103包括:In an optional embodiment, as shown in FIG. 6, on the basis of the foregoing embodiment of FIG. 5, the
获取单元1031,设置成:获取所述隐藏策略中与所述位置信息和/或时间信息对应的应用图标及应用数据;The obtaining
隐藏单元1032,设置成:在应用的读取接口将所述应用图标对应的应用进行过滤,及在文件读取接口将所述应用数据进行过滤,对所述应用图标及应用数据进行隐藏。The
本实施例中,在应用的读取接口及文件读取接口分别添加限制属性,然后在获取隐藏策略中与位置信息和/或时间信息对应的应用图标及应用数据后,该应用图标及应用数据为限制属性,则在应用的读取接口将应用进行过滤,在文件读取接口将应用数据进行过滤,终端上层界面上将不显示该应用图标及应用数据,从而达到隐藏应用图标及应用数据的目的。In this embodiment, after the restriction attribute is added to the read interface and the file read interface of the application, and then the application icon and the application data corresponding to the location information and/or the time information in the hidden policy are obtained, the application icon and the application data are obtained. To limit the attribute, the application is filtered on the application's read interface, and the application data is filtered on the file read interface. The application icon and the application data are not displayed on the upper layer interface of the terminal, thereby hiding the application icon and the application data. purpose.
除了隐藏策略中与位置信息和/或时间信息对应的应用图标及应用数据外,其他的应用为非限制属性,因此,在终端的界面上显示非限制属性的应用及应用数据,这样,将用户在当前时空场景下常用的应用及应用数据进行显示,方便用户的操作。In addition to the application icons and application data corresponding to the location information and/or the time information in the hidden policy, the other applications are non-restricted attributes, and therefore, the application and application data of the unrestricted attributes are displayed on the interface of the terminal, so that the user is The commonly used applications and application data are displayed in the current space-time scene, which is convenient for the user's operation.
在一可选的实施例中,如图7所示,在上述图5的实施例的基础上,所述应用的处理装置还包括:In an optional embodiment, as shown in FIG. 7, on the basis of the foregoing embodiment of FIG. 5, the processing device of the application further includes:
显示模块104,设置成:当当前所显示的应用图标及应用数据隐藏后,显示供用户输入取消隐藏的信息的界面;The
取消隐藏模块105,设置成:接收输入的取消隐藏的信息,根据所输入的信息将所隐藏的应用图标及应用数据重新显示。The
本实施例中,如果用户当前正在使用某一应用,终端界面上显示该应用的应用图标及应用数据,但是如果当前的时空场景恰好发生变化,在变化后的时空场景下,该应用将会被隐藏掉,也就是说,对于当前用户正在使用的应用及应用数据,如果因为位置和/或时间等因素变化导致该应用及应用数据 的可见性发生变化,终端会直接中止用户对该应用及应用数据的使用,将其进行隐藏。当该应用被隐藏后,终端可以跳出供用户输入取消隐藏的信息的界面,例如供用户输入取消隐藏的密码信息,当用户在该界面中输入密码后,刚才被隐藏掉的应用重新显示,通过这种方式,以提高应用隐藏的灵活性,进一步方便用户的操作。In this embodiment, if the user is currently using an application, the application icon and the application data of the application are displayed on the terminal interface, but if the current space-time scene happens to change, the application will be Hidden, that is, for the application and application data that the current user is using, if the application and application data are changed due to factors such as location and/or time. The visibility changes, and the terminal directly suspends the user's use of the application and application data to hide it. After the application is hidden, the terminal can jump out of the interface for the user to input the unhidden information, for example, the user inputs the unhidden password information. When the user enters the password in the interface, the hidden application is redisplayed. This way, to increase the flexibility of application hiding, further facilitate the user's operation.
本实施例中,上述的密码信息配置在隐藏策略中,在配置时空信息及与该时空信息对应的需要进行隐藏的应用的同时,配置需要进行隐藏的应用重新显示(即取消隐藏)的密码信息,密码信息可以是字符信息,也可以是用户的指纹信息等等。In this embodiment, the password information is configured in a hidden policy, and the password information that needs to be hidden (ie, unhidden) is configured to be hidden when the space-time information and the application corresponding to the space-time information need to be hidden are configured. The password information may be character information, a fingerprint information of the user, or the like.
在一可选的实施例中,如图8所示,在上述图5的实施例的基础上,所述应用的处理装置还包括:In an optional embodiment, as shown in FIG. 8, on the basis of the foregoing embodiment of FIG. 5, the processing device of the application further includes:
配置模块100,设置成:获取终端的历史位置信息和/或时间信息,以及与所述历史位置信息和/或时间信息对应的应用的操作数据,根据所述历史位置信息和/或时间信息、应用的操作数据配置隐藏策略。The
本实施例中,应用的隐藏策略可以由终端自行进行配置,终端收集用户的历史时空信息及历史时空信息对应的应用的操作数据,从这些应用的操作数据中可以获取到用户在哪些时空场景下使用哪些应用及未使用或较少使用哪些应用,将未使用或较少使用的应用配置为与该时空场景对应的需要进行隐藏的应用。In this embodiment, the hidden policy of the application may be configured by the terminal, and the terminal collects the historical space-time information of the user and the operation data of the application corresponding to the historical space-time information, and the time-space scenarios of the user can be obtained from the operation data of the application. Use which applications are used and which applications are not used or used less, and configure unused or less used applications as applications that need to be hidden corresponding to the spatiotemporal scene.
另外,本实施例基于终端自行配置隐藏策略的同时,还提供供用户进行修改所配置的隐藏策略的实施例,以提高隐藏策略配置的灵活性,进一步方便用户的操作。In addition, the embodiment provides an embodiment for the user to modify the configured hidden policy, so as to improve the flexibility of the hidden policy configuration and further facilitate the operation of the user.
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令被计算机执行时,使得该计算机可执行上述任意的应用的处理方法。The embodiment of the invention also discloses a computer program, comprising program instructions, which when executed by a computer, enable the computer to execute the processing method of any of the above applications.
本发明实施例还公开了一种载有所述的计算机程序的载体。The embodiment of the invention also discloses a carrier carrying the computer program.
在阅读并理解了附图和详细描述后,可以明白其他方面。 Other aspects will be apparent upon reading and understanding the drawings and detailed description.
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。One of ordinary skill in the art will appreciate that all or a portion of the steps of the above-described embodiments can be implemented using a computer program flow, which can be stored in a computer readable storage medium, such as on a corresponding hardware platform (eg, The system, device, device, device, etc. are executed, and when executed, include one or a combination of the steps of the method embodiments.
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。Alternatively, all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。The devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. The above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求所述的保护范围为准。Variations or substitutions are readily conceivable within the scope of the present invention by those skilled in the art and are within the scope of the present invention. Therefore, the scope of the invention should be determined by the scope of the claims.
本发明技术方案的应用的处理方法及装置,终端预先配置隐藏策略,然后获取终端当前的位置信息和/或时间信息,基于位置信息和/或时间信息形成的时空场景将隐藏策略中对应的应用图标及应用数据进行隐藏,也就是在该时空场景下将用户重要的应用或者不使用的应用进行隐藏,免去用户手动进行隐藏或限制的操作,减少用户大量无谓的选择和查找,方便用户的操作。因此本发明具有很强的工业实用性。 The processing method and device of the application of the technical solution of the present invention, the terminal pre-configures the hidden policy, and then acquires the current location information and/or time information of the terminal, and the spatio-temporal scene formed based on the location information and/or the time information will hide the corresponding application in the policy. The icon and the application data are hidden, that is, the important application or the unused application is hidden in the space-time scene, thereby eliminating the user from manually hiding or limiting the operation, reducing the user's large and unnecessary selection and searching, and facilitating the user. operating. Therefore, the present invention has strong industrial applicability.
Claims (12)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510274787.5 | 2015-05-26 | ||
| CN201510274787.5A CN106295359A (en) | 2015-05-26 | 2015-05-26 | The processing method and processing device of application |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016188152A1 true WO2016188152A1 (en) | 2016-12-01 |
Family
ID=57393413
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/073863 Ceased WO2016188152A1 (en) | 2015-05-26 | 2016-02-16 | Application processing method and apparatus |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106295359A (en) |
| WO (1) | WO2016188152A1 (en) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107292194A (en) * | 2017-05-26 | 2017-10-24 | 北京珠穆朗玛移动通信有限公司 | A kind of data guard method, mobile terminal and storage medium |
| CN109697494A (en) * | 2018-12-21 | 2019-04-30 | 南京维沃软件技术有限公司 | A kind of graphic code display methods and terminal device |
| CN109889507B (en) * | 2019-01-24 | 2021-08-06 | 印象(山东)大数据有限公司 | Monitoring method and system for monitoring mailbox operation safety |
| CN110113486B (en) * | 2019-04-28 | 2021-06-08 | 维沃移动通信有限公司 | Method and terminal for moving application icon |
| CN114610412B (en) * | 2022-03-16 | 2024-03-15 | 杭州每刻科技有限公司 | Application visibility hierarchical management method and system |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101859229A (en) * | 2010-06-22 | 2010-10-13 | 宇龙计算机通信科技(深圳)有限公司 | Icon hiding method, device and touch screen terminal |
| KR20110055058A (en) * | 2009-11-19 | 2011-05-25 | 엘지전자 주식회사 | Mobile terminal and its control method |
| CN103324483A (en) * | 2013-06-26 | 2013-09-25 | 青岛海信移动通信技术股份有限公司 | Application of smart terminal to display hidden method and device |
| CN103544020A (en) * | 2013-10-31 | 2014-01-29 | 华为终端有限公司 | Method and mobile terminal for displaying application software icons |
| CN104092821A (en) * | 2014-07-01 | 2014-10-08 | 惠州Tcl移动通信有限公司 | Icon hiding method and system of mobile terminal |
-
2015
- 2015-05-26 CN CN201510274787.5A patent/CN106295359A/en active Pending
-
2016
- 2016-02-16 WO PCT/CN2016/073863 patent/WO2016188152A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20110055058A (en) * | 2009-11-19 | 2011-05-25 | 엘지전자 주식회사 | Mobile terminal and its control method |
| CN101859229A (en) * | 2010-06-22 | 2010-10-13 | 宇龙计算机通信科技(深圳)有限公司 | Icon hiding method, device and touch screen terminal |
| CN103324483A (en) * | 2013-06-26 | 2013-09-25 | 青岛海信移动通信技术股份有限公司 | Application of smart terminal to display hidden method and device |
| CN103544020A (en) * | 2013-10-31 | 2014-01-29 | 华为终端有限公司 | Method and mobile terminal for displaying application software icons |
| CN104092821A (en) * | 2014-07-01 | 2014-10-08 | 惠州Tcl移动通信有限公司 | Icon hiding method and system of mobile terminal |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106295359A (en) | 2017-01-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN116827896B (en) | System and method for user controlled media overlay | |
| EP2407972B1 (en) | Method for photo editing and mobile terminal using this method | |
| JP7302038B2 (en) | USER PROFILE PICTURE GENERATION METHOD AND ELECTRONIC DEVICE | |
| KR101777984B1 (en) | Method and device for displaying wifi list | |
| US9565223B2 (en) | Social network interaction | |
| US20110072355A1 (en) | At-a-distance magic lenses for privacy-sensitive, collaborative document viewing across mobile devices and large displays | |
| US20140365646A1 (en) | Network connection managing device, system and method | |
| WO2016188152A1 (en) | Application processing method and apparatus | |
| WO2015009583A1 (en) | Intelligent user interfaces for multiple sim cards | |
| CN104797003B (en) | A kind of method and device for switching intelligent terminal user | |
| CN110390641B (en) | Image desensitizing method, electronic device and storage medium | |
| US20150242076A1 (en) | Method of editing one or more objects and apparatus for same | |
| US10229138B2 (en) | Method and apparatus for tagged deletion of user online history | |
| KR101714939B1 (en) | Method, apparatus, program, and recording medium for sharing resources | |
| US20250193197A1 (en) | Application sensitive behavior reminder method, related apparatus, and communication system | |
| CN113626626B (en) | A photo storage method, device and equipment shared by multiple people | |
| WO2017028541A1 (en) | Mode permission management method, apparatus, and terminal | |
| CN111885298B (en) | Image processing method and device | |
| EP3239856B1 (en) | Information acquisition method, device and system | |
| KR102264428B1 (en) | Method and appratus for operating of a electronic device | |
| US20150163841A1 (en) | Method for processing information and electronic apparatus | |
| CN119051921B (en) | Methods, devices, equipment, and storage media for identifying abnormal account sharing | |
| CN114911394B (en) | Terminal equipment and one-hand operation method | |
| CN104636646B (en) | A kind of smart mobile phone method for security protection based on safe scene | |
| CN113268185B (en) | Information providing method and device and electronic equipment |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16799041 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16799041 Country of ref document: EP Kind code of ref document: A1 |