[go: up one dir, main page]

CN106446709A - Application clone method and system - Google Patents

Application clone method and system Download PDF

Info

Publication number
CN106446709A
CN106446709A CN201610844416.0A CN201610844416A CN106446709A CN 106446709 A CN106446709 A CN 106446709A CN 201610844416 A CN201610844416 A CN 201610844416A CN 106446709 A CN106446709 A CN 106446709A
Authority
CN
China
Prior art keywords
application
avatar
icon
generation method
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610844416.0A
Other languages
Chinese (zh)
Inventor
曾俊豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Dongguan Yulong Telecommunication Technology Co Ltd
Priority to CN201610844416.0A priority Critical patent/CN106446709A/en
Publication of CN106446709A publication Critical patent/CN106446709A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

An application program dividing method is applied to an electronic terminal, and the method comprises the following steps: displaying a visitor mode interface when a trigger instruction for entering a visitor mode is received; creating an application split; and hiding the true body of the application program. The invention can realize the individuation of the application program and hide the true body of the application program in the visitor mode, thereby not only facilitating the reuse of the true body of the application program by a user, but also effectively protecting the privacy of the user and improving the user experience.

Description

应用程序分身方法及系统Application clone method and system

技术领域technical field

本发明涉及应用程序管理领域,尤其涉及一种应用程序分身方法及系统。The invention relates to the field of application program management, in particular to an application program clone method and system.

背景技术Background technique

近年来,电子终端的功能越来越多样,可安装的应用程序也越来越多。部分应用程序,例如,支付应用程序,聊天应用程序或者理财应用程序等,记录了用户非常重要的隐私信息,用户对这些隐私信息需要高度保密。而在日常生活中通常会有电子终端被他人借用的情况发生,例如,他人借用手机打电话或者玩游戏等,这些隐私信息有可能被他人有意或无意地翻看。In recent years, the functions of electronic terminals have become more and more diverse, and more and more applications can be installed. Some applications, such as payment applications, chat applications, or financial management applications, record very important private information of the user, and the user needs to keep such private information highly confidential. However, in daily life, electronic terminals are usually borrowed by others, for example, others borrow mobile phones to make calls or play games, etc. These private information may be read by others intentionally or unintentionally.

虽然现有电子终端提供了“访客模式”,用户可以提前设定,什么软件将在“访客模式”下出现,什么软件不会出现。但现有的访客模式只能进行基础的防护,启用访客模式后,所有安装的应用都不能被删除。其次,部分应用程序被隐藏后,会给他人造成一种电子终端未安装该些应用程序的错觉。例如,访客模式下隐藏了QQ,他人有可能会重新下载安装QQ,如此造成了对电子终端存储空间及网络流量的浪费。Although the existing electronic terminal provides a "guest mode", the user can set in advance what software will appear in the "guest mode" and what software will not appear. However, the existing guest mode can only perform basic protection. After the guest mode is enabled, all installed applications cannot be deleted. Secondly, after some application programs are hidden, it will give others an illusion that these application programs are not installed on the electronic terminal. For example, if QQ is hidden in the guest mode, others may re-download and install QQ, which causes a waste of storage space and network traffic on the electronic terminal.

发明内容Contents of the invention

鉴于以上内容,有必要提出一种应用程序分身方法及系统,其可以实现对电子终端安装的应用程序的分身,操作简便,保护用户隐私的同时还能提高用户体验。In view of the above, it is necessary to propose a method and system for cloning applications, which can realize cloning of applications installed on electronic terminals, is easy to operate, protects user privacy, and improves user experience at the same time.

一种应用程序分身方法,应用于电子终端中,所述方法包括:An application clone method, applied to an electronic terminal, said method comprising:

当接收到进入访客模式的触发指令时,显示访客模式界面;When a trigger instruction to enter the visitor mode is received, the visitor mode interface is displayed;

创建应用程序分身;及create app clones; and

隐藏所述应用程序真身。Hide said app's real body.

根据本发明的一个优选实施例,所述方法还包括:According to a preferred embodiment of the present invention, the method also includes:

预先设置进入所述访客模式的快捷入口,通过所述快捷入口,进入所述访客模式界面,其中,所述快捷入口是访客模式应用程序的图标或者是所述电子终端锁屏界面上的解锁密码。A shortcut entry for entering the visitor mode is set in advance, and the visitor mode interface is entered through the shortcut entry, wherein the shortcut entry is an icon of a visitor mode application program or an unlock password on the lock screen interface of the electronic terminal .

根据本发明的一个优选实施例,所述创建应用程序分身包括:According to a preferred embodiment of the present invention, said creation of application avatar includes:

预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式;The generation method of the icon of the application avatar is set in advance, and the generation method includes one or more of the following: a generation method based on the application avatar list, a generation method based on a specific touch area, and a generation method based on an avatar instruction;

当所述生成方式是基于应用程序分身列表的生成方式时,且在侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标;或者When the generation method is based on the generation method of the avatar list of the application program, and when a signal is detected that the user adds the icon of the real avatar of the application program to the avatar list, the icon of the avatar of the application program is created; or

当所述生成方式是基于特定触控区域的生成方式时,且在侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标;或者When the generation method is based on the generation method of a specific touch area, and when a signal is detected that the user drags or moves the icon of the application avatar to the specific touch area, the application avatar is created icon; or

当所述生成方式是基于分身指令的生成方式时,且在侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标。When the generation method is based on the generation method of the avatar instruction, and when a signal that the user triggers the avatar instruction is detected, an icon of the avatar of the application program is created.

根据本发明的一个优选实施例,所述方法还包括:According to a preferred embodiment of the present invention, the method also includes:

预先创建用于存储被隐藏的应用程序真身的文件夹;或者Pre-create the folder where the hidden app avatar is stored; or

预先创建具备隐藏功能的隐藏应用程序。Pre-created hidden apps with hidden functions.

根据本发明的一个优选实施例,所述方法还包括:According to a preferred embodiment of the present invention, the method also includes:

在退出所述访客模式界面时,删除访客数据。When exiting the visitor mode interface, the visitor data is deleted.

一种应用程序分身系统,安装于电子终端中,所述系统包括:An application avatar system installed in an electronic terminal, said system comprising:

显示模块,用于当接收到进入访客模式的触发指令时,显示访客模式界面;A display module, configured to display the visitor mode interface when a trigger instruction for entering the visitor mode is received;

创建模块,用于创建应用程序分身;及create modules for creating app clones; and

隐藏模块,用于隐藏所述应用程序真身。The hidden module is used to hide the real body of the application.

根据本发明的一个优选实施例,所述系统还包括:According to a preferred embodiment of the present invention, the system also includes:

设置模块,用于预先设置进入所述访客模式的快捷入口,通过所述快捷入口,进入所述访客模式界面,其中,所述快捷入口是访客模式应用程序的图标或者是所述电子终端锁屏界面上的解锁密码。A setting module, configured to preset a shortcut entry for entering the visitor mode, and enter the visitor mode interface through the shortcut entry, wherein the shortcut entry is an icon of a visitor mode application program or a lock screen of the electronic terminal The unlock password on the interface.

根据本发明的一个优选实施例,According to a preferred embodiment of the present invention,

所述设置模块,还用于预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式;The setting module is also used to pre-set the generation method of the icon of the application avatar, and the generation method includes one or more of the following: a generation method based on the application avatar list, a generation method based on a specific touch area , Based on the generation method of the avatar command;

所述创建模块在所述生成方式是基于应用程序分身列表的生成方式时,且在侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标;或者The creation module creates the application when the generation method is based on the generation method of the avatar list of the application program, and when a signal is detected that the user adds the icon of the avatar of the application program to the avatar list the icon of the avatar; or

所述创建模块在所述生成方式是基于特定触控区域的生成方式时,且在侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标;或者When the creation method is based on the generation method of a specific touch area, and when a signal is detected that the user drags or moves the icon of the application avatar to the specific touch area, the creation module creates the the icon of the said app avatar; or

所述创建模块在所述生成方式是基于分身指令的生成方式时,且在侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标。The creating module creates an icon of the application avatar when the generating method is based on the avatar command and when a signal that the user triggers the avatar command is detected.

根据本发明的一个优选实施例,所述创建模块还用于:According to a preferred embodiment of the present invention, the creation module is also used for:

预先创建用于存储被隐藏的应用程序真身的文件夹;或者Pre-create the folder where the hidden app avatar is stored; or

预先创建具备隐藏功能的隐藏应用程序。Pre-created hidden apps with hidden functions.

根据本发明的一个优选实施例,所述系统还包括:According to a preferred embodiment of the present invention, the system also includes:

删除模块,用于在退出所述访客模式界面时,删除访客数据。A deletion module, configured to delete visitor data when exiting the visitor mode interface.

相较于现有技术,本发明所述的应用程序分身方法及系统,能够实现对电子终端安装的应用程序进行分身,在访客模式下隐藏应用程序真身,仅显示应用程序分身,操作简便。既保留了用户运行应用程序真身的历史数据,方便用户再次使用该应用程序真身,也有效地保护了用户的隐私,提高用户体验。Compared with the prior art, the application clone method and system described in the present invention can clone the applications installed on the electronic terminal, hide the real application program in the guest mode, and only display the application clone, which is easy to operate. It not only retains the historical data of the user running the application program, which is convenient for the user to use the application program again, but also effectively protects the user's privacy and improves the user experience.

附图说明Description of drawings

图1所示是执行本发明应用程序分身系统的电子终端的硬件结构示意图。FIG. 1 is a schematic diagram of the hardware structure of an electronic terminal executing the application avatar system of the present invention.

图2所示是本发明应用程序分身方法较佳实施例的方法流程图。FIG. 2 is a method flow chart of a preferred embodiment of the application clone method of the present invention.

图3所示是本发明应用程序分身系统较佳实施例的功能模块图。Fig. 3 is a functional block diagram of a preferred embodiment of the application program clone system of the present invention.

主要元件符号说明Description of main component symbols

电子终端 1electronic terminal 1

应用程序分身系统 10Application Clone System 10

存储设备 11storage device 11

处理器 12Processor 12

显示模块 100display module 100

设置模块 101Setup Module 101

创建模块 102Creating Modules 102

隐藏模块 103hidden modules 103

删除模块 104remove module 104

具体实施方式detailed description

为了使本发明的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。显然,所描述的实施例仅仅是本发明的一部分实施例,而不是全部的实施例。此外,应当理解,本文所描述的具体实施例,仅用以解释本发明,并不用于限定本发明。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. In addition, it should be understood that the specific embodiments described herein are only used to explain the present invention, not to limit the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

如图1所示,是执行本发明所述应用程序分身系统的电子终端的硬件结构示意图。如该硬件架构示意图所示,所述电子终端1可以是,但不限制于,智能手机、平板电脑、智能电视、游戏机、个人数字助理、智能式穿戴设备等可进行人机交互的用户设备。As shown in FIG. 1 , it is a schematic diagram of the hardware structure of an electronic terminal executing the application clone system of the present invention. As shown in the schematic diagram of the hardware architecture, the electronic terminal 1 may be, but not limited to, a user device capable of human-computer interaction such as a smart phone, a tablet computer, a smart TV, a game console, a personal digital assistant, and a smart wearable device. .

在本发明较佳实施例中,所述电子终端1包括,但不限于,应用程序分身系统10、存储设备11以及处理器12。In a preferred embodiment of the present invention, the electronic terminal 1 includes, but is not limited to, an application avatar system 10 , a storage device 11 and a processor 12 .

需要说明的是,所述电子终端1仅为举例,其他现有的或今后可能出现的用户设备如可适应于本发明,也应包含在本发明的保护范围以内,并以引用方式包含于此。It should be noted that the electronic terminal 1 is only an example, and other existing or future user equipments that can be adapted to the present invention should also be included in the protection scope of the present invention, and are included here by reference .

本发明实施例中所描述的终端的系统指设备的操作系统,可以包括但不限于:Android系统、Windows系统、IOS系统等等。The system of the terminal described in the embodiment of the present invention refers to the operating system of the device, which may include but not limited to: Android system, Windows system, IOS system and so on.

所述电子终端1中安装有多个应用软件,又称应用程序(Application,APP),是使用各种程序设计语言编制的,为解决某类问题而设计的程序的集合,供多用户使用。每个应用程序具有一个应用程序图标。所述应用程序图标以虚拟图标的形式显示于所述电子终端1的显示屏上。The electronic terminal 1 is installed with a plurality of application software, also known as application program (Application, APP), which is a collection of programs designed to solve certain types of problems compiled using various programming languages, and is used by multiple users. Each application has an application icon. The application icon is displayed on the display screen of the electronic terminal 1 in the form of a virtual icon.

所述存储设备11用于存储安裝于所述电子终端1中的软件程序和各种数据,例如所述应用程序分身系统10,并在所述电子终端1运行过程中实现高速、自动地完成程序或数据的存取。所述存储设备11可以是所述电子终端1的内部存储设备,例如所述电子终端1的硬盘或者内存。所述存储设备11也可以是所述电子终端1的外部存储设备,例如所述电子终端1上的插接式硬盘、智能媒体卡(Smart Media Card,SMC)、安全数字卡(Secure DigitalCard,SD)、快闪存储器卡(flash card)等储存设备。进一步地,所述存储设备11还可以既包括所述电子终端1的内部存储设备,也可以包括外部存储设备。进一步地,所述存储设备11还可以是集成电路中没有实物形式的具有存储功能的电路。The storage device 11 is used to store software programs and various data installed in the electronic terminal 1, such as the application avatar system 10, and realize high-speed and automatic program completion during the operation of the electronic terminal 1 or data access. The storage device 11 may be an internal storage device of the electronic terminal 1 , such as a hard disk or a memory of the electronic terminal 1 . The storage device 11 can also be an external storage device of the electronic terminal 1, such as a plug-in hard disk on the electronic terminal 1, a smart media card (Smart Media Card, SMC), a secure digital card (Secure DigitalCard, SD ), flash memory card (flash card) and other storage devices. Further, the storage device 11 may also include both an internal storage device of the electronic terminal 1 and an external storage device. Further, the storage device 11 may also be a circuit with a storage function that has no physical form in an integrated circuit.

所述处理器12又称中央处理器(Central Processing Unit,CPU),是一块超大规模的集成电路,是所述电子终端1的运算核心(Core)和控制核心(Control Unit)。所述处理器12的功能主要是执行软件程序代码或运算数据,例如执行所述的应用程序分身系统10。The processor 12 is also called a central processing unit (Central Processing Unit, CPU), which is a very large-scale integrated circuit, and is the computing core (Core) and control core (Control Unit) of the electronic terminal 1 . The function of the processor 12 is mainly to execute software program codes or calculate data, for example, to execute the application avatar system 10 .

参考图2所示,是本发明应用程序分身方法较佳实施例的方法流程图。根据不同的需求,该图所示流程图中的执行顺序可以改变,某些可以省略。Referring to FIG. 2 , it is a method flow chart of a preferred embodiment of the application clone method of the present invention. According to different requirements, the execution sequence in the flow chart shown in this figure can be changed, and some can be omitted.

S10,当接收到进入访客模式的触发指令时,显示访客模式界面。S10, displaying a visitor mode interface when a trigger instruction for entering the visitor mode is received.

在本实施例中,所述电子终端1的屏幕为触摸式显示屏。所述触摸式显示屏可以让使用者只要用手指或者触控笔轻轻触碰显示屏上的应用程序图标或文件夹或文字或图片就能实现对所述电子终端1的操作,使人机交互更为直截了当。In this embodiment, the screen of the electronic terminal 1 is a touch screen. The touch screen allows the user to operate the electronic terminal 1 as long as the user touches the application program icon or folder or text or picture on the screen with a finger or a stylus lightly, making the man-machine Interaction is more straightforward.

优选的,用户用手指点击或者触摸所述电子终端1的屏幕时产生一个触碰事件。Preferably, a touch event is generated when the user clicks or touches the screen of the electronic terminal 1 with a finger.

在本实施例中,所述应用程序分身系统10预先设置了进入访客模式的快捷入口,通过所述快捷入口,用户可以进入访客模式。In this embodiment, the application avatar system 10 presets a shortcut entry for entering the guest mode, through which the user can enter the guest mode.

在第一实施例中,所述快捷入口是访客模式应用程序图标。当用户点击访客模式应用程序图标后,所述电子终端1内部会产生一个触控信号,所述应用程序分身系统10判断所述触控信号所在的位置所对应的应用程序图标,进而确定接收到了进入访客模式的触发信号,在所述电子终端1的显示屏幕上显示访客模式应用界面。In the first embodiment, the shortcut entry is an application program icon in guest mode. When the user clicks the application program icon in visitor mode, a touch signal will be generated inside the electronic terminal 1, and the application avatar system 10 will judge the application program icon corresponding to the position where the touch signal is located, and then determine that the touch signal has been received. The trigger signal for entering the visitor mode displays the visitor mode application interface on the display screen of the electronic terminal 1 .

在第二实施例中,所述应用程序分身系统10预先设置了在锁屏界面上进入访客模式的解锁密码,则所述快捷入口是锁屏界面上的解锁密码。当用户正确输入相应的密码后,所述应用程序分身系统10确定接收到了进入访客模式的触发信号,在所述电子终端1的显示屏幕上显示访客模式应用界面。In the second embodiment, the application avatar system 10 presets an unlock password for entering the guest mode on the lock screen interface, and the shortcut entry is the unlock password on the lock screen interface. After the user correctly enters the corresponding password, the application avatar system 10 determines that a trigger signal to enter the guest mode has been received, and displays the guest mode application interface on the display screen of the electronic terminal 1 .

S20,创建应用程序分身。S20, creating an application clone.

在本实施例中,所述应用程序分身系统10将一个源应用程序(下文简称为“应用程序真身”)复制成与所述应用程序真身相同的应用程序分身(下文简称为“应用程序分身”)。所述应用程序真身具有第一标识信息,所述应用程序分身具有第二标识信息,其中,所述第一标识信息可以与所述第二标识信息相同,也可以不相同。所述标识信息包括,但不限于,应用程序的图标,应用程序的名称等。即,所述应用程序真身的图标可以与所述应用程序分身的图标相同,所述应用程序真身的名称可以与所述应用程序分身的名称相同,例如,均为即时通信软件。所述应用程序真身的图标也可以与所述应用程序分身的图标不相同,所述应用程序真身的名称也可以与所述应用程序分身的名称不相同,例如,所述应用程序真身的名称为“即时通信软件”,而所述应用程序分身的名称为“即时通讯软件1”。In this embodiment, the application avatar system 10 copies a source application (hereinafter referred to as "application avatar") to an application avatar (hereinafter referred to as "application avatar") identical to the application avatar. avatar"). The application avatar has first identification information, and the application avatar has second identification information, wherein the first identification information may be the same as or different from the second identification information. The identification information includes, but is not limited to, the icon of the application program, the name of the application program, and the like. That is, the icon of the application real body may be the same as the icon of the application avatar, and the name of the application avatar may be the same as the name of the application avatar, for example, both are instant messaging software. The icon of the application real body can also be different from the icon of the application avatar, and the name of the application real body can also be different from the name of the application avatar, for example, the application real body The name of the application is "instant messaging software", and the name of the application clone is "instant messaging software 1".

所述应用程序分身是指双开或多开所述应用程序,以实现在如Android系统下,一个应用程序能够打开两个或多个进程,且所述两个或多个进程可同时运行。分身应用程序图标对应分身进程,即运行分身应用程序图标对应的分身应用程序后,生成一个不同于源应用程序的独立进程,具有独立的运行环境。The application program clone refers to double-opening or multiple-opening of the application program, so that under the Android system, for example, one application program can open two or more processes, and the two or more processes can run simultaneously. The clone application icon corresponds to the clone process, that is, after running the clone application corresponding to the clone application icon, an independent process different from the source application is generated and has an independent operating environment.

即,当所述应用程序分身系统10为某个应用程序创建了一个或多个应用程序分身,所述应用程序真身及对应的应用程序分身可以同时运行在所述电子终端1中。所述应用程序真身用于所述电子终端1的主人交流、游戏或购物等,所述应用程序分身用于他人(即访客)交流、游戏或购物等。如此,他人进入访客模式后就不能够登录所述应用程序的真身,只能登录所述应用程序的分身,也就避免了访客登录主人账号的情况发生。That is, when the application avatar system 10 creates one or more application avatars for a certain application, the application avatar and the corresponding application avatar can run on the electronic terminal 1 at the same time. The real application is used by the owner of the electronic terminal 1 for communication, games or shopping, etc., and the application avatar is used for communication, games or shopping by other people (namely visitors). In this way, after other people enter the guest mode, they cannot log in the real body of the application, but can only log in the avatar of the application, which avoids the situation where the guest logs in to the master account.

在本实施例中,所述应用程序分身系统10可以预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式。In this embodiment, the application avatar system 10 can preset the generation method of the icon of the application avatar, and the generation method includes one or more of the following: based on the generation method of the application avatar list, based on a specific The generation method of the touch area and the generation method based on the avatar command.

在第一个实施例中,所述应用程序分身系统10预先设置的生成方式是基于应用程序分身列表的生成方式,当用户需要为某个应用程序创建一个应用程序分身时,所述应用程序分身系统10侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。In the first embodiment, the preset generation method of the application avatar system 10 is based on the generation method of the application avatar list. When a user needs to create an application avatar for a certain application, the application avatar When the system 10 detects a signal that the user adds the icon of the real application program to the avatar list, an icon of the application program avatar is created to generate an avatar process, and the icon corresponds to the application program avatar.

在第二个实施例中,所述应用程序分身系统10预先设置的生成方式是基于特定触控区域的生成方式,所述应用程序分身系统10侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。In the second embodiment, the preset generation method of the application avatar system 10 is based on the generation method of a specific touch area, and the application avatar system 10 detects that the user drags or moves the real Create an icon of the application avatar to generate an avatar process when a signal from the avatar icon to the specific touch area is generated, and the icon corresponds to the application avatar.

在第三个实施例中,所述应用程序分身系统10预先设置的生成方式是基于分身指令的生成方式,所述应用程序分身系统10侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。所述分身指令包括,但不限于,触摸所述应用程序真身的图标的时长大于预设时间(例如,5秒),或者在预设时间段内点击所述所述应用程序真身的图标的次数满足预设的次数(例如,三次)。In the third embodiment, the preset generation method of the application avatar system 10 is based on the generation method of the avatar command. When the application avatar system 10 detects a signal that the user triggers the avatar instruction, the An icon of an application clone to generate a clone process, and the icon corresponds to the application clone. The avatar instruction includes, but is not limited to, touching the icon of the application real body for longer than a preset time (for example, 5 seconds), or clicking the icon of the application real body within a preset time period The number of times satisfies the preset number of times (for example, three times).

S30,隐藏所述应用程序真身。S30, hiding the real body of the application program.

在本实施例中,当为应用程序创建了应用程序分身时,所述应用程序分身系统10隐藏所述应用程序真身。如此可使得在访客模式下,访客无法查看主人的短信、通话记录或需要保密的应用程序或者功能等。In this embodiment, when an application avatar is created for an application, the application avatar system 10 hides the application avatar. In this way, in the guest mode, the guest cannot view the owner's text messages, call records, or applications or functions that need to be kept secret.

所述应用程序分身系统10可以预先创建用于存储被隐藏的应用程序真身的文件夹或者预先创建具备隐藏功能的隐藏应用程序。The application avatar system 10 may pre-create folders for storing hidden application avatars or pre-create hidden applications with a hidden function.

当用户拖拽或者移动所述应用程序真身至所述文件夹时,所述应用程序分身系统10获取用户拖拽或者移动的应用程序真身信息并将所述信息进行隐藏。所述应用程序真身信息包括应用程序真身名称、应用程序真身图标及运行所述应用程序真身产生的用户数据。When the user drags or moves the avatar of the application to the folder, the application avatar system 10 acquires information about the avatar of the application dragged or moved by the user and hides the information. The application avatar information includes the application avatar name, application avatar icon, and user data generated by running the application avatar.

在一些实施例中,所述应用程序分身系统10可预先设置隐藏所述文件夹的隐藏指令(例如长按所述电子终端1的物理按键超过第一预设时间)及预先设置显示所述文件夹的显示指令(例如长按所述电子终端1的物理按键超过第二预设时间)。当所述应用程序分身系统10侦测到所述隐藏指令时,在所述电子终端1的显示屏上完全隐藏所述文件夹。当所述应用程序分身系统10侦测到所述显示指令时,在所述电子终端1的显示屏上完全显示所述文件夹。In some embodiments, the application avatar system 10 can preset a hidden command to hide the folder (for example, press and hold the physical button of the electronic terminal 1 for more than a first preset time) and preset to display the file Folder display instruction (for example, press and hold the physical button of the electronic terminal 1 for more than the second preset time). When the application avatar system 10 detects the hiding instruction, the folder is completely hidden on the display screen of the electronic terminal 1 . When the application avatar system 10 detects the display instruction, the folder is completely displayed on the display screen of the electronic terminal 1 .

在一些实施例中,所述应用程序分身系统10可以为所述文件夹预先设置鉴权密码。进行加密设置的文件夹可以在所述电子终端1进入访客模式时仍旧显示在所述电子终端1的显示屏上。所述鉴权密码可以是用户的生物特征数据,例如,指纹数据、人脸数据、手形数据、虹膜数据、视网膜数据、脉搏数据或者耳廓数据等。所述鉴权密码还可以是用户的行为特征数据,例如,笔迹、声音、按键力度等。所述鉴权密码还可以是密码数据,例如,数字、字母、符号等或者数字、字母与符号等的组合。在其他实施例中,所述鉴权密码还可以是用户的生物特征数据、行为特征数据、密码数据的两种或者全部的组合。In some embodiments, the application avatar system 10 may preset an authentication password for the folder. The folder for encryption setting can still be displayed on the display screen of the electronic terminal 1 when the electronic terminal 1 enters the guest mode. The authentication password may be biometric data of the user, for example, fingerprint data, face data, hand shape data, iris data, retina data, pulse data or auricle data. The authentication password may also be user behavior characteristic data, for example, handwriting, voice, pressing force and so on. The authentication password may also be password data, for example, numbers, letters, symbols, etc. or a combination of numbers, letters, and symbols. In other embodiments, the authentication password may also be a combination of two or all of the user's biological feature data, behavioral feature data, and password data.

当用户通过所述隐藏应用程序的添加功能添加所述应用程序真身时,所述应用程序分身系统10获取所添加的应用程序真身信息并将所述信息进行隐藏。所述应用程序真身信息包括应用程序真身名称、应用程序真身图标及所述运行所述应用程序真身产生的用户数据。在一些实施例中,所述隐藏应用程序可以是小插件,如widget应用程序。When the user adds the real person of the application through the adding function of the hidden application, the application avatar system 10 obtains the added real person information of the application and hides the information. The application avatar information includes an application avatar name, an application avatar icon, and user data generated by running the application avatar. In some embodiments, the hidden application may be a widget, such as a widget application.

需要说明的是,在上述实施例中,在访客模式下,安装在所述电子终端1中的所有应用程序或者系统自带的功能等都不可以被删除,以防止访客随意删除或更改应用程序或者功能等。It should be noted that, in the above-mentioned embodiment, in the guest mode, all applications installed in the electronic terminal 1 or functions built in the system cannot be deleted, so as to prevent visitors from deleting or changing applications at will. or functions etc.

进一步地,本发明所述应用程序分身方法还包括:在退出所述访客模式界面时,删除访客数据。Further, the application clone method of the present invention further includes: deleting visitor data when exiting the visitor mode interface.

在退出访客模式时,所述应用程序分身系统10将所述应用程序分身中产生的访客数据删除。在一些实施例中,所述应用程序分身系统10可以预先设置专门用于存放访客数据的目录,当将所述目录删掉,访客数据随之被删除。When exiting the guest mode, the application avatar system 10 deletes the visitor data generated in the application avatar. In some embodiments, the application avatar system 10 can preset a directory dedicated to storing visitor data, and when the directory is deleted, the visitor data will be deleted accordingly.

综上所述,所述应用程序分身方法在接收到进入访客模式的触发指令时,进入访客模式界面,创建应用程序分身的同时隐藏所述应用程序真身。通过本发明能够实现对电子终端安装的应用程序进行分身,在访客模式下隐藏应用程序真身,既保留了用户运行应用程序真身的历史数据,使得主人再次运行所述应用程序时,不用重新手动输入必须的数据(例如,账号和密码),使得用户即使忘记了运行该应用程序所需的账号和密码也不会对再次运行该应用程序造成任何影响,人机交互更加流畅,同时还有效地保护了用户的隐私,提高用户体验。其次,创建应用程序分身还可避免访客误以为所述电子终端中没有所述应用程序而重新下载安装该应用程序,节省了终端内存和网络流量。To sum up, when the application avatar method receives a trigger instruction to enter the visitor mode, it enters the visitor mode interface, creates an application avatar and hides the real application at the same time. Through the present invention, the application program installed on the electronic terminal can be cloned, and the application program real body is hidden in the guest mode, which not only retains the historical data of the user running the application program real body, so that when the owner runs the application program again, there is no need to restart the application program. Manually input the necessary data (for example, account number and password), so that even if the user forgets the account number and password required to run the application, it will not have any impact on running the application again, making the human-computer interaction more smooth and effective. It protects the privacy of users and improves user experience. Secondly, creating application avatars can also prevent visitors from re-downloading and installing the application program because they mistakenly think that the application program does not exist in the electronic terminal, which saves terminal memory and network traffic.

参阅图3所示,是本发应用程序分身系统10较佳实施例中的功能模块图。Referring to FIG. 3 , it is a diagram of functional modules in a preferred embodiment of the application avatar system 10 of the present invention.

在本实施例中,所述应用程序分身系统10包括:显示模块100、设置模块101、创建模块102、隐藏模块103以及删除模块104。本发明所称的模块是指一种能够被处理器12所执行并且能够完成固定功能的一系列计算机程序段,其存储在存储设备11中。在本实施例中,关于各模块的功能将在后续的实施例中详述。In this embodiment, the application avatar system 10 includes: a display module 100 , a setting module 101 , a creating module 102 , a hiding module 103 and a deleting module 104 . The module referred to in the present invention refers to a series of computer program segments that can be executed by the processor 12 and can complete fixed functions, and are stored in the storage device 11 . In this embodiment, the functions of each module will be described in detail in subsequent embodiments.

所述显示模块100,用于当接收到进入访客模式的触发指令时,显示访客模式界面。The display module 100 is configured to display a visitor mode interface when a trigger instruction to enter the visitor mode is received.

在本实施例中,所述电子终端1的屏幕为触摸式显示屏。所述触摸式显示屏可以让使用者只要用手指或者触控笔轻轻触碰显示屏上的应用程序图标或文件夹或文字或图片就能实现对所述电子终端1的操作,使人机交互更为直截了当。In this embodiment, the screen of the electronic terminal 1 is a touch screen. The touch screen allows the user to operate the electronic terminal 1 as long as the user touches the application program icon or folder or text or picture on the screen with a finger or a stylus lightly, making the man-machine Interaction is more straightforward.

优选的,用户用手指点击或者触摸所述电子终端1的屏幕时产生一个触碰事件。Preferably, a touch event is generated when the user clicks or touches the screen of the electronic terminal 1 with a finger.

在本实施例中,所述设置模块101预先设置了进入访客模式的快捷入口,通过所述快捷入口,用户可以进入访客模式。In this embodiment, the setting module 101 presets a shortcut entry for entering the visitor mode, through which the user can enter the visitor mode.

在第一实施例中,所述快捷入口是访客模式应用程序图标。当用户点击访客模式应用程序图标后,所述电子终端1内部会产生一个触控信号,所述显示模块100判断所述触控信号所在的位置所对应的应用程序图标,进而确定接收到了进入访客模式的触发信号,在所述电子终端1的显示屏幕上显示访客模式应用界面。In the first embodiment, the shortcut entry is an application program icon in guest mode. When the user clicks the application program icon in visitor mode, a touch signal will be generated inside the electronic terminal 1, and the display module 100 will determine the application program icon corresponding to the location of the touch signal, and then determine that the incoming visitor The trigger signal of the mode displays the visitor mode application interface on the display screen of the electronic terminal 1 .

在第二实施例中,所述设置模块101预先设置了在锁屏界面上进入访客模式的解锁密码,则所述快捷入口是锁屏界面上的解锁密码。当用户正确输入相应的密码后,所述显示模块100确定接收到了进入访客模式的触发信号,在所述电子终端1的显示屏幕上显示访客模式应用界面。In the second embodiment, the setting module 101 presets an unlock password for entering the guest mode on the lock screen interface, and the shortcut entry is the unlock password on the lock screen interface. When the user correctly enters the corresponding password, the display module 100 determines that a trigger signal to enter the guest mode has been received, and displays the guest mode application interface on the display screen of the electronic terminal 1 .

所述创建模块102,用于创建应用程序分身。The creation module 102 is used to create application avatars.

在本实施例中,所述创建模块102将一个源应用程序(下文简称为“应用程序真身”)复制成与所述应用程序真身相同的应用程序分身(下文简称为“应用程序分身”)。所述应用程序真身具有第一标识信息,所述应用程序分身具有第二标识信息,其中,所述第一标识信息可以与所述第二标识信息相同,也可以不相同。所述标识信息包括,但不限于,应用程序的图标,应用程序的名称等。即,所述应用程序真身的图标可以与所述应用程序分身的图标相同,所述应用程序真身的名称可以与所述应用程序分身的名称相同,例如,均为即时通信软件。所述应用程序真身的图标也可以与所述应用程序分身的图标不相同,所述应用程序真身的名称也可以与所述应用程序分身的名称不相同,例如,所述应用程序真身的名称为“即时通信软件”,而所述应用程序分身的名称为“即时通讯软件1”。In this embodiment, the creation module 102 copies a source application program (hereinafter referred to as "application program clone") to an application program clone (hereinafter referred to as "application program clone" for short) that is identical to the application program's real program program. ). The application avatar has first identification information, and the application avatar has second identification information, wherein the first identification information may be the same as or different from the second identification information. The identification information includes, but is not limited to, the icon of the application program, the name of the application program, and the like. That is, the icon of the application real body may be the same as the icon of the application avatar, and the name of the application avatar may be the same as the name of the application avatar, for example, both are instant messaging software. The icon of the application real body can also be different from the icon of the application avatar, and the name of the application real body can also be different from the name of the application avatar, for example, the application real body The name of the application is "instant messaging software", and the name of the application clone is "instant messaging software 1".

所述应用程序分身是指双开或多开所述应用程序,以实现在如Android系统下,一个应用程序能够打开两个或多个进程,且所述两个或多个进程可同时运行。分身应用程序图标对应分身进程,即运行分身应用程序图标对应的分身应用程序后,生成一个不同于源应用程序的独立进程,具有独立的运行环境。The application program clone refers to double-opening or multiple-opening of the application program, so that under the Android system, for example, one application program can open two or more processes, and the two or more processes can run simultaneously. The clone application icon corresponds to the clone process, that is, after running the clone application corresponding to the clone application icon, an independent process different from the source application is generated and has an independent operating environment.

即,当所述创建模块102为某个应用程序创建了一个或多个应用程序分身,所述应用程序真身及对应的应用程序分身可以同时运行在所述电子终端1中。所述应用程序真身用于所述电子终端1的主人交流、游戏或购物等,所述应用程序分身用于他人(即访客)交流、游戏或购物等。如此,他人进入访客模式后就不能够登录所述应用程序的真身,只能登录所述应用程序的分身,也就避免了访客登录主人账号的情况发生。That is, when the creation module 102 creates one or more application avatars for a certain application, the application avatar and the corresponding application avatars can run on the electronic terminal 1 at the same time. The real application is used by the owner of the electronic terminal 1 for communication, games or shopping, etc., and the application avatar is used for communication, games or shopping by other people (namely visitors). In this way, after other people enter the guest mode, they cannot log in the real body of the application, but can only log in the avatar of the application, which avoids the situation where the guest logs in to the master account.

在本实施例中,所述设置模块101可以预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式。In this embodiment, the setting module 101 can preset the generation method of the icon of the application avatar, and the generation method includes one or more of the following: generation method based on application avatar list, based on specific touch The generation method of the area and the generation method based on the avatar command.

在第一个实施例中,所述设置模块101预先设置的生成方式是基于应用程序分身列表的生成方式,当用户需要为某个应用程序创建一个应用程序分身时,所述创建模块102侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。In the first embodiment, the generation method preset by the setting module 101 is based on the generation method of the application avatar list. When the user needs to create an application avatar for a certain application, the creation module 102 detects When the user adds the icon of the real application program to the signal in the avatar list, an icon of the application program avatar is created to generate an avatar process, and the icon corresponds to the application program avatar.

在第二个实施例中,所述设置模块101预先设置的生成方式是基于特定触控区域的生成方式,所述创建模块102侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。In the second embodiment, the generation method preset by the setting module 101 is based on the generation method of a specific touch area, and the creation module 102 detects that the user drags or moves the icon of the real application program to the When the signal of the specific touch area is used, an icon of the application avatar is created to generate an avatar process, and the icon corresponds to the application avatar.

在第三个实施例中,所述设置模块101预先设置的生成方式是基于分身指令的生成方式,所述创建模块102侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标,以生成分身进程,所述图标对应所述应用程序分身。所述分身指令包括,但不限于,触摸所述应用程序真身的图标的时长大于预设时间(例如,5秒),或者在预设时间段内点击所述所述应用程序真身的图标的次数满足预设的次数(例如,三次)。In the third embodiment, the generation method preset by the setting module 101 is based on the generation method of the avatar instruction, and the creation module 102 creates the avatar of the application program when a signal that the user triggers the avatar instruction is detected. icon to generate the clone process, and the icon corresponds to the clone of the application program. The avatar instruction includes, but is not limited to, touching the icon of the application real body for longer than a preset time (for example, 5 seconds), or clicking the icon of the application real body within a preset time period The number of times satisfies the preset number of times (for example, three times).

所述隐藏模块103,用于隐藏所述应用程序真身。The hiding module 103 is configured to hide the real body of the application.

在本实施例中,当为应用程序创建了应用程序分身时,所述隐藏模块103隐藏所述应用程序真身。如此可使得在访客模式下,访客无法查看主人的短信、通话记录或需要保密的应用程序或者功能等。In this embodiment, when an application avatar is created for the application, the hiding module 103 hides the real avatar of the application. In this way, in the guest mode, the guest cannot view the owner's text messages, call records, or applications or functions that need to be kept secret.

所述创建模块102可以预先创建用于存储被隐藏的应用程序真身的文件夹或者预先创建具备隐藏功能的隐藏应用程序。The creation module 102 may pre-create a folder for storing the real body of the hidden application program or pre-create a hidden application program with a hiding function.

当用户拖拽或者移动所述应用程序真身至所述文件夹时,所述隐藏模块103获取用户拖拽或者移动的应用程序真身信息并将所述信息进行隐藏。所述应用程序真身信息包括应用程序真身名称、应用程序真身图标及运行所述应用程序真身产生的用户数据。When the user drags or moves the avatar of the application to the folder, the hiding module 103 acquires the avatar information of the application dragged or moved by the user and hides the information. The application avatar information includes the application avatar name, application avatar icon, and user data generated by running the application avatar.

在一些实施例中,所述设置模块101可预先设置隐藏所述文件夹的隐藏指令(例如长按所述电子终端1的物理按键超过第一预设时间)及预先设置显示所述文件夹的显示指令(例如长按所述电子终端1的物理按键超过第二预设时间)。当所述隐藏模块103侦测到所述隐藏指令时,在所述电子终端1的显示屏上完全隐藏所述文件夹。当所述隐藏模块103侦测到所述显示指令时,在所述电子终端1的显示屏上完全显示所述文件夹。In some embodiments, the setting module 101 can preset the hidden command to hide the folder (for example, press and hold the physical button of the electronic terminal 1 for more than the first preset time) and preset the command to display the folder. Displaying an instruction (for example, pressing and holding a physical button of the electronic terminal 1 for more than a second preset time). When the hiding module 103 detects the hiding instruction, the folder is completely hidden on the display screen of the electronic terminal 1 . When the hiding module 103 detects the display instruction, the folder is completely displayed on the display screen of the electronic terminal 1 .

在一些实施例中,所述设置模块101可以为所述文件夹预先设置鉴权密码。进行加密设置的文件夹可以在所述电子终端1进入访客模式时仍旧显示在所述电子终端1的显示屏上。所述鉴权密码可以是用户的生物特征数据,例如,指纹数据、人脸数据、手形数据、虹膜数据、视网膜数据、脉搏数据或者耳廓数据等。所述鉴权密码还可以是用户的行为特征数据,例如,笔迹、声音、按键力度等。所述鉴权密码还可以是密码数据,例如,数字、字母、符号等或者数字、字母与符号等的组合。在其他实施例中,所述鉴权密码还可以是用户的生物特征数据、行为特征数据、密码数据的两种或者全部的组合。In some embodiments, the setting module 101 can preset an authentication password for the folder. The folder for encryption setting can still be displayed on the display screen of the electronic terminal 1 when the electronic terminal 1 enters the guest mode. The authentication password may be biometric data of the user, for example, fingerprint data, face data, hand shape data, iris data, retina data, pulse data or auricle data. The authentication password may also be user behavior characteristic data, for example, handwriting, voice, pressing force and so on. The authentication password may also be password data, for example, numbers, letters, symbols, etc. or a combination of numbers, letters, and symbols. In other embodiments, the authentication password may also be a combination of two or all of the user's biological feature data, behavioral feature data, and password data.

当用户通过所述隐藏应用程序的添加功能添加所述应用程序真身时,所述隐藏模块103获取所添加的应用程序真身信息并将所述信息进行隐藏。所述应用程序真身信息包括应用程序真身名称、应用程序真身图标及所述运行所述应用程序真身产生的用户数据。在一些实施例中,所述隐藏应用程序可以是小插件,如widget应用程序。When the user adds the real body of the application through the adding function of the hidden application, the hiding module 103 acquires the added real body information of the application and hides the information. The application avatar information includes an application avatar name, an application avatar icon, and user data generated by running the application avatar. In some embodiments, the hidden application may be a widget, such as a widget application.

需要说明的是,在上述实施例中,在访客模式下,安装在所述电子终端1中的所有应用程序或者系统自带的功能等都不可以被删除,以防止访客随意删除或更改应用程序或者功能等。It should be noted that, in the above-mentioned embodiment, in the guest mode, all applications installed in the electronic terminal 1 or functions built in the system cannot be deleted, so as to prevent visitors from deleting or changing applications at will. or functions etc.

进一步地,本发明所述应用程序分身系统还包括所述删除模块104:用于在退出所述访客模式界面时,删除访客数据。Further, the application avatar system of the present invention further includes the deletion module 104, configured to delete visitor data when exiting the visitor mode interface.

在退出访客模式时,所述删除模块104将所述应用程序分身中产生的访客数据删除。在一些实施例中,所述设置模块101可以预先设置专门用于存放访客数据的目录,当所述删除模块104将所述目录删掉,访客数据随之被删除。When exiting the guest mode, the deletion module 104 deletes the guest data generated in the application avatar. In some embodiments, the setting module 101 may preset a directory dedicated to storing visitor data, and when the deletion module 104 deletes the directory, the visitor data will be deleted accordingly.

综上所述,所述应用程序分身系统10在接收到进入访客模式的触发指令时,进入访客模式界面,创建应用程序分身的同时隐藏所述应用程序真身。通过本发明能够实现对电子终端安装的应用程序进行分身,在访客模式下隐藏应用程序真身,既保留了用户运行应用程序真身的历史数据,使得主人再次运行所述应用程序时,不用重新手动输入必须的数据(例如,账号和密码),使得用户即使忘记了运行该应用程序所需的账号和密码也不会对再次运行该应用程序造成任何影响,人机交互更加流畅,同时还有效地保护了用户的隐私,提高用户体验。其次,创建应用程序分身还可避免访客误以为所述电子终端中没有所述应用程序而重新下载安装该应用程序,节省了终端内存和网络流量。To sum up, when the application avatar system 10 receives a trigger instruction to enter the guest mode, it enters the guest mode interface, creates an application avatar and hides the real application at the same time. Through the present invention, the application program installed on the electronic terminal can be cloned, and the application program real body is hidden in the guest mode, which not only retains the historical data of the user running the application program real body, so that when the owner runs the application program again, there is no need to restart the application program. Manually input the necessary data (for example, account number and password), so that even if the user forgets the account number and password required to run the application, it will not have any impact on running the application again, making the human-computer interaction more smooth and effective. It protects the privacy of users and improves user experience. Secondly, creating application avatars can also prevent visitors from re-downloading and installing the application program because they mistakenly think that the application program does not exist in the electronic terminal, which saves terminal memory and network traffic.

在本发明所提供的几个实施例中,应该理解到,所揭露的系统,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。In the several embodiments provided by the present invention, it should be understood that the disclosed systems, devices and methods can be implemented in other ways. For example, the device embodiments described above are only illustrative. For example, the division of the modules is only a logical function division, and there may be other division methods in actual implementation.

另外,在本发明各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。In addition, each functional module in each embodiment of the present invention may be integrated into one processing unit, or each unit may physically exist separately, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, or in the form of hardware plus software function modules.

上述以软件功能模块的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能模块存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,通讯终端,或者网络设备等)或处理器(processor)执行本发明各个实施例所述方法的部分。The above-mentioned integrated units implemented in the form of software function modules can be stored in a computer-readable storage medium. The above-mentioned software function modules are stored in a storage medium, and include several instructions to enable a computer device (which may be a personal computer, a communication terminal, or a network device, etc.) or a processor (processor) to execute the methods described in various embodiments of the present invention part.

对于本领域技术人员而言,显然本发明不限于上述示范性实施例的细节,而且在不背离本发明的精神或基本特征的情况下,能够以其他的具体形式实现本发明。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本发明的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本发明内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或,单数不排除复数。系统权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。It will be apparent to those skilled in the art that the invention is not limited to the details of the above-described exemplary embodiments, but that the invention can be embodied in other specific forms without departing from the spirit or essential characteristics of the invention. Accordingly, the embodiments should be regarded in all points of view as exemplary and not restrictive, the scope of the invention being defined by the appended claims rather than the foregoing description, and it is therefore intended that the scope of the invention be defined by the appended claims rather than by the foregoing description. All changes within the meaning and range of equivalents of the elements are embraced in the present invention. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is clear that the word "comprising" does not exclude other elements or the singular does not exclude the plural. A plurality of units or devices stated in the system claims may also be realized by one unit or device through software or hardware. The words first, second, etc. are used to denote names and do not imply any particular order.

最后应说明的是,以上实施例仅用以说明本发明的技术方案而非限制,尽管参照较佳实施例对本发明进行了详细说明,本领域的普通技术人员应当理解,可以对本发明的技术方案进行修改或等同替换,而不脱离本发明技术方案的精神和范围。Finally, it should be noted that the above embodiments are only used to illustrate the technical solutions of the present invention without limitation. Although the present invention has been described in detail with reference to the preferred embodiments, those of ordinary skill in the art should understand that the technical solutions of the present invention can be Modifications or equivalent replacements can be made without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1.一种应用程序分身方法,应用于电子终端中,其特征在于,所述方法包括:1. A method for application program clone, applied in an electronic terminal, characterized in that the method comprises: 当接收到进入访客模式的触发指令时,显示访客模式界面;When a trigger instruction to enter the visitor mode is received, the visitor mode interface is displayed; 创建应用程序分身;及create app clones; and 隐藏所述应用程序真身。Hide said app's real body. 2.如权利要求1所述的应用程序分身方法,其特征在于,所述方法还包括:2. The application clone method according to claim 1, further comprising: 预先设置进入所述访客模式的快捷入口,通过所述快捷入口,进入所述访客模式界面,其中,所述快捷入口是访客模式应用程序的图标或者是所述电子终端锁屏界面上的解锁密码。A shortcut entry for entering the visitor mode is set in advance, and the visitor mode interface is entered through the shortcut entry, wherein the shortcut entry is an icon of a visitor mode application program or an unlock password on the lock screen interface of the electronic terminal . 3.如权利要求1所述的应用程序分身方法,其特征在于,所述创建应用程序分身包括:3. The application clone method according to claim 1, wherein said creating an application clone comprises: 预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式;The generation method of the icon of the application avatar is set in advance, and the generation method includes one or more of the following: a generation method based on the application avatar list, a generation method based on a specific touch area, and a generation method based on an avatar instruction; 当所述生成方式是基于应用程序分身列表的生成方式时,且在侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标;或者When the generation method is based on the generation method of the avatar list of the application program, and when a signal is detected that the user adds the icon of the real avatar of the application program to the avatar list, the icon of the avatar of the application program is created; or 当所述生成方式是基于特定触控区域的生成方式时,且在侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标;或者When the generation method is based on the generation method of a specific touch area, and when a signal is detected that the user drags or moves the icon of the application avatar to the specific touch area, the application avatar is created icon; or 当所述生成方式是基于分身指令的生成方式时,且在侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标。When the generation method is based on the generation method of the avatar instruction, and when a signal that the user triggers the avatar instruction is detected, an icon of the avatar of the application program is created. 4.如权利要求1所述的应用程序分身方法,其特征在于,所述方法还包括:4. The application clone method according to claim 1, further comprising: 预先创建用于存储被隐藏的应用程序真身的文件夹;或者Pre-create the folder where the hidden app avatar is stored; or 预先创建具备隐藏功能的隐藏应用程序。Pre-created hidden apps with hidden functions. 5.如权利要求1至4中任意一项所述的应用程序分身方法,其特征在于,所述方法还包括:5. The application clone method according to any one of claims 1 to 4, further comprising: 在退出所述访客模式界面时,删除访客数据。When exiting the visitor mode interface, the visitor data is deleted. 6.一种应用程序分身系统,安装于电子终端中,其特征在于,所述系统包括:6. An application avatar system installed in an electronic terminal, characterized in that the system includes: 显示模块,用于当接收到进入访客模式的触发指令时,显示访客模式界面;A display module, configured to display the visitor mode interface when a trigger instruction for entering the visitor mode is received; 创建模块,用于创建应用程序分身;及create modules for creating app clones; and 隐藏模块,用于隐藏所述应用程序真身。The hidden module is used to hide the real body of the application. 7.如权利要求6所述的应用程序分身系统,其特征在于,所述系统还包括:7. The application avatar system according to claim 6, wherein the system further comprises: 设置模块,用于预先设置进入所述访客模式的快捷入口,通过所述快捷入口,进入所述访客模式界面,其中,所述快捷入口是访客模式应用程序的图标或者是所述电子终端锁屏界面上的解锁密码。A setting module, configured to preset a shortcut entry for entering the visitor mode, and enter the visitor mode interface through the shortcut entry, wherein the shortcut entry is an icon of a visitor mode application program or a lock screen of the electronic terminal The unlock password on the interface. 8.如权利要求6所述的应用程序分身系统,其特征在于,8. The application avatar system according to claim 6, characterized in that, 所述设置模块,还用于预先设置所述应用程序分身的图标的生成方式,所述生成方式包括以下一种或者多种:基于应用程序分身列表的生成方式、基于特定触控区域的生成方式、基于分身指令的生成方式;The setting module is also used to pre-set the generation method of the icon of the application avatar, and the generation method includes one or more of the following: a generation method based on the application avatar list, a generation method based on a specific touch area , Based on the generation method of the avatar command; 所述创建模块在所述生成方式是基于应用程序分身列表的生成方式时,且在侦测到用户将所述应用程序真身的图标添加至所述分身列表中的信号时创建所述应用程序分身的图标;或者The creation module creates the application when the generation method is based on the generation method of the avatar list of the application program, and when a signal is detected that the user adds the icon of the avatar of the application program to the avatar list the icon of the avatar; or 所述创建模块在所述生成方式是基于特定触控区域的生成方式时,且在侦测到用户拖拽或者移动所述应用程序真身的图标至所述特定的触摸区域的信号时创建所述应用程序分身的图标;或者When the creation method is based on the generation method of a specific touch area, and when a signal is detected that the user drags or moves the icon of the application avatar to the specific touch area, the creation module creates the the icon of the said app avatar; or 所述创建模块在所述生成方式是基于分身指令的生成方式时,且在侦测到用户触发所述分身指令的信号时创建所述应用程序分身的图标。The creating module creates an icon of the application avatar when the generating method is based on the avatar command and when a signal that the user triggers the avatar command is detected. 9.如权利要求6所述的应用程序分身系统,其特征在于,所述创建模块还用于:9. The application avatar system according to claim 6, wherein the creation module is also used for: 预先创建用于存储被隐藏的应用程序真身的文件夹;或者Pre-create the folder where the hidden app avatar is stored; or 预先创建具备隐藏功能的隐藏应用程序。Pre-created hidden apps with hidden functions. 10.如权利要求6至9中任意一项所述的应用程序分身系统,其特征在于,所述系统还包括:10. The application avatar system according to any one of claims 6 to 9, wherein the system further comprises: 删除模块,用于在退出所述访客模式界面时,删除访客数据。A deletion module, configured to delete visitor data when exiting the visitor mode interface.
CN201610844416.0A 2016-09-22 2016-09-22 Application clone method and system Pending CN106446709A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610844416.0A CN106446709A (en) 2016-09-22 2016-09-22 Application clone method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610844416.0A CN106446709A (en) 2016-09-22 2016-09-22 Application clone method and system

Publications (1)

Publication Number Publication Date
CN106446709A true CN106446709A (en) 2017-02-22

Family

ID=58167000

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610844416.0A Pending CN106446709A (en) 2016-09-22 2016-09-22 Application clone method and system

Country Status (1)

Country Link
CN (1) CN106446709A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951293A (en) * 2017-03-28 2017-07-14 华平智慧信息技术(深圳)有限公司 The realization method and system of attending to anything else of instant messaging
CN107277626A (en) * 2017-08-09 2017-10-20 四川长虹电器股份有限公司 A kind of method that concealed pre-installation application is realized in intelligent television
CN107800867A (en) * 2017-09-19 2018-03-13 深圳依偎控股有限公司 Using management method, device and the computer-readable recording medium attended to anything else
CN108170331A (en) * 2017-12-26 2018-06-15 上海展扬通信技术有限公司 A kind of double switching methods and relevant device for opening application
CN108595977A (en) * 2018-03-30 2018-09-28 广东欧珀移动通信有限公司 User mode controlling method and device, readable storage medium storing program for executing, terminal
WO2018176223A1 (en) * 2017-03-28 2018-10-04 华平智慧信息技术(深圳)有限公司 Cloned implementation method and system for instant message
CN112230826A (en) * 2020-11-23 2021-01-15 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium
CN116049118A (en) * 2022-05-27 2023-05-02 荣耀终端有限公司 File sharing method and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting mobile phone permission password
US20140164518A1 (en) * 2009-09-18 2014-06-12 Telesocial, Inc. Telecommunication Service Employing an Electronic Information Repository Storing Social Network User Information, Developer Information, and Mobile Network Operator Information
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN105224322A (en) * 2015-09-25 2016-01-06 维沃移动通信有限公司 A kind of attend to anything else method and terminal of application program
CN105956495A (en) * 2016-04-15 2016-09-21 奇酷软件(深圳)有限公司 Social application program operation control method and system, and mobile terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140164518A1 (en) * 2009-09-18 2014-06-12 Telesocial, Inc. Telecommunication Service Employing an Electronic Information Repository Storing Social Network User Information, Developer Information, and Mobile Network Operator Information
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting mobile phone permission password
CN105025165A (en) * 2015-07-06 2015-11-04 北京乐动卓越科技有限公司 Interface unlocking method and system corresponding to multiple passwords
CN105224322A (en) * 2015-09-25 2016-01-06 维沃移动通信有限公司 A kind of attend to anything else method and terminal of application program
CN105956495A (en) * 2016-04-15 2016-09-21 奇酷软件(深圳)有限公司 Social application program operation control method and system, and mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
未知: "关于隐私空间和微信分身的结合使用", 《URL:HTTP://BBS.360.CN/THREAD-52263-1-1.HTML,文档第1页》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951293A (en) * 2017-03-28 2017-07-14 华平智慧信息技术(深圳)有限公司 The realization method and system of attending to anything else of instant messaging
WO2018176223A1 (en) * 2017-03-28 2018-10-04 华平智慧信息技术(深圳)有限公司 Cloned implementation method and system for instant message
CN107277626A (en) * 2017-08-09 2017-10-20 四川长虹电器股份有限公司 A kind of method that concealed pre-installation application is realized in intelligent television
CN107277626B (en) * 2017-08-09 2020-04-28 四川长虹电器股份有限公司 Method for realizing hidden pre-installation application in smart television
CN107800867A (en) * 2017-09-19 2018-03-13 深圳依偎控股有限公司 Using management method, device and the computer-readable recording medium attended to anything else
CN107800867B (en) * 2017-09-19 2020-08-04 深圳依偎控股有限公司 Application split management method and device and computer readable storage medium
WO2019129042A1 (en) * 2017-12-26 2019-07-04 深圳传音控股股份有限公司 Dual account application switching method and related equipment
CN108170331A (en) * 2017-12-26 2018-06-15 上海展扬通信技术有限公司 A kind of double switching methods and relevant device for opening application
CN108595977A (en) * 2018-03-30 2018-09-28 广东欧珀移动通信有限公司 User mode controlling method and device, readable storage medium storing program for executing, terminal
CN112230826A (en) * 2020-11-23 2021-01-15 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium
CN112230826B (en) * 2020-11-23 2022-07-12 深圳传音控股股份有限公司 Control method of mobile terminal, mobile terminal and storage medium
CN116049118A (en) * 2022-05-27 2023-05-02 荣耀终端有限公司 File sharing method and electronic equipment
CN116049118B (en) * 2022-05-27 2023-11-07 荣耀终端有限公司 File sharing method and electronic equipment

Similar Documents

Publication Publication Date Title
US11882221B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN106446709A (en) Application clone method and system
KR101825771B1 (en) Multiple-access-level lock screen
EP2650808A1 (en) Method for integrating account management function in input method software
CN111344707B (en) Electronic device including a display and method for encrypting and decrypting information
US20170192646A1 (en) Method and electronic device for hiding application icons and mobile phone
CN103064515A (en) A method and device for quickly entering a function based on fingerprint recognition
EP3176719B1 (en) Methods and devices for acquiring certification document
WO2020253197A1 (en) Method and apparatus for managing virtual user identification card, terminal device and storage medium
CN107450839A (en) Black screen gesture-based control method, device, storage medium and mobile terminal
CN105224194B (en) A kind of data processing method and terminal
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
US9740835B2 (en) Systems and methods for creating and sharing protected content
CN105827622A (en) Method and device for protecting user information
CN105205410B (en) Data managing method and terminal
CN106778124A (en) The application method and device of a kind of hiden application
JP6938579B2 (en) Mobile device privacy protection methods and devices, as well as mobile devices
JP2009181218A (en) Authentication device, authentication method and program
CN109324843B (en) Fingerprint processing system and method and fingerprint equipment
CN110554817A (en) desktop icon display control method and device, readable medium and computing equipment
WO2022247866A1 (en) Application icon management method and apparatus, and electronic device
CN111279339B (en) Application locking method, terminal equipment and computer readable medium
CN110727645A (en) Method and system for opening debug bridge adb, storage medium and electronic equipment
CN111090868A (en) Terminal screen display control method, terminal and computer readable storage medium
JP2014232522A (en) Information processing device, control method for information processing device, and program

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222