CN102082863A - Terminal and software call method on same - Google Patents
Terminal and software call method on same Download PDFInfo
- Publication number
- CN102082863A CN102082863A CN2010102927803A CN201010292780A CN102082863A CN 102082863 A CN102082863 A CN 102082863A CN 2010102927803 A CN2010102927803 A CN 2010102927803A CN 201010292780 A CN201010292780 A CN 201010292780A CN 102082863 A CN102082863 A CN 102082863A
- Authority
- CN
- China
- Prior art keywords
- software
- particular type
- terminal
- user
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephone Function (AREA)
Abstract
The invention relates to the communication field and discloses a terminal and a software call method on the same. In the invention, specified software for protecting the privacy of specified information on the terminal is run in background, and a running interface of the software is displayed to a user through an input command by means of event triggering when the software is required to be called. As mobile phone software for safety, privacy protection, and the like is run in a background mode, other people cannot discover the run software through a program list, namely other people cannot know whether the software is installed or not, thus the privacy protection and safety are completely realized. Moreover, due to complete background running, the use of other software cannot be affected.
Description
Technical field
The present invention relates to the communications field, particularly the terminal technology in the communications field.
Background technology
Along with network and technology develop towards more and more broadband direction, the mobile communication industry will be moved towards the real mobile message epoch.On the other hand, along with the develop rapidly of integrated circuit technique, the disposal ability of portable terminal has had powerful disposal ability, and portable terminal (as mobile phone) becomes an integrated information processing platform from simple conversation instrument.This has also increased broad more development space to portable terminal.
Modern portable terminal has had very powerful disposal ability, can finish complicated Processing tasks.Portable terminal also has profuse communication mode, promptly can pass through GSM (Global Systemfor Mobile Communications, Chinese is global system for mobile communications), CDMA (CodeDivision Multiple Access, Chinese is code division multiple access), WCDMA (Wideband CodeDivision Multiple Access, Chinese is Wideband Code Division Multiple Access (WCDMA)), TD-CDMA wireless operation network communications such as (TD SDMA accesses), also can pass through WLAN (wireless local area network), bluetooth and infrared communicating.
Because portable terminal of today is used various aspects in daily life more and more widely, therefore how the privacy on the terminal is protected, also obtained paying close attention to widely.
The various softwares that the privacy on the terminal is protected of being used for have been proposed at present, as letter Anyi, 360 mobile phone bodyguards.These cell phone softwares of realizing safety, secret protection class all need move under open mode mostly, adopt during visit password is set conducts interviews.Usually in handset program, can find shortcut, know its existence, and can open it.Yet there is following problem in present this mode:
1. safety inadequately, other people can find, and know that it installs this type of software (secret protection);
2. the user uses loaded down with trivial detailsly, needs to open from the program listing the inside earlier, inputs password then and enters;
3. use inconvenience, need under open mode, just can move, influence the use of other softwares.
Summary of the invention
The object of the present invention is to provide software transfer method and terminal on a kind of terminal, easy to use with the secret protection on the abundant realization terminal, and do not influence the use of other softwares.
For solving the problems of the technologies described above, embodiments of the present invention provide the method for the software transfer on a kind of terminal, comprise following steps:
Terminal is at the software of running background particular type;
When described terminal is called the software of described particular type at needs, in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
Embodiments of the present invention also provide a kind of terminal, comprise:
The operation module is used for the software in the running background particular type;
Calling module is used for when needs call the software of described particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of described particular type;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
Embodiment of the present invention in terms of existing technologies; the specific software that is used for the customizing messages on the terminal is carried out secret protection at running background; when needs call this software, in the mode of Event triggered the runnable interface of this software is shown to the user by input instruction.Owing to be the mode security of operation with running background, the cell phone software of secret protection class; therefore other people can't find this operating software by program listing; be that other people can't learn whether this type of software has been installed on the terminal, thereby realize protection fully terminal security and privacy.And, because complete running background can not influence the use of other softwares.
In addition; trigger calling of this software by keyboard instruction, strengthened the safeguard protection of this software and to user's secret protection, simultaneously; realize call operation owing to need not steps such as input by the opening of program listing, password, simplified steps such as the opening of this software, use this software.
In addition, also can make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guarantee extensive use scene of the present invention by access this software of running background behind the input instruction by the mode of dial key.
Description of drawings
Fig. 1 is according to the software transfer method flow diagram on the terminal of first embodiment of the invention;
Fig. 2 is the structural representation according to the terminal of third embodiment of the invention.
Embodiment
First execution mode of the present invention relates to the software transfer method on a kind of terminal.Idiographic flow as shown in Figure 1.
In step 110, terminal is at the software of running background particular type.Specifically; the software of particular type is meant the software that the customizing messages of terminal is carried out secret protection; such as the software that information such as the note that terminal is received, incoming calls record, address list is carried out secret protection can be softwares such as letter Anyi, 360 mobile phone bodyguards.Terminal can make other people to find this operating software by program listing by at the suchlike software of running background, and promptly other people can't learn whether this type of software has been installed on the terminal, thereby realize the protection to terminal security and privacy fully.And, because complete running background can not influence the use of other softwares.
Then, when terminal need be called the software of this particular type, enter step 120.In step 120, in the mode of Event triggered the runnable interface of the software of this particular type is shown to the user by input instruction.In the present embodiment, terminal is a key mobile phone, and terminal triggers calling of this software by keyboard instruction.
Specifically, terminal need receive the keyboard instruction of software that is used to call this particular type of user input, and according to the keyboard instruction that receives, and will be shown to the user at the runnable interface of the software of this particular type of running background, operates for the user.Trigger calling of this software by keyboard instruction; strengthened the safeguard protection of this software and to user's secret protection; simultaneously, realize call operation, simplified steps such as the opening of this software, use this software owing to need not steps such as input by the opening of program listing, password.
Then, in step 130, the user is according to the needs of oneself, and the software of this particular type is provided with or operates.
Then, in step 140, after the user finishes operation to the software of this particular type, hide the runnable interface of the software of this particular type by input instruction, other people can't learn whether this type of software has been installed with further assurance.
Be not difficult to find, utilize the software transfer method of present embodiment, can overall safety ground protect user's privacy, other people both can't learn whether this type of software has been installed, more can't learn that the activation that the user is provided with accesses instruction.
Second execution mode of the present invention relates to the software transfer method on a kind of terminal.Second execution mode and first execution mode are roughly the same, and main distinction part is:
In the first embodiment, terminal is the calling of software of triggering this particular type by keyboard instruction; And in the present embodiment, terminal is calling by the instruction of input and the dialing signal software that triggers this particular type.That is to say, when terminal need be called the software of this particular type, terminal need receive the instruction and the dialing signal of software that is used to call this particular type of user input, and the instruction that basis receives after receiving this dialing signal, the runnable interface of the software of this particular type is shown to the user, operates for the user.
Owing to not only can trigger calling of this software by keyboard instruction, also can be by access this software of running background behind the input instruction by the mode of dial key, make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guaranteed extensive use scene of the present invention.
In addition, the step that it will be understood by those skilled in the art that top the whole bag of tricks is divided, just clear in order to describe, can merge into a step during realization or some step is split, be decomposed into a plurality of steps, as long as comprise identical logical relation, all in the protection range of this patent; To adding inessential modification in the algorithm or in the flow process or introduce inessential design, but the core design that does not change its algorithm and flow process is all in the protection range of this patent.
Third embodiment of the invention relates to a kind of terminal, as shown in Figure 2, comprises operation module, calling module and hiding module.
The operation module is used for the software in the running background particular type.
Calling module is used for when needs call the software of this particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of this particular type.Such as, when calling module calls the software of this particular type at needs, receive the keyboard instruction of software that is used to call this particular type of user's input, and according to the described keyboard instruction that receives, the runnable interface of the software of this particular type is shown to the user.Wherein, the software of the software of this particular type for the customizing messages of terminal is carried out secret protection, the software of protecting as information such as note that terminal is received, incoming calls record, address lists.
Hiding module is used for after the user finishes operation to the software of this particular type, hides the runnable interface of the software of this particular type by the instruction of input, and other people can't learn whether this type of software has been installed with further assurance.
Be not difficult to find that present embodiment is and the corresponding system embodiment of first execution mode, present embodiment can with the enforcement of working in coordination of first execution mode.The correlation technique details of mentioning in first execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in first execution mode.
What deserves to be mentioned is that each involved in present embodiment module is logic module, in actual applications, a logical block can be a physical location, also can be the part of a physical location, can also realize with the combination of a plurality of physical locations.In addition, for outstanding innovation part of the present invention, will not introduce not too close unit in the present embodiment, but this does not show the unit that does not have other in the present embodiment with solving technical problem relation proposed by the invention.
Four embodiment of the invention relates to a kind of terminal.The 4th execution mode and the 3rd execution mode are roughly the same, and main distinction part is:
In the 3rd execution mode, calling module is the calling of software of triggering this particular type by keyboard instruction; And in the present embodiment, calling module is calling by the instruction of input and the dialing signal software that triggers this particular type.That is to say, when needs call the software of this particular type, calling module need receive the instruction and the dialing signal of software that is used to call this particular type of user input, and the instruction that basis receives after receiving this dialing signal, the runnable interface of the software of this particular type is shown to the user, operates for the user.Make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guaranteed extensive use scene of the present invention.
The respective embodiments described above are to realize specific embodiments of the invention, and in actual applications, can do various changes to it in the form and details, and without departing from the spirit and scope of the present invention.
Claims (10)
1. the software transfer method on the terminal is characterized in that, comprises following steps:
Terminal is at the software of running background particular type;
When described terminal is called the software of described particular type at needs, in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
2. the software transfer method on the terminal according to claim 1 is characterized in that, described in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction after, also comprise following substep:
After described user finishes operation to the software of described particular type, hide the runnable interface of the software of described particular type by input instruction.
3. the software transfer method on the terminal according to claim 1 is characterized in that, describedly is shown in user's the step with the mode of the Event triggered runnable interface with the software of described particular type by input instruction, comprises following substep:
Described terminal receives the keyboard instruction of software that is used to call described particular type of user's input;
Described terminal is according to the described keyboard instruction that receives, and the runnable interface of the software of described particular type is shown to the user.
4. the software transfer method on the terminal according to claim 1 is characterized in that,, describedly be shown in user's the step with the mode of Event triggered runnable interface the software of described particular type by input instruction, comprise following substep::
Described terminal receives the instruction and the dialing signal of software that is used to call described particular type of user's input;
Described terminal according to the described instruction that receives, is shown to the user with the runnable interface of the software of described particular type after receiving described dialing signal.
5. according to the software transfer method on each described terminal in the claim 1 to 4, it is characterized in that the customizing messages of described terminal comprises one of following or its combination in any:
The note that receives, incoming calls record, address list.
6. a terminal is characterized in that, comprises:
The operation module is used for the software in the running background particular type;
Calling module is used for when needs call the software of described particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of described particular type;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
7. terminal according to claim 6 is characterized in that, described terminal also comprises:
Hide module, be used for after described user finishes operation to the software of described particular type, hiding the runnable interface of the software of described particular type by the instruction of input.
8. terminal according to claim 6, it is characterized in that, when described calling module calls the software of described particular type at needs, receive the keyboard instruction of software that is used to call described particular type of user's input, and, the runnable interface of the software of described particular type is shown to the user according to the described keyboard instruction that receives.
9. terminal according to claim 6, it is characterized in that, when described calling module calls the software of described particular type at needs, receive the instruction and the dialing information of software that is used to call described particular type of user's input, and after receiving described dialing information according to the described instruction that receives, the runnable interface of the software of described particular type is shown to the user.
10. according to each described terminal in the claim 6 to 9, it is characterized in that the customizing messages of described terminal comprises one of following or its combination in any: the note that receives, incoming calls record, address list.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102927803A CN102082863A (en) | 2010-09-27 | 2010-09-27 | Terminal and software call method on same |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010102927803A CN102082863A (en) | 2010-09-27 | 2010-09-27 | Terminal and software call method on same |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102082863A true CN102082863A (en) | 2011-06-01 |
Family
ID=44088612
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010102927803A Pending CN102082863A (en) | 2010-09-27 | 2010-09-27 | Terminal and software call method on same |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102082863A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662451A (en) * | 2012-03-24 | 2012-09-12 | 上海量明科技发展有限公司 | Method and terminal for achieving data resetting operation through touch screen |
CN103634482A (en) * | 2013-12-26 | 2014-03-12 | 厦门福龙天下网络技术有限公司 | Safety protecting method for application software of portable intelligent equipment |
CN103679007A (en) * | 2013-12-19 | 2014-03-26 | 深圳全智达通信股份有限公司 | Method and device for managing application program permission and mobile device |
CN103810437A (en) * | 2014-03-04 | 2014-05-21 | 深圳市金立通信设备有限公司 | Method and terminal for hiding application program |
CN104217172A (en) * | 2013-06-03 | 2014-12-17 | 腾讯科技(深圳)有限公司 | Privacy content checking method and device |
WO2015043316A1 (en) * | 2013-09-26 | 2015-04-02 | Tencent Technology (Shenzhen) Company Limited | Method, device and electronic equipment for controlling displaying |
CN106161742A (en) * | 2015-04-02 | 2016-11-23 | 深圳市腾讯计算机系统有限公司 | The method for authenticating of mobile terminal and right discriminating system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101598997A (en) * | 2008-06-06 | 2009-12-09 | 英业达股份有限公司 | The method for operating application program of hierarchical interface |
-
2010
- 2010-09-27 CN CN2010102927803A patent/CN102082863A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101598997A (en) * | 2008-06-06 | 2009-12-09 | 英业达股份有限公司 | The method for operating application program of hierarchical interface |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102662451A (en) * | 2012-03-24 | 2012-09-12 | 上海量明科技发展有限公司 | Method and terminal for achieving data resetting operation through touch screen |
CN104217172A (en) * | 2013-06-03 | 2014-12-17 | 腾讯科技(深圳)有限公司 | Privacy content checking method and device |
CN104217172B (en) * | 2013-06-03 | 2019-05-14 | 腾讯科技(深圳)有限公司 | Privacy content inspection method and device |
WO2015043316A1 (en) * | 2013-09-26 | 2015-04-02 | Tencent Technology (Shenzhen) Company Limited | Method, device and electronic equipment for controlling displaying |
CN103679007A (en) * | 2013-12-19 | 2014-03-26 | 深圳全智达通信股份有限公司 | Method and device for managing application program permission and mobile device |
CN103679007B (en) * | 2013-12-19 | 2017-01-04 | 深圳全智达通信股份有限公司 | A kind of manage the method for application program authority, device and mobile device |
CN103634482A (en) * | 2013-12-26 | 2014-03-12 | 厦门福龙天下网络技术有限公司 | Safety protecting method for application software of portable intelligent equipment |
CN103810437A (en) * | 2014-03-04 | 2014-05-21 | 深圳市金立通信设备有限公司 | Method and terminal for hiding application program |
CN103810437B (en) * | 2014-03-04 | 2016-12-07 | 深圳市金立通信设备有限公司 | A kind of method of hide application program and terminal |
CN106161742A (en) * | 2015-04-02 | 2016-11-23 | 深圳市腾讯计算机系统有限公司 | The method for authenticating of mobile terminal and right discriminating system |
CN106161742B (en) * | 2015-04-02 | 2020-12-01 | 深圳市腾讯计算机系统有限公司 | Authentication method and authentication system of mobile terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102082863A (en) | Terminal and software call method on same | |
CN103458125B (en) | The guard method of a kind of high-grade privacy smart phone and private information thereof | |
CN104618584A (en) | Method and system for switching intelligent terminal safe work mode | |
CA2575288C (en) | Method and system for coordinating client and host security modules | |
US20100122314A1 (en) | Active access monitoring for safer computing environments and systems | |
CN100473193C (en) | Mobile terminal with information secrecy function and secrecy method | |
CN101997960A (en) | High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking | |
CN104361272A (en) | Fingerprint input information processing method and system and mobile terminal | |
JP2015527652A (en) | Operation control method for touch screen terminal and mobile terminal | |
CN101867650A (en) | Method and device for protecting user behavior at operating terminal | |
JP2004159022A (en) | Mobile phone, dial lock release method used for the same, and program thereof | |
CN108235767B (en) | Payment application isolation method and device and terminal | |
CN108781234B (en) | Function control method and terminal | |
CN106105168B (en) | Call forwarding method, terminal and portable electronic equipment | |
CN107395880A (en) | Method for information display, device and terminal | |
CN108537058A (en) | The polygonal color application method and device, computer readable storage medium, terminal of terminal | |
CN106249999A (en) | Terminal operation method and device | |
CN103257893B (en) | A kind of methods, devices and systems obtaining input state-event | |
CN107343279A (en) | Method for connecting network, device, terminal device and storage medium | |
WO2013149553A1 (en) | Information input method, device, terminal and storage medium | |
CN105657147A (en) | Mobile terminal anti-theft method and device | |
CN106447325A (en) | Processing method and device based on NFC (Near Filed Communication), and mobile terminal | |
CN102135857A (en) | Control method for opening application and terminal thereof | |
CN110062929A (en) | A kind of method, apparatus and terminal showing data | |
CN101510915A (en) | Fast switching method for mobile phone software window |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110601 |