CN102082863A - Terminal and software call method on same - Google Patents

Terminal and software call method on same Download PDF

Info

Publication number
CN102082863A
CN102082863A CN2010102927803A CN201010292780A CN102082863A CN 102082863 A CN102082863 A CN 102082863A CN 2010102927803 A CN2010102927803 A CN 2010102927803A CN 201010292780 A CN201010292780 A CN 201010292780A CN 102082863 A CN102082863 A CN 102082863A
Authority
CN
China
Prior art keywords
software
particular type
terminal
user
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010102927803A
Other languages
Chinese (zh)
Inventor
张国顺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Xianxian Information Science & Technology Co Ltd
Original Assignee
Shanghai Xianxian Information Science & Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xianxian Information Science & Technology Co Ltd filed Critical Shanghai Xianxian Information Science & Technology Co Ltd
Priority to CN2010102927803A priority Critical patent/CN102082863A/en
Publication of CN102082863A publication Critical patent/CN102082863A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The invention relates to the communication field and discloses a terminal and a software call method on the same. In the invention, specified software for protecting the privacy of specified information on the terminal is run in background, and a running interface of the software is displayed to a user through an input command by means of event triggering when the software is required to be called. As mobile phone software for safety, privacy protection, and the like is run in a background mode, other people cannot discover the run software through a program list, namely other people cannot know whether the software is installed or not, thus the privacy protection and safety are completely realized. Moreover, due to complete background running, the use of other software cannot be affected.

Description

Software transfer method and terminal on the terminal
Technical field
The present invention relates to the communications field, particularly the terminal technology in the communications field.
Background technology
Along with network and technology develop towards more and more broadband direction, the mobile communication industry will be moved towards the real mobile message epoch.On the other hand, along with the develop rapidly of integrated circuit technique, the disposal ability of portable terminal has had powerful disposal ability, and portable terminal (as mobile phone) becomes an integrated information processing platform from simple conversation instrument.This has also increased broad more development space to portable terminal.
Modern portable terminal has had very powerful disposal ability, can finish complicated Processing tasks.Portable terminal also has profuse communication mode, promptly can pass through GSM (Global Systemfor Mobile Communications, Chinese is global system for mobile communications), CDMA (CodeDivision Multiple Access, Chinese is code division multiple access), WCDMA (Wideband CodeDivision Multiple Access, Chinese is Wideband Code Division Multiple Access (WCDMA)), TD-CDMA wireless operation network communications such as (TD SDMA accesses), also can pass through WLAN (wireless local area network), bluetooth and infrared communicating.
Because portable terminal of today is used various aspects in daily life more and more widely, therefore how the privacy on the terminal is protected, also obtained paying close attention to widely.
The various softwares that the privacy on the terminal is protected of being used for have been proposed at present, as letter Anyi, 360 mobile phone bodyguards.These cell phone softwares of realizing safety, secret protection class all need move under open mode mostly, adopt during visit password is set conducts interviews.Usually in handset program, can find shortcut, know its existence, and can open it.Yet there is following problem in present this mode:
1. safety inadequately, other people can find, and know that it installs this type of software (secret protection);
2. the user uses loaded down with trivial detailsly, needs to open from the program listing the inside earlier, inputs password then and enters;
3. use inconvenience, need under open mode, just can move, influence the use of other softwares.
Summary of the invention
The object of the present invention is to provide software transfer method and terminal on a kind of terminal, easy to use with the secret protection on the abundant realization terminal, and do not influence the use of other softwares.
For solving the problems of the technologies described above, embodiments of the present invention provide the method for the software transfer on a kind of terminal, comprise following steps:
Terminal is at the software of running background particular type;
When described terminal is called the software of described particular type at needs, in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
Embodiments of the present invention also provide a kind of terminal, comprise:
The operation module is used for the software in the running background particular type;
Calling module is used for when needs call the software of described particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of described particular type;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
Embodiment of the present invention in terms of existing technologies; the specific software that is used for the customizing messages on the terminal is carried out secret protection at running background; when needs call this software, in the mode of Event triggered the runnable interface of this software is shown to the user by input instruction.Owing to be the mode security of operation with running background, the cell phone software of secret protection class; therefore other people can't find this operating software by program listing; be that other people can't learn whether this type of software has been installed on the terminal, thereby realize protection fully terminal security and privacy.And, because complete running background can not influence the use of other softwares.
In addition; trigger calling of this software by keyboard instruction, strengthened the safeguard protection of this software and to user's secret protection, simultaneously; realize call operation owing to need not steps such as input by the opening of program listing, password, simplified steps such as the opening of this software, use this software.
In addition, also can make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guarantee extensive use scene of the present invention by access this software of running background behind the input instruction by the mode of dial key.
Description of drawings
Fig. 1 is according to the software transfer method flow diagram on the terminal of first embodiment of the invention;
Fig. 2 is the structural representation according to the terminal of third embodiment of the invention.
Embodiment
First execution mode of the present invention relates to the software transfer method on a kind of terminal.Idiographic flow as shown in Figure 1.
In step 110, terminal is at the software of running background particular type.Specifically; the software of particular type is meant the software that the customizing messages of terminal is carried out secret protection; such as the software that information such as the note that terminal is received, incoming calls record, address list is carried out secret protection can be softwares such as letter Anyi, 360 mobile phone bodyguards.Terminal can make other people to find this operating software by program listing by at the suchlike software of running background, and promptly other people can't learn whether this type of software has been installed on the terminal, thereby realize the protection to terminal security and privacy fully.And, because complete running background can not influence the use of other softwares.
Then, when terminal need be called the software of this particular type, enter step 120.In step 120, in the mode of Event triggered the runnable interface of the software of this particular type is shown to the user by input instruction.In the present embodiment, terminal is a key mobile phone, and terminal triggers calling of this software by keyboard instruction.
Specifically, terminal need receive the keyboard instruction of software that is used to call this particular type of user input, and according to the keyboard instruction that receives, and will be shown to the user at the runnable interface of the software of this particular type of running background, operates for the user.Trigger calling of this software by keyboard instruction; strengthened the safeguard protection of this software and to user's secret protection; simultaneously, realize call operation, simplified steps such as the opening of this software, use this software owing to need not steps such as input by the opening of program listing, password.
Then, in step 130, the user is according to the needs of oneself, and the software of this particular type is provided with or operates.
Then, in step 140, after the user finishes operation to the software of this particular type, hide the runnable interface of the software of this particular type by input instruction, other people can't learn whether this type of software has been installed with further assurance.
Be not difficult to find, utilize the software transfer method of present embodiment, can overall safety ground protect user's privacy, other people both can't learn whether this type of software has been installed, more can't learn that the activation that the user is provided with accesses instruction.
Second execution mode of the present invention relates to the software transfer method on a kind of terminal.Second execution mode and first execution mode are roughly the same, and main distinction part is:
In the first embodiment, terminal is the calling of software of triggering this particular type by keyboard instruction; And in the present embodiment, terminal is calling by the instruction of input and the dialing signal software that triggers this particular type.That is to say, when terminal need be called the software of this particular type, terminal need receive the instruction and the dialing signal of software that is used to call this particular type of user input, and the instruction that basis receives after receiving this dialing signal, the runnable interface of the software of this particular type is shown to the user, operates for the user.
Owing to not only can trigger calling of this software by keyboard instruction, also can be by access this software of running background behind the input instruction by the mode of dial key, make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guaranteed extensive use scene of the present invention.
In addition, the step that it will be understood by those skilled in the art that top the whole bag of tricks is divided, just clear in order to describe, can merge into a step during realization or some step is split, be decomposed into a plurality of steps, as long as comprise identical logical relation, all in the protection range of this patent; To adding inessential modification in the algorithm or in the flow process or introduce inessential design, but the core design that does not change its algorithm and flow process is all in the protection range of this patent.
Third embodiment of the invention relates to a kind of terminal, as shown in Figure 2, comprises operation module, calling module and hiding module.
The operation module is used for the software in the running background particular type.
Calling module is used for when needs call the software of this particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of this particular type.Such as, when calling module calls the software of this particular type at needs, receive the keyboard instruction of software that is used to call this particular type of user's input, and according to the described keyboard instruction that receives, the runnable interface of the software of this particular type is shown to the user.Wherein, the software of the software of this particular type for the customizing messages of terminal is carried out secret protection, the software of protecting as information such as note that terminal is received, incoming calls record, address lists.
Hiding module is used for after the user finishes operation to the software of this particular type, hides the runnable interface of the software of this particular type by the instruction of input, and other people can't learn whether this type of software has been installed with further assurance.
Be not difficult to find that present embodiment is and the corresponding system embodiment of first execution mode, present embodiment can with the enforcement of working in coordination of first execution mode.The correlation technique details of mentioning in first execution mode is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in the present embodiment also can be applicable in first execution mode.
What deserves to be mentioned is that each involved in present embodiment module is logic module, in actual applications, a logical block can be a physical location, also can be the part of a physical location, can also realize with the combination of a plurality of physical locations.In addition, for outstanding innovation part of the present invention, will not introduce not too close unit in the present embodiment, but this does not show the unit that does not have other in the present embodiment with solving technical problem relation proposed by the invention.
Four embodiment of the invention relates to a kind of terminal.The 4th execution mode and the 3rd execution mode are roughly the same, and main distinction part is:
In the 3rd execution mode, calling module is the calling of software of triggering this particular type by keyboard instruction; And in the present embodiment, calling module is calling by the instruction of input and the dialing signal software that triggers this particular type.That is to say, when needs call the software of this particular type, calling module need receive the instruction and the dialing signal of software that is used to call this particular type of user input, and the instruction that basis receives after receiving this dialing signal, the runnable interface of the software of this particular type is shown to the user, operates for the user.Make the present invention not be only applicable to key mobile phone, also be applicable to touch-screen mobile phone, guaranteed extensive use scene of the present invention.
The respective embodiments described above are to realize specific embodiments of the invention, and in actual applications, can do various changes to it in the form and details, and without departing from the spirit and scope of the present invention.

Claims (10)

1. the software transfer method on the terminal is characterized in that, comprises following steps:
Terminal is at the software of running background particular type;
When described terminal is called the software of described particular type at needs, in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
2. the software transfer method on the terminal according to claim 1 is characterized in that, described in the mode of Event triggered the runnable interface of the software of described particular type is shown to the user by input instruction after, also comprise following substep:
After described user finishes operation to the software of described particular type, hide the runnable interface of the software of described particular type by input instruction.
3. the software transfer method on the terminal according to claim 1 is characterized in that, describedly is shown in user's the step with the mode of the Event triggered runnable interface with the software of described particular type by input instruction, comprises following substep:
Described terminal receives the keyboard instruction of software that is used to call described particular type of user's input;
Described terminal is according to the described keyboard instruction that receives, and the runnable interface of the software of described particular type is shown to the user.
4. the software transfer method on the terminal according to claim 1 is characterized in that,, describedly be shown in user's the step with the mode of Event triggered runnable interface the software of described particular type by input instruction, comprise following substep::
Described terminal receives the instruction and the dialing signal of software that is used to call described particular type of user's input;
Described terminal according to the described instruction that receives, is shown to the user with the runnable interface of the software of described particular type after receiving described dialing signal.
5. according to the software transfer method on each described terminal in the claim 1 to 4, it is characterized in that the customizing messages of described terminal comprises one of following or its combination in any:
The note that receives, incoming calls record, address list.
6. a terminal is characterized in that, comprises:
The operation module is used for the software in the running background particular type;
Calling module is used for when needs call the software of described particular type, and the instruction by input is shown to the user in the mode of Event triggered with the runnable interface of the software of described particular type;
Wherein, the software of the software of described particular type for the customizing messages of described terminal is carried out secret protection.
7. terminal according to claim 6 is characterized in that, described terminal also comprises:
Hide module, be used for after described user finishes operation to the software of described particular type, hiding the runnable interface of the software of described particular type by the instruction of input.
8. terminal according to claim 6, it is characterized in that, when described calling module calls the software of described particular type at needs, receive the keyboard instruction of software that is used to call described particular type of user's input, and, the runnable interface of the software of described particular type is shown to the user according to the described keyboard instruction that receives.
9. terminal according to claim 6, it is characterized in that, when described calling module calls the software of described particular type at needs, receive the instruction and the dialing information of software that is used to call described particular type of user's input, and after receiving described dialing information according to the described instruction that receives, the runnable interface of the software of described particular type is shown to the user.
10. according to each described terminal in the claim 6 to 9, it is characterized in that the customizing messages of described terminal comprises one of following or its combination in any: the note that receives, incoming calls record, address list.
CN2010102927803A 2010-09-27 2010-09-27 Terminal and software call method on same Pending CN102082863A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010102927803A CN102082863A (en) 2010-09-27 2010-09-27 Terminal and software call method on same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010102927803A CN102082863A (en) 2010-09-27 2010-09-27 Terminal and software call method on same

Publications (1)

Publication Number Publication Date
CN102082863A true CN102082863A (en) 2011-06-01

Family

ID=44088612

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010102927803A Pending CN102082863A (en) 2010-09-27 2010-09-27 Terminal and software call method on same

Country Status (1)

Country Link
CN (1) CN102082863A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662451A (en) * 2012-03-24 2012-09-12 上海量明科技发展有限公司 Method and terminal for achieving data resetting operation through touch screen
CN103634482A (en) * 2013-12-26 2014-03-12 厦门福龙天下网络技术有限公司 Safety protecting method for application software of portable intelligent equipment
CN103679007A (en) * 2013-12-19 2014-03-26 深圳全智达通信股份有限公司 Method and device for managing application program permission and mobile device
CN103810437A (en) * 2014-03-04 2014-05-21 深圳市金立通信设备有限公司 Method and terminal for hiding application program
CN104217172A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Privacy content checking method and device
WO2015043316A1 (en) * 2013-09-26 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method, device and electronic equipment for controlling displaying
CN106161742A (en) * 2015-04-02 2016-11-23 深圳市腾讯计算机系统有限公司 The method for authenticating of mobile terminal and right discriminating system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101598997A (en) * 2008-06-06 2009-12-09 英业达股份有限公司 The method for operating application program of hierarchical interface

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101598997A (en) * 2008-06-06 2009-12-09 英业达股份有限公司 The method for operating application program of hierarchical interface

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102662451A (en) * 2012-03-24 2012-09-12 上海量明科技发展有限公司 Method and terminal for achieving data resetting operation through touch screen
CN104217172A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Privacy content checking method and device
CN104217172B (en) * 2013-06-03 2019-05-14 腾讯科技(深圳)有限公司 Privacy content inspection method and device
WO2015043316A1 (en) * 2013-09-26 2015-04-02 Tencent Technology (Shenzhen) Company Limited Method, device and electronic equipment for controlling displaying
CN103679007A (en) * 2013-12-19 2014-03-26 深圳全智达通信股份有限公司 Method and device for managing application program permission and mobile device
CN103679007B (en) * 2013-12-19 2017-01-04 深圳全智达通信股份有限公司 A kind of manage the method for application program authority, device and mobile device
CN103634482A (en) * 2013-12-26 2014-03-12 厦门福龙天下网络技术有限公司 Safety protecting method for application software of portable intelligent equipment
CN103810437A (en) * 2014-03-04 2014-05-21 深圳市金立通信设备有限公司 Method and terminal for hiding application program
CN103810437B (en) * 2014-03-04 2016-12-07 深圳市金立通信设备有限公司 A kind of method of hide application program and terminal
CN106161742A (en) * 2015-04-02 2016-11-23 深圳市腾讯计算机系统有限公司 The method for authenticating of mobile terminal and right discriminating system
CN106161742B (en) * 2015-04-02 2020-12-01 深圳市腾讯计算机系统有限公司 Authentication method and authentication system of mobile terminal

Similar Documents

Publication Publication Date Title
CN102082863A (en) Terminal and software call method on same
CN103458125B (en) The guard method of a kind of high-grade privacy smart phone and private information thereof
CN104618584A (en) Method and system for switching intelligent terminal safe work mode
CA2575288C (en) Method and system for coordinating client and host security modules
US20100122314A1 (en) Active access monitoring for safer computing environments and systems
CN100473193C (en) Mobile terminal with information secrecy function and secrecy method
CN101997960A (en) High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking
CN104361272A (en) Fingerprint input information processing method and system and mobile terminal
JP2015527652A (en) Operation control method for touch screen terminal and mobile terminal
CN101867650A (en) Method and device for protecting user behavior at operating terminal
JP2004159022A (en) Mobile phone, dial lock release method used for the same, and program thereof
CN108235767B (en) Payment application isolation method and device and terminal
CN108781234B (en) Function control method and terminal
CN106105168B (en) Call forwarding method, terminal and portable electronic equipment
CN107395880A (en) Method for information display, device and terminal
CN108537058A (en) The polygonal color application method and device, computer readable storage medium, terminal of terminal
CN106249999A (en) Terminal operation method and device
CN103257893B (en) A kind of methods, devices and systems obtaining input state-event
CN107343279A (en) Method for connecting network, device, terminal device and storage medium
WO2013149553A1 (en) Information input method, device, terminal and storage medium
CN105657147A (en) Mobile terminal anti-theft method and device
CN106447325A (en) Processing method and device based on NFC (Near Filed Communication), and mobile terminal
CN102135857A (en) Control method for opening application and terminal thereof
CN110062929A (en) A kind of method, apparatus and terminal showing data
CN101510915A (en) Fast switching method for mobile phone software window

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110601