CN103514396B - File/applied program processing method and device on communication terminal - Google Patents

File/applied program processing method and device on communication terminal Download PDF

Info

Publication number
CN103514396B
CN103514396B CN201310444592.1A CN201310444592A CN103514396B CN 103514396 B CN103514396 B CN 103514396B CN 201310444592 A CN201310444592 A CN 201310444592A CN 103514396 B CN103514396 B CN 103514396B
Authority
CN
China
Prior art keywords
file
event
operated
application
specific
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310444592.1A
Other languages
Chinese (zh)
Other versions
CN103514396A (en
Inventor
马章栋
冯立夫
黄媛媛
余锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310444592.1A priority Critical patent/CN103514396B/en
Publication of CN103514396A publication Critical patent/CN103514396A/en
Application granted granted Critical
Publication of CN103514396B publication Critical patent/CN103514396B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Abstract

The invention discloses file/applied program processing method on communication terminal and device, wherein, methods described includes:The event that the event and file/application program that distance to other objects relative movement communicating terminal outside communication terminal changes are operated is monitored;If monitoring the event that file/application program is operated, and the event that the distance changes is monitored in preset time range, then file/the application program operated is defined as to the object for needing to be protected as privacy information;Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate, to avoid the file/application program operated compromised.By means of the invention it is possible to be needed on to terminal device during being protected as privacy information, the privacy information of user is more effectively protected.

Description

File/applied program processing method and device on communication terminal
Technical field
The present invention relates to file/application program protection processing technology field, and in particular to and file on communication terminal/ Applied program processing method and device.
Background technology
Current Intelligent mobile communication terminal(Including mobile phone, tablet personal computer etc.)The function such as take pictures, record a video, recording of providing Really happy easily adventure in daily life is brought for user, but one is exactly privacy the problem of can not be ignored.Mobile communication The memory space of terminal is constantly increasing, and the texts such as many pictures, video and recording can be stored in a communication terminal Part, these multimedia files are usually for a user individual privacy, if communication terminal is obtained by others, these letters Breath will face compromised risk.
Therefore, in the urgent need to the technical problem that those skilled in the art solve is that:How in terminal called terminal The information realization protected as privacy information is needed to be effectively protected.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the text on the file/applied program processing method and corresponding mobile communication terminal device on the communication terminal of problem Part/application processing apparatus, can need during being protected as privacy information, more effectively on to terminal device Protection user privacy information.
According to one aspect of the present invention there is provided file/applied program processing method on a kind of communication terminal, Including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and The event that file/application program is operated is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range described The event that distance changes, then be defined as needing what is protected as privacy information using the file/application program operated Object;
Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate, To avoid the file/application program operated compromised.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes Event be monitored, including:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from From the event changed.
Alternatively, the event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes Event and the event that is operated of file/application program be monitored before also include:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to outside communication terminal Other objects relative movement communicating terminal the event that changes of distance and the event that is operated of file/application program enter Row monitoring.
Alternatively, the distance of other objects relative movement communicating terminal to outside communication terminal changes Event and the event that is operated of file/application program be monitored including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and The event that new file is created is monitored.
Alternatively, it is described that the event that new file in communication terminal is created is monitored, including:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
Alternatively, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If described monitor the event that file/application program is operated, and is monitored in preset time range The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated The object of shield, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre- The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy Cease the object protected.
Alternatively, in addition to:
When monitoring the event that file/application program is operated, the very first time is recorded;
When monitoring the event that the distance changes, recorded for the second time;
If described monitor the event that file/application program is operated, and is monitored in preset time range The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated The object of shield, including:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey Sequence is defined as the object for needing to be protected as privacy information.
Alternatively, it is described that the file/application program operated is performed accordingly according to preset privacy preserving operations mode Protection operation, including:
Deletion action is performed to the file/application program operated;
Or,
According to preset catalogue, the file/application program operated is transferred under preassigned catalogue;
Or,
According to preset password, the file/application program operated is encrypted.
Alternatively, different types of file/different protection mode of operation of application program correspondence.
According to another aspect of the present invention there is provided file/application processing apparatus on a kind of communication terminal, Including:
Monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal becomes The event that the event and file/application program of change are operated is monitored;
Determining unit, if for monitoring the event that file/application program is operated, and in preset time range The event that the distance changes inside is monitored, then is defined as needing to believe as privacy using the file/application program operated Cease the object protected;
Operating unit, for performing phase to the file/application program operated according to preset privacy preserving operations mode The protection operation answered, to avoid the file/application program operated compromised.
Alternatively, the monitoring unit specifically for:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from From the event changed.
Alternatively, the event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or The change of person from the close-by examples to those far off.
Alternatively, in addition to:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from Before the event operated from the event and file/application program that change is monitored, in communication terminal just It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes The event operated is monitored.
Alternatively, the monitoring unit includes:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal The event that the event and new file changed is created is monitored.
Alternatively, it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
Alternatively, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre- The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy Cease the object protected.
Alternatively, in addition to:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey Sequence is defined as the object for needing to be protected as privacy information.
Alternatively, the operating unit includes:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
Alternatively, different types of file/different protection mode of operation of application program correspondence.
According to the file/applied program processing method and device on the communication terminal of the present invention, in present invention implementation In example, the event and file/application program that can be changed to the distance that other objects relatively move communicating terminal are grasped The event of work is monitored, if it find that file/application program is operated, and monitors other in preset time range The event that the distance of object relative movement communicating terminal changes, then can be as user to performing privacy preserving operations Confirmation, therefore can with directly according to preset privacy preserving operations mode to new file perform protection operation.It can be seen that, mistake herein Cheng Zhong, can confirm whether user is needed to file/application program with directly by way of detecting distance changes operation Secret protection is carried out, it is user-friendly.And, can be directly according to presetting after user confirms to carry out secret protection Good protection mode of operation backstage performs specific protection operation, and specific transfer road is selected in interface again without user Footpath, setting code etc. are operated, and therefore, it can the compromised risk of the private file of further reduction user.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the flow chart of method according to an embodiment of the invention;And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing the disclosure in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Complete conveys to those skilled in the art.
In embodiments of the present invention, a application program for running on communication terminal can be provided(For ease of description, The application program is referred to as " defence program " in the embodiment of the present invention), the defence program can relatively move logical to other objects The event that the event and file/application program that the distance of news terminal changes are operated is monitored, then according to monitoring As a result, privacy preserving operations are performed to file/application program.For example, can be monitored to the event for creating new file, such as Fruit find there is new file to be created, also judge its whether may for user private file, if it is, can be to other objects The event that the distance of relative movement communicating terminal changes is monitored, if monitoring distance hair in the range of certain time The event for changing, then can perform protection operation according to preset mode to the file newly created.That is, from user angle For degree, protection mode of operation can be specified for file/application program in advance, for example, can directly deleted, or file is turned The target directory position of transfer is moved and preassigns, or, file can also be encrypted and be used when preassigning encryption Password, etc..So, in a newly-generated file, either file is operated or application program is mounted or is used it Afterwards, user can just be moved from distant place to receiver with other objects such as hand and cover the range sensor near receiver, or, use Then the first coverage distance sensor of other objects such as hand leaves gradually so that range sensor is able to detect that other objects are relative The change that the distance of the communication terminal draws near, or change from the close-by examples to those far off;So, the guarantor of the embodiment of the present invention This distance change event collected can just be defined as the trigger signal for needing to carry out secret protection by shield program, be come with this Trigger protection program performs corresponding privacy preserving operations to the file/application program operated.Below to this progress in detail Introduce.
Referring to Fig. 1, the embodiment of the present invention provide firstly file/application program processing side on a kind of communication terminal The executive agent of each step just can be previously described defence program in method, this method, in actual applications may also certainly Realized by way of hardware.This method may comprise steps of:
S101:The event that distance to other objects relative movement communicating terminal outside communication terminal changes And the event that file/application program is operated is monitored;
When implementing, the event that file/application program is operated can just include the event that new file be created, existing Event that the mounted event of event that file is edited, application program, application program are used etc..Except to file/should The event operated with program is monitored, the thing that can also be changed to the distance that other objects relatively move communicating terminal Part is monitored.When implementing, because communication terminal typically all carries range sensor, for sensing other object phases To the distance of communication terminal.For example, the range sensor generally plays a role during user takes phone:When with Mobile phone is put into by family when being conversed in one's ear, and range sensor can sense the event, so that the display screen of mobile phone is closed, Play the effects such as saving electric energy.And when user removes mobile phone from one's ear, range sensor can also perceive the event, then The display screen of mobile phone is started automatically, etc..Range sensor is typically mounted near the receiver of communication terminal, certainly It is probably other positions.Therefore, in embodiments of the present invention, it is possible to use range sensor this dress in communication terminal Put, the instrument of confirmation is sent as user, be also by other object proximities or away from communication terminal by user Operation, as user to needing the confirmation of progress privacy preserving operations.If user needs file/application program to being operated Protected as privacy information, then can be in a period of time before the procedure either afterwards or in operating process, so that it may To be moved with other objects such as hand from distant place to receiver and cover the range sensor near receiver, or, with other things such as hand Then body elder generation coverage distance sensor leaves gradually so that range sensor is able to detect that other objects are logical relative to the movement The change that the distance of news terminal draws near, or change from the close-by examples to those far off.Defence program in the embodiment of the present invention can lead to The mode such as interface for accessing range sensor is crossed, get that range sensor detects above-mentioned draws near or from the close-by examples to those far off Event.
In addition, generally, only in some specific application programs operationally, being only possible to that possible needs can be produced The file protected as privacy information, or the specific application program in itself may belong to and to need to carry out secret protection Application program.Therefore, the defence program in the embodiment of the present invention can also be to the application journey currently run in communication terminal Sequence is monitored, if it find that critical applications are currently running, and restarts the adjust the distance event changed and file/should The event operated with program is monitored, if the application program currently run does not include, there may be the key of private file Application program, then may not necessarily start the event progress that the adjust the distance event changed and file/application program are operated Monitoring.Wherein, so-called critical applications can include camera, video recorder, recorder program, JICQ etc. Deng.Wherein, the API that the program information that detection is currently running can be provided by system is completed, such as in android system The lower program for obtaining operation program information is as follows:
// obtain system service ActivityManager
ActivityManager manager=(ActivityManager)getSystemService(ACTIVITY_ SERVICE);
// the task stack list being currently running is obtained,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
The task stack of the current top of // acquisition, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
The top Activity of // acquisition foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name applied
String packageName=topActivity.getPackageName();。
Wherein method getSystemService (), getRunningTasks (), getPackageName () are The api function that android system is provided.
In order to timely be protected to the file/application program that may belong to privacy of user, in present invention implementation In example, the event that defence program can be operated by a background process to file/application program first is monitored.Specifically , in order to realize this monitoring, there can be various ways.For example, under in one way in which, it is possible to use communication terminal The event sniffer of operating system, the broadcast message that snoop-operations system is sent, by the filtering to system broadcast message, is known The event that file/application program is operated.That is, background program can be by the event of communication terminal operating system Monitor, the system message to each generation judges, if type of message is the thing that file/application program is operated Part, then can therefrom extract the information such as filename, suffix name, the title of the application program operated of the file operated. For example, under android system, when creating new file, system can send the broadcast of establishment file, and background program can be set One BroadCastReceiver is monitored and filtered to broadcast, is judged whether to create according to the type of message of broadcast Build the event of new file.
Or, under another implementation, can also utilize communication terminal operating system Hook Function, to The event that family file/application program is operated is monitored.That is, during file/application program is by operation, needing Call the program of correlation to realize the operation to file/application program, in embodiments of the present invention, API hooks can be used Function, background program can provide Hook Function and call steering Hook Function by original(Generally pass through Modification growth function entrance Realize address), such Hook Function just results in the information such as the filename of the file operated, suffix name, complete to file/ The information such as filename, application name in the monitoring for the event that application program is operated, and acquisition event.
It should be noted that the catalogue for being used to preserve file in actual applications, in communication terminal typically has a lot, But may include the private file of user in general only some catalogue, and others catalogue, such as storage system File etc. will not typically deposit the private file of user in sightless catalogue for a user.Therefore, to creating new file Event be monitored during, only some specific catalogues can be monitored, monitor this specific catalogue Chinese Whether the change of part, judgement wherein has new file to be created.For example, this specific catalogue can be the photograph for preserving user The catalogue of the files such as piece, video.
S102:If monitoring the event that file/application program is operated, and monitored in preset time range The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated The object of shield;
If the event that file/application program is operated has been monitored, and it is certain before or after the event The event that the distance of other objects relative movement communicating terminal changes also is detected in period, then can be by other things The event that body phase changes to the distance of communication terminal is defined as carrying out file/application program the need for user sends The trigger event of secret protection, accordingly, it is possible to which this document/application program is defined as to need to be protected as privacy information Object.
If that is, monitoring the event that file/application program is operated, and also detecting other object phases The event that distance to communication terminal changes, then also need to determine whether the time pass that the two times occur System, when only time interval is in certain scope, can just trigger privacy preserving operations.When implementing, when monitor file/ During the event that application program is operated, the very first time is recorded, the distance for monitoring other objects relative movement communicating terminal occurs During the event of change, recorded for the second time;So, if monitoring the event that file/application program is operated, and it is monitored The event that the distance of his object relative movement communicating terminal changes, and the time between the very first time and the second time Difference is less than preset time threshold, then is defined as needing to be protected as privacy information using the file/application program operated Object.Wherein, the sequencing relation between the very first time and the second time can be without limiting, that is to say, that for , can be to this document/apply journey when needing to be protected certain file/application program as privacy information for user Before or after sequence is operated, or even in operating process, the distance to moving closer to communication terminal with other objects Sensor, or first other objects are covered on range sensor gradually left again, in this, as to protecting what is operated The confirmation of file/application program.
Wherein, for creating the event of new file, the file/application program operated is defined as need as Before the object of privacy information protection, can also further it be judged.Specifically when being judged, if being to specific before Catalogue in create the monitoring that the event of new file is carried out, then catalogue that can be directly according to where new file judges that it belongs to Need the object as privacy information protection.That is, due to only entering in advance to some there may be the catalogue of private file Row monitoring, therefore, the new file monitored is all just the file in these specific catalogues, can be defined as needing conduct The file that privacy information is protected.Otherwise, new file is created even if monitoring, and is also supervised in the range of the regular hour The event that the distance of other objects relative movement communicating terminal changes has been controlled, need not can also be defined as needing to make The file protected for privacy information.
Or, while creating event due to monitoring new file, the information such as the suffix name of new file can also be got, Therefore, the file type information of new file can be analyzed accordingly, and then, it can judge that new file is according to file type information The no object for needing to be protected as privacy information for user.For example, generally, if it find that file type belongs to figure The types such as piece, video, audio, then can be determined that to need the object protected as privacy information.
Certainly, in order to further improve the degree of accuracy of judgement, above two mode can also be combined.That is, can be with Establishment event to new file in some specific catalogues is monitored, if it find that new file is created in specific catalogue, Suffix name further according to new file determines the file type of new file, if file type belongs to preset particular type again, It can be probably then the object for needing to be protected as privacy information using the file of the new establishment.
For example, the example in a practical application can be:Start first and apply monitoring service program(Running background), when The application program related to privacy is detected using monitoring programme(Camera, recorder etc.)During startup, startup file monitoring clothes Business program(Running background)And distance variation information is obtained by the interface of range sensor(Running background), file monitor program The establishment event of file under related path is monitored, when there is private file establishment, the very first time is recorded;Monitor other objects During the event that the distance of relative movement communicating terminal changes, recorded for the second time, compare the difference between two time, when the Special time threshold value of two times before or after file creation time(Such as 10 seconds)When interior, the protection to private file is performed Processing operation.
S103:Corresponding protection is performed to the file/application program operated according to preset privacy preserving operations mode Operation, to avoid the file/application program operated compromised.
Determine a file/application program operated belong to need the object protected as privacy information it Afterwards, it is possible to which the file that can be newly created according to preset privacy preserving operations mode performs protection operation.
Wherein, the privacy preserving operations of file/application program to being operated can be directly by the file operated/should Deleted with program;Or can also be that the file/application program that will be operated is shifted, at this point it is possible to be existed by user The target directory position of transfer is specified when pre-setting;Again or, the file/application program operated can also be added It is close, and it is possible to password used when specifying encryption when pre-setting by user, etc..It should be noted that due to difference File/the application program operated under type or different directories may have different severity levels, therefore, it can difference Different protection modes of operation are set for the file operated under different type or different directories/application program.For example, will The file of picture category is set to transfer and preserved, and the private file of video class is set into encryption etc..
In a word, in embodiments of the present invention, the distance that other objects relatively move communicating terminal can be changed The event that event and file/application program are operated is monitored, if it find that file/application program is operated, and The event that the distance of other objects relative movement communicating terminal changes is monitored in preset time range, then can be by it As user to performing the confirmations of privacy preserving operations, thus can with directly according to preset privacy preserving operations mode to new text Part performs protection operation.It can be seen that, in the process, can with directly confirm by way of detecting distance changes operation use Whether family needs to carry out file/application program secret protection, user-friendly.And confirm to carry out secret protection in user Afterwards, it directly can perform specific protection according to pre-set protection mode of operation backstage to operate, without user Select specific transfer path, setting code etc. to operate in interface again, therefore, it can the private file of further reduction user Compromised risk.
It is corresponding with file/applied program processing method on communication terminal provided in an embodiment of the present invention, this hair Bright embodiment additionally provides file/application processing apparatus on a kind of communication terminal, referring to Fig. 2, and the device can be with Including:
Monitoring unit 201, the distance for other objects outside communication terminal to be relatively moved with communicating terminal is sent out The event that the event and file/application program of changing are operated is monitored;
Determining unit 202, if for monitoring the event that file/application program is operated, and in the preset time In the range of monitor the event that the distance changes, then file/the application program operated is defined as needing as hidden The object that personal letter breath is protected;
Operating unit 203, for being performed according to preset privacy preserving operations mode to the file/application program operated Corresponding protection operation, to avoid the file/application program operated compromised.
Wherein, the monitoring unit specifically for:By the interface of the range sensor in communication terminal, institute is obtained State the event that the distance that range sensor detects changes.
The event that the distance changes includes:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or The change of person from the close-by examples to those far off.
When implementing, the device can also include:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from Before the event operated from the event and file/application program that change is monitored, in communication terminal just It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes The event operated is monitored.
Wherein, the monitoring unit includes:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal The event that the event and new file changed is created is monitored.
Wherein it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
The device can also include:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre- The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy Cease the object protected.
The monitoring unit includes:
Second monitoring subelement, for being edited to the file in communication terminal, application program is mounted or applies The Action Events that program is used are monitored.
In addition, the device can also include:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey Sequence is defined as the object for needing to be protected as privacy information.
Wherein, the operating unit includes:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
When implementing, different types of file/application program can correspond to different protection modes of operation.
It can be seen that, in embodiments of the present invention, the distance that other objects relatively move communicating terminal can be changed The event that event and file/application program are operated is monitored, if it find that file/application program is operated, and The event that the distance of other objects relative movement communicating terminal changes is monitored in preset time range, then can be by it As user to performing the confirmations of privacy preserving operations, thus can with directly according to preset privacy preserving operations mode to new text Part performs protection operation.It can be seen that, in the process, can with directly confirm by way of detecting distance changes operation use Whether family needs to carry out file/application program secret protection, user-friendly.And confirm to carry out secret protection in user Afterwards, it directly can perform specific protection according to pre-set protection mode of operation backstage to operate, without user Select specific transfer path, setting code etc. to operate in interface again, therefore, it can the private file of further reduction user Compromised risk.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It is understood that, it is possible to use it is various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place is provided, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, exist Above in the description of the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:It is i.e. required to protect The application claims of shield features more more than the feature being expressly recited in each claim.More precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself All as the separate embodiments of the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is to this specification(Including adjoint claim, summary and accompanying drawing)Disclosed in all features and so disclosed appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification(Including adjoint power Profit requires, made a summary and accompanying drawing)Disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
Although in addition, it will be appreciated by those of skill in the art that some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of be the same as Example does not mean in of the invention Within the scope of and form different embodiments.For example, in the following claims, times of embodiment claimed One of meaning mode can be used in any combination.
The present invention all parts embodiment can be realized with hardware, or with one or more processor run Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor(DSP)Come realize the file on communication terminal according to embodiments of the present invention/ The some or all functions of some or all parts in application program processing equipment.The present invention is also implemented as being used for Perform some or all equipment or program of device of method as described herein(For example, computer program and calculating Machine program product).Such program for realizing the present invention can be stored on a computer-readable medium, or can have one Or the form of multiple signals.Such signal can be downloaded from internet website and obtained, or be provided on carrier signal, Or provided in any other form.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" is not excluded the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and coming real by means of properly programmed computer It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The application can apply to computer system/server, and it can be with numerous other universal or special computing system rings Border or configuration are operated together.Suitable for the well-known computing system being used together with computer system/server, environment and/ Or the example of configuration includes but is not limited to:Personal computer system, server computer system, thin client, thick client computer, hand Hold or laptop devices, the system based on microprocessor, set top box, programmable consumer electronics, NetPC Network PC, small-sized meter Calculation machine Xi Tong ﹑ large computer systems and distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in the computer system executable instruction performed by computer system(Such as journey Sequence module)General linguistic context under describe.Generally, program module can include routine, program, target program, component, logic, number According to structure etc., they perform specific task or realize specific abstract data type.Computer system/server can be with Implement in distributed cloud computing environment, in distributed cloud computing environment, task is by by the long-range of communication network links Manage what equipment was performed.In distributed cloud computing environment, program module, which can be located at, includes the Local or Remote meter of storage device On calculation system storage medium.
The invention also discloses file/applied program processing method on A1, a kind of communication terminal, including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and The event that file/application program is operated is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range described The event that distance changes, then be defined as needing what is protected as privacy information using the file/application program operated Object;
Corresponding protection is performed according to preset privacy preserving operations mode to the file/application program operated to operate, To avoid the file/application program operated compromised.
A2, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal The event that distance changes is monitored, including:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from From the event changed.
A3, the method as described in A1, the event that the distance changes include:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off.
A4, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal The event that the event and file/application program that distance changes are operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to outside communication terminal Other objects relative movement communicating terminal the event that changes of distance and the event that is operated of file/application program enter Row monitoring.
A5, the method as described in A1, described other objects to outside communication terminal relatively move communicating terminal The event that the event and file/application program that distance changes are operated be monitored including:
The event that changes of distance to other objects relative movement communicating terminal outside communication terminal and The event that new file is created is monitored.
A6, the method as described in A5, described to be monitored to the event that new file in communication terminal is created, bag Include:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
A7, the method as described in A5, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If described monitor the event that file/application program is operated, and is monitored in preset time range The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated The object of shield, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre- The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy Cease the object protected.
A8, the method as described in A1 to any one of A7, in addition to:
When monitoring the event that file/application program is operated, the very first time is recorded;
When monitoring the event that the distance changes, recorded for the second time;
If described monitor the event that file/application program is operated, and is monitored in preset time range The event that the distance changes, then be defined as needing to be protected as privacy information using the file/application program operated The object of shield, including:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey Sequence is defined as the object for needing to be protected as privacy information.
A9, the method as described in A1 to any one of A7, it is described according to preset privacy preserving operations mode to being operated File/application program performs corresponding protection operation, including:
Deletion action is performed to the file/application program operated;
Or,
According to preset catalogue, the file/application program operated is transferred under preassigned catalogue;
Or,
According to preset password, the file/application program operated is encrypted.
A10, the method as described in A1 to any one of A7, the different protection behaviour of different types of file/application program correspondence Make mode.
The invention also discloses file/application processing apparatus on B1, a kind of communication terminal, including:
Monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal becomes The event that the event and file/application program of change are operated is monitored;
Determining unit, if for monitoring the event that file/application program is operated, and in preset time range The event that the distance changes inside is monitored, then is defined as needing to believe as privacy using the file/application program operated Cease the object protected;
Operating unit, for performing phase to the file/application program operated according to preset privacy preserving operations mode The protection operation answered, to avoid the file/application program operated compromised.
B2, the device as described in B1, the monitoring unit specifically for:
By the interface of the range sensor in communication terminal, obtain that the range sensor detects it is described away from From the event changed.
B3, the device as described in B1, the event that the distance changes include:
The change that the distance of the relatively described communication terminal of other objects outside communication terminal draws near, or The change of person from the close-by examples to those far off.
B4, the device as described in B1, in addition to:
Operation program monitoring unit, for outside communication terminal other objects relatively move communicating terminal away from Before the event operated from the event and file/application program that change is monitored, in communication terminal just It is monitored in the application program of operation;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to moving Event and file/application program that the distance of other objects relative movement communicating terminal outside dynamic communicating terminal changes The event operated is monitored.
B5, the device as described in B1, the monitoring unit include:
First monitoring subelement, the distance for other objects outside communication terminal to be relatively moved with communicating terminal The event that the event and new file changed is created is monitored.
B6, the device as described in B5, it is described first monitoring subelement specifically for:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
B7, the device as described in B5, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type letter of new file Breath;
The determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and pre- The event that the distance changes is monitored in the time range put, then is defined as the new file needing to believe as privacy Cease the object protected.
B8, the device as described in B1 to any one of B7, in addition to:
Very first time recording unit, for when monitoring the event that file/application program is operated, during record first Between;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:
If monitoring the event that file/application program is operated, and the event that the distance changes is monitored, and Time difference between the very first time and the second time is less than preset time threshold, then by the file operated/apply journey Sequence is defined as the object for needing to be protected as privacy information.
B9, the device as described in B1 to any one of B7, the operating unit include:
Deletion action subelement, deletion action is performed for the file to being operated/application program;
Or,
Subelement is shifted, for according to preset catalogue, the file/application program operated being transferred to preassigned Under catalogue;
Or,
Encryption sub-unit operable, for according to preset password, the file/application program operated to be encrypted.
B10, the device as described in B1 to any one of B7, the different protection behaviour of different types of file/application program correspondence Make mode.

Claims (18)

1. file/applied program processing method on a kind of communication terminal, including:
The event that the distance for making other objects outside communication terminal relatively move communicating terminal to user changes with And the event that the file in application-specific/particular category is operated is monitored, the event package that the distance changes Include:
The change that the distance of the relatively described communication terminal of other objects draws near, or change from the close-by examples to those far off;
If the event that the file in application-specific/particular category is operated is monitored, and in preset time range The event that the distance changes inside is monitored, then is determined the file in the application-specific/particular category operated To need the object protected as privacy information;
Corresponding protection is performed to the file in application-specific/particular category according to preset privacy preserving operations mode to grasp Make, to avoid the file in the application-specific/particular category operated compromised;
Wherein, the event that the file in application-specific/particular category is operated is monitored, including:
Using the event sniffer of the operating system of the communication terminal, the broadcast message that snoop-operations system is sent is led to The filtering to system broadcast message is crossed, the event that the file in the application-specific/particular category is operated, or profit is known With the Hook Function of communication terminal operating system, the file in the application-specific/particular category is operated Event is monitored.
2. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical The event that the distance of news terminal changes is monitored, including:
By the interface of the range sensor in communication terminal, the distance hair that the range sensor is detected is obtained The event for changing.
3. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical The event that file in event and application-specific/particular category that the distance of news terminal changes is operated is supervised Also include before control:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, start to its outside communication terminal File quilt in event and application-specific/particular category that the distance of his object relative movement communicating terminal changes The event of operation is monitored.
4. the method as described in claim 1, other objects relative movement made to user outside communication terminal is logical The event that file in event and application-specific/particular category that the distance of news terminal changes is operated is supervised Control includes:
Event and new text that distance to other objects relative movement communicating terminal outside communication terminal changes The event that part is created is monitored.
5. method as claimed in claim 4, described that the event that new file in communication terminal is created is monitored, bag Include:
Event is created to the new file in assigned catalogue in communication terminal to be monitored.
6. method as claimed in claim 4, in addition to:
When monitoring the event for creating new file, the file type information of new file is obtained;
If the event that the file monitored in application-specific/particular category is operated, and in the preset time In the range of monitor the event that the distance changes, then by the file in the application-specific/particular category operated It is defined as the object for needing to be protected as privacy information, including:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and preset The event that the distance changes is monitored in time range, then is defined as the new file needing to enter as privacy information The object of row protection.
7. the method as described in claim 1 to any one of claim 6, in addition to:
When the event that the file monitored in application-specific/particular category is operated, the very first time is recorded;Monitor institute When stating the event that distance changes, recorded for the second time;
If the event that the file monitored in application-specific/particular category is operated, and in the preset time In the range of monitor the event that the distance changes, then by the file in the application-specific/particular category operated It is defined as the object for needing to be protected as privacy information, including:
Occur if monitoring the event that the file in application-specific/particular category is operated, and monitoring the distance Time difference between the event of change, and the very first time and the second time is less than preset time threshold, then will be operated Application-specific/particular category in file be defined as the object for needing to be protected as privacy information.
8. the method as described in claim 1 to any one of claim 6, described according to preset privacy preserving operations mode pair File in the application-specific/particular category operated performs corresponding protection operation, including:
Deletion action is performed to the file in application-specific/particular category for being operated;
Or, according to preset catalogue, the file in the application-specific/particular category operated is transferred to predesignated Catalogue under;
Or, according to preset password, the file in application-specific/particular category for being operated is encrypted.
9. the method as described in claim 1 to any one of claim 6, different types of application-specific/particular category In the different protection modes of operation of file correspondence.
10. file/application processing apparatus on a kind of communication terminal, including:
Monitoring unit, the distance for making other objects outside communication terminal relatively move communicating terminal to user occurs The event that file in the event and application-specific/particular category of change is operated is monitored, and the distance occurs The event of change includes:What the distance of the relatively described communication terminal of other objects outside communication terminal drew near Change, or change from the close-by examples to those far off, wherein, the event operated to the file in application-specific/particular category is carried out Monitoring, including:Using the event sniffer of the operating system of the communication terminal, the broadcast that snoop-operations system is sent disappears Breath, by the filtering to system broadcast message, knows the thing that the file in the application-specific/particular category is operated Part, or using the Hook Function of communication terminal operating system, to the file quilt in the application-specific/particular category The event of operation is monitored;
Determining unit, if for monitoring the event that the file in application-specific/particular category is operated, and pre- The event that the distance changes is monitored in the time range put, then by the application-specific/particular category operated In file be defined as the object for needing to be protected as privacy information;
Operating unit, for according to preset privacy preserving operations mode in application-specific/particular category for being operated File perform corresponding protection operation, to avoid the file in the application-specific/particular category operated compromised.
11. device as claimed in claim 10, the monitoring unit specifically for:Passed by the distance in communication terminal The interface of sensor, the event that the distance that the acquisition range sensor is detected changes.
12. device as claimed in claim 10, in addition to:
Operation program monitoring unit, the distance for other objects outside communication terminal to be relatively moved with communicating terminal is sent out Before the event that file in the event and application-specific/particular category of changing is operated is monitored, to movement The application program being currently running in communicating terminal is monitored;
Start unit, if the application program for being currently running belongs to preset critical applications, starts to mobile logical The event and application-specific that the distance of other objects relative movement communicating terminal outside news terminal changes/specific The event that file in catalogue is operated is monitored.
13. device as claimed in claim 10, the monitoring unit includes:First monitoring subelement, for mobile communication The event that the event and new file that the distance of other objects relative movement communicating terminal outside terminal changes are created It is monitored.
14. device as claimed in claim 13, the first monitoring subelement specifically for:To being specified in communication terminal New file in catalogue creates event and is monitored.
15. device as claimed in claim 13, in addition to:
Type information acquiring unit, when the event of new file is created for monitoring, obtains the file type information of new file;Institute State determining unit specifically for:
If monitoring creates the event of new file, and the file type of the new file belongs to preset type, and preset The event that the distance changes is monitored in time range, then is defined as the new file needing to enter as privacy information The object of row protection.
16. the device as described in claim 10 to any one of claim 15, in addition to:
Very first time recording unit, for when the event that the file monitored in application-specific/particular category is operated, Record the very first time;
Second time recording unit, for monitoring during event that the distance changes, recorded for the second time;
The determining unit specifically for:If monitoring the event that the file in application-specific/particular category is operated, And the time difference between the event that the distance changes, and the very first time and the second time is monitored less than preset File in the application-specific/particular category operated, then be defined as needing to carry out as privacy information by time threshold The object of protection.
17. the device as described in claim 10 to any one of claim 15, the operating unit includes:
Deletion action subelement, deletion action is performed for the file in application-specific/particular category to being operated;
Or, subelement is shifted, for according to preset catalogue, by the text in the application-specific/particular category operated Part is transferred under preassigned catalogue;
Or, encryption sub-unit operable, for according to preset password, to the text in application-specific/particular category for being operated Part is encrypted.
18. the device as described in claim 10 to any one of claim 15, different types of application-specific/specific mesh The corresponding different protection mode of operation of file in record.
CN201310444592.1A 2013-09-23 2013-09-23 File/applied program processing method and device on communication terminal Active CN103514396B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310444592.1A CN103514396B (en) 2013-09-23 2013-09-23 File/applied program processing method and device on communication terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310444592.1A CN103514396B (en) 2013-09-23 2013-09-23 File/applied program processing method and device on communication terminal

Publications (2)

Publication Number Publication Date
CN103514396A CN103514396A (en) 2014-01-15
CN103514396B true CN103514396B (en) 2017-11-03

Family

ID=49897103

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310444592.1A Active CN103514396B (en) 2013-09-23 2013-09-23 File/applied program processing method and device on communication terminal

Country Status (1)

Country Link
CN (1) CN103514396B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320893B (en) * 2014-07-30 2018-09-28 上海斐讯数据通信技术有限公司 A kind of data prevention method and system applied to mobile terminal
CN104917603B (en) * 2014-09-22 2019-03-12 中兴通讯股份有限公司 A kind of information security transfer method receives terminal and sends terminal
CN104852958B (en) * 2015-04-08 2018-10-02 苏州大学张家港工业技术研究院 A kind of monitoring method and device of software operation behavior
CN105049592B (en) * 2015-05-27 2020-02-14 中国科学院信息工程研究所 Mobile intelligent terminal voice safety protection method and system
CN107766351B (en) * 2016-08-16 2020-12-25 腾讯科技(深圳)有限公司 File directory identification method and device

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108085A (en) * 2013-01-31 2013-05-15 广东欧珀移动通信有限公司 Glance prevention method of mobile terminal

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100677352B1 (en) * 2004-09-09 2007-02-02 엘지전자 주식회사 Speaker volume display apparatus and method for portable terminal device
JP2010246060A (en) * 2009-04-10 2010-10-28 Hitachi Ltd Mobile terminal loss prevention system
US20110013775A1 (en) * 2009-07-17 2011-01-20 Chih-Lin Hu System and method of mobile content sharing and delivery in an integrated network environment
CN101867650A (en) * 2010-05-21 2010-10-20 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting user behavior at operating terminal
CN101873386A (en) * 2010-06-13 2010-10-27 华为终端有限公司 Mobile terminal and incoming-call prompt method thereof
CN102480540A (en) * 2010-11-19 2012-05-30 英业达股份有限公司 Mobile telephone and operation method thereof
CN103164432B (en) * 2011-12-13 2016-03-30 联想(北京)有限公司 Recover method and the mobile terminal of deleted file by mistake

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103108085A (en) * 2013-01-31 2013-05-15 广东欧珀移动通信有限公司 Glance prevention method of mobile terminal

Also Published As

Publication number Publication date
CN103514396A (en) 2014-01-15

Similar Documents

Publication Publication Date Title
US11328079B2 (en) System and method of encrypting folder in device
US11126716B2 (en) System security method and apparatus
CN103514396B (en) File/applied program processing method and device on communication terminal
CN103617382B (en) Method for secret protection and its device
US20210076212A1 (en) Recognizing users with mobile application access patterns learned from dynamic data
CN104520866B (en) Method for secret protection and terminal device
CN107864065B (en) Non-buried point data acquisition method, system and computer readable storage medium
US9614826B1 (en) Sensitive data protection
US20160109864A1 (en) Wireless Building Automation
KR101878708B1 (en) Energy management system of smart electric home appliances using security-enhanced residential gateway device
KR20170026385A (en) System for context-based data protection
Sadineni et al. A holistic forensic model for the internet of things
CN108293044A (en) System and method for detecting malware infection via domain name service flow analysis
US10791177B2 (en) System to monitor and control sensor devices
CN105530261B (en) The guard method of privacy information and device
JP2017511512A (en) System and method for preventing variation of subsystem fingerprinting by introducing device fingerprinting
CN106791087A (en) The storage method of information, device and equipment
CN103530549B (en) File/applied program processing method on communication terminal and device
US9313218B1 (en) Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms
CN105659247B (en) The proactive Threat Management system of context-aware
CN103530550B (en) File/applied program processing method on communication terminal and device
CN103916471A (en) Information display method and device
CN106095781A (en) Malicious websites recognition methods and device
CN107358117B (en) Switching method, electronic equipment and computer storage medium
CN104023137A (en) Mobile terminal, and intelligent encryption method and device of mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220706

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.