CN103530550B - File/applied program processing method on communication terminal and device - Google Patents

File/applied program processing method on communication terminal and device Download PDF

Info

Publication number
CN103530550B
CN103530550B CN201310444639.4A CN201310444639A CN103530550B CN 103530550 B CN103530550 B CN 103530550B CN 201310444639 A CN201310444639 A CN 201310444639A CN 103530550 B CN103530550 B CN 103530550B
Authority
CN
China
Prior art keywords
file
application program
user
operated
touch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310444639.4A
Other languages
Chinese (zh)
Other versions
CN103530550A (en
Inventor
马章栋
冯立夫
黄媛媛
魏巍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310444639.4A priority Critical patent/CN103530550B/en
Publication of CN103530550A publication Critical patent/CN103530550A/en
Application granted granted Critical
Publication of CN103530550B publication Critical patent/CN103530550B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses the file/applied program processing method on communication terminal and device, wherein, described method includes: the event being operated user's touch track and the file/application program of communication terminal is monitored;If monitoring the event that file/application program is operated, and in preset time range, monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing to carry out, as privacy information, the object protected;Perform to protect operation accordingly, to avoid the file/application program operated compromised according to preset privacy preserving operations mode file/application program to being operated.By means of the invention it is possible to during to needing on terminal unit to protect as privacy information, more effectively protect the privacy information of user.

Description

File/applied program processing method on communication terminal and device
Technical field
The present invention relates to file/application program protection processing technology field, be specifically related on communication terminal File/applied program processing method and device.
Background technology
What at present Intelligent mobile communication terminal (including mobile phone, panel computer etc.) provided take pictures, record a video, The functions such as recording bring happiness lived experience easily for user really, however one can not be ignored ask Topic is exactly privacy.The memory space of communication terminal is constantly increasing, in a communication terminal The files such as a lot of picture, video and recording can be stored, these multimedia files for a user As be individual privacy, if communication terminal is obtained by others, these information will face compromised Risk.
Therefore, solve the technical problem that to be that how terminal to be led in the urgent need to those skilled in the art The information realization carrying out protecting as privacy information is needed to be effectively protected in news terminal.
Summary of the invention
In view of the above problems, it is proposed that the present invention is to provide one to overcome the problems referred to above or at least partly Ground solves the file/applied program processing method on the communication terminal of the problems referred to above and moves logical accordingly File/application processing apparatus on news terminal unit, it is possible to needing as privacy on terminal unit During information is protected, more effectively protect the privacy information of user.
According to one aspect of the present invention, it is provided that at the file/application program on a kind of communication terminal Reason method, including:
The thing that user's touch track on communication terminal touch screen and file/application program are operated Part is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
Alternatively, described user's touch track on communication terminal touch screen is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
Alternatively, also include:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get It is sent to be currently at the application program of focus.
Alternatively, described user's touch track in communication terminal is monitored, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme The relevant information of operation.
Alternatively, judge whether to monitor the user's touch track meeting prerequisite in the following manner:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
Alternatively, described to the user's touch track on communication terminal touch screen and file/application journey The event that sequence is operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
Alternatively, described to the user's touch track on communication terminal touch screen and file/application journey The event that sequence is operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out Monitoring.
Alternatively, the described event being created file new in communication terminal is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
Alternatively, the described event being operated the file/application program in communication terminal is monitored, Including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
Alternatively, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches Track meets the time difference between preset condition, and the described very first time and the second time less than preset Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information Object.
According to a further aspect in the invention, it is provided that at the file/application program on a kind of communication terminal Reason device, including:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application The event that program is operated is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
Alternatively, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user Touch the relevant information of operation.
Alternatively, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get The relevant information of touch operation is sent to be currently at the application program of focus.
Alternatively, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme The relevant information of the touch operation performed on the touchscreen.
Alternatively, judge whether to monitor the user's touch track meeting prerequisite in the following manner:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite Track.
Alternatively, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and Before the event that file/application program is operated is monitored, should to what communication terminal was currently running It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated Part is monitored.
Alternatively, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new The event that file is created is monitored.
Alternatively, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
Alternatively, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
Alternatively, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
According to the file/applied program processing method on the communication terminal of the present invention and device, can be right The event that user's touch track of communication terminal and file/application program are operated is monitored, as Fruit finds that file/application program is operated, and monitors in preset time range and meet prerequisite User's touch track, then can as user to perform privacy preserving operations confirmation, therefore may be used Directly to perform to protect operation to new file according to preset privacy preserving operations mode.Visible, in this mistake Whether Cheng Zhong, can confirm user in the way of directly by detection user's specific operation on the touchscreen Need file/application program is carried out secret protection, user-friendly.And carry out hidden in user's confirmation After private protection, directly can perform concrete protection according to pre-set protection mode of operation backstage Operation, selects the operations such as concrete transfer path, setting code again in interface without user, because of This, can reduce the risk that the private file of user is compromised further.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for this Field those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals Identical parts.In the accompanying drawings:
Fig. 1 shows the flow chart of method according to an embodiment of the invention;And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
In embodiments of the present invention, it is provided that a run on communication terminal application program (be It is easy to describe, this application program is referred to as " defence program " by the embodiment of the present invention), this defence program The thing that user's touch track on communication terminal touch screen and file/application program can be operated Part is monitored, and then according to monitored results, file/application program is performed privacy preserving operations.Example As, the event creating new file can be monitored, if it find that there is new file to be created, also judge Whether it may be the private file of user, if it is, user's touch track can be monitored, If monitoring the user's touch track meeting prerequisite, then can be according to preset mode to newly created File perform protection operation.It is to say, for user perspective, can be newly created file in advance Specify protection mode of operation, such as, can directly delete, or file shifts and preassigns transfer Target directory position, or, it is also possible to the password used when file is encrypted and preassigns encryption, Etc..So, at a newly-generated file, or file is operated, or application program is mounted or After using, user just can mark the track of given shape on the touch screen of communication terminal, And then, the specific touch track collected just can be defined as needs by the defence program of the embodiment of the present invention Carry out the triggering signal of secret protection, carry out trigger protection program with this and file/application program operated is held The privacy preserving operations that row is corresponding.Below this is introduced in detail.
Seeing Fig. 1, the embodiment of the present invention provide firstly the file on a kind of communication terminal/application journey Sequence processing method, in the method, the executive agent of each step can be just previously described defence program, when So it is likely in actual applications realize by the way of hardware.The method may comprise steps of:
S101: the user's touch track on communication terminal touch screen and file/application program are grasped The event made is monitored;
When implementing, the event that file/application program is operated just can include the thing that new file is created The thing that the mounted event of event that part, existing file are edited, application program, application program are used Part etc..Event except being operated file/application program is monitored, it is also possible to mobile communication eventually User's touch track on end touch screen is monitored.When implementing, due to some mobile communication at present Terminal is equipped with touch screen, and user can realize the input of information by operation on the touchscreen. So, if the user while perform touch operation on touch screen, then can be perceived by operating system.Therefore, The touch track that user can be formed by defence program in the embodiment of the present invention on the touchscreen is as startup File/the application program currently operated is carried out the trigger condition of secret protection.Therefore, supervise except needs Outside the event of control user operation file/application program, it is also possible to formed when user is operated on the touchscreen Touch track be monitored, and judge whether this touch track meets preset condition.
It should be noted that for the operation that user performs on the touchscreen, in default situations, Have and be currently at the application program of focus condition and captured.For example, it is assumed that user is being currently used clear Device of looking at browses webpage, the most now if the user while perform touch operation, the then coordinate operated on touch screen Can be captured by this browser program etc. information, the most just can realize the most in a browser page turning, The operations such as refreshing.And in embodiments of the present invention, in order to user was made in the range of certain time The event of special touch track is as the trigger condition of secret protection, it is required that the embodiment of the present invention Defence program can get the touch operation that user performs on the touchscreen.But, when implementing, Defence program in the embodiment of the present invention is usually at running background, is not to be currently at focus condition Program, therefore, in order to make defence program get touch behaviour that user performs on the touchscreen The relevant information made, can be accomplished by: under a kind of mode, defence program can create one Individual full frame suspended window, this suspended window is positioned at the upper strata of the application window being currently at focus, so, When user performs touch operation on the touchscreen, the information that touch operation is relevant will be first by protection journey The suspended window of sequence is captured, and can be analyzed the touch operation information captured, it is judged that it is No meet prerequisite.Certainly, if not meeting prerequisite, then user is probably to being currently at Jiao The operational order that the application program of dotted state sends, therefore, it can send out the touch operation information got Give the application program being currently at focus condition so that this application program can respond the operation of user.
Certainly, under this implementation, owing to the defence program in the embodiment of the present invention gets at first The relevant information of user's touch operation, therefore, for user's application program to being currently at focus condition For the operational order sent, certain delay may be produced.In order to avoid the generation of this situation, Under another kind of implementation, it is also possible to starting a touch screen operation monitoring programme, this monitoring programme can To be the program of a ring 0, user can be obtained from drive by this monitoring programme and hold on the touchscreen The relevant information of the touch operation of row.So, avoid the need for creating full frame suspension window, do not interfere with Normal operating to user's application program to being currently at focus condition.Wherein, either by suspending Window obtains, or obtains from drive, and the relevant information of concrete touch operation may each be finger and touches The coordinate information of position.
Certainly, it is however generally that, if user needs to grasp the application program being currently at focus condition Making, the most concrete action type is usually clicking operation, or the slide of linear type track, because, For the ease of making a distinction with this operation, in embodiments of the present invention, prerequisite can be set to Touch track forms preset special shape, such as, five-pointed star shape, circle etc.;Or, it is possible to The point special so that prerequisite to be arranged via some on touch screen, such as, moves in the screen upper left corner Move the lower left corner, move again to the lower right corner, eventually move to the upper left corner, wherein three key points of approach, So, after the touch track monitoring user, it can be determined that whether track sequentially passes through these three closes Key point.It is to say, for a user, if when operating certain file/application program, needed it Protect as private file, then can within certain time before the operation is performed or afterwards, Mark a five-pointed star shape or circle on the touchscreen, or streak the key point specified, phase successively Answering, the defence program in the embodiment of the present invention just can monitor this event, and using this event as File/the application program operated is carried out the trigger condition of secret protection.
Wherein, in order to whether detection user's touch track meets prerequisite, use can monitored During the touch behavior at family, (suspension window or monitoring programme are permissible for the coordinate at the place, position that record touches It is directly obtained this coordinate information), and constantly record the change of coordinate, if be detected that coordinate is continuous Change and formed a track, then can by this track with preset reference trajectory feature (by described previously Five-pointed star or circle etc. as reference trajectory, and therefrom extract feature) mate, if It is made into merit, namely user's touch track meets the feature of reference trajectory, then can be determined that to have monitored and meet User's touch track of prerequisite.
It should be noted that generally, only at some specific application programs operationally, The file that possible needs carry out protecting, or this specific application program may be produced as privacy information Itself may belong to the application program needing to carry out secret protection.Therefore, the protection in the embodiment of the present invention The application program run current in communication terminal can also be monitored by program, if it find that crucial Application program is currently running, and restarts the user's touch track on communication terminal touch screen and literary composition The event that part/application program is operated is monitored, if the current application program run does not includes producing The critical applications of raw private file, then can start terminal user in mobile communication touch track And the event that file/application program is operated is monitored.Wherein, so-called critical applications is permissible Including photographing unit, videocorder, recorder program, JICQ etc..Wherein, detection is current just Can be completed by the API that system provides at the program information run, such as, obtain under android system The program taking operation program information is as follows:
// obtain system service ActivityManager
ActivityManager manager= (ActivityManager)getSystemService(ACTIVITY_SERVICE);
// obtain the task stack list being currently running,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
// obtain the task stack of current top, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
The top Activity of // acquisition foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name applied
String packageName=topActivity.getPackageName();。
Wherein method getSystemService (), getRunningTasks (), getPackageName () are The api function that android system provides.
In order to the file/application program that may belong to privacy of user is protected, timely at this In bright embodiment, defence program can first pass through what file/application program was operated by a background process Event is monitored.Concrete, in order to realize this monitoring, can there is various ways.Such as, at it Under middle a kind of mode, it is possible to use the event sniffer of communication terminal operating system, snoop-operations system The broadcast that system sends, by the filtration to system broadcast message, knows that file/application program is operated Event.It is to say, background program can pass through the event sniffer of communication terminal operating system, Each system message occurred is judged, is operated if type of message is file/application program Event, then can therefrom extract the filename of the file operated, suffix name, the application journey that operated The information such as the title of sequence.Such as, under android system, when creating new file, system can send wound Build the broadcast of file, background program can arrange a BroadCastReceiver broadcast is carried out monitor and Filter, judge whether the event occurring to create new file according to the type of message of broadcast.
Or, under another kind of implementation, it is also possible to utilize the hook of communication terminal operating system Function, the event being operated user file/application program is monitored.It is to say, in file/application During program is operated, need to call relevant program and realize the operation to file/application program, In embodiments of the present invention, it is possible to use API Hook Function, background program can provide Hook Function also Deflector guide subfunction (generally being realized), such hook is called by Modification growth function entry address by original Function is just obtained in that the information such as the filename of the file operated, suffix name, completes file/application journey The monitoring of the event that sequence is operated, and obtain the information such as the filename in event, application name.
It should be noted that in actual applications, for preserving the catalogue one of file in communication terminal As have a lot, but general only some catalogue may comprise the private file of user, and other Catalogue, such as, typically will not deposit use in the most sightless catalogues such as storage system file The private file at family.Therefore, during the event creating new file is monitored, can be the most right Some specific catalogues are monitored, and monitor the change of file in this specific catalogue, it is judged that Qi Zhongshi No have new file to be created.Such as, this specific catalogue could be for preserving the photo of user, regarding The catalogue of the files such as frequency.
S102: if monitoring the event that file/application program is operated, and at preset time range Inside monitor the user's touch track meeting prerequisite, then file/the application program operated is defined as Needs carry out the object protected as privacy information;
If monitored the event that file/application program is operated, and before or after this event Certain period of time in also detected that the user's touch track meeting prerequisite, then can be by mobile logical User's touch track of news terminal meet this event of prerequisite be defined as needs that user sends to file/ Application program carries out the trigger event of secret protection, accordingly, it is possible to be defined as by this document/application program Needs carry out the object protected as privacy information.
When implementing, when monitoring the event that file/application program is operated, record the very first time, When monitoring the user's touch track meeting prerequisite, recorded for the second time;So, if monitored The event that file/application program is operated, and user's touch track of communication terminal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.Wherein, first Sequencing relation between time and the second time can not be defined, say, that for user For, when certain file/application program is protected by needs as privacy information, can to this document/ Before or after application program operates, draw preset shape on the touchscreen, the most permissible Automatically trigger and file/application program is carried out secret protection.
Wherein, for creating the event of new file, the file/application program operated is being defined as Before needing as the object of privacy information protection, it is also possible to judge further.Specifically sentencing Time disconnected, if being the monitoring that the event creating new file in specific catalogue is carried out before, then can be straight Connect the catalogue according to new file place and judge that it belongs to the needs object as privacy information protection.The most just It is to say, owing to only some catalogues that may produce private file being monitored in advance, therefore, monitors New file be the most all the file in these specific catalogues, can be defined as need as privacy believe Breath carries out the file protected.Otherwise, create new file even if monitoring, and also in the regular hour In the range of monitored qualified user's touch track, it is also possible to need not be defined as needing conduct Privacy information carries out the file protected.
Or, while monitoring new document creation event, it is also possible to get the suffix of new file The information such as name, therefore, can analyze the file type information of the file that makes new advances accordingly, and then, can basis File type information judges that whether new file is that user needs to carry out, as privacy information, the object protected.Example As, generally, if it find that file type belongs to the types such as picture, video, audio frequency, the most permissible It is judged to that needs carry out the object protected as privacy information.
Certainly, in order to improve the accuracy of judgement further, it is also possible to above two mode is combined. That is, the establishment event of file new in some specific catalogues can be monitored, if it find that specific Catalogue in create new file, determine the file type of the file that makes new advances further according to the suffix name of new file, If file type belongs to again preset particular type, then the file that this is newly created can be probably needs The object protected is carried out as privacy information.
Such as, the example in an actual application may is that first start application monitoring service routine (after Platform runs), when application monitoring programme detects application program (photographing unit, the recorder relevant to privacy Deng) start time, startup file monitoring service routine (running background), file monitor program monitoring be correlated with Path under the establishment event of file, when there being private file to create, record the very first time, when detecting During qualified user's touch track, recorded for the second time, compare the difference between two time, when Time in two times special time threshold value (such as 10 seconds) after file creation time, perform privacy literary composition The protection of part processes operation.
S103: perform corresponding according to the preset privacy preserving operations mode file to being operated/application program Protection operation, to avoid the file/application program operated compromised.
Determining that a file/application program operated belongs to what needs carried out protecting as privacy information After object, it is possible to file that can be newly created according to preset privacy preserving operations mode performs protection behaviour Make.
Wherein, the privacy preserving operations of the file/application program operated can directly will be operated File/application program is deleted;Or can also is that and the file/application program operated is shifted, At this point it is possible to specified the target directory position of transfer when pre-setting by user;Again or, it is also possible to File/the application program operated is encrypted, adds and it is possible to specified when pre-setting by user The password used time close, etc..It should be noted that due to the quilt under dissimilar or different directories File/the application program of operation is likely to be of different severity levels, therefore, it can the most dissimilar Or the file/application program operated under different directories arranges different protection modes of operation.Such as, The file of picture category is set to transfer preserve, the private file of video class is set to encryption etc..
In a word, in embodiments of the present invention, can be to user's touch track of communication terminal and literary composition The event that part/application program is operated is monitored, if it find that file/application program is operated, and Monitor the user's touch track meeting prerequisite in preset time range, then can as with The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode New file is performed protection operation.Visible, in the process, can directly touched by detection user The mode of the specific operation on screen confirms that user carries out secret protection the need of to file/application program, User-friendly.And after user confirms to carry out secret protection, can be directly according to presetting Good protection mode of operation backstage performs concrete protection operation, selects without user in interface again The operations such as concrete transfer path, setting code, therefore, it can reduce further the private file of user Compromised risk.
It is corresponding with the file/applied program processing method on the communication terminal that the embodiment of the present invention provides, The embodiment of the present invention additionally provides the file/application processing apparatus on a kind of communication terminal, sees Fig. 2, this device may include that
Monitoring unit 201, for the user's touch track on communication terminal touch screen and file/ The event that application program is operated is monitored;
Determine unit 202, if for monitoring the event that file/application program is operated, and in advance The user's touch track meeting prerequisite is monitored, then the file/should that will be operated in the time range put It is defined as the object that needs carry out protecting as privacy information by program;
Operating unit 203, for according to the file/application to being operated of the preset privacy preserving operations mode Program performs to protect operation accordingly, to avoid the file/application program operated compromised.
When implementing, described monitoring unit may include that
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user Touch the relevant information of operation.
Now, this device can also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get The relevant information of touch operation is sent to be currently at the application program of focus.
Under another kind of implementation, described monitoring unit may include that
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme The relevant information of the touch operation performed on the touchscreen.
When implementing, judge whether in the following manner to monitor and meet the user of prerequisite and touch rail Mark:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite Track.
When implementing, this device can also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and Before the event that file/application program is operated is monitored, should to what communication terminal was currently running It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated Part is monitored.
Wherein, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new The event that file is created is monitored.
Wherein said first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
This device can also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
Described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
It addition, this device can also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
Wherein, described operating unit includes:
Deletion action subelement, for performing deletion action to the file operated/application program;
Or,
Transfer subelement, for according to preset catalogue, transfers to pre-by the file/application program operated Under the catalogue first specified;
Or,
Encryption sub-unit operable, for according to preset password, is encrypted the file/application program operated.
When implementing, different types of file/application program can corresponding different protection mode of operation.
Visible, in embodiments of the present invention, can be to user's touch track of communication terminal and literary composition The event that part/application program is operated is monitored, if it find that file/application program is operated, and Monitor the user's touch track meeting prerequisite in preset time range, then can as with The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode New file is performed protection operation.Visible, in the process, can directly touched by detection user The mode of the specific operation on screen confirms that user carries out secret protection the need of to file/application program, User-friendly.And after user confirms to carry out secret protection, can be directly according to presetting Good protection mode of operation backstage performs concrete protection operation, selects without user in interface again The operations such as concrete transfer path, setting code, therefore, it can reduce further the private file of user Compromised risk.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein Have relevant.Various general-purpose systems can also be used together with based on teaching in this.As described above, Construct the structure required by this kind of system to be apparent from.Additionally, the present invention is also not for any specific Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein, And the description done language-specific above is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of not having these details.In some instances, not It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim The middle more feature of feature be expressly recited.More precisely, as the following claims reflect As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows Claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each right Requirement itself is all as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or Outside at least some in unit excludes each other, can use any combination that (this specification is included companion With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include it Some feature included in its embodiment rather than further feature, but the group of the feature of different embodiment Close and mean to be within the scope of the present invention and formed different embodiments.Such as, in following power In profit claim, one of arbitrarily can mode making in any combination of embodiment required for protection With.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize according to this Some or all portions in file on the communication terminal of inventive embodiments/application program processing equipment The some or all functions of part.The present invention is also implemented as performing method as described herein Part or all equipment or device program (such as, computer program and computer program). The program of such present invention of realization can store on a computer-readable medium, or can have one Or the form of multiple signals.Such signal can be downloaded from internet website and obtain, or carrying There is provided on body signal, or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, And those skilled in the art can design replacement in fact without departing from the scope of the appended claims Execute example.In the claims, should not will be located in any reference marks between bracket to be configured to right is wanted The restriction asked.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.It is positioned at Word "a" or "an" before element does not excludes the presence of multiple such element.The present invention is permissible By means of including the hardware of some different elements and realizing by means of properly programmed computer.? If listing in the unit claim of equipment for drying, several in these devices can be by same Hardware branch specifically embodies.Word first, second and third use do not indicate that any order. Can be title by these word explanations.
The application can apply to computer system/server, and they can be with other universal or special calculating numerous System environments or configuration operate together.Be suitable to be used together with computer system/server is well-known The example of calculating system, environment and/or configuration includes but not limited to: personal computer system, server meter Calculation machine system, thin client, thick client computer, hand-held or laptop devices, system based on microprocessor, Set Top Box, programmable consumer electronics, NetPC Network PC, minicomputer system mass computing Machine system and the distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in the computer system executable instruction performed by computer system Describe under the general linguistic context of (such as program module).Generally, program module can include routine, program, Target program, assembly, logic, data structure etc., they perform specific task or realize specific Abstract data type.Computer system/server can be implemented in distributed cloud computing environment, distribution In formula cloud computing environment, task is to be performed by by the remote processing devices of communication network links.Dividing In cloth cloud computing environment, program module may be located at and includes that the Local or Remote of storage device calculates system On storage medium.
The invention also discloses the file/applied program processing method on A1, a kind of communication terminal, bag Include:
The thing that user's touch track on communication terminal touch screen and file/application program are operated Part is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
A2, method as described in A1, described to the user's touch track on communication terminal touch screen It is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
A3, method as described in A2, also include:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get It is sent to be currently at the application program of focus.
A4, method as described in A1, described supervise the user's touch track in communication terminal Control, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme The relevant information of operation.
A5, method as described in A1, judge whether to monitor to meet prerequisite in the following manner User's touch track:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
A6, method as described in A1, described to the user's touch track on communication terminal touch screen And the event that operated of file/application program be monitored before also include:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
A7, method as described in A1, described to the user's touch track on communication terminal touch screen And the event that file/application program is operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out Monitoring.
A8, method as described in A7, the described event being created file new in communication terminal is entered Row monitoring, including:
New document creation event in assigned catalogue in communication terminal is monitored.
A9, method as described in A7, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
A10, method as described in A1, described operated the file/application program in communication terminal Event be monitored, including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
A11, method as described in any one of A1 to A10, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches Track meets the time difference between preset condition, and the described very first time and the second time less than preset Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information Object.
The invention also discloses the file/application processing apparatus on B1, a kind of communication terminal, bag Include:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application The event that program is operated is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
B2, device as described in B1, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user Touch the relevant information of operation.
B3, device as described in B2, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get The relevant information of touch operation is sent to be currently at the application program of focus.
B4, device as described in B1, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme The relevant information of the touch operation performed on the touchscreen.
B5, device as described in B1, judge whether to monitor the use meeting prerequisite in the following manner Family touch track:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite Track.
B6, device as described in B1, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and Before the event that file/application program is operated is monitored, should to what communication terminal was currently running It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated Part is monitored.
B7, device as described in B1, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new The event that file is created is monitored.
B8, device as described in B7, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
B9, device as described in B7, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
B10, device as described in B1, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
B11, device as described in any one of B1 to B10, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.

Claims (22)

1. file/the applied program processing method on communication terminal, including:
The thing that user's touch track on communication terminal touch screen and file/application program are operated Part is monitored, and wherein, described user's touch track is to carry out the file/application program currently operated The trigger condition of secret protection;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
2. the method for claim 1, described to the user's touch on communication terminal touch screen Track is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
3. method as claimed in claim 2, also includes:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get It is sent to be currently at the application program of focus.
4. the method for claim 1, described enters the user's touch track in communication terminal Row monitoring, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme The relevant information of operation.
5. the method for claim 1, judges whether in the following manner to monitor and meets preset bar User's touch track of part:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
6. the method for claim 1, described to the user's touch on communication terminal touch screen The event that track and file/application program are operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
7. the method for claim 1, described to the user's touch on communication terminal touch screen The event that track and file/application program are operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out Monitoring.
8. method as claimed in claim 7, the described thing that file new in communication terminal is created Part is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
9. method as claimed in claim 7, also includes:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
10. the method for claim 1, described to the file/application program in communication terminal The event operated is monitored, including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
11. methods as described in any one of claim 1 to 10, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches Track meets the time difference between preset condition, and the described very first time and the second time less than preset Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information Object.
File/application processing apparatus on 12. 1 kinds of communication terminals, including:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application The event that program is operated is monitored, and wherein, described user's touch track is to the literary composition currently operated Part/application program carries out the trigger condition of secret protection;
Determine unit, if for monitoring the event that file/application program is operated, and preset The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
13. devices as claimed in claim 12, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user Touch the relevant information of operation.
14. devices as claimed in claim 13, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get The relevant information of touch operation is sent to be currently at the application program of focus.
15. devices as claimed in claim 12, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme The relevant information of the touch operation performed on the touchscreen.
16. devices as claimed in claim 12, judge whether in the following manner to monitor meet preset User's touch track of condition:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite Track.
17. devices as claimed in claim 12, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and Before the event that file/application program is operated is monitored, should to what communication terminal was currently running It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated Part is monitored.
18. devices as claimed in claim 12, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new The event that file is created is monitored.
19. devices as claimed in claim 18, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
20. devices as claimed in claim 18, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
21. devices as claimed in claim 12, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
22. devices as described in any one of claim 12 to 21, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
CN201310444639.4A 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device Active CN103530550B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310444639.4A CN103530550B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310444639.4A CN103530550B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Publications (2)

Publication Number Publication Date
CN103530550A CN103530550A (en) 2014-01-22
CN103530550B true CN103530550B (en) 2016-08-24

Family

ID=49932554

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310444639.4A Active CN103530550B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Country Status (1)

Country Link
CN (1) CN103530550B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103810419B (en) * 2014-02-13 2018-01-05 北京宝利明威软件股份有限公司 One kind applies anti-uninstall method and apparatus
CN104112019B (en) * 2014-07-23 2017-12-01 广州三星通信技术研究有限公司 Send the method, apparatus and terminal of information
CN106411938A (en) * 2016-11-22 2017-02-15 北京奇虎科技有限公司 Device and method for controlling application in user terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929503A (en) * 2012-10-30 2013-02-13 华为终端有限公司 Method and terminal for selecting files
CN103036768A (en) * 2012-12-10 2013-04-10 北京小米科技有限责任公司 Method for management application and device for management application
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN103309673A (en) * 2013-06-24 2013-09-18 北京小米科技有限责任公司 Session processing method and device based on gesture, and terminal equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102929503A (en) * 2012-10-30 2013-02-13 华为终端有限公司 Method and terminal for selecting files
CN103036768A (en) * 2012-12-10 2013-04-10 北京小米科技有限责任公司 Method for management application and device for management application
CN103177206A (en) * 2013-02-21 2013-06-26 深圳市中兴移动通信有限公司 Information privacy method and electronic terminal
CN103309673A (en) * 2013-06-24 2013-09-18 北京小米科技有限责任公司 Session processing method and device based on gesture, and terminal equipment

Also Published As

Publication number Publication date
CN103530550A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
US11301114B2 (en) Method and apparatus for managing notification bar message
US8429425B2 (en) Electronic backup and restoration of encrypted data
US9614826B1 (en) Sensitive data protection
KR101990598B1 (en) Method and device for recommending solution based on user operation behavior
CN112328853A (en) Document information processing method and device and electronic equipment
CN104333449A (en) Picture encryption method and system
CN104252284A (en) File display method and device
CN110557412A (en) data synchronization method and device
CN103514396B (en) File/applied program processing method and device on communication terminal
CN103530550B (en) File/applied program processing method on communication terminal and device
CN109891406A (en) Multi-stage data paging
CN109063011B (en) Log processing method, electronic device and computer readable storage medium
CN105301993B (en) A kind of control method and device in more equipment interactions
CN112799925A (en) Data acquisition method and device, electronic equipment and readable storage medium
CN103530549B (en) File/applied program processing method on communication terminal and device
US11178208B2 (en) Automatic initialization process for standalone e-discovery machine
US9313218B1 (en) Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms
CN103677519A (en) Method for collecting multimedia resource, terminal and server
JP6317433B2 (en) Interface function analysis and display method, apparatus, and computer storage medium
CN106095781A (en) Malicious websites recognition methods and device
EP4020888A1 (en) Systems and methods for monitoring secure web sessions
CN107358117B (en) Switching method, electronic equipment and computer storage medium
CN115277670A (en) Network connection control method and device of target application and electronic equipment
KR20190075558A (en) Terminal apparatus and controlling method of the terminal apparatus
CN103488942A (en) Method and device for processing file/application program on mobile communication terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220712

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co., Ltd