CN103530550B - File/applied program processing method on communication terminal and device - Google Patents
File/applied program processing method on communication terminal and device Download PDFInfo
- Publication number
- CN103530550B CN103530550B CN201310444639.4A CN201310444639A CN103530550B CN 103530550 B CN103530550 B CN 103530550B CN 201310444639 A CN201310444639 A CN 201310444639A CN 103530550 B CN103530550 B CN 103530550B
- Authority
- CN
- China
- Prior art keywords
- file
- application program
- user
- operated
- touch
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000004891 communication Methods 0.000 title claims abstract description 103
- 238000012544 monitoring process Methods 0.000 claims abstract description 115
- 238000000034 method Methods 0.000 claims abstract description 37
- 230000001010 compromised effect Effects 0.000 claims abstract description 13
- 239000000725 suspension Substances 0.000 claims description 20
- 239000000203 mixture Substances 0.000 claims description 12
- 230000008859 change Effects 0.000 claims description 11
- 230000009471 action Effects 0.000 claims description 10
- 238000010295 mobile communication Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 6
- 230000000875 corresponding effect Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 238000012546 transfer Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 7
- 238000001514 detection method Methods 0.000 description 5
- 238000012790 confirmation Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006399 behavior Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000001035 drying Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0487—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
- G06F3/0488—Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses the file/applied program processing method on communication terminal and device, wherein, described method includes: the event being operated user's touch track and the file/application program of communication terminal is monitored;If monitoring the event that file/application program is operated, and in preset time range, monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing to carry out, as privacy information, the object protected;Perform to protect operation accordingly, to avoid the file/application program operated compromised according to preset privacy preserving operations mode file/application program to being operated.By means of the invention it is possible to during to needing on terminal unit to protect as privacy information, more effectively protect the privacy information of user.
Description
Technical field
The present invention relates to file/application program protection processing technology field, be specifically related on communication terminal
File/applied program processing method and device.
Background technology
What at present Intelligent mobile communication terminal (including mobile phone, panel computer etc.) provided take pictures, record a video,
The functions such as recording bring happiness lived experience easily for user really, however one can not be ignored ask
Topic is exactly privacy.The memory space of communication terminal is constantly increasing, in a communication terminal
The files such as a lot of picture, video and recording can be stored, these multimedia files for a user
As be individual privacy, if communication terminal is obtained by others, these information will face compromised
Risk.
Therefore, solve the technical problem that to be that how terminal to be led in the urgent need to those skilled in the art
The information realization carrying out protecting as privacy information is needed to be effectively protected in news terminal.
Summary of the invention
In view of the above problems, it is proposed that the present invention is to provide one to overcome the problems referred to above or at least partly
Ground solves the file/applied program processing method on the communication terminal of the problems referred to above and moves logical accordingly
File/application processing apparatus on news terminal unit, it is possible to needing as privacy on terminal unit
During information is protected, more effectively protect the privacy information of user.
According to one aspect of the present invention, it is provided that at the file/application program on a kind of communication terminal
Reason method, including:
The thing that user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range
To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make
The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated
Operation, to avoid the file/application program operated compromised.
Alternatively, described user's touch track on communication terminal touch screen is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
Alternatively, also include:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get
It is sent to be currently at the application program of focus.
Alternatively, described user's touch track in communication terminal is monitored, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme
The relevant information of operation.
Alternatively, judge whether to monitor the user's touch track meeting prerequisite in the following manner:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature
Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
Alternatively, described to the user's touch track on communication terminal touch screen and file/application journey
The event that sequence is operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication
The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
Alternatively, described to the user's touch track on communication terminal touch screen and file/application journey
The event that sequence is operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out
Monitoring.
Alternatively, the described event being created file new in communication terminal is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition
Part is defined as the object that needs carry out protecting as privacy information.
Alternatively, the described event being operated the file/application program in communication terminal is monitored,
Including:
Edited the file in communication terminal, application program is mounted or application program used
Action Events is monitored.
Alternatively, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches
Track meets the time difference between preset condition, and the described very first time and the second time less than preset
Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information
Object.
According to a further aspect in the invention, it is provided that at the file/application program on a kind of communication terminal
Reason device, including:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application
The event that program is operated is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset
The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range
Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated
Perform to protect operation accordingly, to avoid the file/application program operated compromised.
Alternatively, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user
Touch the relevant information of operation.
Alternatively, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get
The relevant information of touch operation is sent to be currently at the application program of focus.
Alternatively, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme
The relevant information of the touch operation performed on the touchscreen.
Alternatively, judge whether to monitor the user's touch track meeting prerequisite in the following manner:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate
Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with
Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite
Track.
Alternatively, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and
Before the event that file/application program is operated is monitored, should to what communication terminal was currently running
It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then
Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored.
Alternatively, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new
The event that file is created is monitored.
Alternatively, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file
Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range
The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
Alternatively, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified
The Action Events that dress or application program are used is monitored.
Alternatively, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record
The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record
Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar
Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold
File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
According to the file/applied program processing method on the communication terminal of the present invention and device, can be right
The event that user's touch track of communication terminal and file/application program are operated is monitored, as
Fruit finds that file/application program is operated, and monitors in preset time range and meet prerequisite
User's touch track, then can as user to perform privacy preserving operations confirmation, therefore may be used
Directly to perform to protect operation to new file according to preset privacy preserving operations mode.Visible, in this mistake
Whether Cheng Zhong, can confirm user in the way of directly by detection user's specific operation on the touchscreen
Need file/application program is carried out secret protection, user-friendly.And carry out hidden in user's confirmation
After private protection, directly can perform concrete protection according to pre-set protection mode of operation backstage
Operation, selects the operations such as concrete transfer path, setting code again in interface without user, because of
This, can reduce the risk that the private file of user is compromised further.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention
Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other
Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for this
Field those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation,
And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals
Identical parts.In the accompanying drawings:
Fig. 1 shows the flow chart of method according to an embodiment of the invention;And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows
The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not
Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly
Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
In embodiments of the present invention, it is provided that a run on communication terminal application program (be
It is easy to describe, this application program is referred to as " defence program " by the embodiment of the present invention), this defence program
The thing that user's touch track on communication terminal touch screen and file/application program can be operated
Part is monitored, and then according to monitored results, file/application program is performed privacy preserving operations.Example
As, the event creating new file can be monitored, if it find that there is new file to be created, also judge
Whether it may be the private file of user, if it is, user's touch track can be monitored,
If monitoring the user's touch track meeting prerequisite, then can be according to preset mode to newly created
File perform protection operation.It is to say, for user perspective, can be newly created file in advance
Specify protection mode of operation, such as, can directly delete, or file shifts and preassigns transfer
Target directory position, or, it is also possible to the password used when file is encrypted and preassigns encryption,
Etc..So, at a newly-generated file, or file is operated, or application program is mounted or
After using, user just can mark the track of given shape on the touch screen of communication terminal,
And then, the specific touch track collected just can be defined as needs by the defence program of the embodiment of the present invention
Carry out the triggering signal of secret protection, carry out trigger protection program with this and file/application program operated is held
The privacy preserving operations that row is corresponding.Below this is introduced in detail.
Seeing Fig. 1, the embodiment of the present invention provide firstly the file on a kind of communication terminal/application journey
Sequence processing method, in the method, the executive agent of each step can be just previously described defence program, when
So it is likely in actual applications realize by the way of hardware.The method may comprise steps of:
S101: the user's touch track on communication terminal touch screen and file/application program are grasped
The event made is monitored;
When implementing, the event that file/application program is operated just can include the thing that new file is created
The thing that the mounted event of event that part, existing file are edited, application program, application program are used
Part etc..Event except being operated file/application program is monitored, it is also possible to mobile communication eventually
User's touch track on end touch screen is monitored.When implementing, due to some mobile communication at present
Terminal is equipped with touch screen, and user can realize the input of information by operation on the touchscreen.
So, if the user while perform touch operation on touch screen, then can be perceived by operating system.Therefore,
The touch track that user can be formed by defence program in the embodiment of the present invention on the touchscreen is as startup
File/the application program currently operated is carried out the trigger condition of secret protection.Therefore, supervise except needs
Outside the event of control user operation file/application program, it is also possible to formed when user is operated on the touchscreen
Touch track be monitored, and judge whether this touch track meets preset condition.
It should be noted that for the operation that user performs on the touchscreen, in default situations,
Have and be currently at the application program of focus condition and captured.For example, it is assumed that user is being currently used clear
Device of looking at browses webpage, the most now if the user while perform touch operation, the then coordinate operated on touch screen
Can be captured by this browser program etc. information, the most just can realize the most in a browser page turning,
The operations such as refreshing.And in embodiments of the present invention, in order to user was made in the range of certain time
The event of special touch track is as the trigger condition of secret protection, it is required that the embodiment of the present invention
Defence program can get the touch operation that user performs on the touchscreen.But, when implementing,
Defence program in the embodiment of the present invention is usually at running background, is not to be currently at focus condition
Program, therefore, in order to make defence program get touch behaviour that user performs on the touchscreen
The relevant information made, can be accomplished by: under a kind of mode, defence program can create one
Individual full frame suspended window, this suspended window is positioned at the upper strata of the application window being currently at focus, so,
When user performs touch operation on the touchscreen, the information that touch operation is relevant will be first by protection journey
The suspended window of sequence is captured, and can be analyzed the touch operation information captured, it is judged that it is
No meet prerequisite.Certainly, if not meeting prerequisite, then user is probably to being currently at Jiao
The operational order that the application program of dotted state sends, therefore, it can send out the touch operation information got
Give the application program being currently at focus condition so that this application program can respond the operation of user.
Certainly, under this implementation, owing to the defence program in the embodiment of the present invention gets at first
The relevant information of user's touch operation, therefore, for user's application program to being currently at focus condition
For the operational order sent, certain delay may be produced.In order to avoid the generation of this situation,
Under another kind of implementation, it is also possible to starting a touch screen operation monitoring programme, this monitoring programme can
To be the program of a ring 0, user can be obtained from drive by this monitoring programme and hold on the touchscreen
The relevant information of the touch operation of row.So, avoid the need for creating full frame suspension window, do not interfere with
Normal operating to user's application program to being currently at focus condition.Wherein, either by suspending
Window obtains, or obtains from drive, and the relevant information of concrete touch operation may each be finger and touches
The coordinate information of position.
Certainly, it is however generally that, if user needs to grasp the application program being currently at focus condition
Making, the most concrete action type is usually clicking operation, or the slide of linear type track, because,
For the ease of making a distinction with this operation, in embodiments of the present invention, prerequisite can be set to
Touch track forms preset special shape, such as, five-pointed star shape, circle etc.;Or, it is possible to
The point special so that prerequisite to be arranged via some on touch screen, such as, moves in the screen upper left corner
Move the lower left corner, move again to the lower right corner, eventually move to the upper left corner, wherein three key points of approach,
So, after the touch track monitoring user, it can be determined that whether track sequentially passes through these three closes
Key point.It is to say, for a user, if when operating certain file/application program, needed it
Protect as private file, then can within certain time before the operation is performed or afterwards,
Mark a five-pointed star shape or circle on the touchscreen, or streak the key point specified, phase successively
Answering, the defence program in the embodiment of the present invention just can monitor this event, and using this event as
File/the application program operated is carried out the trigger condition of secret protection.
Wherein, in order to whether detection user's touch track meets prerequisite, use can monitored
During the touch behavior at family, (suspension window or monitoring programme are permissible for the coordinate at the place, position that record touches
It is directly obtained this coordinate information), and constantly record the change of coordinate, if be detected that coordinate is continuous
Change and formed a track, then can by this track with preset reference trajectory feature (by described previously
Five-pointed star or circle etc. as reference trajectory, and therefrom extract feature) mate, if
It is made into merit, namely user's touch track meets the feature of reference trajectory, then can be determined that to have monitored and meet
User's touch track of prerequisite.
It should be noted that generally, only at some specific application programs operationally,
The file that possible needs carry out protecting, or this specific application program may be produced as privacy information
Itself may belong to the application program needing to carry out secret protection.Therefore, the protection in the embodiment of the present invention
The application program run current in communication terminal can also be monitored by program, if it find that crucial
Application program is currently running, and restarts the user's touch track on communication terminal touch screen and literary composition
The event that part/application program is operated is monitored, if the current application program run does not includes producing
The critical applications of raw private file, then can start terminal user in mobile communication touch track
And the event that file/application program is operated is monitored.Wherein, so-called critical applications is permissible
Including photographing unit, videocorder, recorder program, JICQ etc..Wherein, detection is current just
Can be completed by the API that system provides at the program information run, such as, obtain under android system
The program taking operation program information is as follows:
// obtain system service ActivityManager
ActivityManager manager=
(ActivityManager)getSystemService(ACTIVITY_SERVICE);
// obtain the task stack list being currently running,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
// obtain the task stack of current top, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
The top Activity of // acquisition foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name applied
String packageName=topActivity.getPackageName();。
Wherein method getSystemService (), getRunningTasks (), getPackageName () are
The api function that android system provides.
In order to the file/application program that may belong to privacy of user is protected, timely at this
In bright embodiment, defence program can first pass through what file/application program was operated by a background process
Event is monitored.Concrete, in order to realize this monitoring, can there is various ways.Such as, at it
Under middle a kind of mode, it is possible to use the event sniffer of communication terminal operating system, snoop-operations system
The broadcast that system sends, by the filtration to system broadcast message, knows that file/application program is operated
Event.It is to say, background program can pass through the event sniffer of communication terminal operating system,
Each system message occurred is judged, is operated if type of message is file/application program
Event, then can therefrom extract the filename of the file operated, suffix name, the application journey that operated
The information such as the title of sequence.Such as, under android system, when creating new file, system can send wound
Build the broadcast of file, background program can arrange a BroadCastReceiver broadcast is carried out monitor and
Filter, judge whether the event occurring to create new file according to the type of message of broadcast.
Or, under another kind of implementation, it is also possible to utilize the hook of communication terminal operating system
Function, the event being operated user file/application program is monitored.It is to say, in file/application
During program is operated, need to call relevant program and realize the operation to file/application program,
In embodiments of the present invention, it is possible to use API Hook Function, background program can provide Hook Function also
Deflector guide subfunction (generally being realized), such hook is called by Modification growth function entry address by original
Function is just obtained in that the information such as the filename of the file operated, suffix name, completes file/application journey
The monitoring of the event that sequence is operated, and obtain the information such as the filename in event, application name.
It should be noted that in actual applications, for preserving the catalogue one of file in communication terminal
As have a lot, but general only some catalogue may comprise the private file of user, and other
Catalogue, such as, typically will not deposit use in the most sightless catalogues such as storage system file
The private file at family.Therefore, during the event creating new file is monitored, can be the most right
Some specific catalogues are monitored, and monitor the change of file in this specific catalogue, it is judged that Qi Zhongshi
No have new file to be created.Such as, this specific catalogue could be for preserving the photo of user, regarding
The catalogue of the files such as frequency.
S102: if monitoring the event that file/application program is operated, and at preset time range
Inside monitor the user's touch track meeting prerequisite, then file/the application program operated is defined as
Needs carry out the object protected as privacy information;
If monitored the event that file/application program is operated, and before or after this event
Certain period of time in also detected that the user's touch track meeting prerequisite, then can be by mobile logical
User's touch track of news terminal meet this event of prerequisite be defined as needs that user sends to file/
Application program carries out the trigger event of secret protection, accordingly, it is possible to be defined as by this document/application program
Needs carry out the object protected as privacy information.
When implementing, when monitoring the event that file/application program is operated, record the very first time,
When monitoring the user's touch track meeting prerequisite, recorded for the second time;So, if monitored
The event that file/application program is operated, and user's touch track of communication terminal meets preset bar
Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold
File/the application program of operation is defined as the object that needs carry out protecting as privacy information.Wherein, first
Sequencing relation between time and the second time can not be defined, say, that for user
For, when certain file/application program is protected by needs as privacy information, can to this document/
Before or after application program operates, draw preset shape on the touchscreen, the most permissible
Automatically trigger and file/application program is carried out secret protection.
Wherein, for creating the event of new file, the file/application program operated is being defined as
Before needing as the object of privacy information protection, it is also possible to judge further.Specifically sentencing
Time disconnected, if being the monitoring that the event creating new file in specific catalogue is carried out before, then can be straight
Connect the catalogue according to new file place and judge that it belongs to the needs object as privacy information protection.The most just
It is to say, owing to only some catalogues that may produce private file being monitored in advance, therefore, monitors
New file be the most all the file in these specific catalogues, can be defined as need as privacy believe
Breath carries out the file protected.Otherwise, create new file even if monitoring, and also in the regular hour
In the range of monitored qualified user's touch track, it is also possible to need not be defined as needing conduct
Privacy information carries out the file protected.
Or, while monitoring new document creation event, it is also possible to get the suffix of new file
The information such as name, therefore, can analyze the file type information of the file that makes new advances accordingly, and then, can basis
File type information judges that whether new file is that user needs to carry out, as privacy information, the object protected.Example
As, generally, if it find that file type belongs to the types such as picture, video, audio frequency, the most permissible
It is judged to that needs carry out the object protected as privacy information.
Certainly, in order to improve the accuracy of judgement further, it is also possible to above two mode is combined.
That is, the establishment event of file new in some specific catalogues can be monitored, if it find that specific
Catalogue in create new file, determine the file type of the file that makes new advances further according to the suffix name of new file,
If file type belongs to again preset particular type, then the file that this is newly created can be probably needs
The object protected is carried out as privacy information.
Such as, the example in an actual application may is that first start application monitoring service routine (after
Platform runs), when application monitoring programme detects application program (photographing unit, the recorder relevant to privacy
Deng) start time, startup file monitoring service routine (running background), file monitor program monitoring be correlated with
Path under the establishment event of file, when there being private file to create, record the very first time, when detecting
During qualified user's touch track, recorded for the second time, compare the difference between two time, when
Time in two times special time threshold value (such as 10 seconds) after file creation time, perform privacy literary composition
The protection of part processes operation.
S103: perform corresponding according to the preset privacy preserving operations mode file to being operated/application program
Protection operation, to avoid the file/application program operated compromised.
Determining that a file/application program operated belongs to what needs carried out protecting as privacy information
After object, it is possible to file that can be newly created according to preset privacy preserving operations mode performs protection behaviour
Make.
Wherein, the privacy preserving operations of the file/application program operated can directly will be operated
File/application program is deleted;Or can also is that and the file/application program operated is shifted,
At this point it is possible to specified the target directory position of transfer when pre-setting by user;Again or, it is also possible to
File/the application program operated is encrypted, adds and it is possible to specified when pre-setting by user
The password used time close, etc..It should be noted that due to the quilt under dissimilar or different directories
File/the application program of operation is likely to be of different severity levels, therefore, it can the most dissimilar
Or the file/application program operated under different directories arranges different protection modes of operation.Such as,
The file of picture category is set to transfer preserve, the private file of video class is set to encryption etc..
In a word, in embodiments of the present invention, can be to user's touch track of communication terminal and literary composition
The event that part/application program is operated is monitored, if it find that file/application program is operated, and
Monitor the user's touch track meeting prerequisite in preset time range, then can as with
The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode
New file is performed protection operation.Visible, in the process, can directly touched by detection user
The mode of the specific operation on screen confirms that user carries out secret protection the need of to file/application program,
User-friendly.And after user confirms to carry out secret protection, can be directly according to presetting
Good protection mode of operation backstage performs concrete protection operation, selects without user in interface again
The operations such as concrete transfer path, setting code, therefore, it can reduce further the private file of user
Compromised risk.
It is corresponding with the file/applied program processing method on the communication terminal that the embodiment of the present invention provides,
The embodiment of the present invention additionally provides the file/application processing apparatus on a kind of communication terminal, sees
Fig. 2, this device may include that
Monitoring unit 201, for the user's touch track on communication terminal touch screen and file/
The event that application program is operated is monitored;
Determine unit 202, if for monitoring the event that file/application program is operated, and in advance
The user's touch track meeting prerequisite is monitored, then the file/should that will be operated in the time range put
It is defined as the object that needs carry out protecting as privacy information by program;
Operating unit 203, for according to the file/application to being operated of the preset privacy preserving operations mode
Program performs to protect operation accordingly, to avoid the file/application program operated compromised.
When implementing, described monitoring unit may include that
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user
Touch the relevant information of operation.
Now, this device can also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get
The relevant information of touch operation is sent to be currently at the application program of focus.
Under another kind of implementation, described monitoring unit may include that
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme
The relevant information of the touch operation performed on the touchscreen.
When implementing, judge whether in the following manner to monitor and meet the user of prerequisite and touch rail
Mark:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate
Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with
Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite
Track.
When implementing, this device can also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and
Before the event that file/application program is operated is monitored, should to what communication terminal was currently running
It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then
Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored.
Wherein, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new
The event that file is created is monitored.
Wherein said first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
This device can also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file
Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range
The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
Described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified
The Action Events that dress or application program are used is monitored.
It addition, this device can also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record
The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record
Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar
Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold
File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
Wherein, described operating unit includes:
Deletion action subelement, for performing deletion action to the file operated/application program;
Or,
Transfer subelement, for according to preset catalogue, transfers to pre-by the file/application program operated
Under the catalogue first specified;
Or,
Encryption sub-unit operable, for according to preset password, is encrypted the file/application program operated.
When implementing, different types of file/application program can corresponding different protection mode of operation.
Visible, in embodiments of the present invention, can be to user's touch track of communication terminal and literary composition
The event that part/application program is operated is monitored, if it find that file/application program is operated, and
Monitor the user's touch track meeting prerequisite in preset time range, then can as with
The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode
New file is performed protection operation.Visible, in the process, can directly touched by detection user
The mode of the specific operation on screen confirms that user carries out secret protection the need of to file/application program,
User-friendly.And after user confirms to carry out secret protection, can be directly according to presetting
Good protection mode of operation backstage performs concrete protection operation, selects without user in interface again
The operations such as concrete transfer path, setting code, therefore, it can reduce further the private file of user
Compromised risk.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein
Have relevant.Various general-purpose systems can also be used together with based on teaching in this.As described above,
Construct the structure required by this kind of system to be apparent from.Additionally, the present invention is also not for any specific
Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein,
And the description done language-specific above is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this
Inventive embodiment can be put into practice in the case of not having these details.In some instances, not
It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one
Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes
It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure
Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim
The middle more feature of feature be expressly recited.More precisely, as the following claims reflect
As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows
Claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each right
Requirement itself is all as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly
Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible
Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used
To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or
Outside at least some in unit excludes each other, can use any combination that (this specification is included companion
With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or
All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion
With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase
Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include it
Some feature included in its embodiment rather than further feature, but the group of the feature of different embodiment
Close and mean to be within the scope of the present invention and formed different embodiments.Such as, in following power
In profit claim, one of arbitrarily can mode making in any combination of embodiment required for protection
With.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more
The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should
Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize according to this
Some or all portions in file on the communication terminal of inventive embodiments/application program processing equipment
The some or all functions of part.The present invention is also implemented as performing method as described herein
Part or all equipment or device program (such as, computer program and computer program).
The program of such present invention of realization can store on a computer-readable medium, or can have one
Or the form of multiple signals.Such signal can be downloaded from internet website and obtain, or carrying
There is provided on body signal, or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment,
And those skilled in the art can design replacement in fact without departing from the scope of the appended claims
Execute example.In the claims, should not will be located in any reference marks between bracket to be configured to right is wanted
The restriction asked.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.It is positioned at
Word "a" or "an" before element does not excludes the presence of multiple such element.The present invention is permissible
By means of including the hardware of some different elements and realizing by means of properly programmed computer.?
If listing in the unit claim of equipment for drying, several in these devices can be by same
Hardware branch specifically embodies.Word first, second and third use do not indicate that any order.
Can be title by these word explanations.
The application can apply to computer system/server, and they can be with other universal or special calculating numerous
System environments or configuration operate together.Be suitable to be used together with computer system/server is well-known
The example of calculating system, environment and/or configuration includes but not limited to: personal computer system, server meter
Calculation machine system, thin client, thick client computer, hand-held or laptop devices, system based on microprocessor,
Set Top Box, programmable consumer electronics, NetPC Network PC, minicomputer system mass computing
Machine system and the distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in the computer system executable instruction performed by computer system
Describe under the general linguistic context of (such as program module).Generally, program module can include routine, program,
Target program, assembly, logic, data structure etc., they perform specific task or realize specific
Abstract data type.Computer system/server can be implemented in distributed cloud computing environment, distribution
In formula cloud computing environment, task is to be performed by by the remote processing devices of communication network links.Dividing
In cloth cloud computing environment, program module may be located at and includes that the Local or Remote of storage device calculates system
On storage medium.
The invention also discloses the file/applied program processing method on A1, a kind of communication terminal, bag
Include:
The thing that user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored;
If monitoring the event that file/application program is operated, and monitor in preset time range
To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make
The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated
Operation, to avoid the file/application program operated compromised.
A2, method as described in A1, described to the user's touch track on communication terminal touch screen
It is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
A3, method as described in A2, also include:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get
It is sent to be currently at the application program of focus.
A4, method as described in A1, described supervise the user's touch track in communication terminal
Control, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme
The relevant information of operation.
A5, method as described in A1, judge whether to monitor to meet prerequisite in the following manner
User's touch track:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature
Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
A6, method as described in A1, described to the user's touch track on communication terminal touch screen
And the event that operated of file/application program be monitored before also include:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication
The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
A7, method as described in A1, described to the user's touch track on communication terminal touch screen
And the event that file/application program is operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out
Monitoring.
A8, method as described in A7, the described event being created file new in communication terminal is entered
Row monitoring, including:
New document creation event in assigned catalogue in communication terminal is monitored.
A9, method as described in A7, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition
Part is defined as the object that needs carry out protecting as privacy information.
A10, method as described in A1, described operated the file/application program in communication terminal
Event be monitored, including:
Edited the file in communication terminal, application program is mounted or application program used
Action Events is monitored.
A11, method as described in any one of A1 to A10, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches
Track meets the time difference between preset condition, and the described very first time and the second time less than preset
Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information
Object.
The invention also discloses the file/application processing apparatus on B1, a kind of communication terminal, bag
Include:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application
The event that program is operated is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset
The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range
Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated
Perform to protect operation accordingly, to avoid the file/application program operated compromised.
B2, device as described in B1, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user
Touch the relevant information of operation.
B3, device as described in B2, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get
The relevant information of touch operation is sent to be currently at the application program of focus.
B4, device as described in B1, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme
The relevant information of the touch operation performed on the touchscreen.
B5, device as described in B1, judge whether to monitor the use meeting prerequisite in the following manner
Family touch track:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate
Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with
Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite
Track.
B6, device as described in B1, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and
Before the event that file/application program is operated is monitored, should to what communication terminal was currently running
It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then
Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored.
B7, device as described in B1, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new
The event that file is created is monitored.
B8, device as described in B7, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
B9, device as described in B7, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file
Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range
The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
B10, device as described in B1, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified
The Action Events that dress or application program are used is monitored.
B11, device as described in any one of B1 to B10, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record
The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record
Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar
Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold
File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
Claims (22)
1. file/the applied program processing method on communication terminal, including:
The thing that user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored, and wherein, described user's touch track is to carry out the file/application program currently operated
The trigger condition of secret protection;
If monitoring the event that file/application program is operated, and monitor in preset time range
To meeting user's touch track of prerequisite, then it is defined as the file/application program operated needing to make
The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated
Operation, to avoid the file/application program operated compromised.
2. the method for claim 1, described to the user's touch on communication terminal touch screen
Track is monitored, including:
Create full frame suspension window;
The relevant information of the touch operation that user performs on the touchscreen is obtained by described suspension window.
3. method as claimed in claim 2, also includes:
If user's touch track does not meets prerequisite, then the relevant information of touch operation that will get
It is sent to be currently at the application program of focus.
4. the method for claim 1, described enters the user's touch track in communication terminal
Row monitoring, including:
Start touch screen operation monitoring programme;
From drive, the touch that user performs on the touchscreen is obtained by described touch screen operation monitoring programme
The relevant information of operation.
5. the method for claim 1, judges whether in the following manner to monitor and meets preset bar
User's touch track of part:
Obtain the coordinate information that touch operation is corresponding, and constantly record the change of coordinate;
If coordinate consecutive variations also forms a track, then by this track and preset reference trajectory feature
Mate;
If the match is successful, then judge to monitor the user's touch track meeting prerequisite.
6. the method for claim 1, described to the user's touch on communication terminal touch screen
The event that track and file/application program are operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication
The event that user's touch track on terminal touch screen and file/application program are operated is monitored.
7. the method for claim 1, described to the user's touch on communication terminal touch screen
The event that track and file/application program are operated is monitored including:
The event being created the user's touch track on communication terminal touch screen and new file is carried out
Monitoring.
8. method as claimed in claim 7, the described thing that file new in communication terminal is created
Part is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
9. method as claimed in claim 7, also includes:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And in preset time range, monitor the user's touch track meeting prerequisite, then by described new literary composition
Part is defined as the object that needs carry out protecting as privacy information.
10. the method for claim 1, described to the file/application program in communication terminal
The event operated is monitored, including:
Edited the file in communication terminal, application program is mounted or application program used
Action Events is monitored.
11. methods as described in any one of claim 1 to 10, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the user's touch track meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range
Monitor the user's touch track meeting prerequisite, be then defined as the file/application program operated needing
The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the user in communication terminal touches
Track meets the time difference between preset condition, and the described very first time and the second time less than preset
Time threshold, then be defined as the file/application program operated needing carrying out protecting as privacy information
Object.
File/application processing apparatus on 12. 1 kinds of communication terminals, including:
Monitoring unit, for the user's touch track on communication terminal touch screen and file/application
The event that program is operated is monitored, and wherein, described user's touch track is to the literary composition currently operated
Part/application program carries out the trigger condition of secret protection;
Determine unit, if for monitoring the event that file/application program is operated, and preset
The user's touch track meeting prerequisite, the then file/application journey that will be operated is monitored in time range
Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated
Perform to protect operation accordingly, to avoid the file/application program operated compromised.
13. devices as claimed in claim 12, described monitoring unit includes:
Suspension window creation subelement, for creating full frame suspension window;
First obtains subelement, for touching of being performed on the touchscreen by described suspension window acquisition user
Touch the relevant information of operation.
14. devices as claimed in claim 13, also include:
Information transmitting unit, if do not meet prerequisite for user's touch track, then will get
The relevant information of touch operation is sent to be currently at the application program of focus.
15. devices as claimed in claim 12, described monitoring unit includes:
Monitoring programme promoter unit, is used for starting touch screen operation monitoring programme;
Second obtains subelement, for obtaining user from drive by described touch screen operation monitoring programme
The relevant information of the touch operation performed on the touchscreen.
16. devices as claimed in claim 12, judge whether in the following manner to monitor meet preset
User's touch track of condition:
Coordinate record unit, for obtaining the coordinate information that touch operation is corresponding, and constantly records coordinate
Change;
Path matching unit, if for coordinate consecutive variations form a track, then by this track with
Preset reference trajectory feature is mated;
Identifying unit, if for the match is successful, then judges to monitor the user's touch meeting prerequisite
Track.
17. devices as claimed in claim 12, also include:
Run program monitoring unit, for the user's touch track on communication terminal touch screen and
Before the event that file/application program is operated is monitored, should to what communication terminal was currently running
It is monitored by program;
Start unit, if the application program for being currently running belongs to preset critical applications, then
Start the thing that the user's touch track on communication terminal touch screen and file/application program are operated
Part is monitored.
18. devices as claimed in claim 12, described monitoring unit includes:
First monitoring subelement, for the user's touch track on communication terminal touch screen and new
The event that file is created is monitored.
19. devices as claimed in claim 18, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
20. devices as claimed in claim 18, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file
Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type,
And it is satisfied pre-to monitor the user's touch track on communication terminal touch screen in preset time range
The condition put, then be defined as described new file needing to carry out, as privacy information, the object protected.
21. devices as claimed in claim 12, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified
The Action Events that dress or application program are used is monitored.
22. devices as described in any one of claim 12 to 21, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record
The very first time;
Second time record unit, in time monitoring the user's touch track meeting prerequisite, record
Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and user's touch track meets preset bar
Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold
File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444639.4A CN103530550B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method on communication terminal and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310444639.4A CN103530550B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method on communication terminal and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103530550A CN103530550A (en) | 2014-01-22 |
CN103530550B true CN103530550B (en) | 2016-08-24 |
Family
ID=49932554
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310444639.4A Active CN103530550B (en) | 2013-09-23 | 2013-09-23 | File/applied program processing method on communication terminal and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103530550B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103810419B (en) * | 2014-02-13 | 2018-01-05 | 北京宝利明威软件股份有限公司 | One kind applies anti-uninstall method and apparatus |
CN104112019B (en) * | 2014-07-23 | 2017-12-01 | 广州三星通信技术研究有限公司 | Send the method, apparatus and terminal of information |
CN106411938A (en) * | 2016-11-22 | 2017-02-15 | 北京奇虎科技有限公司 | Device and method for controlling application in user terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929503A (en) * | 2012-10-30 | 2013-02-13 | 华为终端有限公司 | Method and terminal for selecting files |
CN103036768A (en) * | 2012-12-10 | 2013-04-10 | 北京小米科技有限责任公司 | Method for management application and device for management application |
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
CN103309673A (en) * | 2013-06-24 | 2013-09-18 | 北京小米科技有限责任公司 | Session processing method and device based on gesture, and terminal equipment |
-
2013
- 2013-09-23 CN CN201310444639.4A patent/CN103530550B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102929503A (en) * | 2012-10-30 | 2013-02-13 | 华为终端有限公司 | Method and terminal for selecting files |
CN103036768A (en) * | 2012-12-10 | 2013-04-10 | 北京小米科技有限责任公司 | Method for management application and device for management application |
CN103177206A (en) * | 2013-02-21 | 2013-06-26 | 深圳市中兴移动通信有限公司 | Information privacy method and electronic terminal |
CN103309673A (en) * | 2013-06-24 | 2013-09-18 | 北京小米科技有限责任公司 | Session processing method and device based on gesture, and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN103530550A (en) | 2014-01-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11301114B2 (en) | Method and apparatus for managing notification bar message | |
US8429425B2 (en) | Electronic backup and restoration of encrypted data | |
US9614826B1 (en) | Sensitive data protection | |
KR101990598B1 (en) | Method and device for recommending solution based on user operation behavior | |
CN112328853A (en) | Document information processing method and device and electronic equipment | |
CN104333449A (en) | Picture encryption method and system | |
CN104252284A (en) | File display method and device | |
CN110557412A (en) | data synchronization method and device | |
CN103514396B (en) | File/applied program processing method and device on communication terminal | |
CN103530550B (en) | File/applied program processing method on communication terminal and device | |
CN109891406A (en) | Multi-stage data paging | |
CN109063011B (en) | Log processing method, electronic device and computer readable storage medium | |
CN105301993B (en) | A kind of control method and device in more equipment interactions | |
CN112799925A (en) | Data acquisition method and device, electronic equipment and readable storage medium | |
CN103530549B (en) | File/applied program processing method on communication terminal and device | |
US11178208B2 (en) | Automatic initialization process for standalone e-discovery machine | |
US9313218B1 (en) | Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms | |
CN103677519A (en) | Method for collecting multimedia resource, terminal and server | |
JP6317433B2 (en) | Interface function analysis and display method, apparatus, and computer storage medium | |
CN106095781A (en) | Malicious websites recognition methods and device | |
EP4020888A1 (en) | Systems and methods for monitoring secure web sessions | |
CN107358117B (en) | Switching method, electronic equipment and computer storage medium | |
CN115277670A (en) | Network connection control method and device of target application and electronic equipment | |
KR20190075558A (en) | Terminal apparatus and controlling method of the terminal apparatus | |
CN103488942A (en) | Method and device for processing file/application program on mobile communication terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220712 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co., Ltd |