CN103778363A - Mobile terminal and method for protecting application - Google Patents

Mobile terminal and method for protecting application Download PDF

Info

Publication number
CN103778363A
CN103778363A CN201410023964.8A CN201410023964A CN103778363A CN 103778363 A CN103778363 A CN 103778363A CN 201410023964 A CN201410023964 A CN 201410023964A CN 103778363 A CN103778363 A CN 103778363A
Authority
CN
China
Prior art keywords
application
password
mobile terminal
association
submodule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410023964.8A
Other languages
Chinese (zh)
Other versions
CN103778363B (en
Inventor
卢楠
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410023964.8A priority Critical patent/CN103778363B/en
Publication of CN103778363A publication Critical patent/CN103778363A/en
Application granted granted Critical
Publication of CN103778363B publication Critical patent/CN103778363B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention is suitable for the technical field of communication, and provides a method for protecting an application. The method comprises the following steps: receiving a command, and processing an association request initiated by a first application to a second application; according to user operation, setting a first password running the first application and/or a second password running the second application; hiding the first application; inputting the received password of the second application, and triggering to run the first application or the second application according to the input password. The invention correspondingly provides a mobile terminal realizing the method. Therefore, the mobile terminal has wider suitable scenes, can protect the application of the terminal better, and has extremely high practicability.

Description

The guard method of mobile terminal and application
Technical field
The present invention relates to communication technical field, relate in particular to the guard method of a kind of mobile terminal and application.
Background technology
Along with the development of electronic communication, the function of smart mobile phone is more and more abundanter, and people also more and more pay attention to the information security of mobile phone application.Application protection is as an importance of mobile phone safety, and the measure of its protection has a lot, is hidden into application encipher from application, then to application camouflage etc.Application is hidden, application encipher and application camouflage, protects respectively from different aspects to application.For example: application is hidden, by the application hidden function in mobile phone, application is not presented in desktop and main application interface, thereby plays the effect of avoiding application to be used; Application encipher, does not allow other people use the object of application by the application in mobile phone being arranged to access code, playing; Application camouflage is the application icon showing on desktop by optimizing, and makes its icon that is shown as other application or picture, has certain fascination effect.
Application is hidden, application encipher and application camouflage, protects respectively, but has respectively following defect: application is hidden: by checking in mobile phone, hiding function is set, just can easily finds the application being hidden from different aspects to application.Application encipher: be provided with access code, if kith and kin question closely the access code of application, inform privacy and security that real password equally cannot guarantee information, inform that dummy letter can not meet again the other side's requirement.Application camouflage: the method has certain fascination, but when other people use carefully, will inevitably find the true application of being pretended.
In summary,, obviously there is in actual use inconvenience and defect in the guard method of existing mobile terminal and application, so be necessary to be improved.
Summary of the invention
For above-mentioned defect, the object of the present invention is to provide the guard method of a kind of mobile terminal and application, have and adapt to more widely scene, can better protect terminal applies, there is very high practicality.
To achieve these goals, the invention provides a kind of guard method of application, described method comprises:
Receive instruction, process the association request that the first application is initiated to the second application;
According to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Described the first application is hidden and processed;
Described the second application receives Password Input, and triggers described the first application of operation or the second application according to input password.
The guard method of application according to the present invention, described reception instruction, process the first application and comprised before the associated request step of the second application initiation:
Default described second applies the amount threshold of application program that can be associated;
Described reception instruction, process the first application and comprise to the associated request step of the second application initiation:
Whether the number of applications that judges described the second association reaches described amount threshold;
If the number of applications of described the second association reaches described amount threshold, point out user can not set up association;
If the number of applications of described the second association does not reach described amount threshold, respond described associated request, described the first application is set up associated with the second application.
The guard method of application according to the present invention, described the second application receives Password Input, and comprises according to described the first application of input password triggering operation or the second applying step:
Judge that the password that described the second application receives is first password or the second password, if first password moves described the first application, otherwise move described the second application.
The guard method of application according to the present invention, also comprises before described the second application receives Password Input:
Detect described second and apply the whether related application of tool;
If the related application of described the second application tool points out user to input password, otherwise directly move described the second application.
The guard method of application according to the present invention, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
The present invention also provides a kind of mobile terminal accordingly, comprising:
Request processing module, for receiving instruction, processes the association request that the first application is initiated to the second application;
Password arranges module, for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Hide processing module, for described the first application is hidden and processed;
Operation processing module, while receiving Password Input, triggers described the first application of operation or the second application according to input password for described the second application.
According to mobile terminal of the present invention, described mobile terminal also comprises threshold value setting module, the amount threshold of application program that can be associated for default described the second application;
Described request processing module comprises:
First judges submodule, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule processing, otherwise transfers to associated submodule processing;
The first prompting submodule, for pointing out user can not set up association;
Associated submodule, for responding described associated request, sets up associated by described the first application with the second application.
According to mobile terminal of the present invention, described operation processing module comprises:
Second judges submodule, for judging that the password that described the second application receives is first password or the second password;
Operation submodule, moves described the first application for described password while being first password, and described password moves described the second application while being the second password.
According to mobile terminal of the present invention, described operation processing module also comprises detection sub-module, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule processing, otherwise transfer to directly described the second application of operation of described operation submodule;
The second prompting submodule, for pointing out user to input password.
According to mobile terminal of the present invention, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
The present invention sets up the first application and the second application according to operational order associated, sets up after association, and first password and the second password can be set, and is respectively used to start the first application and the second application.Password after setting completed, hide and process by the first application that mobile terminal arranges needing protection automatically, and now user cannot see the first application from terminal desktop or program interface.If user need to start the first application or the second application, by the second applications trigger, the second application receives user's Password Input, and terminal is according to this password judgement operation the first application or the second application.Whereby, the present invention has and adapts to more widely scene, can protect better terminal applies, has very high practicality.
Accompanying drawing explanation
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention;
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention;
Fig. 3 A is the mobile terminal first display interface schematic diagram of one embodiment of the invention;
Fig. 3 B is the mobile terminal second display interface schematic diagram of one embodiment of the invention;
Fig. 3 C is mobile terminal the 3rd display interface schematic diagram of one embodiment of the invention;
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention;
Fig. 5 is the guard method process flow diagram of the application program of another embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The first application of the present invention and the second application are not refered in particular to certain or certain class and are applied; the different application that the first application described below or the second application are only described for difference; that is: the first application is any application of mobile terminal; the second application is that other that be different from the first application applied arbitrarily, and in embodiments of the invention, sets first and be applied as the application needing protection.
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention, and this mobile terminal 100 can be mobile phone, PDA(Personal Digital Assistant, personal digital assistant), palm PC etc.This embodiment only shows part related to the present invention, and mobile terminal 100 comprises that request processing module 10, password arrange module 20, hide processing module 30 and operation processing module 40, wherein:
Request processing module 10, for receiving instruction, is processed the association request that the first application is initiated to the second application.
User can, according to default mode of operation, initiate the order of the first application and the second association mobile terminal 100.Such as, in same display interface, press respectively two application icons of the first application and the second application with two fingers simultaneously, trigger operation associated, now user is dragged and dropped into the first application icon on the second application icon, has sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password that module 20 is set to process setting up after the first application and the second application associated.
Password arranges module 20 for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying.
Described first password is the security password of access the first application, and because the first application is the application needing protection, therefore, first password can be set by the user as specific combination (as any two kinds of combinations of 6 to 8 bit digital, letter or underscore).For the second password, it is for moving the second application, and the second application of the present invention is to apply for correlation protection first, therefore can, for being different from the combination in any of first password, when the second application receives input arbitrarily, all can start operation for the second password.Certainly, user also can also be made as the second password the fixed Combination that is different from first password according to demands of individuals, be specific cryptosystem, to protect the second application simultaneously.
Hide processing module 30 for described the first application is hidden and processed.
User, after the first password and the second password confirming to set, hides processing module 30 and hides and process by the first application, and each display interface of mobile terminal 100 all no longer shows the first application icon, protects whereby the first application.
Operation processing module 40, while receiving Password Input, triggers described the first application of operation or the second application according to input password for described the second application.
It should be noted that, if the second application has set in advance access code, mobile terminal 100, processing the first application before the association request of the second application initiation, can be pointed out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, in the time that password arranges, can directly the password of the second default application be made as to the second password, facilitate whereby the response processing of follow-up the second application.
Certainly, for setting the first associated application and the second application, user also can remove the correlation protection relation of the two, in conjunction with Fig. 3 B, user can show " checking " and " releasing " button after the second correct password of input, user clicks " checking " button, can check Apply Names (AppA) and associated application (AppB) thereof that protection has been set, as shown in Figure 3 C, if this association has protected application AppA, click " releasing " button, by PackageManager, the package informatin of application AppA and AppB is modified, releasing AppA is associated with AppB's, remove the access protection to AppA application, AppA application is presented in desktop and main application interface again.
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention.The same section of this embodiment and previous embodiment repeats no more, and only difference is illustrated below.
In this embodiment, mobile terminal 100 also comprises threshold value setting module 50, the amount threshold of application program that can be associated for default described the second application.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly operation for the convenience of the user, and other a application of considering that user's experience, the present invention is preferably set to that an application only can be associated.
Described request processing module 10 comprises:
First judges submodule 11, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule 12 to process, otherwise transfers to associated submodule 13 to process.
The first prompting submodule 12, for pointing out user can not set up association;
Associated submodule 13, for responding described associated request, sets up associated by described the first application with the second application.Set up after association, can module 20 be set by password and carry out password setting.
Concrete; only in the present embodiment, the second application being made as can an associated application; when mobile terminal 100 is initiated the first application to the association request of the second application; judge the application package informatin of the second application by PackageManager, whether monitoring the second application has arranged other protection application associated.If the second application has arranged associated other protection application, plays frame prompting user and reselects associated application.If the second application does not have correlation protection application, in the package informatin of the first application and the second application, increase mode field by PackageManager, the two association is mapped.
Preferably, described operation processing module 40 also comprises detection sub-module 41, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule 42 to process, otherwise transfer to directly described the second application of operation of described operation submodule 44.
The second prompting submodule 42, for pointing out user to input password.
Second judges submodule 43, for judging that the password that described the second application receives is first password or the second password.
Operation submodule 44, moves described the first application for described password while being first password, and described password moves described the second application while being the second password.
In practical application, user, clicking after the second application icon of desktop, obtains this application program package informatin by PackageManager.If this application does not have associated protected application, directly pull-up moves this second application.If this association has protected application, eject Password Input frame, require user's input reference password.To input password judge, if first password pull-up first apply, the second password if, pull-up second is applied, and effectively protects whereby the first application.
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 1, and the method comprises:
Step S401, receives instruction, processes the association request that the first application is initiated to the second application.
User can, according to default mode of operation, initiate the order of the first application and the second association mobile terminal 100.Such as, in same display interface, press respectively two application icons of the first application and the second application with two fingers simultaneously, trigger operation associated, now user is dragged and dropped into the first application icon on the second application icon, has sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password that module 20 is set to process setting up after the first application and the second application associated.
Step S402, according to user's operation, arranges the first password of described the first application of operation and/or moves described second the second password of applying.
Described first password is the security password of access the first application, and because the first application is the application needing protection, therefore, first password can be set by the user as specific combination (as any two kinds of combinations of 6 to 8 bit digital, letter or underscore).For the second password, it is for moving the second application, and the second application of the present invention is to apply for correlation protection first, therefore can, for being different from the combination in any of first password, when the second application receives input arbitrarily, all can start operation for the second password.Certainly, user also can also be made as the second password the fixed Combination that is different from first password according to demands of individuals, be specific cryptosystem, to protect the second application simultaneously.
Step S403, hides described the first application to process.
User, after the first password and the second password confirming to set, hides processing module 30 and hides and process by the first application, and each display interface of mobile terminal 100 all no longer shows the first application icon, protects whereby the first application.
Step S404, when described the second application receives Password Input, triggers described the first application of operation or the second application according to input password.
It should be noted that, if the second application has set in advance access code, mobile terminal 100, processing the first application before the association request of the second application initiation, can be pointed out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, in the time that password arranges, can directly the password of the second default application be made as to the second password, facilitate whereby the response processing of follow-up the second application.
Fig. 5 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 2, and the method comprises:
Step S501, the amount threshold of the application program that default described the second application can be associated.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly operation for the convenience of the user, and other a application of considering that user's experience, the present invention is preferably set to that an application only can be associated.
Step S502, receives after associated request, judges whether the number of applications of the second association reaches amount threshold, if perform step S503, otherwise execution step S504.
Step S503, prompting user can not set up association.
Step S504, responds described associated request, and described the first application is set up associated with the second application.
Step S505, enters password interface is set, and first password and the second password are set.
Step S506, hides the first application to process.
Step S507, the second application receives after operation triggering command, and detect described second and apply the whether related application of tool, if perform step S508, otherwise execution step S509.
Step S508, mobile terminal 100 ejects interface for password input, and prompting user inputs password.
Step S509, response instruction, moves described the second application.
Step S510, judges that the password that described the second application receives is first password or the second password, if first password performs step S511, otherwise execution step S509.
Step S511, operation the first application.
In practical application, user, clicking after the second application icon of desktop, obtains this application program package informatin by PackageManager.If this application does not have associated protected application, directly pull-up moves this second application.If this association has protected application, eject Password Input frame, require user's input reference password.To input password judge, if first password pull-up first apply, the second password if, pull-up second is applied, and effectively protects whereby the first application.
In sum, the present invention sets up the first application and the second application according to operational order associated, sets up after association, and first password and the second password can be set, and is respectively used to start the first application and the second application.Password after setting completed, hide and process by the first application that mobile terminal arranges needing protection automatically, and now user cannot see the first application from terminal desktop or program interface.If user need to start the first application or the second application, by the second applications trigger, the second application receives user's Password Input, and terminal is according to this password judgement operation the first application or the second application.Whereby, the present invention has and adapts to more widely scene, can better protect terminal applies, has very high practicality.
Certainly; the present invention also can have other various embodiments; in the situation that not deviating from spirit of the present invention and essence thereof; those of ordinary skill in the art are when making according to the present invention various corresponding changes and distortion, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.

Claims (10)

1. a guard method for application, is characterized in that, described method comprises:
Receive instruction, process the association request that the first application is initiated to the second application;
According to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Described the first application is hidden and processed;
Described the second application receives Password Input, and triggers described the first application of operation or the second application according to input password.
2. the guard method of application according to claim 1, is characterized in that, described reception instruction is processed the first application and comprised before the associated request step of the second application initiation:
Default described second applies the amount threshold of application program that can be associated;
Described reception instruction, process the first application and comprise to the associated request step of the second application initiation:
Whether the number of applications that judges described the second association reaches described amount threshold;
If the number of applications of described the second association reaches described amount threshold, point out user can not set up association;
If the number of applications of described the second association does not reach described amount threshold, respond described associated request, described the first application is set up associated with the second application.
3. the guard method of application according to claim 1, is characterized in that, described the second application receives Password Input, and comprises according to described the first application of input password triggering operation or the second applying step:
Judge that the password that described the second application receives is first password or the second password, if first password moves described the first application, otherwise move described the second application.
4. the guard method of application according to claim 3, is characterized in that, before described the second application receives Password Input, also comprises:
Detect described second and apply the whether related application of tool;
If the related application of described the second application tool points out user to input password, otherwise directly move described the second application.
5. the guard method of application according to claim 2, is characterized in that, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
6. a mobile terminal, is characterized in that, comprising:
Request processing module, for receiving instruction, processes the association request that the first application is initiated to the second application;
Password arranges module, for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Hide processing module, for described the first application is hidden and processed;
Operation processing module, while receiving Password Input, triggers described the first application of operation or the second application according to input password for described the second application.
7. mobile terminal according to claim 6, is characterized in that, described mobile terminal also comprises threshold value setting module, the amount threshold of application program that can be associated for default described the second application;
Described request processing module comprises:
First judges submodule, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule processing, otherwise transfers to associated submodule processing;
The first prompting submodule, for pointing out user can not set up association;
Associated submodule, for responding described associated request, sets up associated by described the first application with the second application.
8. mobile terminal according to claim 6, is characterized in that, described operation processing module comprises:
Second judges submodule, for judging that the password that described the second application receives is first password or the second password;
Operation submodule, moves described the first application for described password while being first password, and described password moves described the second application while being the second password.
9. mobile terminal according to claim 8, it is characterized in that, described operation processing module also comprises detection sub-module, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule processing, otherwise transfer to directly described the second application of operation of described operation submodule;
The second prompting submodule, for pointing out user to input password.
10. mobile terminal according to claim 7, is characterized in that, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
CN201410023964.8A 2014-01-20 2014-01-20 The guard method of mobile terminal and application Active CN103778363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410023964.8A CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410023964.8A CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Publications (2)

Publication Number Publication Date
CN103778363A true CN103778363A (en) 2014-05-07
CN103778363B CN103778363B (en) 2015-09-30

Family

ID=50570591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410023964.8A Active CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Country Status (1)

Country Link
CN (1) CN103778363B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN105760796A (en) * 2016-02-18 2016-07-13 北京小米移动软件有限公司 Application security processing method and device
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN106407790A (en) * 2016-09-22 2017-02-15 北京奇虎科技有限公司 A privacy protection method and a privacy protection device for application programs
CN106407760A (en) * 2016-09-22 2017-02-15 上海传英信息技术有限公司 A user terminal and an application program hiding method
CN106446632A (en) * 2016-09-22 2017-02-22 北京奇虎科技有限公司 Hide display starting device and hide display starting method for application programs
CN106778096A (en) * 2016-12-28 2017-05-31 努比亚技术有限公司 The camouflage method and mobile terminal of a kind of application program
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
WO2017211021A1 (en) * 2016-06-08 2017-12-14 北京小米移动软件有限公司 Application trigger method and device
EP3316107A1 (en) * 2016-11-01 2018-05-02 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for hiding application icon
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752751A (en) * 2012-06-29 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Protection method and device for application
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752751A (en) * 2012-06-29 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Protection method and device for application
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573552A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Method and device for hiding application icons
CN104573552B (en) * 2014-12-29 2018-01-19 广东欧珀移动通信有限公司 A kind of method and device of hiden application icon
CN106156646A (en) * 2015-04-03 2016-11-23 北京搜狗科技发展有限公司 A kind of information call method and electronic equipment
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN104866752A (en) * 2015-05-12 2015-08-26 广东欧珀移动通信有限公司 Application protection method and user terminal
CN104866752B (en) * 2015-05-12 2018-09-04 广东欧珀移动通信有限公司 A kind of application guard method and user terminal
CN105760796A (en) * 2016-02-18 2016-07-13 北京小米移动软件有限公司 Application security processing method and device
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
WO2017211021A1 (en) * 2016-06-08 2017-12-14 北京小米移动软件有限公司 Application trigger method and device
US10467393B2 (en) 2016-06-08 2019-11-05 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for triggering application
CN106446632A (en) * 2016-09-22 2017-02-22 北京奇虎科技有限公司 Hide display starting device and hide display starting method for application programs
CN106407760A (en) * 2016-09-22 2017-02-15 上海传英信息技术有限公司 A user terminal and an application program hiding method
CN106446632B (en) * 2016-09-22 2020-09-22 北京奇虎科技有限公司 Hidden display starting method and hidden display starting device for application program
CN106407790A (en) * 2016-09-22 2017-02-15 北京奇虎科技有限公司 A privacy protection method and a privacy protection device for application programs
CN106407760B (en) * 2016-09-22 2021-09-24 上海传英信息技术有限公司 User terminal and application program hiding method
EP3316107A1 (en) * 2016-11-01 2018-05-02 Beijing Xiaomi Mobile Software Co., Ltd. Method and device for hiding application icon
CN106778096A (en) * 2016-12-28 2017-05-31 努比亚技术有限公司 The camouflage method and mobile terminal of a kind of application program
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Also Published As

Publication number Publication date
CN103778363B (en) 2015-09-30

Similar Documents

Publication Publication Date Title
CN103778363B (en) The guard method of mobile terminal and application
CN104992096B (en) A kind of data guard method and mobile terminal
CN104049806B (en) A kind of touch control terminal and its control method and system
CN104239804A (en) Data protecting method and device
CN103634316A (en) Account login method and electronic equipment
CN105323218A (en) Identity verifying method and device
CN103366105A (en) Method and communication terminal for implementing private space
CN105160227A (en) Remote fingerprint verification method, user terminal and fingerprint verification system
CN102750101A (en) Method and device for triggering application starting instruction
CN108021830B (en) Information processing method and electronic equipment
CN105306202B (en) Auth method, device and server
CN105323066A (en) Identity verification method and device
CN106506443B (en) A kind of information inspection method and device
CN106648583B (en) Information processing method and terminal
JP6321188B2 (en) Mobile terminal hacking prevention system and method
CN104954340A (en) Proxy IP address detection method and device
CN107506198B (en) Display method of mobile terminal and mobile terminal
CN105530232B (en) Account login method and device
CN104811304B (en) Identity verification method and device
CN107066864B (en) Application icon display method and device
CN104778389A (en) Numerical value transferring method, terminal, server and system
CN104333563A (en) Method of information processing and electronic equipment
CN112235412A (en) Message processing method and device
CN111079140B (en) Method, device and system for preventing cheating
CN105577621B (en) Business operation verification method, device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant