CN103778363A - Mobile terminal and method for protecting application - Google Patents
Mobile terminal and method for protecting application Download PDFInfo
- Publication number
- CN103778363A CN103778363A CN201410023964.8A CN201410023964A CN103778363A CN 103778363 A CN103778363 A CN 103778363A CN 201410023964 A CN201410023964 A CN 201410023964A CN 103778363 A CN103778363 A CN 103778363A
- Authority
- CN
- China
- Prior art keywords
- application
- password
- mobile terminal
- association
- submodule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention is suitable for the technical field of communication, and provides a method for protecting an application. The method comprises the following steps: receiving a command, and processing an association request initiated by a first application to a second application; according to user operation, setting a first password running the first application and/or a second password running the second application; hiding the first application; inputting the received password of the second application, and triggering to run the first application or the second application according to the input password. The invention correspondingly provides a mobile terminal realizing the method. Therefore, the mobile terminal has wider suitable scenes, can protect the application of the terminal better, and has extremely high practicability.
Description
Technical field
The present invention relates to communication technical field, relate in particular to the guard method of a kind of mobile terminal and application.
Background technology
Along with the development of electronic communication, the function of smart mobile phone is more and more abundanter, and people also more and more pay attention to the information security of mobile phone application.Application protection is as an importance of mobile phone safety, and the measure of its protection has a lot, is hidden into application encipher from application, then to application camouflage etc.Application is hidden, application encipher and application camouflage, protects respectively from different aspects to application.For example: application is hidden, by the application hidden function in mobile phone, application is not presented in desktop and main application interface, thereby plays the effect of avoiding application to be used; Application encipher, does not allow other people use the object of application by the application in mobile phone being arranged to access code, playing; Application camouflage is the application icon showing on desktop by optimizing, and makes its icon that is shown as other application or picture, has certain fascination effect.
Application is hidden, application encipher and application camouflage, protects respectively, but has respectively following defect: application is hidden: by checking in mobile phone, hiding function is set, just can easily finds the application being hidden from different aspects to application.Application encipher: be provided with access code, if kith and kin question closely the access code of application, inform privacy and security that real password equally cannot guarantee information, inform that dummy letter can not meet again the other side's requirement.Application camouflage: the method has certain fascination, but when other people use carefully, will inevitably find the true application of being pretended.
In summary,, obviously there is in actual use inconvenience and defect in the guard method of existing mobile terminal and application, so be necessary to be improved.
Summary of the invention
For above-mentioned defect, the object of the present invention is to provide the guard method of a kind of mobile terminal and application, have and adapt to more widely scene, can better protect terminal applies, there is very high practicality.
To achieve these goals, the invention provides a kind of guard method of application, described method comprises:
Receive instruction, process the association request that the first application is initiated to the second application;
According to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Described the first application is hidden and processed;
Described the second application receives Password Input, and triggers described the first application of operation or the second application according to input password.
The guard method of application according to the present invention, described reception instruction, process the first application and comprised before the associated request step of the second application initiation:
Default described second applies the amount threshold of application program that can be associated;
Described reception instruction, process the first application and comprise to the associated request step of the second application initiation:
Whether the number of applications that judges described the second association reaches described amount threshold;
If the number of applications of described the second association reaches described amount threshold, point out user can not set up association;
If the number of applications of described the second association does not reach described amount threshold, respond described associated request, described the first application is set up associated with the second application.
The guard method of application according to the present invention, described the second application receives Password Input, and comprises according to described the first application of input password triggering operation or the second applying step:
Judge that the password that described the second application receives is first password or the second password, if first password moves described the first application, otherwise move described the second application.
The guard method of application according to the present invention, also comprises before described the second application receives Password Input:
Detect described second and apply the whether related application of tool;
If the related application of described the second application tool points out user to input password, otherwise directly move described the second application.
The guard method of application according to the present invention, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
The present invention also provides a kind of mobile terminal accordingly, comprising:
Request processing module, for receiving instruction, processes the association request that the first application is initiated to the second application;
Password arranges module, for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Hide processing module, for described the first application is hidden and processed;
Operation processing module, while receiving Password Input, triggers described the first application of operation or the second application according to input password for described the second application.
According to mobile terminal of the present invention, described mobile terminal also comprises threshold value setting module, the amount threshold of application program that can be associated for default described the second application;
Described request processing module comprises:
First judges submodule, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule processing, otherwise transfers to associated submodule processing;
The first prompting submodule, for pointing out user can not set up association;
Associated submodule, for responding described associated request, sets up associated by described the first application with the second application.
According to mobile terminal of the present invention, described operation processing module comprises:
Second judges submodule, for judging that the password that described the second application receives is first password or the second password;
Operation submodule, moves described the first application for described password while being first password, and described password moves described the second application while being the second password.
According to mobile terminal of the present invention, described operation processing module also comprises detection sub-module, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule processing, otherwise transfer to directly described the second application of operation of described operation submodule;
The second prompting submodule, for pointing out user to input password.
According to mobile terminal of the present invention, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
The present invention sets up the first application and the second application according to operational order associated, sets up after association, and first password and the second password can be set, and is respectively used to start the first application and the second application.Password after setting completed, hide and process by the first application that mobile terminal arranges needing protection automatically, and now user cannot see the first application from terminal desktop or program interface.If user need to start the first application or the second application, by the second applications trigger, the second application receives user's Password Input, and terminal is according to this password judgement operation the first application or the second application.Whereby, the present invention has and adapts to more widely scene, can protect better terminal applies, has very high practicality.
Accompanying drawing explanation
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention;
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention;
Fig. 3 A is the mobile terminal first display interface schematic diagram of one embodiment of the invention;
Fig. 3 B is the mobile terminal second display interface schematic diagram of one embodiment of the invention;
Fig. 3 C is mobile terminal the 3rd display interface schematic diagram of one embodiment of the invention;
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention;
Fig. 5 is the guard method process flow diagram of the application program of another embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The first application of the present invention and the second application are not refered in particular to certain or certain class and are applied; the different application that the first application described below or the second application are only described for difference; that is: the first application is any application of mobile terminal; the second application is that other that be different from the first application applied arbitrarily, and in embodiments of the invention, sets first and be applied as the application needing protection.
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention, and this mobile terminal 100 can be mobile phone, PDA(Personal Digital Assistant, personal digital assistant), palm PC etc.This embodiment only shows part related to the present invention, and mobile terminal 100 comprises that request processing module 10, password arrange module 20, hide processing module 30 and operation processing module 40, wherein:
User can, according to default mode of operation, initiate the order of the first application and the second association mobile terminal 100.Such as, in same display interface, press respectively two application icons of the first application and the second application with two fingers simultaneously, trigger operation associated, now user is dragged and dropped into the first application icon on the second application icon, has sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password that module 20 is set to process setting up after the first application and the second application associated.
Password arranges module 20 for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying.
Described first password is the security password of access the first application, and because the first application is the application needing protection, therefore, first password can be set by the user as specific combination (as any two kinds of combinations of 6 to 8 bit digital, letter or underscore).For the second password, it is for moving the second application, and the second application of the present invention is to apply for correlation protection first, therefore can, for being different from the combination in any of first password, when the second application receives input arbitrarily, all can start operation for the second password.Certainly, user also can also be made as the second password the fixed Combination that is different from first password according to demands of individuals, be specific cryptosystem, to protect the second application simultaneously.
User, after the first password and the second password confirming to set, hides processing module 30 and hides and process by the first application, and each display interface of mobile terminal 100 all no longer shows the first application icon, protects whereby the first application.
It should be noted that, if the second application has set in advance access code, mobile terminal 100, processing the first application before the association request of the second application initiation, can be pointed out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, in the time that password arranges, can directly the password of the second default application be made as to the second password, facilitate whereby the response processing of follow-up the second application.
Certainly, for setting the first associated application and the second application, user also can remove the correlation protection relation of the two, in conjunction with Fig. 3 B, user can show " checking " and " releasing " button after the second correct password of input, user clicks " checking " button, can check Apply Names (AppA) and associated application (AppB) thereof that protection has been set, as shown in Figure 3 C, if this association has protected application AppA, click " releasing " button, by PackageManager, the package informatin of application AppA and AppB is modified, releasing AppA is associated with AppB's, remove the access protection to AppA application, AppA application is presented in desktop and main application interface again.
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention.The same section of this embodiment and previous embodiment repeats no more, and only difference is illustrated below.
In this embodiment, mobile terminal 100 also comprises threshold value setting module 50, the amount threshold of application program that can be associated for default described the second application.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly operation for the convenience of the user, and other a application of considering that user's experience, the present invention is preferably set to that an application only can be associated.
Described request processing module 10 comprises:
First judges submodule 11, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule 12 to process, otherwise transfers to associated submodule 13 to process.
The first prompting submodule 12, for pointing out user can not set up association;
Concrete; only in the present embodiment, the second application being made as can an associated application; when mobile terminal 100 is initiated the first application to the association request of the second application; judge the application package informatin of the second application by PackageManager, whether monitoring the second application has arranged other protection application associated.If the second application has arranged associated other protection application, plays frame prompting user and reselects associated application.If the second application does not have correlation protection application, in the package informatin of the first application and the second application, increase mode field by PackageManager, the two association is mapped.
Preferably, described operation processing module 40 also comprises detection sub-module 41, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule 42 to process, otherwise transfer to directly described the second application of operation of described operation submodule 44.
The second prompting submodule 42, for pointing out user to input password.
Second judges submodule 43, for judging that the password that described the second application receives is first password or the second password.
In practical application, user, clicking after the second application icon of desktop, obtains this application program package informatin by PackageManager.If this application does not have associated protected application, directly pull-up moves this second application.If this association has protected application, eject Password Input frame, require user's input reference password.To input password judge, if first password pull-up first apply, the second password if, pull-up second is applied, and effectively protects whereby the first application.
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 1, and the method comprises:
Step S401, receives instruction, processes the association request that the first application is initiated to the second application.
User can, according to default mode of operation, initiate the order of the first application and the second association mobile terminal 100.Such as, in same display interface, press respectively two application icons of the first application and the second application with two fingers simultaneously, trigger operation associated, now user is dragged and dropped into the first application icon on the second application icon, has sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password that module 20 is set to process setting up after the first application and the second application associated.
Step S402, according to user's operation, arranges the first password of described the first application of operation and/or moves described second the second password of applying.
Described first password is the security password of access the first application, and because the first application is the application needing protection, therefore, first password can be set by the user as specific combination (as any two kinds of combinations of 6 to 8 bit digital, letter or underscore).For the second password, it is for moving the second application, and the second application of the present invention is to apply for correlation protection first, therefore can, for being different from the combination in any of first password, when the second application receives input arbitrarily, all can start operation for the second password.Certainly, user also can also be made as the second password the fixed Combination that is different from first password according to demands of individuals, be specific cryptosystem, to protect the second application simultaneously.
Step S403, hides described the first application to process.
User, after the first password and the second password confirming to set, hides processing module 30 and hides and process by the first application, and each display interface of mobile terminal 100 all no longer shows the first application icon, protects whereby the first application.
Step S404, when described the second application receives Password Input, triggers described the first application of operation or the second application according to input password.
It should be noted that, if the second application has set in advance access code, mobile terminal 100, processing the first application before the association request of the second application initiation, can be pointed out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, in the time that password arranges, can directly the password of the second default application be made as to the second password, facilitate whereby the response processing of follow-up the second application.
Fig. 5 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 2, and the method comprises:
Step S501, the amount threshold of the application program that default described the second application can be associated.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly operation for the convenience of the user, and other a application of considering that user's experience, the present invention is preferably set to that an application only can be associated.
Step S502, receives after associated request, judges whether the number of applications of the second association reaches amount threshold, if perform step S503, otherwise execution step S504.
Step S503, prompting user can not set up association.
Step S504, responds described associated request, and described the first application is set up associated with the second application.
Step S505, enters password interface is set, and first password and the second password are set.
Step S506, hides the first application to process.
Step S507, the second application receives after operation triggering command, and detect described second and apply the whether related application of tool, if perform step S508, otherwise execution step S509.
Step S508, mobile terminal 100 ejects interface for password input, and prompting user inputs password.
Step S509, response instruction, moves described the second application.
Step S510, judges that the password that described the second application receives is first password or the second password, if first password performs step S511, otherwise execution step S509.
Step S511, operation the first application.
In practical application, user, clicking after the second application icon of desktop, obtains this application program package informatin by PackageManager.If this application does not have associated protected application, directly pull-up moves this second application.If this association has protected application, eject Password Input frame, require user's input reference password.To input password judge, if first password pull-up first apply, the second password if, pull-up second is applied, and effectively protects whereby the first application.
In sum, the present invention sets up the first application and the second application according to operational order associated, sets up after association, and first password and the second password can be set, and is respectively used to start the first application and the second application.Password after setting completed, hide and process by the first application that mobile terminal arranges needing protection automatically, and now user cannot see the first application from terminal desktop or program interface.If user need to start the first application or the second application, by the second applications trigger, the second application receives user's Password Input, and terminal is according to this password judgement operation the first application or the second application.Whereby, the present invention has and adapts to more widely scene, can better protect terminal applies, has very high practicality.
Certainly; the present invention also can have other various embodiments; in the situation that not deviating from spirit of the present invention and essence thereof; those of ordinary skill in the art are when making according to the present invention various corresponding changes and distortion, but these corresponding changes and distortion all should belong to the protection domain of the appended claim of the present invention.
Claims (10)
1. a guard method for application, is characterized in that, described method comprises:
Receive instruction, process the association request that the first application is initiated to the second application;
According to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Described the first application is hidden and processed;
Described the second application receives Password Input, and triggers described the first application of operation or the second application according to input password.
2. the guard method of application according to claim 1, is characterized in that, described reception instruction is processed the first application and comprised before the associated request step of the second application initiation:
Default described second applies the amount threshold of application program that can be associated;
Described reception instruction, process the first application and comprise to the associated request step of the second application initiation:
Whether the number of applications that judges described the second association reaches described amount threshold;
If the number of applications of described the second association reaches described amount threshold, point out user can not set up association;
If the number of applications of described the second association does not reach described amount threshold, respond described associated request, described the first application is set up associated with the second application.
3. the guard method of application according to claim 1, is characterized in that, described the second application receives Password Input, and comprises according to described the first application of input password triggering operation or the second applying step:
Judge that the password that described the second application receives is first password or the second password, if first password moves described the first application, otherwise move described the second application.
4. the guard method of application according to claim 3, is characterized in that, before described the second application receives Password Input, also comprises:
Detect described second and apply the whether related application of tool;
If the related application of described the second application tool points out user to input password, otherwise directly move described the second application.
5. the guard method of application according to claim 2, is characterized in that, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
6. a mobile terminal, is characterized in that, comprising:
Request processing module, for receiving instruction, processes the association request that the first application is initiated to the second application;
Password arranges module, for according to user's operation, the first password of described the first application of operation is set and/or moves described second the second password of applying;
Hide processing module, for described the first application is hidden and processed;
Operation processing module, while receiving Password Input, triggers described the first application of operation or the second application according to input password for described the second application.
7. mobile terminal according to claim 6, is characterized in that, described mobile terminal also comprises threshold value setting module, the amount threshold of application program that can be associated for default described the second application;
Described request processing module comprises:
First judges submodule, whether reaches described amount threshold for the number of applications that judges described the second association, if transfer to the first prompting submodule processing, otherwise transfers to associated submodule processing;
The first prompting submodule, for pointing out user can not set up association;
Associated submodule, for responding described associated request, sets up associated by described the first application with the second application.
8. mobile terminal according to claim 6, is characterized in that, described operation processing module comprises:
Second judges submodule, for judging that the password that described the second application receives is first password or the second password;
Operation submodule, moves described the first application for described password while being first password, and described password moves described the second application while being the second password.
9. mobile terminal according to claim 8, it is characterized in that, described operation processing module also comprises detection sub-module, apply the whether related application of tool for detection of described second, if transfer to the second prompting submodule processing, otherwise transfer to directly described the second application of operation of described operation submodule;
The second prompting submodule, for pointing out user to input password.
10. mobile terminal according to claim 7, is characterized in that, described the second application only can an associated application;
Described the second password is the combination in any that is different from described first password; Or described the second password is the fixed Combination that is different from described first password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410023964.8A CN103778363B (en) | 2014-01-20 | 2014-01-20 | The guard method of mobile terminal and application |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410023964.8A CN103778363B (en) | 2014-01-20 | 2014-01-20 | The guard method of mobile terminal and application |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103778363A true CN103778363A (en) | 2014-05-07 |
CN103778363B CN103778363B (en) | 2015-09-30 |
Family
ID=50570591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410023964.8A Active CN103778363B (en) | 2014-01-20 | 2014-01-20 | The guard method of mobile terminal and application |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103778363B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573552A (en) * | 2014-12-29 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for hiding application icons |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
CN105760796A (en) * | 2016-02-18 | 2016-07-13 | 北京小米移动软件有限公司 | Application security processing method and device |
CN106156646A (en) * | 2015-04-03 | 2016-11-23 | 北京搜狗科技发展有限公司 | A kind of information call method and electronic equipment |
CN106407760A (en) * | 2016-09-22 | 2017-02-15 | 上海传英信息技术有限公司 | A user terminal and an application program hiding method |
CN106407790A (en) * | 2016-09-22 | 2017-02-15 | 北京奇虎科技有限公司 | A privacy protection method and a privacy protection device for application programs |
CN106446632A (en) * | 2016-09-22 | 2017-02-22 | 北京奇虎科技有限公司 | Hide display starting device and hide display starting method for application programs |
CN106778096A (en) * | 2016-12-28 | 2017-05-31 | 努比亚技术有限公司 | The camouflage method and mobile terminal of a kind of application program |
CN107122628A (en) * | 2016-02-24 | 2017-09-01 | 阿里巴巴集团控股有限公司 | Icon processing method and processing device, the terminal of application program |
WO2017211021A1 (en) * | 2016-06-08 | 2017-12-14 | 北京小米移动软件有限公司 | Application trigger method and device |
EP3316107A1 (en) * | 2016-11-01 | 2018-05-02 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for hiding application icon |
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752751A (en) * | 2012-06-29 | 2012-10-24 | 宇龙计算机通信科技(深圳)有限公司 | Protection method and device for application |
CN103488940A (en) * | 2013-09-11 | 2014-01-01 | 昆山富泰科电脑有限公司 | Password protection system and method for application programs of intelligent equipment |
CN103500302A (en) * | 2013-10-12 | 2014-01-08 | 广州市久邦数码科技有限公司 | System and method of safety lock hidden programs |
-
2014
- 2014-01-20 CN CN201410023964.8A patent/CN103778363B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752751A (en) * | 2012-06-29 | 2012-10-24 | 宇龙计算机通信科技(深圳)有限公司 | Protection method and device for application |
CN103488940A (en) * | 2013-09-11 | 2014-01-01 | 昆山富泰科电脑有限公司 | Password protection system and method for application programs of intelligent equipment |
CN103500302A (en) * | 2013-10-12 | 2014-01-08 | 广州市久邦数码科技有限公司 | System and method of safety lock hidden programs |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104573552A (en) * | 2014-12-29 | 2015-04-29 | 广东欧珀移动通信有限公司 | Method and device for hiding application icons |
CN104573552B (en) * | 2014-12-29 | 2018-01-19 | 广东欧珀移动通信有限公司 | A kind of method and device of hiden application icon |
CN106156646A (en) * | 2015-04-03 | 2016-11-23 | 北京搜狗科技发展有限公司 | A kind of information call method and electronic equipment |
CN106156646B (en) * | 2015-04-03 | 2020-09-22 | 北京搜狗科技发展有限公司 | Information calling method and electronic equipment |
CN104866752A (en) * | 2015-05-12 | 2015-08-26 | 广东欧珀移动通信有限公司 | Application protection method and user terminal |
CN104866752B (en) * | 2015-05-12 | 2018-09-04 | 广东欧珀移动通信有限公司 | A kind of application guard method and user terminal |
CN105760796A (en) * | 2016-02-18 | 2016-07-13 | 北京小米移动软件有限公司 | Application security processing method and device |
CN107122628A (en) * | 2016-02-24 | 2017-09-01 | 阿里巴巴集团控股有限公司 | Icon processing method and processing device, the terminal of application program |
WO2017211021A1 (en) * | 2016-06-08 | 2017-12-14 | 北京小米移动软件有限公司 | Application trigger method and device |
US10467393B2 (en) | 2016-06-08 | 2019-11-05 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for triggering application |
CN106446632A (en) * | 2016-09-22 | 2017-02-22 | 北京奇虎科技有限公司 | Hide display starting device and hide display starting method for application programs |
CN106407790A (en) * | 2016-09-22 | 2017-02-15 | 北京奇虎科技有限公司 | A privacy protection method and a privacy protection device for application programs |
CN106407760A (en) * | 2016-09-22 | 2017-02-15 | 上海传英信息技术有限公司 | A user terminal and an application program hiding method |
CN106446632B (en) * | 2016-09-22 | 2020-09-22 | 北京奇虎科技有限公司 | Hidden display starting method and hidden display starting device for application program |
CN106407760B (en) * | 2016-09-22 | 2021-09-24 | 上海传英信息技术有限公司 | User terminal and application program hiding method |
EP3316107A1 (en) * | 2016-11-01 | 2018-05-02 | Beijing Xiaomi Mobile Software Co., Ltd. | Method and device for hiding application icon |
CN106778096A (en) * | 2016-12-28 | 2017-05-31 | 努比亚技术有限公司 | The camouflage method and mobile terminal of a kind of application program |
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Also Published As
Publication number | Publication date |
---|---|
CN103778363B (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103778363B (en) | The guard method of mobile terminal and application | |
CN104992096B (en) | A kind of data guard method and mobile terminal | |
CN104239804A (en) | Data protecting method and device | |
CN103634316A (en) | Account login method and electronic equipment | |
CN105323218A (en) | Identity verifying method and device | |
CN103366105A (en) | Method and communication terminal for implementing private space | |
CN104700010A (en) | Personal information protection method and protection device | |
CN105160227A (en) | Remote fingerprint verification method, user terminal and fingerprint verification system | |
CN102750101A (en) | Method and device for triggering application starting instruction | |
CN108021830B (en) | Information processing method and electronic equipment | |
CN108259458A (en) | Application software account relating method, apparatus and storage medium | |
CN105306202B (en) | Auth method, device and server | |
CN105323066A (en) | Identity verification method and device | |
CN105530232B (en) | Account login method and device | |
CN106506443B (en) | A kind of information inspection method and device | |
CN106648583B (en) | Information processing method and terminal | |
JP6321188B2 (en) | Mobile terminal hacking prevention system and method | |
CN104954340A (en) | Proxy IP address detection method and device | |
WO2016202277A1 (en) | Message sending method and mobile terminal | |
CN104811304B (en) | Identity verification method and device | |
CN104202432B (en) | Remote web management system and management method | |
CN104778389A (en) | Numerical value transferring method, terminal, server and system | |
CN104333563A (en) | Method of information processing and electronic equipment | |
CN111079140B (en) | Method, device and system for preventing cheating | |
CN105577621B (en) | Business operation verification method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |