CN103778363B - The guard method of mobile terminal and application - Google Patents

The guard method of mobile terminal and application Download PDF

Info

Publication number
CN103778363B
CN103778363B CN201410023964.8A CN201410023964A CN103778363B CN 103778363 B CN103778363 B CN 103778363B CN 201410023964 A CN201410023964 A CN 201410023964A CN 103778363 B CN103778363 B CN 103778363B
Authority
CN
China
Prior art keywords
application
password
association
submodule
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410023964.8A
Other languages
Chinese (zh)
Other versions
CN103778363A (en
Inventor
卢楠
黄宏用
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410023964.8A priority Critical patent/CN103778363B/en
Publication of CN103778363A publication Critical patent/CN103778363A/en
Application granted granted Critical
Publication of CN103778363B publication Critical patent/CN103778363B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

Abstract

The present invention is applicable to communication technical field, provides a kind of guard method of application, and described method comprises: receive instruction, the association request that process first application is initiated to the second application; According to user operation, the first password running described first application and/or the second password running described second application are set; Process is hidden in described first application; Described second application receives Password Input, and triggers described first application of operation or the second application according to input password.The present invention provides a kind of mobile terminal realizing said method accordingly.Whereby, the present invention has and adapts to scene more widely, can better protect terminal applies, have very high practicality.

Description

The guard method of mobile terminal and application
Technical field
The present invention relates to communication technical field, particularly relate to the guard method of a kind of mobile terminal and application.
Background technology
Along with the development of electronic communication, the function of smart mobile phone is more and more abundanter, and people also more and more pay attention to the information security of mobile phone application.Application protection is as an importance of mobile phone safe, and the measure of its protection has a lot, is hidden into application encipher from application, then to application camouflage etc.Application hide, application encipher and application camouflage, from different aspects, application is protected respectively.Such as: application hide, by the application hidden function in mobile phone, application is not presented in desktop and main application interface, thus play avoid application by the effect used; Application encipher, by arranging access code to the application in mobile phone, plays the object not allowing other people use application; Application camouflage is then by optimizing the application icon that desktop shows, and makes its icon being shown as other application or picture, has certain fascination effect.
Application hide, application encipher and application camouflage, from different aspects, application is protected respectively, but there is following defect respectively: application hide: hiding function being set by checking in mobile phone, just easily can finding the application be hidden.Application encipher: be provided with access code, if kith and kin question closely the access code of application, informs that real password then equally cannot the privacy of guarantee information and security, informs that dummy letter can not meet again the requirement of the other side.Application camouflage: the method has certain fascination, but when other people use careful, will inevitably find by the true application pretended.
In summary, obviously there is inconvenience and defect in actual use, so be necessary to be improved in the guard method of existing mobile terminal and application.
Summary of the invention
For above-mentioned defect, the object of the present invention is to provide the guard method of a kind of mobile terminal and application, have and adapt to scene more widely, can better terminal applies be protected, there is very high practicality.
To achieve these goals, the invention provides a kind of guard method of application, described method comprises:
Receive instruction, the association request that process first application is initiated to the second application;
According to user operation, the first password running described first application and/or the second password running described second application are set;
Process is hidden in described first application;
Described second application receives Password Input, and triggers described first application of operation or the second application according to input password.
The guard method of application according to the present invention, described reception instruction, process first application comprises before applying to second the association request step initiated:
Preset the amount threshold that described second applies the application program that can associate;
Described reception instruction, the association request step that process first application is initiated to the second application comprises:
Judge whether the number of applications of described second association reaches described amount threshold;
If the number of applications of described second association reaches described amount threshold, then user is pointed out not to be associated;
If the number of applications of described second association does not reach described amount threshold, then respond described association request, described first application and second is applied and is associated.
The guard method of application according to the present invention, described second application receives Password Input, and comprises according to described first application of input password triggering operation or the second applying step:
Judge that the password that described second application receives is first password or the second password, if first password, then run described first application, otherwise run described second application.
The guard method of application according to the present invention, also comprises before described second application receives Password Input:
Detect described second and apply the whether related application of tool;
If the related application of described second application tool, points out user to input password, otherwise directly run described second application.
The guard method of application according to the present invention, described second application only can associate an application;
Described second password is the combination in any being different from described first password; Or described second password is the fixed Combination being different from described first password.
The present invention also provides a kind of mobile terminal accordingly, comprising:
Request processing module, for receiving instruction, the association request that process first application is initiated to the second application;
Password arranges module, for according to user operation, arranges the first password running described first application and/or the second password running described second application;
Hide processing module, for process is hidden in described first application;
Run processing module, when receiving Password Input for described second application, trigger according to input password and run described first application or the second application.
According to mobile terminal of the present invention, described mobile terminal also comprises threshold setting module, for presetting the amount threshold that described second applies the application program that can associate;
Described request processing module comprises:
First judges submodule, for judging whether the number of applications of described second association reaches described amount threshold, if then transfer to the first prompting submodule process, otherwise transfers to the process of association submodule;
First prompting submodule, can not be associated for pointing out user;
Association submodule, for responding described association request, applying described first application and second and being associated.
According to mobile terminal of the present invention, described operation processing module comprises:
Second judges submodule, for judging that the password that described second application receives is first password or the second password;
Run submodule, when being first password for described password, run described first application, and when described password is the second password, run described second application.
According to mobile terminal of the present invention, described operation processing module also comprises detection sub-module, applying the whether related application of tool for detecting described second, if then transfer to the second prompting submodule process, otherwise transferring to described operation submodule directly to run described second application;
Second prompting submodule, inputs password for pointing out user.
According to mobile terminal of the present invention, described second application only can associate an application;
Described second password is the combination in any being different from described first password; Or described second password is the fixed Combination being different from described first password.
First application and the second application are associated according to operational order by the present invention, after being associated, namely can arrange first password and the second password, are respectively used to startup first and apply and the second application.After setting completed, mobile terminal will need the first application of protection setting to hide process to password automatically, and now user cannot see the first application from terminal desktop or program interface.If user needs startup first to apply or the second application, then by the second applications trigger, the second application receives the Password Input of user, according to this password, terminal judges that operation first is applied or the second application.Whereby, the present invention has and adapts to scene more widely, can protect terminal applies better, have very high practicality.
Accompanying drawing explanation
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention;
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention;
Fig. 3 A is the mobile terminal first display interface schematic diagram of one embodiment of the invention;
Fig. 3 B is the mobile terminal second display interface schematic diagram of one embodiment of the invention;
Fig. 3 C is mobile terminal the 3rd display interface schematic diagram of one embodiment of the invention;
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention;
Fig. 5 is the guard method process flow diagram of the application program of another embodiment of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearly understand, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
First application of the present invention and the second application are not refered in particular to certain or certain class and are applied; first application described below or the second application are only the different application that difference describes; that is: the first application is any application of mobile terminal; second application is that other that be different from the first application is applied arbitrarily, and sets first in embodiments of the invention and be applied as the application needing protection.
Fig. 1 is the mobile terminal structure schematic diagram of one embodiment of the invention, and this mobile terminal 100 can be mobile phone, PDA(Personal Digital Assistant, personal digital assistant), palm PC etc.This embodiment illustrate only part related to the present invention, and mobile terminal 100 comprises request processing module 10, password arranges module 20, hide processing module 30 and operation processing module 40, wherein:
Request processing module 10 is for receiving instruction, and process first application is to the association request of the second application initiation.
User according to the mode of operation preset, can initiate the order by the first application and the second association to mobile terminal 100.Such as, in same display interface, press the two methods icon of the first application and the second application simultaneously with two fingers respectively, namely trigger operation associated, now the first application icon is dragged and dropped on the second application icon by user, namely have sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password to arrange module 20 to process after setting up the associating of the first application and the second application.
Password arranges module 20 for according to user operation, arranges the first password running described first application and/or the second password running described second application.
Described first password is the security password that access first is applied, and because the first application is the application needing protection, therefore, first password can be set by the user as specifically combining (any two kinds of combinations as 6 to 8 bit digital, letter or underscore).For the second password, it is for running the second application, and the second application of the present invention is applied for correlation protection first, therefore can for being different from the combination in any of first password for the second password, when namely the second application receives and inputs arbitrarily, and all can startup optimization.Certainly, the second password also can be also set to according to demands of individuals the fixed Combination being different from first password by user, is specific cryptosystem, to protect the second application simultaneously.
Hide processing module 30 for process is hidden in described first application.
User is after the first password confirming setting and the second password, and hide processing module 30 and hide process by the first application, each display interface of mobile terminal 100 all no longer shows the first application icon, protects first to apply whereby.
Run processing module 40, when receiving Password Input for described second application, trigger according to input password and run described first application or the second application.
It should be noted that, if the second application is previously provided with access code, mobile terminal 100, before the association request initiated to the second application is applied in process first, can point out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, when password is arranged, directly the password of the preset second application can be set to the second password, facilitate the response process of follow-up second application whereby.
Certainly, for the first application and the second application that set association, user also can remove the two correlation protection relation, composition graphs 3B, user can show " checking " and " releasing " button after the second password that input is correct, user clicks " checking " button, the application (AppB) of Apply Names (AppA) and the association thereof that protection has been set can be checked, as shown in Figure 3 C, if this association has protected application AppA, click " releasing " button, by PackageManager, the package informatin of application AppA and AppB is modified, remove the association of AppA and AppB, remove the access protection to AppA application, AppA is applied again be presented in desktop and main application interface.
Fig. 2 is the mobile terminal structure schematic diagram of another embodiment of the present invention.The same section of this embodiment and previous embodiment repeats no more, and only difference is illustrated below.
In this embodiment, mobile terminal 100 also comprises threshold setting module 50, for presetting the amount threshold that described second applies the application program that can associate.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly, operation for the convenience of the user, and the experience considering user, the present invention is preferably set to one and applies other application that only can associate.
Described request processing module 10 comprises:
First judges submodule 11, for judging whether the number of applications of described second association reaches described amount threshold, if then transfer to the first prompting submodule 12 to process, otherwise transfers to association submodule 13 to process.
First prompting submodule 12, can not be associated for pointing out user;
Association submodule 13, for responding described association request, applying described first application and second and being associated.After being associated, namely module 20 can being set by password and carrying out password setting.
Concrete; in the present embodiment, the second application is set to and only can associates an application; then mobile terminal 100 initiate the first application to second application association request time; judge the second application package informatin applied by PackageManager, whether monitoring second application has arranged the protection application being associated with other.If the second application has arranged the protection application being associated with other, then play frame prompting user and reselected associated application.If the second application does not have correlation protection to apply, then in the first application and the second package informatin applied, increase mode field by PackageManager, the two association is mapped.
Preferably, described operation processing module 40 also comprises detection sub-module 41, applying the whether related application of tool for detecting described second, if then transfer to the second prompting submodule 42 to process, otherwise transferring to described operation submodule 44 directly to run described second application.
Second prompting submodule 42, inputs password for pointing out user.
Second judges submodule 43, for judging that the password that described second application receives is first password or the second password.
Run submodule 44, when being first password for described password, run described first application, and when described password is the second password, run described second application.
In practical application, user, after the second application icon clicking desktop, obtains this application program package informatin by PackageManager.If this application does not associate protected application, then directly pull-up runs this second application.If this association has protected application, then eject Password Input frame, require user's input reference password.Judge the password of input, if be first password, pull-up first is applied, if be the second password, then pull-up second is applied, and effectively protects the first application whereby.
Fig. 4 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 1, and the method comprises:
Step S401, receives instruction, the association request that process first application is initiated to the second application.
User according to the mode of operation preset, can initiate the order by the first application and the second association to mobile terminal 100.Such as, in same display interface, press the two methods icon of the first application and the second application simultaneously with two fingers respectively, namely trigger operation associated, now the first application icon is dragged and dropped on the second application icon by user, namely have sent the association request of the first application to the second application.Request processing module 10 responds and processes this request, and transfers to password to arrange module 20 to process after setting up the associating of the first application and the second application.
Step S402, according to user operation, arranges the first password running described first application and/or the second password running described second application.
Described first password is the security password that access first is applied, and because the first application is the application needing protection, therefore, first password can be set by the user as specifically combining (any two kinds of combinations as 6 to 8 bit digital, letter or underscore).For the second password, it is for running the second application, and the second application of the present invention is applied for correlation protection first, therefore can for being different from the combination in any of first password for the second password, when namely the second application receives and inputs arbitrarily, and all can startup optimization.Certainly, the second password also can be also set to according to demands of individuals the fixed Combination being different from first password by user, is specific cryptosystem, to protect the second application simultaneously.
Step S403, hides process by described first application.
User is after the first password confirming setting and the second password, and hide processing module 30 and hide process by the first application, each display interface of mobile terminal 100 all no longer shows the first application icon, protects first to apply whereby.
Step S404, when described second application receives Password Input, triggers according to input password and runs described first application or the second application.
It should be noted that, if the second application is previously provided with access code, mobile terminal 100, before the association request initiated to the second application is applied in process first, can point out user's input reference password, as Fig. 3 A, whereby identifying user identity.Meanwhile, when password is arranged, directly the password of the preset second application can be set to the second password, facilitate the response process of follow-up second application whereby.
Fig. 5 is the guard method process flow diagram of the application program of one embodiment of the invention, and it can be realized by mobile terminal 100 as shown in Figure 2, and the method comprises:
Step S501, presets the amount threshold that described second applies the application program that can associate.An application of the present invention can be applied by one or more other of correlation protection, and user can set different amount threshold according to demand.Certainly, operation for the convenience of the user, and the experience considering user, the present invention is preferably set to one and applies other application that only can associate.
Step S502, after receiving association request, judges whether the number of applications of the second association reaches amount threshold, if then perform step S503, otherwise performs step S504.
Step S503, prompting user can not be associated.
Step S504, responds described association request, described first application and second is applied and is associated.
Step S505, enters password and arranges interface, arranges first password and the second password.
Step S506, hides process by the first application.
Step S507, the second application receives and runs after triggering command, detects described second and applies the whether related application of tool, if then perform step S508, otherwise perform step S509.
Step S508, mobile terminal 100 ejects interface for password input, and prompting user inputs password.
Step S509, response instruction, runs described second application.
Step S510, judges that the password that described second application receives is first password or the second password, if first password then performs step S511, otherwise performs step S509.
Step S511, runs the first application.
In practical application, user, after the second application icon clicking desktop, obtains this application program package informatin by PackageManager.If this application does not associate protected application, then directly pull-up runs this second application.If this association has protected application, then eject Password Input frame, require user's input reference password.Judge the password of input, if be first password, pull-up first is applied, if be the second password, then pull-up second is applied, and effectively protects the first application whereby.
In sum, the first application and the second application are associated according to operational order by the present invention, after being associated, namely can arrange first password and the second password, are respectively used to startup first and apply and the second application.After setting completed, mobile terminal will need the first application of protection setting to hide process to password automatically, and now user cannot see the first application from terminal desktop or program interface.If user needs startup first to apply or the second application, then by the second applications trigger, the second application receives the Password Input of user, according to this password, terminal judges that operation first is applied or the second application.Whereby, the present invention has and adapts to scene more widely, can better protect terminal applies, have very high practicality.
Certainly; the present invention also can have other various embodiments; when not deviating from the present invention's spirit and essence thereof; those of ordinary skill in the art are when making various corresponding change and distortion according to the present invention, but these change accordingly and are out of shape the protection domain that all should belong to the claim appended by the present invention.

Claims (8)

1. a guard method for application, it is characterized in that, described method comprises:
Receive instruction, the association request that process first application is initiated to the second application;
According to user operation, the first password running described first application and/or the second password running described second application are set;
Process is hidden in described first application;
Described second application receives Password Input, judges that the password that described second application receives is first password or the second password, if first password, then runs described first application, otherwise runs described second application.
2. the guard method of application according to claim 1, is characterized in that, described reception instruction, and process first application comprises before applying to second the association request step initiated:
Preset the amount threshold that described second applies the application program that can associate;
Described reception instruction, the association request step that process first application is initiated to the second application comprises:
Judge whether the number of applications of described second association reaches described amount threshold;
If the number of applications of described second association reaches described amount threshold, then user is pointed out not to be associated;
If the number of applications of described second association does not reach described amount threshold, then respond described association request, described first application and second is applied and is associated.
3. the guard method of application according to claim 1, is characterized in that, also comprises before described second application receives Password Input:
Detect described second and apply the whether related application of tool;
If the related application of described second application tool, points out user to input password, otherwise directly run described second application.
4. the guard method of application according to claim 2, is characterized in that, described second application only can associate an application;
Described second password is the combination in any being different from described first password; Or described second password is the fixed Combination being different from described first password.
5. a mobile terminal, is characterized in that, comprising:
Request processing module, for receiving instruction, the association request that process first application is initiated to the second application;
Password arranges module, for according to user operation, arranges the first password running described first application and/or the second password running described second application;
Hide processing module, for process is hidden in described first application;
Run processing module, when receiving Password Input for described second application, trigger according to input password and run described first application or the second application;
Described operation processing module comprises:
Second judges submodule, for judging that the password that described second application receives is first password or the second password;
Run submodule, when being first password for described password, run described first application, and when described password is the second password, run described second application.
6. mobile terminal according to claim 5, is characterized in that, described mobile terminal also comprises threshold setting module, for presetting the amount threshold that described second applies the application program that can associate;
Described request processing module comprises:
First judges submodule, for judging whether the number of applications of described second association reaches described amount threshold, if then transfer to the first prompting submodule process, otherwise transfers to the process of association submodule;
First prompting submodule, can not be associated for pointing out user;
Association submodule, for responding described association request, applying described first application and second and being associated.
7. mobile terminal according to claim 5, it is characterized in that, described operation processing module also comprises detection sub-module, the whether related application of tool is applied for detecting described second, if then transfer to the second prompting submodule process, otherwise described operation submodule is transferred to directly to run described second application;
Second prompting submodule, inputs password for pointing out user.
8. mobile terminal according to claim 6, is characterized in that, described second application only can associate an application;
Described second password is the combination in any being different from described first password; Or described second password is the fixed Combination being different from described first password.
CN201410023964.8A 2014-01-20 2014-01-20 The guard method of mobile terminal and application Active CN103778363B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410023964.8A CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410023964.8A CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Publications (2)

Publication Number Publication Date
CN103778363A CN103778363A (en) 2014-05-07
CN103778363B true CN103778363B (en) 2015-09-30

Family

ID=50570591

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410023964.8A Active CN103778363B (en) 2014-01-20 2014-01-20 The guard method of mobile terminal and application

Country Status (1)

Country Link
CN (1) CN103778363B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104573552B (en) * 2014-12-29 2018-01-19 广东欧珀移动通信有限公司 A kind of method and device of hiden application icon
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN104866752B (en) * 2015-05-12 2018-09-04 广东欧珀移动通信有限公司 A kind of application guard method and user terminal
CN105760796B (en) * 2016-02-18 2021-11-30 北京小米移动软件有限公司 Application security processing method and device
CN107122628A (en) * 2016-02-24 2017-09-01 阿里巴巴集团控股有限公司 Icon processing method and processing device, the terminal of application program
CN106096442B (en) * 2016-06-08 2019-07-23 北京小米移动软件有限公司 Applications trigger method and device
CN106407790A (en) * 2016-09-22 2017-02-15 北京奇虎科技有限公司 A privacy protection method and a privacy protection device for application programs
CN106407760B (en) * 2016-09-22 2021-09-24 上海传英信息技术有限公司 User terminal and application program hiding method
CN106446632B (en) * 2016-09-22 2020-09-22 北京奇虎科技有限公司 Hidden display starting method and hidden display starting device for application program
CN109154967A (en) * 2016-11-01 2019-01-04 北京小米移动软件有限公司 The method and device of hiden application icon
CN106778096A (en) * 2016-12-28 2017-05-31 努比亚技术有限公司 The camouflage method and mobile terminal of a kind of application program
CN110210186A (en) * 2018-02-28 2019-09-06 上海爱优威软件开发有限公司 A kind of latent function starting method and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752751A (en) * 2012-06-29 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Protection method and device for application
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752751A (en) * 2012-06-29 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Protection method and device for application
CN103488940A (en) * 2013-09-11 2014-01-01 昆山富泰科电脑有限公司 Password protection system and method for application programs of intelligent equipment
CN103500302A (en) * 2013-10-12 2014-01-08 广州市久邦数码科技有限公司 System and method of safety lock hidden programs

Also Published As

Publication number Publication date
CN103778363A (en) 2014-05-07

Similar Documents

Publication Publication Date Title
CN103778363B (en) The guard method of mobile terminal and application
EP3249568B1 (en) Method and apparatus for displaying application and picture, and electronic device
CN104618577A (en) Key requirement response method and device
US11017066B2 (en) Method for associating application program with biometric feature, apparatus, and mobile terminal
CN104239804A (en) Data protecting method and device
CN105205374A (en) Application program encrypting method and user terminal
CN105323218A (en) Identity verifying method and device
CN102970428A (en) Mobile terminal application sharing method and system
CN103218564A (en) Mobile terminal protection method and mobile terminal protection device
US10069872B2 (en) Architecture to establish serverless WebRTC connections
CN105306202B (en) Auth method, device and server
CN114726947B (en) Message display method, device, user terminal and readable storage medium
CN104954340A (en) Proxy IP address detection method and device
CN106469280A (en) The method and device of instant messaging interface processing
CN105530232B (en) Account login method and device
CN106506443A (en) A kind of information inspection method and device
CN104125267A (en) Account protection method, device and terminal equipment
CN106413032B (en) Hotspot establishing method and terminal equipment
WO2016202277A1 (en) Message sending method and mobile terminal
CN104202432B (en) Remote web management system and management method
CN105373715A (en) Wearable device based data access method and apparatus
CN107015744B (en) Screen capture control method of tablet device and tablet device
CN104144107A (en) Method, device and system for achieving account noting
CN112235412A (en) Message processing method and device
CN104811304A (en) Identity authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant