CN103793657B - System and method for hiden application on mobile terminals - Google Patents

System and method for hiden application on mobile terminals Download PDF

Info

Publication number
CN103793657B
CN103793657B CN201410054266.4A CN201410054266A CN103793657B CN 103793657 B CN103793657 B CN 103793657B CN 201410054266 A CN201410054266 A CN 201410054266A CN 103793657 B CN103793657 B CN 103793657B
Authority
CN
China
Prior art keywords
application
hiden
hiden application
mobile terminal
parasitic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201410054266.4A
Other languages
Chinese (zh)
Other versions
CN103793657A (en
Inventor
李坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Netqin Technology Co Ltd
Original Assignee
Beijing Netqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Netqin Technology Co Ltd filed Critical Beijing Netqin Technology Co Ltd
Priority to CN201410054266.4A priority Critical patent/CN103793657B/en
Publication of CN103793657A publication Critical patent/CN103793657A/en
Application granted granted Critical
Publication of CN103793657B publication Critical patent/CN103793657B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a kind of system for hiden application on mobile terminals, including: select unit, be configured to select hiden application and accommodate the parasitic application of described hiden application;Hidden unit, is configured to not show on the desktop of mobile terminal the icon of described hiden application;Detector unit, is configured to detect the startup of described parasitic application;And monitoring unit, it is configured to monitor the appearance of specified conditions after described parasitic application starts, and starts described hiden application when described specified conditions occur.Present invention also offers a kind of method for hiden application on mobile terminals.The secret application that the invention enables user is not found, thus protects the privacy of user.

Description

System and method for hiden application on mobile terminals
Technical field
The present invention relates to moving communicating field.More particularly it relates to an for moving The system and method for hiden application in terminal.
Background technology
In Android system, application bag name is unique sign of an application.If two application As bag name, then Android system is considered as them is same application.
Desktop user interface in Android system is referred to as desktop starter (Launcher).Launcher The icon of the application of installation can be shown.User clicks in the application that icon can enter into correspondence. Launcher can scan, after starting, the application comprising startup interface, is shown by their icon.
Currently, Launcher can show the icon of mounted all application after starting.If user Having application-specific to be not intended to others to find, current system cannot protect the privacy of user.
Accordingly, it would be desirable to the system of a kind of another one application that the application that needs are hidden can be disguised oneself as And method so that user can protect privacy.
Summary of the invention
In order to solve the problems referred to above, the present invention proposes a kind of for hiden application on mobile terminals System and method.
Specifically, according to the first scheme of the present invention, it is provided that a kind of for the most hidden Hide the system of application, including: select unit, be configured to select hiden application and accommodate described The parasitic application of hiden application;Hidden unit, is configured to not show on the desktop of mobile terminal The icon of described hiden application;Detector unit, is configured to detect the startup of described parasitic application; And monitoring unit, it is configured to monitor the appearance of specified conditions after described parasitic application starts, And described hiden application is started when described specified conditions occur.
In one embodiment, described selection unit is configured to: pass through SharedPreferences Data storage method, stores the information relevant with described hiden application and described parasitic application. SharedPreferences is a kind of light-duty data storage method, and its essence is based on XML literary composition Part storage key-value key-value pair data.SharedPreferences can be used to store Simple configuration information, its storage position can be such as/data/data/ <bag Name >/shared_prefs catalogue.
In one embodiment, described hidden unit is configured to: by disabling described hiden application Startup assembly so that on the desktop of mobile terminal, do not show the icon of described hiden application.
In one embodiment, described detector unit is configured to: what circulation acquisition was currently in use should Title, to detect the startup of described parasitic application.Such as, Android system provides to obtain and works as Before the interface of the title of application that uses up front, obtained by circulation use up front should Title, the startup of application can be detected.
In one embodiment, described specified conditions include: described mobile terminal shakes.Example As, Android system provides the interface that monitoring mobile terminal shakes, and can be examined by this interface Measure user and rock mobile terminal.
Alternative plan according to the present invention, it is provided that a kind of for hiden application on mobile terminals Method, including: select hiden application and accommodate the parasitic application of described hiden application;Do not moving The icon of described hiden application is shown on the desktop of dynamic terminal;Detect the startup of described parasitic application; And monitor the appearance of specified conditions after described parasitic application starts, and at described specified conditions Described hiden application is started during appearance.
In one embodiment, by SharedPreferences data storage method, storage with The information that described hiden application is relevant with described parasitic application.
In one embodiment, by disabling the startup assembly of described hiden application so that do not moving The icon of described hiden application is shown on the desktop of dynamic terminal.
In one embodiment, circulation obtains the title of the application being currently in use, and posts described in detection The startup of raw application.
In one embodiment, described specified conditions include: described mobile terminal shakes.
By the application present invention, in user's hiden application just as colonizing in another one application In (parasitic application).Hiden application does not shows in Launcher, is only starting parasitism application Shi Fasheng specified conditions (such as rocking mobile terminal) just can start hiden application.Therefore, originally Invention achieves the effect of application camouflage, and this makes the secret application of user be difficult to be found, thus Protect the privacy of user.
Accompanying drawing explanation
By the preferred embodiments of the present invention are described below in conjunction with the accompanying drawings, by make the present invention on address Other objects, features and advantages are clearer, wherein:
Fig. 1 shows according to an embodiment of the invention for hiden application on mobile terminals The block diagram of system.
Fig. 2 shows according to an embodiment of the invention for hiden application on mobile terminals The flow chart of method.
In all the drawings in the present invention, same or analogous structure is all with same or analogous accompanying drawing Labelling identifies.
Detailed description of the invention
With reference to the accompanying drawings to a preferred embodiment of the present invention will be described in detail, in the course of the description Eliminating is unnecessary details and function for the present invention, to prevent the understanding of the present invention Cause and obscure.
Fig. 1 shows according to an embodiment of the invention for hiden application on mobile terminals The block diagram of system.As it is shown in figure 1, system 10 include select unit 110, hidden unit 120, Detector unit 130 and monitoring unit 140.Below, each assembly to the system 10 shown in Fig. 1 It is described in detail.
Select unit 110 be configured to select hiden application and accommodate this hiden application parasitism should With.In one example, unit 110 is selected can be deposited by SharedPreferences data Storage mode stores the information relevant with hiden application and parasitic application.SharedPreferences Being a kind of light-duty data storage method, its essence is to store key-value key based on XML file Value is to data.SharedPreferences can be used to store some simple configuration informations, its Storage position can be such as/data/data/<bag name>/shared_prefs catalogue.
Hidden unit 120 is configured to not show on the desktop of mobile terminal described hiden application Icon.In one example, hidden unit 120, by disabling the startup assembly of hiden application, makes Obtain the icon not showing hiden application on the desktop of mobile terminal.
Detector unit 130 is configured to detect the startup of described parasitic application.In one example, Detector unit 130 can obtain the application that is currently in use by the circulation of interface that Android system provides Title, to detect the startup of described parasitic application.
Monitoring unit 140 is configured to after described parasitic application starts monitor going out of specified conditions Existing, and described hiden application is started when described specified conditions occur.Such as, these specified conditions Can be that mobile terminal shakes.It will be understood by those skilled in the art that these specified conditions not Being limited to this, but can set according to practical situation, such as these specified conditions can also is that and press Specific keys (physical button or virtual key) on mobile terminal, etc..
Using the system of the present embodiment, hiden application will not show in Launcher.Only exist Start when parasitism is applied and occur specified conditions just can start hiden application.Therefore, this system Achieving the effect of application camouflage, this makes the secret application of user be difficult to be found, thus protects The privacy of user.
Fig. 2 shows according to an embodiment of the invention for hiden application on mobile terminals The flow chart of method.As in figure 2 it is shown, method 20 starts at step S210.
At step S220, select hiden application and accommodate the parasitic application of described hiden application. For example, it is possible to by SharedPreferences data storage method, storage should with described hiding By the information relevant with described parasitic application.
At step S230, the desktop of mobile terminal does not shows the icon of described hiden application. Such as, this can realize by disabling the startup assembly of described hiden application.
At step S240, detect the startup of described parasitic application.For example, it is possible to by calling System interface circulation obtains the title of the application being currently in use, to detect the startup of described parasitic application.
At step S250, after described parasitic application starts, monitor the appearance of specified conditions, with And described hiden application is started when described specified conditions occur.Such as, these specified conditions can be Mobile terminal shakes.It will be understood by those skilled in the art that these specified conditions are not limited to this, But can set according to practical situation, such as these specified conditions can also is that and press mobile terminal On specific keys (physical button or virtual key), etc..
Finally, method 20 terminates at step S260.
It should be understood that the above embodiment of the present invention can pass through software, hardware or software and hard Being implemented in combination in of both parts.Such as, the various assemblies in the system 10 shown in Fig. 1 can pass through Multiple device realizes, and these devices include but not limited to: analog circuit, digital circuit, general Processor, Digital Signal Processing (DSP) circuit, programmable processor, special IC (ASIC), Field programmable gate array (FPGA), PLD (CPLD), etc..It addition, be Various assemblies in system 10 can also realize by the way of hardware combines with software, or complete Entirely realize in the form of software.
It will be understood to those skilled in the art that the data described in the embodiment of the present invention can store In the local database, it is also possible to be stored in distributed data base or can be stored in remotely number According in storehouse.
Additionally, embodiments of the invention disclosed herein can be real on computer program Existing.More specifically, this computer program is following a kind of product: have computer-readable Medium, on computer-readable medium, coding has computer program logic, when performing on the computing device Time, this computer program logic provides relevant operating with the technique scheme realizing the present invention. When performing at least one processor in the system of calculating, computer program logic makes processor Perform the operation (method) described in the embodiment of the present invention.This set of the present invention is typically provided as Arrange or encode the computer-readable at such as light medium (such as CD-ROM), floppy disk or hard disk etc. Software, code and/or other data structures on medium or the most one or more ROM or In firmware on RAM or PROM chip or other media of microcode or one or more module Downloadable software image, shared data bank etc..Software or firmware or this configuration may be installed meter On calculation equipment, so that the one or more processors in calculating equipment perform embodiment of the present invention institute The technical scheme described.
So far already in connection with preferred embodiment, invention has been described.It should be understood that this area Technical staff without departing from the spirit and scope of the present invention, can carry out various other Change, replace and add.Therefore, the scope of the present invention is not limited to above-mentioned specific embodiment, and Should be defined by the appended claims.

Claims (6)

1. for a system for hiden application on mobile terminals, including:
Select unit, be configured to select hiden application and accommodate described hiden application parasitism should With;
Hidden unit, is configured to not show on the desktop of mobile terminal the figure of described hiden application Mark;
Detector unit, is configured to circulation and obtains the title of the application being currently in use, described with detection The startup of parasitic application;And
Monitoring unit, is configured to monitor the appearance of specified conditions after described parasitic application starts, And described hiden application, wherein, described specified conditions bag is started when described specified conditions occur Include the specific keys that described mobile terminal shakes or presses on mobile terminal.
System the most according to claim 1, wherein, described selection unit is configured to: By SharedPreferences data storage method, store and described hiden application and described post The information that raw application is relevant.
System the most according to claim 1, wherein, described hidden unit is configured to: By disabling the startup assembly of described hiden application so that do not show institute on the desktop of mobile terminal State the icon of hiden application.
4. for a method for hiden application on mobile terminals, including:
Select hiden application and accommodate the parasitic application of described hiden application;
On the desktop of mobile terminal, do not show the icon of described hiden application;
Circulation obtains the title of the application being currently in use, to detect the startup of described parasitic application;With And
The appearance of specified conditions is monitored after described parasitic application starts, and at described specified conditions Starting described hiden application during appearance, wherein, described specified conditions include that described mobile terminal occurs Rock or press the specific keys on mobile terminal.
Method the most according to claim 4, wherein, passes through SharedPreferences Data storage method, stores the information relevant with described hiden application and described parasitic application.
Method the most according to claim 4, wherein, by disabling described hiden application Start assembly so that on the desktop of mobile terminal, do not show the icon of described hiden application.
CN201410054266.4A 2014-02-18 2014-02-18 System and method for hiden application on mobile terminals Expired - Fee Related CN103793657B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410054266.4A CN103793657B (en) 2014-02-18 2014-02-18 System and method for hiden application on mobile terminals

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410054266.4A CN103793657B (en) 2014-02-18 2014-02-18 System and method for hiden application on mobile terminals

Publications (2)

Publication Number Publication Date
CN103793657A CN103793657A (en) 2014-05-14
CN103793657B true CN103793657B (en) 2017-01-04

Family

ID=50669308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410054266.4A Expired - Fee Related CN103793657B (en) 2014-02-18 2014-02-18 System and method for hiden application on mobile terminals

Country Status (1)

Country Link
CN (1) CN103793657B (en)

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447399B (en) * 2014-08-18 2019-12-17 北京壹人壹本信息科技有限公司 icon hiding method and device
CN104317402B (en) * 2014-10-24 2020-07-03 小米科技有限责任公司 Description information display method and device and electronic equipment
CN104376268B (en) * 2014-11-26 2017-11-10 北京奇虎科技有限公司 Using method for hidden controlling and device
CN104573552B (en) * 2014-12-29 2018-01-19 广东欧珀移动通信有限公司 A kind of method and device of hiden application icon
CN104732157B (en) * 2015-03-31 2018-09-07 酷派软件技术(深圳)有限公司 A kind of application hides, deployment method and device
CN106156646B (en) * 2015-04-03 2020-09-22 北京搜狗科技发展有限公司 Information calling method and electronic equipment
CN104965662A (en) * 2015-07-02 2015-10-07 安一恒通(北京)科技有限公司 Mobile intelligent terminal operation method and apparatus
CN105404443B (en) * 2015-10-27 2019-02-01 努比亚技术有限公司 Using starting method and device
CN105760796B (en) * 2016-02-18 2021-11-30 北京小米移动软件有限公司 Application security processing method and device
CN107450895A (en) * 2016-05-31 2017-12-08 宇龙计算机通信科技(深圳)有限公司 Application icon display methods and system
CN106446632B (en) * 2016-09-22 2020-09-22 北京奇虎科技有限公司 Hidden display starting method and hidden display starting device for application program
CN106407790A (en) * 2016-09-22 2017-02-15 北京奇虎科技有限公司 A privacy protection method and a privacy protection device for application programs
CN106484231A (en) * 2016-09-30 2017-03-08 宇龙计算机通信科技(深圳)有限公司 A kind of method and device of application hides
CN106446669A (en) * 2016-10-26 2017-02-22 惠州Tcl移动通信有限公司 Encryption method and system based on combined keys
CN106775217B (en) * 2016-11-30 2019-10-25 Oppo广东移动通信有限公司 A kind of application identities processing method, device and terminal
CN107423585A (en) * 2017-07-31 2017-12-01 上海爱优威软件开发有限公司 The concealed application method and system of a kind of application

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102722359A (en) * 2011-03-30 2012-10-10 汉王科技股份有限公司 Method and device for displaying application program and portable mobile terminal
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103383620A (en) * 2012-05-04 2013-11-06 腾讯科技(深圳)有限公司 Method for displaying help information on mobile terminal and mobile terminal
CN103543918A (en) * 2013-10-31 2014-01-29 宇龙计算机通信科技(深圳)有限公司 Method and system for calling application program and mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8214768B2 (en) * 2007-01-05 2012-07-03 Apple Inc. Method, system, and graphical user interface for viewing multiple application windows
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101859229A (en) * 2010-06-22 2010-10-13 宇龙计算机通信科技(深圳)有限公司 Icon hiding method, device and touch screen terminal
CN102722359A (en) * 2011-03-30 2012-10-10 汉王科技股份有限公司 Method and device for displaying application program and portable mobile terminal
CN103383620A (en) * 2012-05-04 2013-11-06 腾讯科技(深圳)有限公司 Method for displaying help information on mobile terminal and mobile terminal
CN102880837A (en) * 2012-08-24 2013-01-16 腾讯科技(深圳)有限公司 Method for improving security of mobile terminal and mobile terminal
CN103543918A (en) * 2013-10-31 2014-01-29 宇龙计算机通信科技(深圳)有限公司 Method and system for calling application program and mobile terminal

Also Published As

Publication number Publication date
CN103793657A (en) 2014-05-14

Similar Documents

Publication Publication Date Title
CN103793657B (en) System and method for hiden application on mobile terminals
CN107169329B (en) Privacy information protection method, mobile terminal and computer readable storage medium
US10990196B2 (en) Screen output method and electronic device supporting same
CN106155789B (en) Application freezing method and mobile terminal
KR102560635B1 (en) Content recognition device and method for controlling thereof
CN109040419B (en) Screen recording method and device, mobile terminal and storage medium
US20170104861A1 (en) Electronic device monitoring method and apparatus
US9225700B1 (en) Proximity-based authentication
CN108140297A (en) A suspect&#39;s detecting system and a suspect&#39;s detection method
CN106250770B (en) Electronic device and method for encrypting content
US9686277B2 (en) Unique identification for an information handling system
CN108255393B (en) Unlocking password generation method and mobile terminal
CN105260216A (en) Method, device and terminal for starting application program
EP3114601A1 (en) Access control for a resource
Meng et al. Harvesting smartphone privacy through enhanced juice filming charging attacks
TW201339990A (en) Data protecting system and protecting method
CN106911554B (en) Historical information display method and device
Meng et al. JuiceCaster: towards automatic juice filming attacks on smartphones
CN111078102B (en) Method for determining point reading area through projection and terminal equipment
CN106534482B (en) Method and device for managing application programs of mobile terminal
KR101206086B1 (en) Sytstem and method for protecting phishing by authenticaion of calling number
CN106127558B (en) Bill generation method and mobile terminal
CN115495169B (en) Data acquisition and page generation methods, devices, equipment and readable storage medium
CN107358117B (en) Switching method, electronic equipment and computer storage medium
CN107862010B (en) Method and device for acquiring information of application system of Internet of things and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170104

Termination date: 20190218