CN106156652A - Application privacy protection device and method - Google Patents
Application privacy protection device and method Download PDFInfo
- Publication number
- CN106156652A CN106156652A CN201610464754.1A CN201610464754A CN106156652A CN 106156652 A CN106156652 A CN 106156652A CN 201610464754 A CN201610464754 A CN 201610464754A CN 106156652 A CN106156652 A CN 106156652A
- Authority
- CN
- China
- Prior art keywords
- application
- software matrix
- protected
- interface
- software
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention open one application privacy protection device, including acquisition module, for checking and is used when checking instruction of application recently when receiving, obtaining storage has the software matrix of the nearest information being used and applying;Determine module, for according to the described software matrix got and preset protected list of application, determining the shielded application in described software matrix;Display module, for show described nearest is used apply time, the display interface of the shielded application in described software matrix determined is replaced with preset interface, to protect the described shielded privacy content applied on described display interface.Invention additionally discloses a kind of application method for secret protection.Present invention achieves and used application secret protection when applying recently checking in terminal.
Description
Technical field
The present invention relates to field of mobile terminals, particularly relate to a kind of application privacy protection device and method.
Background technology
Along with the development of the development of communication technology, especially mobile communication, increasing user uses mobile whole
End (such as mobile phone, panel computer) communicates with other people.Mobile terminal brings many can to the communication exchange between user
Convenient, but the privacy that on mobile terminal, the application of user installation is comprised can reveal the personal information of user, if these are a few
People's information is utilized by lawless person, then can bring the threat on the person or property safety to user.
Personal secrets in protection the used application of user, it is generally required to meet following condition: any want to check, use
By the user of the application of secret protection, it is required for verifying, avoiding my other users non-to check, uses this should
With, thus cause the leakage of individual privacy.
At present, existing third party safety APP (application software) provides " application lock " function, when user uses quilt
During the APP that " application lock " is protected, the way of third party safety APP is, ejection interface for password input shelters from user will be made
APP, with reach protection application privacy effect.But, all these safety APP existed, the most completely
Protection the used application of user privacy.Such as, when user checks the application used recently in terminal, it is still able to see
To the information applied on display interface protected Bei " application lock ", this makes the privacy of the used application of user not have
Complete protects, and it is possible to because this leak, is aware of the privacy of this user by other people, thus cause the user
Loss in various degree.Relatively conventional example is, Tencent QQ chat record has be sent to recently household bank's card number and
Withdraw the money password, although this application of Tencent QQ is protected by " application lock ", but, if other people are by checking nearest institute in terminal
If using application, it is it can be seen that this bank's card number and withdraw the money password, then, will be because of this leak cause the user
Bigger economic loss.
Thus, how to prevent other people from being used application by checking recently in terminal, and then steal user in terminal
Application privacy, be a problem needing solution badly.
Summary of the invention
Present invention is primarily targeted at proposition one application privacy protection device and method, it is intended to solve to check in terminal
When being used application recently, the technical problem that the application privacy of user is easily revealed.
For achieving the above object, the present invention provides a kind of application privacy protection device, described application privacy protection device bag
Include:
Acquisition module, for when receive check is used recently apply when checking instruction, acquisition storage has nearest institute
Use the software matrix of the information of application;
Determine module, for according to the described software matrix got and preset protected list of application, determining in institute
State the shielded application in software matrix;
Display module, is used for when displaying is used application recently, being protected in described software matrix that will determine
The display interface of the application protected replaces with preset interface, in protecting the shielded privacy applied on described display interface
Hold.
Optionally, described display module is additionally operable to:
When displaying is used application recently, by the display interface of the not protected application in described software matrix,
It is shown as display interface when respective application is finally used.
Optionally, described application privacy protection device also includes:
Generation module, for when length being detected by home key or double-click home key, triggering generation is checked and is used recently
That applies checks instruction.
Optionally, in described software matrix, storage has the application software package name being used application recently;Described determine module
Including:
Judging unit, for judging the application software package name in described software matrix successively, if is present in described guarantor
Protect in list of application;
Determine unit, in the application software package name in described software matrix is present in described protected list of application
Time, determine the application that described application software package name is corresponding, for the shielded application in described software matrix.
Optionally, described preset interface is made up of one below: picture, picture and word or interface for password input.
For achieving the above object, the present invention also provides for a kind of application method for secret protection, described application method for secret protection
Including:
Check that being used when checking instruction of application, acquisition to store recently has the nearest information being used application when receiving
Software matrix;
According to the described software matrix got and preset protected list of application, determine in described software matrix
Shielded application;
Show used recently apply time, the display of the shielded application in described software matrix that will determine
Interface replaces with preset interface, to protect the shielded privacy content applied on described display interface.
Optionally, described application method for secret protection also includes:
When displaying is used application recently, by the display interface of the not protected application in described software matrix,
It is shown as display interface when respective application is finally used.
Optionally, described application method for secret protection also includes:
When length being detected by home key or double-click home key, triggering generation is checked and is used that applies to check finger recently
Order.
Optionally, in described software matrix, storage has the application software package name being used application recently;Described according to acquisition
The described software matrix arrived and preset protected list of application, determine the shielded application bag in described software matrix
Include:
Judge the application software package name in described software matrix successively, if be present in described protected list of application;
When the application software package name in described software matrix is present in described protected list of application, determine described answering
With application corresponding to software kit name, for the shielded application in described software matrix.
Optionally, described preset interface is made up of one below: picture, picture and word or interface for password input.
Application privacy protection device that the present invention proposes and method, check used recently apply time, according to getting
Storage have the software matrix being used recently the information applied, and preset protected list of application, determine at software
Shielded application in list, with when showing that recently institute's use is applied, protected in software matrix that will determine
The display interface of application, replace with preset interface, thus protect shielded application on respective former display interface
Privacy content, it is achieved that the protection of application privacy, it is to avoid the person that causes because of user's leakage of personal information in application or
Property safety threatens.
Accompanying drawing explanation
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the module diagram of present invention application privacy protection device first embodiment;
Interface display schematic diagram when Fig. 4 is to check the shielded application of most recently used one in the present invention;
Interface display schematic diagram when Fig. 5 is to check one not protected application of most recently used in the present invention;
Fig. 6 is the module diagram determining module in present invention application privacy protection device the 3rd embodiment;
Fig. 7 is the schematic flow sheet of present invention application method for secret protection first embodiment;
Fig. 8 is the schematic flow sheet of step S20 in present invention application method for secret protection the 3rd embodiment.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use
For representing the suffix explanation only for the beneficially present invention of such as " module ", " parts " or " unit " of element, itself
Not specific meaning.Therefore, " module " can mixedly use with " parts ".
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include such as moving
Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP
The mobile terminal of (portable media player), guider etc. and consolidating of such as numeral TV, desk computer etc.
Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, mobile except being used in particular for
Outside the element of purpose, structure according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 can include wireless communication unit 110, A/V (audio/video) input block 120, user's input
Unit 130, sensing unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190
Etc..Fig. 1 shows the mobile terminal with various assembly, it should be understood that be not required for implementing all groups illustrated
Part.Can alternatively implement more or less of assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows mobile terminal 100 and wireless communication system
Or the radio communication between network.Such as, wireless communication unit can include mobile communication module 112, wireless Internet mould
At least one in block 113, short range communication module 114 and positional information module 115.
Mobile communication module 112 sends radio signals to base station (such as, access point, node B etc.), exterior terminal
And in server at least one and/or receive from it radio signal.Such radio signal can include that voice leads to
Words signal, video calling signal or the various types of data sending according to text and/or Multimedia Message and/or receiving.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be internally or externally
It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN (WLAN) (Wi-Fi), Wibro
(WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant
Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Positional information module 115 is the module of positional information for checking or obtain mobile terminal.Positional information module
Typical case be GPS (global pick device).According to current technology, positional information module 115 calculates from three or more
The range information of many satellites and correct time information and for the Information application triangulation calculated, thus according to warp
Degree, latitude and highly accurately calculating three-dimensional current location information.Currently, for calculating the method use of position and temporal information
Three satellites and by using the position and the error of temporal information that other satellite correction calculates.Additionally, position
Information module 115 can calculate velocity information by Continuous plus current location information in real time.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include camera 121 He
Mike 122, the camera 121 static images to being obtained by image capture apparatus in Video Capture pattern or image capture mode
Or the view data of video processes.Picture frame after process may be displayed on display unit 151.Process through camera 121
After picture frame can be stored in memorizer 160 (or other storage medium) or via wireless communication unit 110 carry out send out
Send, two or more cameras 121 can be provided according to the structure of mobile terminal.Mike 122 can be in telephone calling model, note
Record pattern, speech recognition mode etc. operational mode receives sound (voice data) via mike, and can be by so
Acoustic processing be voice data.Audio frequency (voice) data after process can be converted in the case of telephone calling model can
The form output of mobile communication base station it is sent to via mobile communication module 112.Mike 122 can implement various types of making an uproar
Sound eliminates (or suppression) algorithm and with the noise of elimination (or suppression) generation during receiving and send audio signal or does
Disturb.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user's input
Plant operation.User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch
Plate (such as, detection due to touched and cause resistance, pressure, the sensitive component of change of electric capacity etc.), roller, rocking bar etc.
Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close shape
State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal
Orientation, the acceleration of mobile terminal 100 of 100 or speed is moved and direction etc., and generate for controlling mobile terminal 100
The order of operation or signal.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing unit 140 can sense
This sliding-type phone opens or cuts out.It addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or
Whether person's interface unit 170 couples with external device (ED).
Interface unit 170 is used as at least one external device (ED) and is connected, with mobile terminal 100, the interface that can pass through.Such as,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, for connect have the port of device of identification module, audio frequency input/output (I/O) end
Mouth, video i/o port, ear port etc..Identification module can be that storage is for verifying that user uses each of mobile terminal 100
Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included
Etc..It addition, the device (hereinafter referred to as " identification device ") with identification module can be to take the form of smart card, therefore, know
Other device can be connected with mobile terminal 100 via port or other attachment means.Interface unit 170 may be used for receive from
The input (such as, data message, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100
One or more elements or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing electricity by it
Power provides the path of mobile terminal 100 from base or can serve as allowing from the various command signals of base input by it
It is transferred to the path of mobile terminal.May serve as identifying that mobile terminal is from various command signals or the electric power of base input
The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner
Go out signal (such as, audio signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include display
Unit 151, dio Output Modules 152 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, it is in electricity when mobile terminal 100
During words call mode, display unit 151 can show and call or other (such as, text messaging, multimedia file that communicate
Download etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern
Or during image capture mode, display unit 151 can show image and/or the image of reception of capture, illustrate video or figure
UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time, display unit
151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT)
In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least
A kind of.Some in these display may be constructed such that transparence is watched from outside with permission user, and this is properly termed as transparent
Display, typical transparent display can for example, TOLED (transparent organic light emitting diode) display etc..According to specific
The embodiment wanted, mobile terminal 100 can include two or more display units (or other display device), such as, move
Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touches
Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal receive pattern, call mode, logging mode,
Time under the isotype such as speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or at memorizer 160
The voice data transducing audio signal of middle storage and be output as sound.And, dio Output Modules 152 can provide with mobile
The audio frequency output (such as, call signal receives sound, message sink sound etc.) that the specific function that terminal 100 performs is relevant.
Dio Output Modules 152 can include pick up, buzzer etc..
Memorizer 160 can store the process performed by controller 180 and the software program controlling operation etc., or can
The data (such as, telephone directory, message, still image, video etc.) that maybe will export have been exported temporarily to store.And
And, memorizer 160 can with storage about when touch be applied to touch screen time the vibration of various modes of output and audio signal
Data.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include flash memory, hard disk, many
Media card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static random-access store
Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory
(PROM), magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected execution memorizer with by network
The network storage device cooperation of the storage function of 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and voice call, data
Control that communication, video calling etc. are relevant and process.It addition, controller 180 can include for reproducing (or playback) many matchmakers
The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or it is so structured that with control
Device 180 separates.Controller 180 can perform pattern recognition process, with the handwriting input that will perform on the touchscreen or picture
Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit
Suitable electric power needed for part and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any combination of calculating
Machine computer-readable recording medium is implemented.Implementing for hardware, embodiment described herein can be by using application-specific IC
(ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can
Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to perform function described herein
At least one in electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180.
Software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation
Software module is implemented.Software code can be come by the software application (or program) write with any suitable programming language
Implementing, software code can be stored in memorizer 160 and be performed by controller 180.
So far, mobile terminal is described according to its function.Below, for the sake of brevity, will describe such as folded form,
Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is as showing
Example.Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.
It should be noted that the mobile terminal shown in Fig. 1 can be also used for check used recently apply time, to being protected
The application privacy of the application protected is protected, and the virtual functions module that this concrete mobile terminal includes is as follows:
Acquisition module 400, for when receive check is used recently apply when checking instruction, acquisition storage has recently
Used the software matrix of the information of application;
Determine module 600, for according to the described software matrix got and preset protected list of application, determining
Shielded application in described software matrix;
Display module 700, is used for when displaying is used application recently, being subject in described software matrix that will determine
The display interface of the application of protection replaces with preset interface, in protecting the shielded privacy applied on described display interface
Hold.
In the mobile terminal shown in Fig. 1, when being used application recently during user checks mobile terminal, trigger controller
Acquisition module 400 in 180 receives checks that is used recently application checks instruction, and afterwards, acquisition module 400 acquisition stores
There is the software matrix of the information being used application recently;In controller 180 really cover half block 600 according to the described software got
List and preset protected list of application, determine the shielded application in described software matrix;Exhibition in controller 180
Show module 700 show is used recently apply time, by showing of the shielded application in described software matrix determined
Show that interface replaces with preset interface, to protect the shielded privacy content applied on described display interface.
As shown in Figure 1 mobile terminal 100 may be constructed such that utilize via frame or packet transmission data all if any
Line and wireless communication system and satellite-based communication system operate.
The communication system being wherein operable to according to the mobile terminal of the present invention is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.Such as, communication system use
Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system
System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under
The description in face relates to cdma communication system, but such teaching is equally applicable to other type of device.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 100, multiple base station (BS) 270, base station
Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN)
290 form interface.MSC280 is also structured to and the BSC275 formation interface that can be couple to base station 270 via back haul link.
If back haul link can construct according to any one in the interface that Ganji knows, described interface includes such as E1/T1, ATM, IP,
PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that device as shown in Figure 2 can include multiple BSC275.
Each BS270 can service one or more subregion (or region), by multidirectional antenna or the sky of sensing specific direction
Each subregion that line covers is radially away from BS270.Or, each subregion can be by for two or more of diversity reception
Antenna covers.Each BS270 may be constructed such that support multiple frequencies distribution, and the distribution of each frequency has specific frequency spectrum
(such as, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver
Device (BTS) or other equivalent terms.In this case, term " base station " may be used for broadly representing single
BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed
For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent in device the mobile terminal operated by broadcsting transmitter (BT) 295
100.In fig. 2 it is shown that several global pick devices (GPS) satellite 300.Satellite 300 helps to position multiple mobile terminals 100
In at least one.
In fig. 2, depict multiple satellite 300, but it is understood that, it is possible to use any number of satellite obtains
Useful location information.Positional information module 115 is generally configured to coordinate with satellite 300 and thinks to obtain as shown in Figure 1
The location information wanted.Substitute GPS tracking technique or outside GPS tracking technique, it is possible to use mobile terminal can be followed the tracks of
Other technology of position.It addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100
Signal.Mobile terminal 100 generally participates in call, information receiving and transmitting communicates with other type of.Certain base station 270 receive each instead
Processed in specific BS270 to link signal.The data obtained are forwarded to the BSC275 being correlated with.BSC provides call
Resource distribution and the mobile management function of the coordination of soft switching process included between BS270.The number that BSC275 also will receive
According to being routed to MSC280, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with
MSC280 forms interface, MSC Yu BSC275 forms interface, and BSC275 correspondingly controls BS270 with by forward link signals
It is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration, the structure of communication system, each of proposition apparatus of the present invention and method is real
Execute example.
The present invention further provides a kind of application privacy protection device, as shown in Figure 3, it is shown that present invention application privacy is protected
The high-level schematic functional block diagram of protection unit first embodiment, application privacy protection device includes:
Acquisition module 400, for when receive check is used recently apply when checking instruction, acquisition storage has recently
Used the software matrix of the information of application;
Further, application privacy protection device also includes:
Generation module 500, for when length being detected by home key or double-click home key, triggering generation is checked and is made recently
Instruction is checked with apply.
Present invention application privacy protection device may be provided on above-mentioned mobile terminal, and mobile terminal can be mobile phone, flat board
The terminals such as computer.As a example by mobile phone, when the home key pressed with the head of a household on mobile phone, (i.e. HOME key is clicked HOME bond energy and is enough returned master
Screen or enter the interface of all application programs, long presses or double-clicks HOME key, it is possible to the application program that display is opened recently) or double
When hitting home key, mobile phone is after this operation user being detected, according to the setting of the operating system installed on mobile phone, triggers hands
Generation module 500 generation of machine is checked and is used that applies to check instruction recently.Wherein, recently used application refers to that user is
The application software closely opened, such as Tencent QQ, wechat, application treasured, the application softwaries such as browser of roaming.
Generation module 500 generate check used recently apply check instruction after, the acquisition module 400 of mobile phone gets final product root
Checking instruction according to this received, obtaining storage has the software matrix of the information being used application recently, wherein, in software matrix
The information being used application recently of storage, it may include the various identification informations of application.Such as, the application of user's most recently used has
Tencent QQ, wechat, browser of roaming, then, in the software matrix got, storage has these the 3 sections correlated identities information applied.
Determine module 600, for according to the software matrix got and preset protected list of application, determining at software
Shielded application in list;
Protected list of application is stored in advance on mobile phone, is subject to for storing the application privacy of user's appointment or system default
Identification information to each application of protection.The setting that user can be provided by the security application software of embedded in mobile phone or mobile phone
Function, selects one or more application, as shielded application from the mounted all application of mobile phone;Hands can also be passed through
The third party's security application software installed on machine selects shielded application.The mark letter of each application being selected
Breath, can be stored in protected list of application, and when application during user opens protected list of application, user needs first to lead to
Cross password authentification and could normally start the application being opened.Protected list of application is storable in internal memory or the storage card of mobile phone
On, it is also possible to data in protected list of application are stored in the data base of mobile phone.
According to the software matrix got, and preset protected list of application, determine that module 600 can be by coupling
Information in software matrix and protected list of application, so that it is determined that go out the shielded application in software matrix.
Display module 700, for show used recently apply time, protected in software matrix that will determine
The display interface of application replace with preset interface, to protect the shielded privacy content applied on display interface.
Further, preset interface is made up of one below: picture, picture and word or interface for password input.Preset
The situation that interface is made up of picture and word, as shown in Figure 4, wherein, picture covers application whole display picture originally, from
And it is effectively protected the privacy content on the former display picture of application.
When displaying is used application recently on a display screen, if only one of which application, then display module in software matrix
700 related contents showing this application, if there being multiple application in software matrix, then display module 700 can be answered according to using
Sequencing, in the way of stacking, show these related contents applied.And when being protected in software matrix to be illustrated in
During the application protected, the display interface that these are applied by the display module 700 of mobile phone replaces with preset interface, thus protects
That protects applies the privacy content on respective former display interface.
The application privacy protection device that the present invention proposes, check used recently apply time, according to the storage got
There are the software matrix of the information being used application recently, and preset protected list of application, determine in software matrix
Shielded application, with when showing that recently institute's use is applied, the shielded application in software matrix that will determine
Display interface, replace with preset interface, thus protect in the shielded privacy applied on respective former display interface
Hold, it is achieved that the protection of application privacy, it is to avoid the person caused because of user's leakage of personal information in application or property peace
Full threat.
Further, based on above-mentioned application privacy protection device first embodiment, present invention application privacy protection device is proposed
Second embodiment, its difference is, display module 700 is additionally operable to application not protected in software matrix is shown place
Reason, its specifically for:
When displaying is used application recently, by the display interface of the not protected application in software matrix, show
Display interface when finally being used for respective application.
When displaying is used application recently, display module 700 is except by the shielded application in software matrix
Display interface replaces with outside preset interface, also by software matrix but the display interface of not protected application, be shown as phase
Display interface when finally being used should be applied, such as the display interface of one the not protected application of most recently used in Fig. 5
Shown in.
The application privacy protection device that the present invention proposes, for need not shielded application, when user checks nearest institute
When using application, stored not protected application if used in application recently, then show when these application are finally used
Display interface, in order to user can according to last use application time display interface, recall the last scene using application
Etc. information.
Further, based on above-mentioned application privacy protection device the second embodiment, present invention application privacy protection device is proposed
3rd embodiment, its difference is, in software matrix, storage has the application software package name being used application recently.At the present embodiment
In, with reference to Fig. 6, determine that module 600 includes:
Judging unit 601, for judging the application software package name in software matrix successively, if be present in protected application
In list;
In the present embodiment, in protected list of application, corresponding storage has the application software package name of shielded application, its
In, application software package name can uniquely identify an application.Judging unit 601 is according to the application software package of storage in software matrix
The order of name, by the application software package name in coupling software matrix and protected list of application, can judge that software arranges successively
Which application software package name in table, is present in protected list of application.
Determine unit 602, be used for when the application software package name in software matrix is present in protected list of application, really
Determine the application that application software package name is corresponding, for the shielded application in software matrix.
When an application software package name in software matrix, identical with the application software package name in protected list of application
Time, determine that unit 602 thinks that this application software package name in software matrix is present in protected list of application, now, determine
Unit 602 is by application corresponding for this application software package name, the shielded application being defined as in software matrix.
The application privacy protection device that the present invention proposes, uses the application software package name that can uniquely identify an application,
Determined the shielded application in software matrix by coupling, function is easily achieved, and can determine rapidly and accurately
Closely used in application, belonged to shielded application.
Invention further provides application method for secret protection first embodiment, corresponding above-mentioned application privacy protection device
First embodiment.As shown in Figure 7, it is shown that the schematic flow sheet of present invention application method for secret protection first embodiment, application
Method for secret protection includes:
S10, checking and is used recently when checking instruction of application when receiving, obtaining storage has nearest use to apply
The software matrix of information;
Further, before above-mentioned steps S10, application method for secret protection also includes:
When length being detected by home key or double-click home key, triggering generation is checked and is used that applies to check finger recently
Order.
Present invention application method for secret protection can be implemented on above-mentioned mobile terminal, and mobile terminal can be mobile phone, flat board
The terminals such as computer.As a example by mobile phone, when the home key pressed with the head of a household on mobile phone, (i.e. HOME key is clicked HOME bond energy and is enough returned master
Screen or enter the interface of all application programs, long presses or double-clicks HOME key, it is possible to the application program that display is opened recently) or double
When hitting home key, mobile phone is after this operation user being detected, according to the setting of the operating system installed on mobile phone, triggers hands
Machine generation is checked and is used that applies to check instruction recently.Wherein, application is used to refer to the application that user opens recently recently
Software, such as Tencent QQ, wechat, application treasured, the application softwaries such as browser of roaming.
Generate check used recently apply check instruction after, mobile phone can check instruction according to this received, and obtains
Taking storage and have the software matrix of the information being used application recently, wherein, in software matrix, storage is used application recently
Information, it may include the various identification informations of application.Such as, the application of user's most recently used has Tencent QQ, wechat, roaming browses
Device, then, in the software matrix got, storage has these the 3 sections correlated identities information applied.
S20, according to the software matrix that gets and preset protected list of application, determine being protected in software matrix
The application protected;
Protected list of application is stored in advance on mobile phone, is subject to for storing the application privacy of user's appointment or system default
Identification information to each application of protection.The setting that user can be provided by the security application software of embedded in mobile phone or mobile phone
Function, selects one or more application, as shielded application from the mounted all application of mobile phone;Hands can also be passed through
The third party's security application software installed on machine selects shielded application.The mark letter of each application being selected
Breath, can be stored in protected list of application, and when application during user opens protected list of application, user needs first to lead to
Cross password authentification and could normally start the application being opened.Protected list of application is storable in internal memory or the storage card of mobile phone
On, it is also possible to data in protected list of application are stored in the data base of mobile phone.
According to the software matrix got, and preset protected list of application, can by coupling software matrix and
Information in protected list of application, so that it is determined that go out the shielded application in software matrix.
S30, show used recently apply time, the display of the shielded application in software matrix that will determine
Interface replaces with preset interface, to protect the shielded privacy content applied on display interface.
Further, preset interface is made up of one below: picture, picture and word or interface for password input.Preset
The situation that interface is made up of picture and word, as shown in Figure 4, wherein, picture covers application whole display picture originally, from
And it is effectively protected the privacy content on the former display picture of application.
When displaying is used application recently on a display screen, if only one of which application in software matrix, the most only show and be somebody's turn to do
The related content of application, if software matrix has multiple application, then can be according to using the sequencing applied, with the side of stacking
Formula shows these related contents applied.And when in software matrix to be illustrated in shielded application time, mobile phone by these should
Display interface replace with preset interface, thus protect in the shielded privacy applied on respective former display interface
Hold.
The application method for secret protection that the present invention proposes, check used recently apply time, according to the storage got
There are the software matrix of the information being used application recently, and preset protected list of application, determine in software matrix
Shielded application, with when showing that recently institute's use is applied, the shielded application in software matrix that will determine
Display interface, replace with preset interface, thus protect in the shielded privacy applied on respective former display interface
Hold, it is achieved that the protection of application privacy, it is to avoid the person caused because of user's leakage of personal information in application or property peace
Full threat.
Further, corresponding above-mentioned application privacy protection device the second embodiment, based on above-mentioned application method for secret protection
First embodiment proposes present invention application method for secret protection the second embodiment, and its difference is, application method for secret protection is also
Including the displaying process to application not protected in software matrix, concretely comprise the following steps:
When displaying is used application recently, by the display interface of the not protected application in software matrix, show
Display interface when finally being used for respective application.
When displaying is used application recently, except the display interface of the shielded application in software matrix is replaced
Outside for preset interface, mobile phone also by software matrix but the display interface of not protected application, be shown as respective application
Display interface when being used afterwards, as shown in the display interface of one the not protected application of most recently used in Fig. 5.
The application method for secret protection that the present invention proposes, for need not shielded application, when user checks nearest institute
When using application, stored not protected application if used in application recently, then show when these application are finally used
Display interface, in order to user can according to last use application time display interface, recall the last scene using application
Etc. information.
Further, corresponding above-mentioned application privacy protection device the 3rd embodiment, based on above-mentioned application method for secret protection
Second embodiment proposes present invention application method for secret protection the 3rd embodiment, and its difference is, in software matrix, storage has
The nearly application software package name being used application.In the present embodiment, with reference to Fig. 8, above-mentioned steps S20 includes:
S21, the application software package name judging in software matrix successively, if be present in protected list of application;
In the present embodiment, in protected list of application, corresponding storage has the application software package name of shielded application, its
In, application software package name can uniquely identify an application.According to the order of the application software package name of storage in software matrix, logical
Application software package name in overmatching software matrix and protected list of application, can judge successively in software matrix which should
Use software kit name, be present in protected list of application.
S22, when the application software package name in software matrix is present in protected list of application, determine application software package
The application that name is corresponding, for the shielded application in software matrix.
When an application software package name in software matrix, identical with the application software package name in protected list of application
Time, it is believed that this application software package name in software matrix is present in protected list of application, now, by this application software package name
Corresponding application, the shielded application being defined as in software matrix.
The application method for secret protection that the present invention proposes, uses the application software package name that can uniquely identify an application,
Determined the shielded application in software matrix by coupling, method is easy and easy to implement, it is possible to determine rapidly and accurately
Go out and used in application recently, belong to shielded application.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side
Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of
The former is more preferably embodiment.Based on such understanding, prior art is done by technical scheme the most in other words
The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take
Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this
Equivalent structure or equivalence flow process that bright description and accompanying drawing content are made convert, or are directly or indirectly used in other relevant skills
Art field, is the most in like manner included in the scope of patent protection of the present invention.
Claims (10)
1. an application privacy protection device, it is characterised in that described application privacy protection device includes:
Acquisition module, for when receive check is used recently apply when checking instruction, acquisition storage has and is used recently
The software matrix of the information of application;
Determine module, for according to the described software matrix got and preset protected list of application, determining described soft
Shielded application in part list;
Display module, for show described nearest is used apply time, being protected in described software matrix that will determine
The display interface of the application protected replaces with preset interface, to protect the described shielded privacy applied on described display interface
Content.
Apply privacy protection device the most as claimed in claim 1, it is characterised in that described display module is additionally operable to:
Show described nearest is used apply time, by the display interface of the not protected application in described software matrix,
It is shown as display interface when respective application is finally used.
Apply privacy protection device the most as claimed in claim 1, it is characterised in that described application privacy protection device is also wrapped
Include:
Generation module, for when length being detected by home key or double-click home key, checks described in triggering generation and is used recently
That applies checks instruction.
4. the application privacy protection device as described in claim 1-3 any one, it is characterised in that deposit in described software matrix
Contain the described nearest application software package name being used application;Described determine that module includes:
Judging unit, for judging the application software package name in described software matrix successively, if be present in described protected should
With in list;
Determine unit, be used for when the application software package name in described software matrix is present in described protected list of application,
Determine the application that described application software package name is corresponding, for the shielded application in described software matrix.
5. the application privacy protection device as described in claim 1-3 any one, it is characterised in that described preset interface by with
One of lower constitute:
Picture, picture and word or interface for password input.
6. an application method for secret protection, it is characterised in that described application method for secret protection includes:
Check that being used when checking instruction of application, acquisition to store recently has the soft of the nearest information being used application when receiving
Part list;
According to the described software matrix got and preset protected list of application, determine being protected in described software matrix
The application protected;
Show described nearest is used apply time, the display of the shielded application in described software matrix that will determine
Interface replaces with preset interface, to protect the described shielded privacy content applied on described display interface.
Apply method for secret protection the most as claimed in claim 6, it is characterised in that described application method for secret protection also wraps
Include:
Show described nearest is used apply time, by the display interface of the not protected application in described software matrix,
It is shown as display interface when respective application is finally used.
Apply method for secret protection the most as claimed in claim 6, it is characterised in that described application method for secret protection also wraps
Include:
When length being detected by home key or double-click home key, check described in triggering generation and used that applies to check finger recently
Order.
9. the application method for secret protection as described in claim 6-8 any one, it is characterised in that deposit in described software matrix
Contain the described nearest application software package name being used application;
Described software matrix that described basis gets and preset protected list of application, determine in described software matrix
Shielded application includes:
Judge the application software package name in described software matrix successively, if be present in described protected list of application;
When the application software package name in described software matrix is present in described protected list of application, determine that described application is soft
The application that part bag name is corresponding, for the shielded application in described software matrix.
10. the application method for secret protection as described in claim 6-8 any one, it is characterised in that described preset interface by
One below is constituted:
Picture, picture and word or interface for password input.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610464754.1A CN106156652A (en) | 2016-06-23 | 2016-06-23 | Application privacy protection device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610464754.1A CN106156652A (en) | 2016-06-23 | 2016-06-23 | Application privacy protection device and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106156652A true CN106156652A (en) | 2016-11-23 |
Family
ID=57353581
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610464754.1A Pending CN106156652A (en) | 2016-06-23 | 2016-06-23 | Application privacy protection device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106156652A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583591A (en) * | 2020-12-23 | 2021-03-30 | 维沃移动通信有限公司 | Application program control method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200638223A (en) * | 2004-12-14 | 2006-11-01 | Ibm | Method, system and program product for a window level security screen-saver |
US20070136466A1 (en) * | 2005-12-12 | 2007-06-14 | Nokia Corporation | Privacy protection on application sharing and data projector connectivity |
CN100407091C (en) * | 2005-10-28 | 2008-07-30 | 腾讯科技(深圳)有限公司 | Protection method of operation interface |
CN104424432A (en) * | 2013-08-26 | 2015-03-18 | 联想(北京)有限公司 | Information processing method and electronic device |
-
2016
- 2016-06-23 CN CN201610464754.1A patent/CN106156652A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200638223A (en) * | 2004-12-14 | 2006-11-01 | Ibm | Method, system and program product for a window level security screen-saver |
CN100407091C (en) * | 2005-10-28 | 2008-07-30 | 腾讯科技(深圳)有限公司 | Protection method of operation interface |
US20070136466A1 (en) * | 2005-12-12 | 2007-06-14 | Nokia Corporation | Privacy protection on application sharing and data projector connectivity |
CN104424432A (en) * | 2013-08-26 | 2015-03-18 | 联想(北京)有限公司 | Information processing method and electronic device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112583591A (en) * | 2020-12-23 | 2021-03-30 | 维沃移动通信有限公司 | Application program control method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105094613B (en) | Terminal control mechanism and method | |
CN104915582B (en) | unlocking method and device | |
CN104980588B (en) | A kind of method and apparatus for detecting mobile terminal state | |
CN104731512B (en) | The method, apparatus and terminal that picture is shared | |
CN106230597A (en) | Short message verification code checking device and method | |
CN105094532B (en) | Data access method and device | |
CN105631370B (en) | Region screen locking method and mobile terminal | |
CN106911850A (en) | Mobile terminal and its screenshotss method | |
CN106817377A (en) | A kind of data encryption device, decryption device and method | |
CN106453652A (en) | Log file uploading method and system | |
CN105573916B (en) | Fault detection method and mobile terminal | |
CN106851006A (en) | A kind of apparatus and method for recognizing Quick Response Code | |
CN106383707A (en) | Picture display method and system | |
CN106952090A (en) | Payment verification device and method | |
CN105095705B (en) | A kind of information processing method and device | |
CN106507343A (en) | A kind of information processing method, mobile terminal and server | |
CN104731484B (en) | The method and device that picture is checked | |
CN106485163A (en) | Control method and control device that mobile terminal data storehouse accesses | |
CN106125898A (en) | The method and device of screen rotation | |
CN106897010A (en) | Touch screen terminal and control method | |
CN106792644A (en) | Mobile terminal, server and information processing method | |
CN106131318A (en) | A kind of incoming information hidden method and device | |
CN106792921A (en) | The regulating power consumption device and method of mobile terminal | |
CN104751074B (en) | Image display processing method and device | |
CN106156652A (en) | Application privacy protection device and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161123 |