CN106156652A - Application privacy protection device and method - Google Patents

Application privacy protection device and method Download PDF

Info

Publication number
CN106156652A
CN106156652A CN201610464754.1A CN201610464754A CN106156652A CN 106156652 A CN106156652 A CN 106156652A CN 201610464754 A CN201610464754 A CN 201610464754A CN 106156652 A CN106156652 A CN 106156652A
Authority
CN
China
Prior art keywords
application
software matrix
protected
interface
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610464754.1A
Other languages
Chinese (zh)
Inventor
张永飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201610464754.1A priority Critical patent/CN106156652A/en
Publication of CN106156652A publication Critical patent/CN106156652A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention open one application privacy protection device, including acquisition module, for checking and is used when checking instruction of application recently when receiving, obtaining storage has the software matrix of the nearest information being used and applying;Determine module, for according to the described software matrix got and preset protected list of application, determining the shielded application in described software matrix;Display module, for show described nearest is used apply time, the display interface of the shielded application in described software matrix determined is replaced with preset interface, to protect the described shielded privacy content applied on described display interface.Invention additionally discloses a kind of application method for secret protection.Present invention achieves and used application secret protection when applying recently checking in terminal.

Description

Application privacy protection device and method
Technical field
The present invention relates to field of mobile terminals, particularly relate to a kind of application privacy protection device and method.
Background technology
Along with the development of the development of communication technology, especially mobile communication, increasing user uses mobile whole End (such as mobile phone, panel computer) communicates with other people.Mobile terminal brings many can to the communication exchange between user Convenient, but the privacy that on mobile terminal, the application of user installation is comprised can reveal the personal information of user, if these are a few People's information is utilized by lawless person, then can bring the threat on the person or property safety to user.
Personal secrets in protection the used application of user, it is generally required to meet following condition: any want to check, use By the user of the application of secret protection, it is required for verifying, avoiding my other users non-to check, uses this should With, thus cause the leakage of individual privacy.
At present, existing third party safety APP (application software) provides " application lock " function, when user uses quilt During the APP that " application lock " is protected, the way of third party safety APP is, ejection interface for password input shelters from user will be made APP, with reach protection application privacy effect.But, all these safety APP existed, the most completely Protection the used application of user privacy.Such as, when user checks the application used recently in terminal, it is still able to see To the information applied on display interface protected Bei " application lock ", this makes the privacy of the used application of user not have Complete protects, and it is possible to because this leak, is aware of the privacy of this user by other people, thus cause the user Loss in various degree.Relatively conventional example is, Tencent QQ chat record has be sent to recently household bank's card number and Withdraw the money password, although this application of Tencent QQ is protected by " application lock ", but, if other people are by checking nearest institute in terminal If using application, it is it can be seen that this bank's card number and withdraw the money password, then, will be because of this leak cause the user Bigger economic loss.
Thus, how to prevent other people from being used application by checking recently in terminal, and then steal user in terminal Application privacy, be a problem needing solution badly.
Summary of the invention
Present invention is primarily targeted at proposition one application privacy protection device and method, it is intended to solve to check in terminal When being used application recently, the technical problem that the application privacy of user is easily revealed.
For achieving the above object, the present invention provides a kind of application privacy protection device, described application privacy protection device bag Include:
Acquisition module, for when receive check is used recently apply when checking instruction, acquisition storage has nearest institute Use the software matrix of the information of application;
Determine module, for according to the described software matrix got and preset protected list of application, determining in institute State the shielded application in software matrix;
Display module, is used for when displaying is used application recently, being protected in described software matrix that will determine The display interface of the application protected replaces with preset interface, in protecting the shielded privacy applied on described display interface Hold.
Optionally, described display module is additionally operable to:
When displaying is used application recently, by the display interface of the not protected application in described software matrix, It is shown as display interface when respective application is finally used.
Optionally, described application privacy protection device also includes:
Generation module, for when length being detected by home key or double-click home key, triggering generation is checked and is used recently That applies checks instruction.
Optionally, in described software matrix, storage has the application software package name being used application recently;Described determine module Including:
Judging unit, for judging the application software package name in described software matrix successively, if is present in described guarantor Protect in list of application;
Determine unit, in the application software package name in described software matrix is present in described protected list of application Time, determine the application that described application software package name is corresponding, for the shielded application in described software matrix.
Optionally, described preset interface is made up of one below: picture, picture and word or interface for password input.
For achieving the above object, the present invention also provides for a kind of application method for secret protection, described application method for secret protection Including:
Check that being used when checking instruction of application, acquisition to store recently has the nearest information being used application when receiving Software matrix;
According to the described software matrix got and preset protected list of application, determine in described software matrix Shielded application;
Show used recently apply time, the display of the shielded application in described software matrix that will determine Interface replaces with preset interface, to protect the shielded privacy content applied on described display interface.
Optionally, described application method for secret protection also includes:
When displaying is used application recently, by the display interface of the not protected application in described software matrix, It is shown as display interface when respective application is finally used.
Optionally, described application method for secret protection also includes:
When length being detected by home key or double-click home key, triggering generation is checked and is used that applies to check finger recently Order.
Optionally, in described software matrix, storage has the application software package name being used application recently;Described according to acquisition The described software matrix arrived and preset protected list of application, determine the shielded application bag in described software matrix Include:
Judge the application software package name in described software matrix successively, if be present in described protected list of application;
When the application software package name in described software matrix is present in described protected list of application, determine described answering With application corresponding to software kit name, for the shielded application in described software matrix.
Optionally, described preset interface is made up of one below: picture, picture and word or interface for password input.
Application privacy protection device that the present invention proposes and method, check used recently apply time, according to getting Storage have the software matrix being used recently the information applied, and preset protected list of application, determine at software Shielded application in list, with when showing that recently institute's use is applied, protected in software matrix that will determine The display interface of application, replace with preset interface, thus protect shielded application on respective former display interface Privacy content, it is achieved that the protection of application privacy, it is to avoid the person that causes because of user's leakage of personal information in application or Property safety threatens.
Accompanying drawing explanation
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the module diagram of present invention application privacy protection device first embodiment;
Interface display schematic diagram when Fig. 4 is to check the shielded application of most recently used one in the present invention;
Interface display schematic diagram when Fig. 5 is to check one not protected application of most recently used in the present invention;
Fig. 6 is the module diagram determining module in present invention application privacy protection device the 3rd embodiment;
Fig. 7 is the schematic flow sheet of present invention application method for secret protection first embodiment;
Fig. 8 is the schematic flow sheet of step S20 in present invention application method for secret protection the 3rd embodiment.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further referring to the drawings.
Detailed description of the invention
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use For representing the suffix explanation only for the beneficially present invention of such as " module ", " parts " or " unit " of element, itself Not specific meaning.Therefore, " module " can mixedly use with " parts ".
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can include such as moving Phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP The mobile terminal of (portable media player), guider etc. and consolidating of such as numeral TV, desk computer etc. Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that, mobile except being used in particular for Outside the element of purpose, structure according to the embodiment of the present invention can also apply to the terminal of fixed type.
Fig. 1 is the hardware architecture diagram realizing each one optional mobile terminal of embodiment of the present invention.
Mobile terminal 100 can include wireless communication unit 110, A/V (audio/video) input block 120, user's input Unit 130, sensing unit 140, output unit 150, memorizer 160, interface unit 170, controller 180 and power subsystem 190 Etc..Fig. 1 shows the mobile terminal with various assembly, it should be understood that be not required for implementing all groups illustrated Part.Can alternatively implement more or less of assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows mobile terminal 100 and wireless communication system Or the radio communication between network.Such as, wireless communication unit can include mobile communication module 112, wireless Internet mould At least one in block 113, short range communication module 114 and positional information module 115.
Mobile communication module 112 sends radio signals to base station (such as, access point, node B etc.), exterior terminal And in server at least one and/or receive from it radio signal.Such radio signal can include that voice leads to Words signal, video calling signal or the various types of data sending according to text and/or Multimedia Message and/or receiving.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can include WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting junction service.Some examples of short-range communication technology include indigo plant Tooth TM, RF identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc..
Positional information module 115 is the module of positional information for checking or obtain mobile terminal.Positional information module Typical case be GPS (global pick device).According to current technology, positional information module 115 calculates from three or more The range information of many satellites and correct time information and for the Information application triangulation calculated, thus according to warp Degree, latitude and highly accurately calculating three-dimensional current location information.Currently, for calculating the method use of position and temporal information Three satellites and by using the position and the error of temporal information that other satellite correction calculates.Additionally, position Information module 115 can calculate velocity information by Continuous plus current location information in real time.
A/V input block 120 is used for receiving audio or video signal.A/V input block 120 can include camera 121 He Mike 122, the camera 121 static images to being obtained by image capture apparatus in Video Capture pattern or image capture mode Or the view data of video processes.Picture frame after process may be displayed on display unit 151.Process through camera 121 After picture frame can be stored in memorizer 160 (or other storage medium) or via wireless communication unit 110 carry out send out Send, two or more cameras 121 can be provided according to the structure of mobile terminal.Mike 122 can be in telephone calling model, note Record pattern, speech recognition mode etc. operational mode receives sound (voice data) via mike, and can be by so Acoustic processing be voice data.Audio frequency (voice) data after process can be converted in the case of telephone calling model can The form output of mobile communication base station it is sent to via mobile communication module 112.Mike 122 can implement various types of making an uproar Sound eliminates (or suppression) algorithm and with the noise of elimination (or suppression) generation during receiving and send audio signal or does Disturb.
User input unit 130 can generate key input data to control each of mobile terminal according to the order of user's input Plant operation.User input unit 130 allows user to input various types of information, and can include keyboard, metal dome, touch Plate (such as, detection due to touched and cause resistance, pressure, the sensitive component of change of electric capacity etc.), roller, rocking bar etc. Deng.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, touch input) of mobile terminal 100, mobile terminal Orientation, the acceleration of mobile terminal 100 of 100 or speed is moved and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing unit 140 can sense This sliding-type phone opens or cuts out.It addition, sensing unit 140 can detect power subsystem 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).
Interface unit 170 is used as at least one external device (ED) and is connected, with mobile terminal 100, the interface that can pass through.Such as, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, for connect have the port of device of identification module, audio frequency input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be that storage is for verifying that user uses each of mobile terminal 100 Kind of information and subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) can be included Etc..It addition, the device (hereinafter referred to as " identification device ") with identification module can be to take the form of smart card, therefore, know Other device can be connected with mobile terminal 100 via port or other attachment means.Interface unit 170 may be used for receive from The input (such as, data message, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100 One or more elements or may be used between mobile terminal and external device (ED) transmit data.
It addition, when mobile terminal 100 is connected with external base, interface unit 170 can serve as allowing electricity by it Power provides the path of mobile terminal 100 from base or can serve as allowing from the various command signals of base input by it It is transferred to the path of mobile terminal.May serve as identifying that mobile terminal is from various command signals or the electric power of base input The no signal being accurately fitted within base.Output unit 150 is configured to provide defeated with vision, audio frequency and/or tactile manner Go out signal (such as, audio signal, video signal, alarm signal, vibration signal etc.).Output unit 150 can include display Unit 151, dio Output Modules 152 etc..
Display unit 151 may be displayed on the information processed in mobile terminal 100.Such as, it is in electricity when mobile terminal 100 During words call mode, display unit 151 can show and call or other (such as, text messaging, multimedia file that communicate Download etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern Or during image capture mode, display unit 151 can show image and/or the image of reception of capture, illustrate video or figure UI or GUI of picture and correlation function etc..
Meanwhile, when display unit 151 and touch pad the most superposed on one another with formed touch screen time, display unit 151 can serve as input equipment and output device.Display unit 151 can include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least A kind of.Some in these display may be constructed such that transparence is watched from outside with permission user, and this is properly termed as transparent Display, typical transparent display can for example, TOLED (transparent organic light emitting diode) display etc..According to specific The embodiment wanted, mobile terminal 100 can include two or more display units (or other display device), such as, move Dynamic terminal can include outernal display unit (not shown) and inner display unit (not shown).Touch screen can be used for detection and touches Input pressure and touch input position and touch input area.
Dio Output Modules 152 can mobile terminal be in call signal receive pattern, call mode, logging mode, Time under the isotype such as speech recognition mode, broadcast reception mode, that wireless communication unit 110 is received or at memorizer 160 The voice data transducing audio signal of middle storage and be output as sound.And, dio Output Modules 152 can provide with mobile The audio frequency output (such as, call signal receives sound, message sink sound etc.) that the specific function that terminal 100 performs is relevant. Dio Output Modules 152 can include pick up, buzzer etc..
Memorizer 160 can store the process performed by controller 180 and the software program controlling operation etc., or can The data (such as, telephone directory, message, still image, video etc.) that maybe will export have been exported temporarily to store.And And, memorizer 160 can with storage about when touch be applied to touch screen time the vibration of various modes of output and audio signal Data.
Memorizer 160 can include that the storage medium of at least one type, described storage medium include flash memory, hard disk, many Media card, card-type memorizer (such as, SD or DX memorizer etc.), random access storage device (RAM), static random-access store Device (SRAM), read only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..And, mobile terminal 100 can be connected execution memorizer with by network The network storage device cooperation of the storage function of 160.
Controller 180 generally controls the overall operation of mobile terminal.Such as, controller 180 performs and voice call, data Control that communication, video calling etc. are relevant and process.It addition, controller 180 can include for reproducing (or playback) many matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or it is so structured that with control Device 180 separates.Controller 180 can perform pattern recognition process, with the handwriting input that will perform on the touchscreen or picture Draw input and be identified as character or image.
Power subsystem 190 receives external power or internal power under the control of controller 180 and provides operation each unit Suitable electric power needed for part and assembly.
Various embodiment described herein can be to use such as computer software, hardware or its any combination of calculating Machine computer-readable recording medium is implemented.Implementing for hardware, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Program gate array (FPGA), processor, controller, microcontroller, microprocessor, be designed to perform function described herein At least one in electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. Software is implemented, the embodiment of such as process or function can with allow to perform the single of at least one function or operation Software module is implemented.Software code can be come by the software application (or program) write with any suitable programming language Implementing, software code can be stored in memorizer 160 and be performed by controller 180.
So far, mobile terminal is described according to its function.Below, for the sake of brevity, will describe such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc. is as showing Example.Therefore, the present invention can be applied to any kind of mobile terminal, and is not limited to slide type mobile terminal.
It should be noted that the mobile terminal shown in Fig. 1 can be also used for check used recently apply time, to being protected The application privacy of the application protected is protected, and the virtual functions module that this concrete mobile terminal includes is as follows:
Acquisition module 400, for when receive check is used recently apply when checking instruction, acquisition storage has recently Used the software matrix of the information of application;
Determine module 600, for according to the described software matrix got and preset protected list of application, determining Shielded application in described software matrix;
Display module 700, is used for when displaying is used application recently, being subject in described software matrix that will determine The display interface of the application of protection replaces with preset interface, in protecting the shielded privacy applied on described display interface Hold.
In the mobile terminal shown in Fig. 1, when being used application recently during user checks mobile terminal, trigger controller Acquisition module 400 in 180 receives checks that is used recently application checks instruction, and afterwards, acquisition module 400 acquisition stores There is the software matrix of the information being used application recently;In controller 180 really cover half block 600 according to the described software got List and preset protected list of application, determine the shielded application in described software matrix;Exhibition in controller 180 Show module 700 show is used recently apply time, by showing of the shielded application in described software matrix determined Show that interface replaces with preset interface, to protect the shielded privacy content applied on described display interface.
As shown in Figure 1 mobile terminal 100 may be constructed such that utilize via frame or packet transmission data all if any Line and wireless communication system and satellite-based communication system operate.
The communication system being wherein operable to according to the mobile terminal of the present invention is described referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.Such as, communication system use Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications system System (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc..As non-limiting example, under The description in face relates to cdma communication system, but such teaching is equally applicable to other type of device.
With reference to Fig. 2, cdma wireless communication system can include multiple mobile terminal 100, multiple base station (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to and the BSC275 formation interface that can be couple to base station 270 via back haul link. If back haul link can construct according to any one in the interface that Ganji knows, described interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that device as shown in Figure 2 can include multiple BSC275.
Each BS270 can service one or more subregion (or region), by multidirectional antenna or the sky of sensing specific direction Each subregion that line covers is radially away from BS270.Or, each subregion can be by for two or more of diversity reception Antenna covers.Each BS270 may be constructed such that support multiple frequencies distribution, and the distribution of each frequency has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Intersecting that subregion and frequency are distributed can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver Device (BTS) or other equivalent terms.In this case, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Or, each subregion of specific BS270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent in device the mobile terminal operated by broadcsting transmitter (BT) 295 100.In fig. 2 it is shown that several global pick devices (GPS) satellite 300.Satellite 300 helps to position multiple mobile terminals 100 In at least one.
In fig. 2, depict multiple satellite 300, but it is understood that, it is possible to use any number of satellite obtains Useful location information.Positional information module 115 is generally configured to coordinate with satellite 300 and thinks to obtain as shown in Figure 1 The location information wanted.Substitute GPS tracking technique or outside GPS tracking technique, it is possible to use mobile terminal can be followed the tracks of Other technology of position.It addition, at least one gps satellite 300 can optionally or additionally process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link from various mobile terminals 100 Signal.Mobile terminal 100 generally participates in call, information receiving and transmitting communicates with other type of.Certain base station 270 receive each instead Processed in specific BS270 to link signal.The data obtained are forwarded to the BSC275 being correlated with.BSC provides call Resource distribution and the mobile management function of the coordination of soft switching process included between BS270.The number that BSC275 also will receive According to being routed to MSC280, it provides the extra route service for forming interface with PSTN290.Similarly, PSTN290 with MSC280 forms interface, MSC Yu BSC275 forms interface, and BSC275 correspondingly controls BS270 with by forward link signals It is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration, the structure of communication system, each of proposition apparatus of the present invention and method is real Execute example.
The present invention further provides a kind of application privacy protection device, as shown in Figure 3, it is shown that present invention application privacy is protected The high-level schematic functional block diagram of protection unit first embodiment, application privacy protection device includes:
Acquisition module 400, for when receive check is used recently apply when checking instruction, acquisition storage has recently Used the software matrix of the information of application;
Further, application privacy protection device also includes:
Generation module 500, for when length being detected by home key or double-click home key, triggering generation is checked and is made recently Instruction is checked with apply.
Present invention application privacy protection device may be provided on above-mentioned mobile terminal, and mobile terminal can be mobile phone, flat board The terminals such as computer.As a example by mobile phone, when the home key pressed with the head of a household on mobile phone, (i.e. HOME key is clicked HOME bond energy and is enough returned master Screen or enter the interface of all application programs, long presses or double-clicks HOME key, it is possible to the application program that display is opened recently) or double When hitting home key, mobile phone is after this operation user being detected, according to the setting of the operating system installed on mobile phone, triggers hands Generation module 500 generation of machine is checked and is used that applies to check instruction recently.Wherein, recently used application refers to that user is The application software closely opened, such as Tencent QQ, wechat, application treasured, the application softwaries such as browser of roaming.
Generation module 500 generate check used recently apply check instruction after, the acquisition module 400 of mobile phone gets final product root Checking instruction according to this received, obtaining storage has the software matrix of the information being used application recently, wherein, in software matrix The information being used application recently of storage, it may include the various identification informations of application.Such as, the application of user's most recently used has Tencent QQ, wechat, browser of roaming, then, in the software matrix got, storage has these the 3 sections correlated identities information applied.
Determine module 600, for according to the software matrix got and preset protected list of application, determining at software Shielded application in list;
Protected list of application is stored in advance on mobile phone, is subject to for storing the application privacy of user's appointment or system default Identification information to each application of protection.The setting that user can be provided by the security application software of embedded in mobile phone or mobile phone Function, selects one or more application, as shielded application from the mounted all application of mobile phone;Hands can also be passed through The third party's security application software installed on machine selects shielded application.The mark letter of each application being selected Breath, can be stored in protected list of application, and when application during user opens protected list of application, user needs first to lead to Cross password authentification and could normally start the application being opened.Protected list of application is storable in internal memory or the storage card of mobile phone On, it is also possible to data in protected list of application are stored in the data base of mobile phone.
According to the software matrix got, and preset protected list of application, determine that module 600 can be by coupling Information in software matrix and protected list of application, so that it is determined that go out the shielded application in software matrix.
Display module 700, for show used recently apply time, protected in software matrix that will determine The display interface of application replace with preset interface, to protect the shielded privacy content applied on display interface.
Further, preset interface is made up of one below: picture, picture and word or interface for password input.Preset The situation that interface is made up of picture and word, as shown in Figure 4, wherein, picture covers application whole display picture originally, from And it is effectively protected the privacy content on the former display picture of application.
When displaying is used application recently on a display screen, if only one of which application, then display module in software matrix 700 related contents showing this application, if there being multiple application in software matrix, then display module 700 can be answered according to using Sequencing, in the way of stacking, show these related contents applied.And when being protected in software matrix to be illustrated in During the application protected, the display interface that these are applied by the display module 700 of mobile phone replaces with preset interface, thus protects That protects applies the privacy content on respective former display interface.
The application privacy protection device that the present invention proposes, check used recently apply time, according to the storage got There are the software matrix of the information being used application recently, and preset protected list of application, determine in software matrix Shielded application, with when showing that recently institute's use is applied, the shielded application in software matrix that will determine Display interface, replace with preset interface, thus protect in the shielded privacy applied on respective former display interface Hold, it is achieved that the protection of application privacy, it is to avoid the person caused because of user's leakage of personal information in application or property peace Full threat.
Further, based on above-mentioned application privacy protection device first embodiment, present invention application privacy protection device is proposed Second embodiment, its difference is, display module 700 is additionally operable to application not protected in software matrix is shown place Reason, its specifically for:
When displaying is used application recently, by the display interface of the not protected application in software matrix, show Display interface when finally being used for respective application.
When displaying is used application recently, display module 700 is except by the shielded application in software matrix Display interface replaces with outside preset interface, also by software matrix but the display interface of not protected application, be shown as phase Display interface when finally being used should be applied, such as the display interface of one the not protected application of most recently used in Fig. 5 Shown in.
The application privacy protection device that the present invention proposes, for need not shielded application, when user checks nearest institute When using application, stored not protected application if used in application recently, then show when these application are finally used Display interface, in order to user can according to last use application time display interface, recall the last scene using application Etc. information.
Further, based on above-mentioned application privacy protection device the second embodiment, present invention application privacy protection device is proposed 3rd embodiment, its difference is, in software matrix, storage has the application software package name being used application recently.At the present embodiment In, with reference to Fig. 6, determine that module 600 includes:
Judging unit 601, for judging the application software package name in software matrix successively, if be present in protected application In list;
In the present embodiment, in protected list of application, corresponding storage has the application software package name of shielded application, its In, application software package name can uniquely identify an application.Judging unit 601 is according to the application software package of storage in software matrix The order of name, by the application software package name in coupling software matrix and protected list of application, can judge that software arranges successively Which application software package name in table, is present in protected list of application.
Determine unit 602, be used for when the application software package name in software matrix is present in protected list of application, really Determine the application that application software package name is corresponding, for the shielded application in software matrix.
When an application software package name in software matrix, identical with the application software package name in protected list of application Time, determine that unit 602 thinks that this application software package name in software matrix is present in protected list of application, now, determine Unit 602 is by application corresponding for this application software package name, the shielded application being defined as in software matrix.
The application privacy protection device that the present invention proposes, uses the application software package name that can uniquely identify an application, Determined the shielded application in software matrix by coupling, function is easily achieved, and can determine rapidly and accurately Closely used in application, belonged to shielded application.
Invention further provides application method for secret protection first embodiment, corresponding above-mentioned application privacy protection device First embodiment.As shown in Figure 7, it is shown that the schematic flow sheet of present invention application method for secret protection first embodiment, application Method for secret protection includes:
S10, checking and is used recently when checking instruction of application when receiving, obtaining storage has nearest use to apply The software matrix of information;
Further, before above-mentioned steps S10, application method for secret protection also includes:
When length being detected by home key or double-click home key, triggering generation is checked and is used that applies to check finger recently Order.
Present invention application method for secret protection can be implemented on above-mentioned mobile terminal, and mobile terminal can be mobile phone, flat board The terminals such as computer.As a example by mobile phone, when the home key pressed with the head of a household on mobile phone, (i.e. HOME key is clicked HOME bond energy and is enough returned master Screen or enter the interface of all application programs, long presses or double-clicks HOME key, it is possible to the application program that display is opened recently) or double When hitting home key, mobile phone is after this operation user being detected, according to the setting of the operating system installed on mobile phone, triggers hands Machine generation is checked and is used that applies to check instruction recently.Wherein, application is used to refer to the application that user opens recently recently Software, such as Tencent QQ, wechat, application treasured, the application softwaries such as browser of roaming.
Generate check used recently apply check instruction after, mobile phone can check instruction according to this received, and obtains Taking storage and have the software matrix of the information being used application recently, wherein, in software matrix, storage is used application recently Information, it may include the various identification informations of application.Such as, the application of user's most recently used has Tencent QQ, wechat, roaming browses Device, then, in the software matrix got, storage has these the 3 sections correlated identities information applied.
S20, according to the software matrix that gets and preset protected list of application, determine being protected in software matrix The application protected;
Protected list of application is stored in advance on mobile phone, is subject to for storing the application privacy of user's appointment or system default Identification information to each application of protection.The setting that user can be provided by the security application software of embedded in mobile phone or mobile phone Function, selects one or more application, as shielded application from the mounted all application of mobile phone;Hands can also be passed through The third party's security application software installed on machine selects shielded application.The mark letter of each application being selected Breath, can be stored in protected list of application, and when application during user opens protected list of application, user needs first to lead to Cross password authentification and could normally start the application being opened.Protected list of application is storable in internal memory or the storage card of mobile phone On, it is also possible to data in protected list of application are stored in the data base of mobile phone.
According to the software matrix got, and preset protected list of application, can by coupling software matrix and Information in protected list of application, so that it is determined that go out the shielded application in software matrix.
S30, show used recently apply time, the display of the shielded application in software matrix that will determine Interface replaces with preset interface, to protect the shielded privacy content applied on display interface.
Further, preset interface is made up of one below: picture, picture and word or interface for password input.Preset The situation that interface is made up of picture and word, as shown in Figure 4, wherein, picture covers application whole display picture originally, from And it is effectively protected the privacy content on the former display picture of application.
When displaying is used application recently on a display screen, if only one of which application in software matrix, the most only show and be somebody's turn to do The related content of application, if software matrix has multiple application, then can be according to using the sequencing applied, with the side of stacking Formula shows these related contents applied.And when in software matrix to be illustrated in shielded application time, mobile phone by these should Display interface replace with preset interface, thus protect in the shielded privacy applied on respective former display interface Hold.
The application method for secret protection that the present invention proposes, check used recently apply time, according to the storage got There are the software matrix of the information being used application recently, and preset protected list of application, determine in software matrix Shielded application, with when showing that recently institute's use is applied, the shielded application in software matrix that will determine Display interface, replace with preset interface, thus protect in the shielded privacy applied on respective former display interface Hold, it is achieved that the protection of application privacy, it is to avoid the person caused because of user's leakage of personal information in application or property peace Full threat.
Further, corresponding above-mentioned application privacy protection device the second embodiment, based on above-mentioned application method for secret protection First embodiment proposes present invention application method for secret protection the second embodiment, and its difference is, application method for secret protection is also Including the displaying process to application not protected in software matrix, concretely comprise the following steps:
When displaying is used application recently, by the display interface of the not protected application in software matrix, show Display interface when finally being used for respective application.
When displaying is used application recently, except the display interface of the shielded application in software matrix is replaced Outside for preset interface, mobile phone also by software matrix but the display interface of not protected application, be shown as respective application Display interface when being used afterwards, as shown in the display interface of one the not protected application of most recently used in Fig. 5.
The application method for secret protection that the present invention proposes, for need not shielded application, when user checks nearest institute When using application, stored not protected application if used in application recently, then show when these application are finally used Display interface, in order to user can according to last use application time display interface, recall the last scene using application Etc. information.
Further, corresponding above-mentioned application privacy protection device the 3rd embodiment, based on above-mentioned application method for secret protection Second embodiment proposes present invention application method for secret protection the 3rd embodiment, and its difference is, in software matrix, storage has The nearly application software package name being used application.In the present embodiment, with reference to Fig. 8, above-mentioned steps S20 includes:
S21, the application software package name judging in software matrix successively, if be present in protected list of application;
In the present embodiment, in protected list of application, corresponding storage has the application software package name of shielded application, its In, application software package name can uniquely identify an application.According to the order of the application software package name of storage in software matrix, logical Application software package name in overmatching software matrix and protected list of application, can judge successively in software matrix which should Use software kit name, be present in protected list of application.
S22, when the application software package name in software matrix is present in protected list of application, determine application software package The application that name is corresponding, for the shielded application in software matrix.
When an application software package name in software matrix, identical with the application software package name in protected list of application Time, it is believed that this application software package name in software matrix is present in protected list of application, now, by this application software package name Corresponding application, the shielded application being defined as in software matrix.
The application method for secret protection that the present invention proposes, uses the application software package name that can uniquely identify an application, Determined the shielded application in software matrix by coupling, method is easy and easy to implement, it is possible to determine rapidly and accurately Go out and used in application recently, belong to shielded application.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive above-described embodiment side Method can add the mode of required general hardware platform by software and realize, naturally it is also possible to by hardware, but a lot of in the case of The former is more preferably embodiment.Based on such understanding, prior art is done by technical scheme the most in other words The part going out contribution can embody with the form of software product, and this computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions with so that a station terminal equipment (can be mobile phone, computer, take Business device, air-conditioner, or the network equipment etc.) perform the method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention, not thereby limit the scope of the claims of the present invention, every utilize this Equivalent structure or equivalence flow process that bright description and accompanying drawing content are made convert, or are directly or indirectly used in other relevant skills Art field, is the most in like manner included in the scope of patent protection of the present invention.

Claims (10)

1. an application privacy protection device, it is characterised in that described application privacy protection device includes:
Acquisition module, for when receive check is used recently apply when checking instruction, acquisition storage has and is used recently The software matrix of the information of application;
Determine module, for according to the described software matrix got and preset protected list of application, determining described soft Shielded application in part list;
Display module, for show described nearest is used apply time, being protected in described software matrix that will determine The display interface of the application protected replaces with preset interface, to protect the described shielded privacy applied on described display interface Content.
Apply privacy protection device the most as claimed in claim 1, it is characterised in that described display module is additionally operable to:
Show described nearest is used apply time, by the display interface of the not protected application in described software matrix, It is shown as display interface when respective application is finally used.
Apply privacy protection device the most as claimed in claim 1, it is characterised in that described application privacy protection device is also wrapped Include:
Generation module, for when length being detected by home key or double-click home key, checks described in triggering generation and is used recently That applies checks instruction.
4. the application privacy protection device as described in claim 1-3 any one, it is characterised in that deposit in described software matrix Contain the described nearest application software package name being used application;Described determine that module includes:
Judging unit, for judging the application software package name in described software matrix successively, if be present in described protected should With in list;
Determine unit, be used for when the application software package name in described software matrix is present in described protected list of application, Determine the application that described application software package name is corresponding, for the shielded application in described software matrix.
5. the application privacy protection device as described in claim 1-3 any one, it is characterised in that described preset interface by with One of lower constitute:
Picture, picture and word or interface for password input.
6. an application method for secret protection, it is characterised in that described application method for secret protection includes:
Check that being used when checking instruction of application, acquisition to store recently has the soft of the nearest information being used application when receiving Part list;
According to the described software matrix got and preset protected list of application, determine being protected in described software matrix The application protected;
Show described nearest is used apply time, the display of the shielded application in described software matrix that will determine Interface replaces with preset interface, to protect the described shielded privacy content applied on described display interface.
Apply method for secret protection the most as claimed in claim 6, it is characterised in that described application method for secret protection also wraps Include:
Show described nearest is used apply time, by the display interface of the not protected application in described software matrix, It is shown as display interface when respective application is finally used.
Apply method for secret protection the most as claimed in claim 6, it is characterised in that described application method for secret protection also wraps Include:
When length being detected by home key or double-click home key, check described in triggering generation and used that applies to check finger recently Order.
9. the application method for secret protection as described in claim 6-8 any one, it is characterised in that deposit in described software matrix Contain the described nearest application software package name being used application;
Described software matrix that described basis gets and preset protected list of application, determine in described software matrix Shielded application includes:
Judge the application software package name in described software matrix successively, if be present in described protected list of application;
When the application software package name in described software matrix is present in described protected list of application, determine that described application is soft The application that part bag name is corresponding, for the shielded application in described software matrix.
10. the application method for secret protection as described in claim 6-8 any one, it is characterised in that described preset interface by One below is constituted:
Picture, picture and word or interface for password input.
CN201610464754.1A 2016-06-23 2016-06-23 Application privacy protection device and method Pending CN106156652A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610464754.1A CN106156652A (en) 2016-06-23 2016-06-23 Application privacy protection device and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610464754.1A CN106156652A (en) 2016-06-23 2016-06-23 Application privacy protection device and method

Publications (1)

Publication Number Publication Date
CN106156652A true CN106156652A (en) 2016-11-23

Family

ID=57353581

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610464754.1A Pending CN106156652A (en) 2016-06-23 2016-06-23 Application privacy protection device and method

Country Status (1)

Country Link
CN (1) CN106156652A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583591A (en) * 2020-12-23 2021-03-30 维沃移动通信有限公司 Application program control method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200638223A (en) * 2004-12-14 2006-11-01 Ibm Method, system and program product for a window level security screen-saver
US20070136466A1 (en) * 2005-12-12 2007-06-14 Nokia Corporation Privacy protection on application sharing and data projector connectivity
CN100407091C (en) * 2005-10-28 2008-07-30 腾讯科技(深圳)有限公司 Protection method of operation interface
CN104424432A (en) * 2013-08-26 2015-03-18 联想(北京)有限公司 Information processing method and electronic device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200638223A (en) * 2004-12-14 2006-11-01 Ibm Method, system and program product for a window level security screen-saver
CN100407091C (en) * 2005-10-28 2008-07-30 腾讯科技(深圳)有限公司 Protection method of operation interface
US20070136466A1 (en) * 2005-12-12 2007-06-14 Nokia Corporation Privacy protection on application sharing and data projector connectivity
CN104424432A (en) * 2013-08-26 2015-03-18 联想(北京)有限公司 Information processing method and electronic device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112583591A (en) * 2020-12-23 2021-03-30 维沃移动通信有限公司 Application program control method and device

Similar Documents

Publication Publication Date Title
CN105094613B (en) Terminal control mechanism and method
CN104915582B (en) unlocking method and device
CN104980588B (en) A kind of method and apparatus for detecting mobile terminal state
CN104731512B (en) The method, apparatus and terminal that picture is shared
CN106230597A (en) Short message verification code checking device and method
CN105094532B (en) Data access method and device
CN105631370B (en) Region screen locking method and mobile terminal
CN106911850A (en) Mobile terminal and its screenshotss method
CN106817377A (en) A kind of data encryption device, decryption device and method
CN106453652A (en) Log file uploading method and system
CN105573916B (en) Fault detection method and mobile terminal
CN106851006A (en) A kind of apparatus and method for recognizing Quick Response Code
CN106383707A (en) Picture display method and system
CN106952090A (en) Payment verification device and method
CN105095705B (en) A kind of information processing method and device
CN106507343A (en) A kind of information processing method, mobile terminal and server
CN104731484B (en) The method and device that picture is checked
CN106485163A (en) Control method and control device that mobile terminal data storehouse accesses
CN106125898A (en) The method and device of screen rotation
CN106897010A (en) Touch screen terminal and control method
CN106792644A (en) Mobile terminal, server and information processing method
CN106131318A (en) A kind of incoming information hidden method and device
CN106792921A (en) The regulating power consumption device and method of mobile terminal
CN104751074B (en) Image display processing method and device
CN106156652A (en) Application privacy protection device and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161123