CN106709327A - Application hiding method and mobile terminal adopting same - Google Patents

Application hiding method and mobile terminal adopting same Download PDF

Info

Publication number
CN106709327A
CN106709327A CN201611120554.0A CN201611120554A CN106709327A CN 106709327 A CN106709327 A CN 106709327A CN 201611120554 A CN201611120554 A CN 201611120554A CN 106709327 A CN106709327 A CN 106709327A
Authority
CN
China
Prior art keywords
instruction
virtual
target application
environment
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611120554.0A
Other languages
Chinese (zh)
Inventor
张小玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Junge Technology Co Ltd
Original Assignee
Shenzhen Junge Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Junge Technology Co Ltd filed Critical Shenzhen Junge Technology Co Ltd
Priority to CN201611120554.0A priority Critical patent/CN106709327A/en
Publication of CN106709327A publication Critical patent/CN106709327A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

Embodiments of the invention provide an application hiding method and a mobile terminal adopting the same. The method is used for hiding an application needed to be hidden by a user. The method comprises the steps of receiving a first instruction by the mobile terminal, wherein the first instruction indicates that a virtual running environment is started; then starting the virtual running environment according to the first instruction; receiving a second instruction in the virtual running environment, wherein the second instruction indicates that data of a target application is obtained, wherein the target application is the application needed to be hidden; obtaining the data according to the second instruction, and storing the data in the virtual running environment; and running the target application by using an agent component in the virtual running environment, thereby realizing the hiding of the target application in an operation system.

Description

Application hiding method and mobile terminal thereof
Technical Field
The invention relates to the technical field of mobile terminals, in particular to an application hiding method and a mobile terminal thereof.
Background
With the increasing development of science and technology, people rely on mobile phones more and more, many people pay attention to privacy, and some software APP installed on the desktop of the mobile phone are not expected to be seen by others.
In the prior art, to hide the APP, the user can hide through the transmitter launcher, hiding the entry of the application in the launcher. There are two problems with doing so: first, a launcher needs to be made to replace the current launcher of the system, but because the launcher is replaceable, if a launcher is reloaded by another person, the hidden application will appear again.
There is also a prior art technique to hide an application by locking it. This approach prevents others from accessing the application to be protected, mainly by means of a lock, which is an explicit hiding that others cannot access the application but still see the application, and does not protect the privacy of the user very well.
Disclosure of Invention
The embodiment of the invention provides an application hiding method and a mobile terminal thereof, which are used for hiding applications which need to be hidden by a user.
A first aspect of an embodiment of the present invention provides an application hiding method, where the method is applied to a mobile terminal, where the mobile terminal is installed with virtual environment software, and the virtual environment software can construct a virtual operating environment on an operating system, and the method specifically includes:
receiving a first instruction, wherein the first instruction indicates to start a virtual operating environment;
starting a virtual operating environment according to a first instruction;
receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to acquire data of a target application, and the target application is an application needing to be hidden;
acquiring data according to the second instruction, and storing the data to the virtual operating environment;
and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system.
A first aspect of the embodiments of the present invention provides a mobile terminal, where the mobile terminal is installed with virtual environment software, and the virtual environment software can construct a virtual operating environment on an operating system, and the method specifically includes:
the virtual operating environment processing device comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving a first instruction, and the first instruction indicates to start the virtual operating environment;
the starting unit is used for starting the virtual operating environment according to the first instruction received by the receiving unit;
the second receiving unit is used for receiving a second instruction in the virtual operating environment, wherein the second instruction indicates that data of a target application is acquired, and the target application is an application needing to be hidden;
the acquisition unit is used for acquiring data according to the second instruction and storing the data to the virtual operating environment;
and the running unit is used for running the target application by using the proxy component in the virtual running environment to realize the hiding of the target application in the operating system.
The third aspect of the embodiments of the present invention provides a mobile terminal
An input device, an output device, a processor, and a memory;
the processor is used for executing the following steps by calling the operation instruction stored in the memory:
receiving a first instruction, wherein the first instruction indicates to start a virtual operating environment;
starting a virtual operating environment according to a first instruction;
receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to acquire data of a target application, and the target application is an application needing to be hidden;
acquiring data according to the second instruction, and storing the data to the virtual operating environment;
and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system.
According to the technical scheme, the embodiment of the invention has the following advantages:
in the embodiment of the invention, a mobile terminal receives a first instruction, and the first instruction indicates to start a virtual operating environment; then starting a virtual operating environment according to the first instruction; receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to acquire data of a target application, and the target application is an application needing to be hidden; acquiring data according to the second instruction, and storing the data to the virtual operating environment; and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, acquires an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
Drawings
FIG. 1 is a schematic diagram of a network architecture according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of a method for application hiding according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a method for application hiding according to another embodiment of the present invention;
FIG. 4 is a flowchart illustrating a method for hiding applications according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of an embodiment of a mobile terminal according to the embodiment of the present invention;
fig. 6 is a schematic structural diagram of another embodiment of a mobile terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of another embodiment of a mobile terminal in an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an application hiding method and a mobile terminal thereof, which are used for hiding applications which need to be hidden by a user.
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the embodiment of the present invention, the embodiment of the present invention may be applied to a network architecture as shown in fig. 1, in which a user may download and use an application that needs to be hidden through a mobile terminal (e.g., a notebook computer, a tablet computer, a mobile phone, etc.) in which the user installs virtual environment software.
In the embodiment of the invention, a mobile terminal receives a first instruction, and the first instruction indicates to start a virtual operating environment; then starting a virtual operating environment according to the first instruction; receiving a second instruction in the virtual operating environment, wherein the second instruction instructs to download data of a target application, and the target application is an application needing to be hidden; downloading data according to the second instruction, and storing the data to the virtual operating environment; and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, downloads an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
Referring to fig. 2, an embodiment of the method for applying concealment according to the embodiment of the present invention includes:
201. a first instruction is received.
In this embodiment, when the mobile terminal installed with the virtual environment software needs to start the virtual environment software, the mobile terminal may first receive a first instruction from a user, where the first instruction indicates to start the virtual operating environment, and the virtual environment software may construct the virtual operating environment on the operating system.
202. And starting the virtual operating environment according to the first instruction.
In this embodiment, after the mobile terminal receives the first instruction, the virtual environment software is executed according to the first instruction, and the virtual execution environment is started.
203. A second instruction is received in the virtual execution environment.
In this embodiment, after the mobile terminal starts the virtual operating environment according to the first instruction, a second instruction is received in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden.
204. Data is acquired according to the second instruction.
In this embodiment, after the mobile terminal receives the second instruction in the virtual operating environment, the data corresponding to the target application is obtained according to the second instruction, and the data is stored in the virtual operating environment.
205. A target application is run using the proxy component in the virtual run environment.
In this embodiment, after the data corresponding to the target application is obtained according to the second instruction, the proxy component is used in the virtual operating environment to operate the target application, so as to hide the target application in the operating system.
In the embodiment of the invention, a mobile terminal receives a first instruction, and the first instruction indicates to start a virtual operating environment; then starting a virtual operating environment according to the first instruction; receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to acquire data of a target application, and the target application is an application needing to be hidden; acquiring data according to the second instruction, and storing the data to the virtual operating environment; and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, acquires an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
In practical applications, the mobile terminal may obtain data of the target application in various ways, which are described below:
downloading data of the target application according to the second instruction, and acquiring the data according to a downloading result.
Referring to fig. 3, another embodiment of the method for applying concealment according to the embodiment of the present invention includes:
301. a first instruction is received.
In this embodiment, when the mobile terminal installed with the virtual environment software needs to start the virtual environment software, the mobile terminal will receive a first instruction from a user, where the first instruction indicates to start the virtual environment software, and the virtual environment software may construct a virtual operating environment on the operating system.
302. And starting the virtual operating environment according to the first instruction.
In this embodiment, after the mobile terminal receives the first instruction, the virtual environment software is executed according to the first instruction, and a virtual execution environment is constructed.
The method for constructing the virtual operating environment in the android system comprises the following steps:
registering four android components (activity, service, broadcastinstallation and contentprovider) of the agent and all the rights of the android in advance in a supervisor; replacing and intercepting system key functions through hook and a reflection mechanism so as to proxy the application when the hidden application is started; all activity is set not to be displayed in the most recently used page, and the display in the most recently used page is hidden.
303. A second instruction is received in the virtual execution environment.
In this embodiment, after the mobile terminal starts the virtual operating environment according to the first instruction, a second instruction is received in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden.
304. And executing the downloading operation according to the second instruction.
In this embodiment, after the mobile terminal receives the second instruction in the virtual operating environment, the data corresponding to the target application is downloaded according to the second instruction, and the data is stored in a virtual space in the virtual operating environment, where an entry of the virtual space is located in the virtual environment software.
It should be noted that the data corresponding to the target application is an installation package corresponding to the target application.
305. And acquiring data according to the downloading result.
In this embodiment, after the mobile terminal executes the downloading operation according to the second instruction and obtains the downloading result, the data is obtained according to the downloading result, and the data is stored in the virtual operating environment.
306. A target application is run using the proxy component in the virtual run environment.
In this embodiment, after downloading the data corresponding to the target application according to the second instruction, when the user wants to run the target application, the user may find the data corresponding to the target application in the virtual space of the virtual environment software, and click the corresponding data, so that the mobile terminal runs the target application using the proxy component, thereby hiding the target application in the operating system.
The running of the target application by using the agent component in the virtual running environment specifically comprises the following steps: verifying a target component corresponding to a target application by a proxy component in a virtual run environment; and after the verification is passed, running the target application according to the target component. Specifically, 1, firstly, the agent component registered in the manifest is started, and the component to be actually started (the component corresponding to the downloaded target application, i.e., the target component) is saved and handed to the operating system for verification. 2. Because the virtual execution environment has been constructed, the operating system verifies that the target component was successful, and then the operating system requests the virtual execution environment to create the component instance, at which point the target component is fetched, an instance of the component is created, and the target application is launched by completing the launching of the target component.
It should be noted that, the mobile terminal constructs a virtual operating environment on the management system, and the target application is directly operated in the virtual operating environment through hook, reflection and proxy technologies, without being installed. Because the target application is not installed, the target application does not exist in an operating system and other application management software, so that the purpose of completely hiding the application is achieved, and the privacy of a user is protected.
307. And sending a third instruction to a key function of the operating system through hook.
In this embodiment, after the mobile terminal runs the target application in the virtual running environment by using the proxy component, a third instruction is sent to a key function of the operating system through hook, where the third instruction indicates to store data generated by running the target application in a private space of the virtual running environment. The method prevents others from seeing the data generated by the running of the target application in other places of the mobile terminal and prevents others from seeing the data generated by the running of the target application in other applications of the mobile terminal.
308. And sending a fourth instruction to a key function of the operating system through hook.
In this embodiment, after the mobile terminal runs the target application in the virtual running environment using the proxy component, a fourth instruction is sent to the key function of the operating system through hook, where the fourth instruction indicates that the notification related to the target application can only be displayed in the virtual running environment. No notification associated with the target application can be viewed anywhere on the mobile terminal when the virtual environment software is not turned on.
309. And sending a fifth instruction to a key function of the operating system through hook.
In this embodiment, after the mobile terminal runs the target application in the virtual running environment by using the proxy component, a fifth instruction is sent to a key function of the operating system through hook, where the fifth instruction indicates to close the permission of the desktop floating window of the target application, so as to hide the display of the target application on the desktop.
It should be noted that, in the embodiment of the present invention, the application to be hidden does not need to be installed, all visible entries of the application are hidden, and all data of the application are stored in the virtual operating environment, and only when the virtual operating environment is constructed and the application can be viewed in the virtual operating software, the application is completely and comprehensively hidden.
It should be noted that the embodiment of the present invention adapts to the android entire system, does not need a super user root, and supports all android devices.
In the embodiment of the invention, a mobile terminal receives a first instruction, and the first instruction indicates to start a virtual operating environment; then starting a virtual operating environment according to the first instruction; receiving a second instruction in the virtual operating environment, wherein the second instruction instructs to download data of a target application, and the target application is an application needing to be hidden; downloading data according to the second instruction, and storing the data to the virtual operating environment; and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, downloads an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
And secondly, executing copy operation according to the second instruction, and acquiring the data according to a copy result.
Referring to fig. 3, another embodiment of the method for applying concealment according to the embodiment of the present invention includes:
401. a first instruction is received.
402. And starting the virtual operating environment according to the first instruction.
403. A second instruction is received in the virtual execution environment.
In this embodiment, steps 401 to 403 are similar to steps 301 to 303 in fig. 3, and are not described herein again.
404. And executing the copy operation according to the second instruction.
In this embodiment, after the mobile terminal receives the second instruction in the virtual operating environment, the copy operation is executed in the virtual operating space according to the second instruction.
It should be noted that the virtual environment software can always view the list of the installed software names, and the user can copy the data of the application to be hidden through the list and save the copied data to the virtual space in the virtual operating environment, where the entry of the virtual space is located in the virtual environment software.
405. And acquiring data according to the copying result.
In this embodiment, after the mobile terminal executes the copy operation according to the second instruction and obtains the copy result, the data is obtained according to the copy result, and the copied data is stored in the virtual space in the virtual operating environment.
It should be noted that the acquired data is an installation package corresponding to the target application.
It should be noted that after the data of the target application is copied, if the installed target application needs to be completely hidden, the application may be uninstalled; if only the target application copied into the virtual environment software needs to be hidden and the installed target application is reserved in the system, only the target application copied into the virtual environment software needs to be hidden, at this time, the mobile terminal can simultaneously run two target applications, for example, two WeChats are simultaneously logged in, wherein one WeChat runs in the virtual environment software, the WeChat is not installed in the system, and the other WeChat is the WeChat installed in the system.
406. A target application is run using the proxy component in the virtual run environment.
407. And sending a third instruction to a key function of the operating system through hook.
408. And sending a fourth instruction to a key function of the operating system through hook.
409. And sending a fifth instruction to a key function of the operating system through hook.
In this embodiment, steps 406 to 409 are similar to steps 306 to 309 in fig. 3, and are not described herein again.
In the embodiment of the invention, a mobile terminal receives a first instruction, and the first instruction indicates to start a virtual operating environment; then starting a virtual operating environment according to the first instruction; receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to copy data of a target application, and the target application is an application needing to be hidden; copying corresponding data in the installed application list according to the second instruction, and storing the data to the virtual operating environment; and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, copies an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
For ease of understanding, the present embodiment is described below with reference to specific application scenarios:
the method comprises the steps that a small A wants to download a microblog on an android mobile phone of the small A, but does not want others to know that the microblog is installed, so that the small A wants to hide a microblog application, firstly, the small A installs a virtual running software APP on the mobile phone of the small A, the APP can register android four components (activity, service, broadcast server, contentprovider) of an agent and all permissions of the android in advance in a manager of the system, then, key functions of the system are replaced and intercepted through a hook and reflection mechanism, so that the application is proxied when the hidden application is started, the APP also sets that all the activities are not displayed in recent use, and the display in the recently used page is hidden.
After the virtual operation APP is installed, the small A opens the APP, the APP is made to construct a virtual operation environment on the mobile phone, the android market on the mobile phone is opened again to download the microblog software, and the downloaded microblog software can be automatically stored in the virtual space due to the fact that the virtual operation environment is constructed on the mobile phone. When the user A wants to open a microblog application, the user A needs to open a virtual operation APP to enable the mobile phone to be in a virtual operation environment, then a microblog is found in a virtual space in the virtual space, the microblog is clicked, if the microblog is not installed, but the virtual operation environment is constructed on the mobile phone, a component corresponding to the microblog is stored when a component registered in a manifest is started, the component is submitted to a system for verification, the verification passes due to the fact that the component is in the virtual operation environment, then the system requires the virtual operation environment to create an instance of the component, at the moment, the component corresponding to the prestored microblog is taken out, the instance of the component is created, the starting of the microblog component is completed, and therefore the microblog is started. After the microblog is started in the virtual running environment, a key function of a system is notified through hook, data generated by the application is stored in a private space of the virtual environment, viewing by others and other applications is prevented, notifications of the application are completely hidden and can only be viewed in the virtual environment, the permission of a desktop floating window of the application is closed, and display of the application on a desktop is hidden. At this time, all visible entrances of the microblog are hidden, and the application is completely hidden on the mobile phone.
With reference to fig. 5, the mobile terminal in the embodiment of the present invention is provided with virtual environment software, and the virtual environment software can construct a virtual operating environment on an operating system, where the method for hiding an application in the embodiment of the present invention is described above, and an embodiment of the mobile terminal includes:
a first receiving unit 501, configured to receive a first instruction, where the first instruction indicates to start a virtual operating environment;
a starting unit 502, configured to start the virtual operating environment according to the first instruction received by the receiving unit;
a second receiving unit 503, configured to receive a second instruction in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden;
an obtaining unit 504, configured to obtain data according to the second instruction, and store the data in the virtual operating environment;
and the running unit 505 is configured to run the target application in the virtual running environment by using the proxy component, so as to implement hiding of the target application in the operating system.
In the embodiment of the present invention, the first receiving unit 501 receives a first instruction, where the first instruction indicates to start a virtual operating environment; the starting unit 502 starts the virtual operating environment according to the first instruction; the second receiving unit 503 receives a second instruction in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden; the obtaining unit 504 obtains data according to the second instruction and stores the data in the virtual operating environment; the execution unit 505 executes the target application using the proxy component in the virtual execution environment, implementing hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, acquires an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
Referring to fig. 6, another embodiment of the mobile terminal according to the embodiment of the present invention includes:
a first receiving unit 601, configured to receive a first instruction, where the first instruction indicates to start a virtual operating environment;
a starting unit 602, configured to start the virtual operating environment according to the first instruction received by the receiving unit;
a second receiving unit 603, configured to receive a second instruction in the virtual operating environment, where the second instruction instructs to download data of a target application, and the target application is an application that needs to be hidden;
an obtaining unit 604, configured to download data according to the second instruction, and store the data in the virtual operating environment;
wherein, the obtaining unit 604 includes:
a download subunit 6041, configured to perform a download operation according to the second instruction to obtain a download result;
a first obtaining sub-unit 6042 for obtaining data according to the downloading result.
Or,
the acquisition unit 604 includes:
a copy sub-unit 6042 configured to perform a copy operation according to the second instruction, resulting in a copy result, the copy operation instructing to copy data of the installed target application,
a second obtaining sub-unit 6043 for obtaining data according to the copy result.
The running unit 605 is configured to run the target application in the virtual running environment using the proxy component, so as to implement hiding of the target application in the operating system.
The operation unit 605 includes:
a verification subunit 6051 configured to verify, by the proxy component, a target component corresponding to the target application in the virtual execution environment;
and a running sub-unit 6052 configured to run the target application according to the target component after the verification is passed.
The first sending unit 606 is configured to send a third instruction to a key function of the operating system through hook, where the third instruction indicates to store data generated by running the target application in a private space of the virtual running environment.
A second sending unit 607, configured to send a fourth instruction to the key function of the operating system through hook, where the fourth instruction indicates that the notification related to the target application can only be displayed in the virtual execution environment.
A third sending unit 608, configured to send a fifth instruction to the key function of the operating system through hook, where the fifth instruction indicates to close the desktop floating window of the target application.
In the embodiment of the present invention, the first receiving unit 601 receives a first instruction, where the first instruction indicates to start a virtual operating environment; the starting unit 602 starts the virtual operating environment according to the first instruction; the second receiving unit 603 receives a second instruction in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden; the obtaining unit 604 obtains data according to the second instruction and stores the data in the virtual operating environment; the execution unit 605 executes the target application using the proxy component in the virtual execution environment, implementing hiding of the target application in the operating system. That is to say, the mobile terminal constructs a virtual running environment through virtual environment software, acquires an application to be hidden in the virtual running environment, stores the application in the virtual running environment, and finally runs the application to be hidden in the virtual running environment by using the proxy component, so that the application is hidden in an operating system.
As shown in fig. 7, for convenience of description, only the parts related to the embodiment of the present invention are shown, and details of the specific technology are not disclosed, please refer to the method part in the embodiment of the present invention. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, etc., taking the terminal as the mobile phone as an example:
fig. 7 is a block diagram illustrating a partial structure of a mobile phone related to a terminal provided in an embodiment of the present invention. Referring to fig. 7, the handset includes: radio Frequency (RF) circuit 710, memory 720, input unit 730, display unit 740, sensor 750, audio circuit 760, wireless fidelity (WiFi) module 770, processor 780, and power supply 790. Those skilled in the art will appreciate that the handset configuration shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 7:
the RF circuit 710 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 780; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 710 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 710 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to global system for Mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 720 may be used to store software programs and modules, and the processor 780 may execute various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 720. The memory 720 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 720 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 730 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 730 may include a touch panel 731 and other input devices 732. The touch panel 731, also referred to as a touch screen, can collect touch operations of a user (e.g. operations of the user on or near the touch panel 731 by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 731 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 780, and can receive and execute commands from the processor 780. In addition, the touch panel 731 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 730 may include other input devices 732 in addition to the touch panel 731. In particular, other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 740 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The display unit 740 may include a display panel 741, and optionally, the display panel 741 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-emitting diode (OLED), or the like. Further, the touch panel 731 can cover the display panel 741, and when the touch panel 731 detects a touch operation on or near the touch panel 731, the touch operation is transmitted to the processor 780 to determine the type of the touch event, and then the processor 780 provides a corresponding visual output on the display panel 741 according to the type of the touch event. Although the touch panel 731 and the display panel 741 are two independent components in fig. 7 to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 731 and the display panel 741 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 750, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 741 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 741 and/or a backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 760, speaker 761, and microphone 762 may provide an audio interface between a user and a cell phone. The audio circuit 760 can transmit the electrical signal converted from the received audio data to the speaker 761, and the electrical signal is converted into a sound signal by the speaker 761 and output; on the other hand, the microphone 762 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 760, and then processes the audio data output processor 780, and then transmits the audio data to, for example, another cellular phone through the RF circuit 710, or outputs the audio data to the memory 720 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 770, and provides wireless broadband Internet access for the user. Although fig. 7 shows the WiFi module 770, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 780 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 720 and calling data stored in the memory 720, thereby integrally monitoring the mobile phone. Optionally, processor 780 may include one or more processing units; preferably, the processor 780 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 780.
The handset also includes a power supply 790 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 780 via a power management system, so that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In this embodiment of the present invention, the processor 780 included in the terminal further has the following functions:
receiving a first instruction, wherein the first instruction indicates to start a virtual operating environment;
starting a virtual operating environment according to a first instruction;
receiving a second instruction in the virtual operating environment, wherein the second instruction instructs to download data of a target application, and the target application is an application needing to be hidden;
downloading data according to the second instruction, and storing the data to the virtual operating environment;
and running the target application by using the agent component in the virtual running environment to realize the hiding of the target application in the operating system.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (14)

1. A method for hiding applications, which is applied to a mobile terminal, wherein the mobile terminal is installed with virtual environment software, and the virtual environment software can construct a virtual running environment on an operating system, and the method comprises the following steps:
receiving a first instruction, wherein the first instruction indicates to start the virtual running environment;
starting the virtual operating environment according to the first instruction;
receiving a second instruction in the virtual operating environment, wherein the second instruction indicates to acquire data of a target application, and the target application is an application needing to be hidden;
acquiring the data according to the second instruction, and storing the data to a virtual operating environment;
and running the target application by using a proxy component in the virtual running environment to realize the hiding of the target application in the operating system.
2. The method according to claim 1, wherein said obtaining the data according to the second instruction comprises:
executing a downloading operation according to the second instruction to obtain a downloading result;
and acquiring the data according to the downloading result.
3. The method according to claim 1, wherein said obtaining the data according to the second instruction comprises:
executing copy operation according to the second instruction to obtain a copy result, wherein the copy operation indicates to copy the installed data of the target application,
and acquiring the data according to the copying result.
4. A method for hiding an application according to any one of claims 1 to 3, wherein after running said target application using a proxy component in said virtual running environment, said method further comprises:
and sending a third instruction to a key function of the operating system through hook, wherein the third instruction indicates that data generated by the running of the target application is saved in a private space of a virtual running environment.
5. A method for hiding an application according to any one of claims 1 to 3, wherein after running said target application using a proxy component in said virtual running environment, said method further comprises:
sending a fourth instruction to a key function of the operating system through hook, the fourth instruction indicating that a notification related to the target application is displayable only in the virtual execution environment.
6. A method for hiding an application according to any one of claims 1 to 3, wherein after running said target application using a proxy component in said virtual running environment, said method further comprises:
and sending a fifth instruction to a key function of the operating system through hook, wherein the fifth instruction indicates that the desktop floating window of the target application is closed.
7. The method for hiding the application according to any one of claims 1 to 3, wherein said running the target application in the virtual running environment using the agent component comprises:
verifying, by a proxy component, a target component corresponding to the target application in the virtual runtime environment;
and after the verification is passed, running the target application according to the target component.
8. A mobile terminal, wherein the mobile terminal is installed with virtual environment software, the virtual environment software can construct a virtual execution environment on an operating system, the mobile terminal comprising:
a first receiving unit, configured to receive a first instruction, where the first instruction indicates to start the virtual operating environment;
a starting unit, configured to start the virtual operating environment according to the first instruction received by the receiving unit;
a second receiving unit, configured to receive a second instruction in the virtual operating environment, where the second instruction indicates to acquire data of a target application, and the target application is an application that needs to be hidden;
the acquisition unit is used for acquiring the data according to the second instruction and storing the data to a virtual operating environment;
and the running unit is used for running the target application by using the proxy component in the virtual running environment to realize the hiding of the target application in the operating system.
9. The applied mobile terminal according to claim 8, wherein the root obtaining unit comprises:
the downloading subunit is used for executing downloading operation according to the second instruction to obtain a downloading result;
and the first acquisition subunit is used for acquiring the data according to the downloading result.
10. The applied mobile terminal according to claim 8, wherein the root obtaining unit comprises:
a copy subunit, configured to execute a copy operation according to the second instruction to obtain a copy result, where the copy operation indicates to copy the installed data of the target application,
and the second acquisition subunit is used for acquiring the data according to the copying result.
11. The mobile terminal according to any of claims 8 to 10, characterized in that the mobile terminal further comprises:
the first sending unit is used for sending a third instruction to a key function of the operating system through hook, wherein the third instruction indicates that data generated by the running of the target application is stored in a private space of a virtual running environment.
12. The mobile terminal according to any of claims 8 to 10, characterized in that the mobile terminal further comprises:
a second sending unit, configured to send a fourth instruction to a key function of the operating system through hook, where the fourth instruction indicates that a notification related to the target application is displayable only in the virtual execution environment.
13. The mobile terminal according to any of claims 8 to 10, characterized in that the mobile terminal further comprises:
a third sending unit, configured to send a fifth instruction to the key function of the operating system through hook, where the fifth instruction indicates to close the desktop floating window of the target application.
14. The mobile terminal according to any one of claims 8 to 10, wherein the execution unit comprises:
a verification subunit, configured to verify, by a proxy component, a target component corresponding to the target application in the virtual running environment;
and the running subunit is used for running the target application according to the target component after the verification is passed.
CN201611120554.0A 2016-12-07 2016-12-07 Application hiding method and mobile terminal adopting same Pending CN106709327A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611120554.0A CN106709327A (en) 2016-12-07 2016-12-07 Application hiding method and mobile terminal adopting same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611120554.0A CN106709327A (en) 2016-12-07 2016-12-07 Application hiding method and mobile terminal adopting same

Publications (1)

Publication Number Publication Date
CN106709327A true CN106709327A (en) 2017-05-24

Family

ID=58935972

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611120554.0A Pending CN106709327A (en) 2016-12-07 2016-12-07 Application hiding method and mobile terminal adopting same

Country Status (1)

Country Link
CN (1) CN106709327A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111198785A (en) * 2019-12-27 2020-05-26 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN112199151A (en) * 2020-09-07 2021-01-08 成都安易迅科技有限公司 Application program running method and device
CN115033139A (en) * 2021-03-04 2022-09-09 合肥杰发科技有限公司 Method and related device for starting application program interface

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000072200A1 (en) * 1999-05-21 2000-11-30 Infraworks Corporation Method and apparatus for securing files
CN101689165A (en) * 2007-06-27 2010-03-31 微软公司 Running add-on components in virtual enviroments
CN101965553A (en) * 2008-01-04 2011-02-02 密刻爱你有限公司 Virtual application program system, storing device, method for executing virtual application program and method for protecting virtual environment
CN102592102A (en) * 2011-12-31 2012-07-18 深信服网络科技(深圳)有限公司 Anti-leakage control method of terminal and terminal
CN103870761A (en) * 2012-12-11 2014-06-18 深圳市深信服电子科技有限公司 Leak prevention method and device based on local virtual environment
CN104134034A (en) * 2013-06-13 2014-11-05 腾讯科技(深圳)有限公司 Application operation control method and device
CN104238493A (en) * 2013-06-24 2014-12-24 横河电机株式会社 Process control apparatus and system and updating method therefor
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application
CN106096396A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 The information concealing method of a kind of Android application and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000072200A1 (en) * 1999-05-21 2000-11-30 Infraworks Corporation Method and apparatus for securing files
CN101689165A (en) * 2007-06-27 2010-03-31 微软公司 Running add-on components in virtual enviroments
CN101965553A (en) * 2008-01-04 2011-02-02 密刻爱你有限公司 Virtual application program system, storing device, method for executing virtual application program and method for protecting virtual environment
CN102592102A (en) * 2011-12-31 2012-07-18 深信服网络科技(深圳)有限公司 Anti-leakage control method of terminal and terminal
CN103870761A (en) * 2012-12-11 2014-06-18 深圳市深信服电子科技有限公司 Leak prevention method and device based on local virtual environment
CN104134034A (en) * 2013-06-13 2014-11-05 腾讯科技(深圳)有限公司 Application operation control method and device
CN104238493A (en) * 2013-06-24 2014-12-24 横河电机株式会社 Process control apparatus and system and updating method therefor
CN106096395A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 A kind of protection treating method and apparatus of Android application
CN106096396A (en) * 2016-06-16 2016-11-09 北京奇虎科技有限公司 The information concealing method of a kind of Android application and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111198785A (en) * 2019-12-27 2020-05-26 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN111198785B (en) * 2019-12-27 2023-05-09 宇龙计算机通信科技(深圳)有限公司 Data backup method and device, storage medium and terminal
CN112199151A (en) * 2020-09-07 2021-01-08 成都安易迅科技有限公司 Application program running method and device
CN112199151B (en) * 2020-09-07 2023-10-24 成都安易迅科技有限公司 Application program running method and device
CN115033139A (en) * 2021-03-04 2022-09-09 合肥杰发科技有限公司 Method and related device for starting application program interface
CN115033139B (en) * 2021-03-04 2024-02-27 合肥杰发科技有限公司 Method and related device for starting application program interface

Similar Documents

Publication Publication Date Title
US8522343B2 (en) Removing an active application from a remote device
CN108235754B (en) Method and device for prompting user to update application version
CN106598584B (en) Method, device and system for processing resource file
CN106331370B (en) A kind of data transmission method and terminal device
WO2018120905A1 (en) Message reminding method for terminal, and terminal
CN106843868B (en) Multi-account login method and device and mobile terminal
CN108834132B (en) Data transmission method and equipment and related medium product
CN105653220B (en) Screen data display method and device in remote control
WO2015035947A1 (en) Method for realizing cellphone without card, cellphone and server
CN108334755A (en) Private space creation method and device, storage medium, electronic equipment
CN108573169A (en) Nearest task list display methods and device, storage medium, electronic equipment
CN106506815A (en) A kind of application enables method and relevant device
CN113238868A (en) Task processing method, device, server, equipment, system and storage medium
CN106713319B (en) Remote control method, device and system between terminals and mobile terminal
CN106709327A (en) Application hiding method and mobile terminal adopting same
CN106933636B (en) Method and device for starting plug-in service and terminal equipment
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
CN106095423B (en) Method, terminal and server for providing browsing service
WO2019071581A1 (en) Application startup control method and user terminal
US9742901B2 (en) Method, apparatus and terminal device for obtaining call log
CN107341032B (en) Data loading method, mobile terminal and computer readable storage medium
CN107770449B (en) Continuous shooting method, electronic device and storage medium
CN106874038B (en) Application installation method and device and mobile terminal
CN110430252B (en) Resource data processing method and device, equipment and readable storage medium
CN110443030B (en) Permission processing method and terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170524

RJ01 Rejection of invention patent application after publication