CN107729722A - The secrecy operating method and system of a kind of application program - Google Patents
The secrecy operating method and system of a kind of application program Download PDFInfo
- Publication number
- CN107729722A CN107729722A CN201711044020.9A CN201711044020A CN107729722A CN 107729722 A CN107729722 A CN 107729722A CN 201711044020 A CN201711044020 A CN 201711044020A CN 107729722 A CN107729722 A CN 107729722A
- Authority
- CN
- China
- Prior art keywords
- secrecy
- application program
- security applications
- treat
- binding
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000011017 operating method Methods 0.000 title claims abstract description 14
- 230000006870 function Effects 0.000 claims description 36
- 230000009467 reduction Effects 0.000 claims description 9
- 238000011084 recovery Methods 0.000 claims description 5
- 238000000465 moulding Methods 0.000 claims 1
- 238000000034 method Methods 0.000 abstract description 9
- 230000006872 improvement Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000011435 rock Substances 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Abstract
The invention discloses the secrecy operating method and system of a kind of application program, method includes:Selection application program simultaneously marks it to treat security applications;The function that security applications are treated described in the outside input for meeting preparatory condition and binding is obtained, marks this to meet the outside input of preparatory condition and is operated for secrecy;Detect and the corresponding function for the treatment of security applications is performed based on the secrecy operation.The system is used to perform corresponding method.The present invention can avoid other people operations to application program, protection personal information is not leaked by will specifically operate the function of connected applications program.
Description
Technical field
The present invention relates to the secrecy operating method and system of application program technical field, more particularly to a kind of application program.
Background technology
While various facilitate is brought, there is also personal information to let out application program in various terminals
The risk of leakage, and the guard method of main flow now is all to concentrate on the link for opening human-computer interaction interface, such as screen locking in limited time, no
Exclude someone and take advantage of terminal into the possibility of operation terminal before screen locking, it is therefore desirable to more salvos.
The content of the invention
In order to solve the above problems, the secrecy operating method and system of the invention by providing a kind of application program, pass through
Secrecy operation could correctly realize the function of destination application.
On the one hand the technical solution adopted by the present invention is a kind of secrecy operating method of application program, including step:Selection
Application program simultaneously marks it to treat security applications;Obtain and treat security applications described in the outside input for meeting preparatory condition and binding
Function, mark this to meet the outside input of preparatory condition and operated for secrecy;Detect and be based on the secrecy operation and perform corresponding treat
The function of security applications.
Preferably, in addition to it is provided for receiving the outside switch module for opening operation/shutoff operation, when the switch
Component, which receives to open to operate, then detects the secrecy operation, does not otherwise detect the secrecy operation.
Preferably, in addition to selection and marks it to treat security applications at application program, by the security applications and another treated
Application program is bound, and is marked the another application program as surface program and is hidden and described treat security applications.
Preferably, in addition to be provided for remove binding relationship reduction component.
Preferably, by sensor obtain described in meet preparatory condition outside input and binding described in treat security applications
Function.
On the other hand the technical solution adopted by the present invention is a kind of secrecy operating system of application program, including:Select mould
Block, for selecting application program and marking it to treat security applications;Input module, the outside that preparatory condition is met for obtaining are defeated
Enter and bind the function for the treatment of security applications, mark this to meet the outside input of preparatory condition and operated for secrecy;Execution module,
For detecting and performing the corresponding function for the treatment of security applications based on the secrecy operation.
Preferably, in addition to switch module, the switch module are used to be provided for unlatching operation/closing outside reception
The switch module of operation, the secrecy operation is then detected when the switch module receives to open to operate, does not otherwise detect the guarantor
Close operation.
Preferably, the selecting module, it is additionally operable to select application program and marks it to treat security applications, wait to protect by described
Close application and another application programmatic binding, the another application program is marked as surface program and hides and described treats security applications.
Preferably, in addition to recovery module, the recovery module are used to be provided for the reduction component for removing binding relationship.
Preferably, the input module by sensor obtain described in meet described in outside input and the binding of preparatory condition
Treat the function of security applications.
Beneficial effects of the present invention are by will specifically operate the function of connected applications program, other people can be avoided corresponding
With the operation of program, protection personal information is not leaked.
Brief description of the drawings
Fig. 1 show the schematic diagram of the secrecy operating method based on the embodiment of the present invention.
Embodiment
The present invention will be described with reference to embodiments.
Embodiment based on invention, a kind of secrecy operating method of application program, including step:Selection application program is simultaneously marked
It is remembered to treat security applications;The function that security applications are treated described in the outside input for meeting preparatory condition and binding is obtained, mark should
The outside input for meeting preparatory condition operates for secrecy;Detect and the corresponding work(for treating security applications is performed based on the secrecy operation
Energy.
Method based on embodiment, in addition to the switch module of unlatching operation/shutoff operation outside reception is provided for,
The secrecy operation is then detected when the switch module receives to open to operate, does not otherwise detect the secrecy operation.
Method based on embodiment, in addition to select application program and mark it to treat security applications, wait to maintain secrecy by described
Using with another application programmatic binding, mark the another application program as surface program and hide and described treat security applications.
Method based on embodiment, in addition to it is provided for removing the reduction component of binding relationship.
Method based on embodiment, by sensor obtain described in meet preparatory condition outside input and binding described in treat
The function of security applications.
Some intelligent terminals, such as mobile phone and tablet personal computer can all install some application program (i.e. follow-up described " journeys
Sequence "), wherein, such as the program such as Alipay, wechat, speculation in stocks assistant, due to being related to the personal information of money or sensitivity, it is undesirable to
It is used by others, the present invention provides secrecy operating method as shown in Figure 1:
1. open function of keeping secret;2. select the program of a need for confidentiality;3. input secrecy operation;4. binding secrecy operation
With the function of program;5. record security operates and the matching of program records;6. obtain secrecy to operate and start corresponding function.
Wherein it is possible to provide a start button, (such as provided by clicking on this start button to open function of keeping secret
One specific software, several function buttons can be provided after opening the specific software, one of function button is the startup
Button);In the case where being clicked startup in foregoing start button, click on human-computer interaction interface on program icon with
The program of selected need for confidentiality (can increase some marks, such as increase an indicator lamp on the icon of program, when program quilt
When selected, indicator lamp is bright, unselected, and indicator lamp does not work, and so can significantly show which program is selected);
The data/information that the secrecy operation is formed for the input based on outside, such as the group of sliding action of the finger on touch screen
Close, the number of touch screen is clicked in certain time or clicks on the duration, rock frequency/rule of mobile phone, the numeral of input,
It can be the signal/data inputted by FPDP, the function of these operations and program is bound (described program
Function includes opening, selection, the function such as closing, is specifically based on the function that program can be realized in itself), i.e., the function rank residing for program
The secrecy operation of section and corresponding moment input is bound;The binding relationship to maintain secrecy between operation and the function of corresponding program is remembered
Record uses for follow-up in memory;After completing above-mentioned writing task, detect follow-up outside operation (various operations,
Secrecy operation is not limited only to, such as normally uses the operation of other programs), the secrecy that memory is recorded in if meeting is grasped
Make the function of program corresponding to then starting.
As a further improvement, also include opening operation/closing behaviour in the function button that above-mentioned specific software provides
The button of work, the function of secrecy operation can be opened in need when, i.e., when click on open Cao Zuoanjian after, can detect
Whether secrecy operation is included in outside operation;After shutoff operation is clicked on, then whether will not be wrapped in peripheral operation is detected
Secrecy operation is included, can so increase disguise, is advantageous to protect individual privacy, is also possible to prevent maloperation;Similarly can also
Function button including reduction, when the function button for clicking on the reduction, the record of the secrecy operation set before can be all eliminated.
The method for the acquisition outside input that terminal can be supported, it is essentially all that the i.e. sensor group of the hardware of terminal in itself obtains
The information taken, such as gravity sensor, temperature sensor, the sensor of touch screen potential change is measured, is obtained based on these sensors
Take the input of outside;Certainly some information, such as mouse movement rule, the password of input can be also directly obtained by data-interface
Deng the application of this programme can be made to be expanded to some terminals (such as home computer etc.) for not having the sensor.
As a further improvement, it is selected treat security applications after, using itself and another as surface program application
Program is bound, while the icon hiding that will treat security applications;When user normally clicks on surface program, handset starting surface
Program, when user is using secrecy operation, handset starting treats security applications, for example, normally clicking on one-time surface program, then opens
Dynamic surface program, and in the operation that maintains secrecy, quickly click two subsurface programs/length and press surface program, be then considered as user and require to start
Security applications are treated, then now handset starting is not surface program but treats secure routine;Secure routine is treated in this way, can hide,
Also other surface programs can normally be started, privacy degrees are higher.
Embodiment based on invention, a kind of secrecy operating system of application program, including:Selecting module, for selecting to answer
With program and it is marked to treat security applications;Input module, meet for obtaining described in outside input and the binding of preparatory condition
The function of security applications is treated, marks this to meet the outside input of preparatory condition and is operated for secrecy;Execution module, for detecting simultaneously base
The corresponding function for the treatment of security applications is performed in the secrecy operation.
System based on embodiment, in addition to switch module, the switch module are used to be provided for opening outside reception
The switch module of operation/shutoff operation is opened, then detects the secrecy operation when the switch module receives to open to operate, otherwise not
Detect the secrecy operation.
System based on embodiment, the selecting module, it is additionally operable to select application program and marks it to treat security applications,
Security applications and another application programmatic binding are treated by described, the another application program is marked as surface program and hides described treat
Security applications.
System based on embodiment, in addition to recovery module, the recovery module are used to be provided for removing binding relationship
Reduction component.
System based on embodiment, the input module by sensor obtain described in meet the outside input of preparatory condition
And the function of security applications is treated described in binding.
It is described above, simply presently preferred embodiments of the present invention, the invention is not limited in above-mentioned embodiment, as long as
It reaches the technique effect of the present invention with identical means, should all belong to protection scope of the present invention.In the protection model of the present invention
Its technical scheme and/or embodiment can have a variety of modifications and variations in enclosing.
Claims (10)
1. the secrecy operating method of a kind of application program, it is characterised in that including step:
Selection application program simultaneously marks it to treat security applications;
The function that security applications are treated described in the outside input for meeting preparatory condition and binding is obtained, marks this to meet preparatory condition
Outside input operates for secrecy;
Detect and the corresponding function for the treatment of security applications is performed based on the secrecy operation.
2. the secrecy operating method of a kind of application program according to claim 1, it is characterised in that also include being provided for
The switch module of unlatching operation/shutoff operation outside receiving, the guarantor is then detected when the switch module receives to open to operate
Close operation, the secrecy operation is not otherwise detected.
3. the secrecy operating method of a kind of application program according to claim 1 or 2, it is characterised in that also include selection
Application program simultaneously marks it to treat security applications, treats security applications and another application programmatic binding by described, marks described another
Application program is surface program and hides and described treat security applications.
4. the secrecy operating method of a kind of application program according to claim 3, it is characterised in that also include being provided for
Remove the reduction component of binding relationship.
5. the secrecy operating method of a kind of application program according to claim 1 or 4, it is characterised in that pass through sensor
Meet the function that security applications are treated described in the outside input of preparatory condition and binding described in acquisition.
A kind of 6. secrecy operating system of application program, it is characterised in that including:
Selecting module, for selecting application program and marking it to treat security applications;
Input module, meet for obtaining preparatory condition outside input and binding described in treat the functions of security applications, mark should
The outside input for meeting preparatory condition operates for secrecy;
Execution module, for detecting and performing the corresponding function for the treatment of security applications based on the secrecy operation.
7. the secrecy operating system of a kind of application program according to claim 6, it is characterised in that also including switching molding
Block, the switch module for unlatching operation/shutoff operation that the switch module is used to be provided for outside reception, when the switches set
Part, which receives to open to operate, then detects the secrecy operation, does not otherwise detect the secrecy operation.
A kind of 8. secrecy operating system of application program according to claim 6 or 7, it is characterised in that the selection mould
Block, it is additionally operable to select application program and marks it to treat security applications, security applications and another application programmatic binding are treated by described,
The another application program is marked as surface program and hides and described treats security applications.
9. the secrecy operating system of a kind of application program according to claim 8, it is characterised in that also include reduction mould
Block, the recovery module are used to be provided for the reduction component for removing binding relationship.
A kind of 10. secrecy operating system of application program according to claim 6 or 9, it is characterised in that the input mould
Block by sensor obtain described in meet preparatory condition outside input and binding described in treat the functions of security applications.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711044020.9A CN107729722A (en) | 2017-10-31 | 2017-10-31 | The secrecy operating method and system of a kind of application program |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711044020.9A CN107729722A (en) | 2017-10-31 | 2017-10-31 | The secrecy operating method and system of a kind of application program |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107729722A true CN107729722A (en) | 2018-02-23 |
Family
ID=61202459
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711044020.9A Pending CN107729722A (en) | 2017-10-31 | 2017-10-31 | The secrecy operating method and system of a kind of application program |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107729722A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104933343A (en) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | Secrecy method and apparatus of application program, and electronic device |
US20160232334A1 (en) * | 2015-02-06 | 2016-08-11 | Macpaw Inc. | System and method for software activation and license tracking |
CN106484231A (en) * | 2016-09-30 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application hides |
CN106844023A (en) * | 2016-12-26 | 2017-06-13 | 努比亚技术有限公司 | The implicit operating method and mobile terminal of a kind of application program |
-
2017
- 2017-10-31 CN CN201711044020.9A patent/CN107729722A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160232334A1 (en) * | 2015-02-06 | 2016-08-11 | Macpaw Inc. | System and method for software activation and license tracking |
CN104933343A (en) * | 2015-07-01 | 2015-09-23 | 京东方科技集团股份有限公司 | Secrecy method and apparatus of application program, and electronic device |
CN106484231A (en) * | 2016-09-30 | 2017-03-08 | 宇龙计算机通信科技(深圳)有限公司 | A kind of method and device of application hides |
CN106844023A (en) * | 2016-12-26 | 2017-06-13 | 努比亚技术有限公司 | The implicit operating method and mobile terminal of a kind of application program |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110210186A (en) * | 2018-02-28 | 2019-09-06 | 上海爱优威软件开发有限公司 | A kind of latent function starting method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104182662B (en) | Hiding and deployment method, system and the mobile terminal of hide application program | |
WO2017020427A1 (en) | Application program access method and terminal | |
CN104866752B (en) | A kind of application guard method and user terminal | |
CN104424412A (en) | Method for protecting information in intelligent terminal, page switching method and intelligent terminal | |
CN104951685A (en) | Method and mobile terminal for running application programs | |
CN105426717A (en) | Interface display method and apparatus | |
CN105677222B (en) | Application message methods of exhibiting, application message show device and terminal | |
CN106843729A (en) | A kind of terminal control method and terminal | |
US10789372B2 (en) | Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device | |
CN106203011A (en) | The method and apparatus entering operating system desktop | |
CN105809000A (en) | Information processing method and electronic device | |
CN108460259B (en) | Information processing method and device and terminal | |
CN105825104B (en) | A kind of method for processing business and electronic equipment based on fingerprint recognition | |
CN106484231A (en) | A kind of method and device of application hides | |
CN105094874A (en) | Application starting method and system | |
CN107798231A (en) | Display methods, device, terminal and the storage medium of operation interface | |
CN105912896A (en) | Application switching method and terminal | |
CN107272949A (en) | Method of controlling operation thereof and device, computer installation and storage medium | |
CN104951677B (en) | Information processing method and device | |
CN104318137A (en) | Activating or switching method, device and terminal for operating system and/or application program | |
CN105447365A (en) | Control based privacy protection method and user terminal | |
CN108664279A (en) | A kind of method and apparatus based on the application of fingerprint recognition synchronous averaging | |
CN107291287B (en) | Method for enabling or disabling operation authority of handheld device | |
CN107729722A (en) | The secrecy operating method and system of a kind of application program | |
CN105335088A (en) | File sharing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180223 |