CN111142973A - Information processing method, device, electronic equipment and medium - Google Patents

Information processing method, device, electronic equipment and medium Download PDF

Info

Publication number
CN111142973A
CN111142973A CN201911422639.8A CN201911422639A CN111142973A CN 111142973 A CN111142973 A CN 111142973A CN 201911422639 A CN201911422639 A CN 201911422639A CN 111142973 A CN111142973 A CN 111142973A
Authority
CN
China
Prior art keywords
target application
mode
application
starting
running
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911422639.8A
Other languages
Chinese (zh)
Other versions
CN111142973B (en
Inventor
刘龙飞
冯荣峰
常程
黄世光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201911422639.8A priority Critical patent/CN111142973B/en
Publication of CN111142973A publication Critical patent/CN111142973A/en
Application granted granted Critical
Publication of CN111142973B publication Critical patent/CN111142973B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure provides a method of information processing, comprising: the method comprises the steps of obtaining a starting operation aiming at a target application, wherein the starting operation is used for indicating the target application to run in a first running mode, responding to the starting operation, starting the target application and enabling the target application to run in the first running mode, and preventing the target application from binding an electronic device with the target application. In addition, the present disclosure also provides an information processing apparatus, an electronic device, and a medium.

Description

Information processing method, device, electronic equipment and medium
Technical Field
The present disclosure relates to a method, an apparatus, an electronic device, and a medium for information processing.
Background
By using the application program installed in the electronic equipment, various requirements of the user, such as information browsing requirements, video playing requirements and picture processing requirements, can be met.
However, in the process of using the application by the user, the generated browsing traces, i.e. browsing records, are left in the internet or the electronic device, and the browsing records inevitably have a leakage risk, and once the privacy information of the user is leaked, the user is given an unimaginable loss.
Disclosure of Invention
One aspect of the present disclosure provides a method of information processing, including: the method comprises the steps of obtaining a starting operation aiming at a target application, wherein the starting operation is used for indicating the target application to run in a first running mode, and responding to the starting operation, starting the target application and running the target application in the first running mode so as to prevent the target application from binding electronic equipment with the target application.
Optionally, the obtaining the start operation for the target application includes: the method comprises the steps of obtaining a target application determined by starting operation under the condition that the electronic equipment activates a privacy protection mode, determining that the target application runs in a first running mode under the condition that the target application belongs to a protection application list, and determining that the target application runs in a second running mode under the condition that the target application does not belong to the protection application list, wherein the first running mode is different from the second running mode.
Optionally, the obtaining the start operation for the target application includes: and obtaining a starting operation, determining the target application based on the starting operation and determining the running mode to be the first running mode.
Optionally, the starting the target application in response to the starting operation and the target application running in the first running mode includes: and under the condition that the target application reads the equipment identifier of the electronic equipment, providing a random equipment identifier, wherein the random equipment identifier is different from the real equipment identifier of the electronic equipment.
Optionally, the starting the target application in response to the starting operation and the target application running in the first running mode further includes at least one of: providing a virtual geographical position when the target application reads the geographical position of the electronic equipment, wherein the virtual geographical position is different from the current geographical position of the electronic equipment, providing a virtual network card address when the target application reads the network card address of the electronic equipment, wherein the virtual network card address is different from the physical address of the network card of the electronic equipment, intercepting the associated start to prohibit starting other applications when the target application associates and starts other applications, and shielding the notification message when the notification message pushed by the server of the target application is obtained.
Optionally, the starting the target application in response to the starting operation and the target application running in the first running mode includes: and starting the body-separating application of the target application, wherein the body-separating application interacts with the server side of the target application based on the random equipment identification.
Optionally, the method further includes: and when the target application is operated and quitted in the first operation mode, clearing the input data generated by the operation of the target application in the first operation mode and the response data of the server of the target application responding to the input data.
One aspect of the present disclosure provides an apparatus for information processing, including: the electronic device comprises an obtaining module and a starting module, wherein the obtaining module is configured to obtain a starting operation aiming at a target application, the starting operation is used for indicating the target application to run in a first running mode, and the starting module is configured to respond to the starting operation, start the target application and enable the target application to run in the first running mode, so that the target application is prevented from binding the electronic device with the target application.
Optionally, the obtaining module is configured to: the method comprises the steps of obtaining a target application determined by starting operation under the condition that the electronic equipment activates a privacy protection mode, determining that the target application runs in a first running mode under the condition that the target application belongs to a protection application list, and determining that the target application runs in a second running mode under the condition that the target application does not belong to the protection application list, wherein the first running mode is different from the second running mode.
Optionally, the obtaining module is configured to: and obtaining a starting operation, determining the target application based on the starting operation and determining the running mode to be the first running mode.
Optionally, the starting module is configured to: and under the condition that the target application reads the equipment identifier of the electronic equipment, providing a random equipment identifier, wherein the random equipment identifier is different from the real equipment identifier of the electronic equipment.
Optionally, the starting module is further configured to at least one of: providing a virtual geographical position when the target application reads the geographical position of the electronic equipment, wherein the virtual geographical position is different from the current geographical position of the electronic equipment, providing a virtual network card address when the target application reads the network card address of the electronic equipment, wherein the virtual network card address is different from the physical address of the network card of the electronic equipment, intercepting the associated start to prohibit starting other applications when the target application associates and starts other applications, and shielding the notification message when the notification message pushed by the server of the target application is obtained.
Optionally, the obtaining module is configured to: and starting the body-separating application of the target application, wherein the body-separating application interacts with the server side of the target application based on the random equipment identification.
Optionally, the apparatus further includes a clearing module configured to clear input data generated by the target application operating in the first operation mode and response data of the server of the target application responding to the input data when the target application is operating in the first operation mode and exits.
One aspect of the present disclosure provides an electronic device including: a display screen; one or more processors; and memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of the above.
One aspect of the disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, implement the method of any one of the above.
According to the information processing method, before the application is started, the operation mode of the application when the application is started can be determined, so that the server corresponding to the application program cannot push the content based on the browsing record when the application is operated, the electronic equipment cannot acquire the information of the user in the process that the user uses the application program of the electronic equipment, and the content is pushed according to the information of the user, so that the privacy information of the user is protected.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows a system architecture of a method of information processing according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow diagram of a method of information processing according to an embodiment of the present disclosure;
fig. 3 schematically shows an effect diagram of a method of information processing according to an embodiment of the present disclosure;
FIG. 4 schematically shows a block diagram of an apparatus for information processing according to an embodiment of the present disclosure; and
fig. 5 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable screen capture image generation apparatus such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The present disclosure provides a method of information processing comprising an acquisition phase and a start-up phase. In the obtaining phase, a start operation for the target application is obtained, the start operation being used to instruct the target application to run in the first running mode. In the starting phase, in response to a starting operation, the target application is started and the target application is operated in a first operation mode to prevent the target application from binding the electronic device with the target application. Before the target application is started, the running mode of the target application when the target application is started can be determined, so that the server corresponding to the target application cannot push content to a user based on browsing records generated when the target application runs, and the safety of private information of the user is effectively protected.
Fig. 1 schematically shows a system architecture 100 of a method of information processing according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the message processing method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the message processing system provided by the disclosed embodiments may be generally disposed in the server 105. The message processing method provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the message processing system provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically shows a flow chart of a method of information processing according to an embodiment of the present disclosure.
As shown in fig. 2, the information processing method includes operations S210 and S220.
In operation S210, a start operation for the target application is obtained, and the start operation is used to instruct the target application to run in the first running mode.
According to an embodiment of the present disclosure, the target application may be any application program installed in the electronic device. The electronic device may be a terminal device (as shown in fig. 1) with an android system installed, an application installed in the electronic device, a system-level application, or a non-system-level application. The target application in this disclosure may be a non-system level application. Different applications have different operating conditions.
For example, some applications need to obtain login information of a user, and even require the user to perform real-name authentication to log in the application. By acquiring the personal information of the user and combining the operation behavior data generated by the user in using the application program, the personalized content push can be performed on the user according to the preference or the operation habit of the user.
In operation S220, in response to the start operation, the target application is started and the target application is executed in the first operation mode to prevent the target application from binding the electronic device having the target application.
According to the embodiment of the disclosure, the target application may have a first operation mode, and in the first operation mode, the target application cannot bind the electronic device having the target application.
By the embodiment of the disclosure, the running mode of the application when the application is started can be determined before the application is started, so that the server corresponding to the application program cannot push the content based on the browsing record when the application is running, the electronic equipment cannot acquire the information of the electronic equipment in the process of using the application program of the electronic equipment, and the content is pushed according to the information of the user, thereby protecting the privacy information of the user.
As an alternative embodiment, obtaining the start operation for the target application includes: the method comprises the steps of obtaining a target application determined by starting operation under the condition that the electronic equipment activates a privacy protection mode, determining that the target application runs in a first running mode under the condition that the target application belongs to a protection application list, and determining that the target application runs in a second running mode under the condition that the target application does not belong to the protection application list.
According to the embodiment of the disclosure, in the case that the electronic device activates the privacy protection mode, the applications belonging to the protected application list will be operated in the first operation mode, and the applications not belonging to the protected application list will be operated in the second operation mode. The second mode of operation, the normal mode of operation, is different from the first mode of operation. Specifically, when the target application operates in the first operation mode, the target application can be prevented from binding the electronic device with the target application, and when the target application operates in the second operation mode, the target application cannot be prevented from binding the electronic device with the target application.
Accordingly, in the case where the privacy-preserving mode is not activated by the electronic device, all applications of the electronic device will run in the second operating mode.
According to the embodiment of the disclosure, by judging whether the electronic equipment is in the privacy protection mode, the starting operation for the target application is obtained under the condition that the privacy protection mode is activated, the judgment of the starting mode of the target application is realized from the aspect of the running mode of the electronic equipment, and the intelligence of the electronic equipment is improved.
As an alternative embodiment, obtaining the start operation for the target application includes: obtaining a start operation; the target application is determined based on the launch operation and the operational mode is determined to be a first operational mode.
According to the embodiment of the disclosure, the starting operation can be long pressing or pressure acting on the icon to trigger the menu, and according to the prompt of the menu, the starting operation is lifted after sliding to the menu of 'traceless browsing' without leaving, and is an action.
According to the embodiment of the disclosure, the starting operation can also be an operation of pressing or pressing on the icon to trigger the menu, then leaving, and then clicking to lift after the traceless browsing.
Fig. 3 schematically illustrates an effect diagram of a start-up operation for a target application according to an embodiment of the present disclosure. As shown in fig. 3, a long press on the icon of "target application" may trigger a menu on which options including "seamless browsing", "clear application data", and "application information" are displayed. The user clicks to 'seamless browsing' and then lifts up to start the target application to start the first running mode.
Through the embodiment of the disclosure, the determination of the running mode of the target application can be realized through different starting operations, and the implementation mode is flexible.
As an alternative embodiment, in response to the start operation, starting the target application and running the target application in the first running mode includes: in case the target application reads a device identification of the electronic device, a random device identification is provided, wherein the random device identification is different from a real device identification of the electronic device.
According to an embodiment of the present disclosure, the device identification of the electronic device may be an International Mobile Equipment Identity (IMEI). Taking a mobile phone as an example, the device identifier refers to a serial number of the mobile phone and a serial number of the mobile phone, and is used for identifying mobile communication devices such as each independent mobile phone in a mobile phone network, and is equivalent to an identity card of the mobile phone.
Through the embodiment of the disclosure, based on the random device identifier, the target application can be prevented from being associated with the real electronic device, so that when the electronic device runs in the first running mode, the information generated by the operation of the user on the target application is not corresponding to the real device information, and the content push based on the information generated by the operation is also meaningless.
As an alternative embodiment, in response to the start operation, the target application is started and the target application runs in the first running mode, in addition to providing the random device identifier when the target application reads the device identifier of the electronic device, the target application may also provide the virtual related information when the target application reads the related information of the electronic device, so that the target application runs in a virtual running environment, which is different from the real running environment. Because of the random device identification and the virtual related information, the method is instant and irregular. Therefore, even if the target application obtains the operation behavior of the user, the operation behavior of the user obtained in the virtual execution environment cannot be associated with the user, and the content push to the user cannot be naturally achieved.
Optionally, the relevant information for the virtual may include, but is not limited to, a virtual geographic location and a virtual network card address. In particular, in case the target application reads the geographical location of the electronic device, a virtual geographical location is provided. And providing the virtual network card address under the condition that the target application reads the network card address of the electronic equipment.
According to an embodiment of the present disclosure, the virtual geographical location is different from a geographical location where the electronic device is currently located.
Optionally, for the domestic user, an address different from the current geographical location of the electronic device in the continental china may be randomly generated as the virtual geographical location, and an address at any overseas may also be randomly generated as the virtual geographical location.
Similarly, for overseas users, an address different from the current geographical location of the electronic device in overseas may be randomly generated as the virtual geographical location, or an address within any one of the continents of china may be randomly generated as the virtual geographical location.
According to an embodiment of the present disclosure, the virtual network card address is different from a physical address of a network card of the electronic device. The virtual network card address may be a Media Access Control (MAC) address, and provides a virtual network card address, where the virtual physical address is different from a real physical address of the electronic device.
According to an embodiment of the present disclosure, in response to the start operation, starting the target application and the target application running in the first operation mode further comprises: a virtual Service Set Identifier (SSID) is provided.
As an alternative embodiment, in response to the start operation, the target application is started and the target application runs in the first running mode, in addition to providing the random device identifier when the target application reads the device identifier of the electronic device, providing the virtual related information when the target application reads the related information of the electronic device, in addition to intercepting the associated start to prohibit starting other applications when the target application associated starts other applications. Even in the case of obtaining the notification message pushed by the server side of the target application, the notification message can be shielded.
Through the embodiment of the disclosure, in the case that the target application reads the related information of the electronic device, the virtual related information can be provided, and the association between a single user and the operation behavior can be blocked. By intercepting the associated start-up and/or masking notification messages, the first mode of operation of the target application may be sanitized, avoiding the generation of redundant information.
As an alternative embodiment, in response to the start operation, starting the target application and running the target application in the first running mode includes: and starting the body-separating application of the target application.
According to the embodiment of the disclosure, the self-body application interacts with the server side of the target application based on the random equipment identification. And starting a new secondary application by using the application self-identification technology, wherein the secondary application provides a random equipment identifier under the condition that the secondary application reads the equipment identifier of the electronic equipment, and the random equipment identifier is different from the real equipment identifier of the electronic equipment.
It should be noted that the avatar application needs to have a corresponding target application when being created, and may not have a corresponding target application after being created.
According to the embodiment of the disclosure, the split-body application interacts with the server of the target application based on the random equipment identifier, the random equipment identifier is a virtual equipment identifier, and the server cannot obtain a real equipment identifier, so that the operation behavior of the user executed on the split-body application cannot be associated with the user, and the user information leakage can be avoided.
As an alternative embodiment, the method further comprises: and in the case that the target application is exited by running in the first running mode, clearing the input data generated by running in the first running mode by the target application and the response data of the server of the target application responding to the input data.
According to the embodiment of the disclosure, when the user exits the target application, the target application is reset to clear various data generated by the target application in the first operation mode, and information generated in the process of using the target application by the user, such as browsing records, search records, MAC addresses, SSIDs, location information, account information and other personal information, is not left on the internet and the electronic device.
According to the embodiment of the disclosure, the time length of the target application running in the first running mode may be recorded, or the time length of the target application running in the first running mode may not be recorded. If so, clearing the recorded use duration under the condition that the target application is operated and quitted in the first operation mode.
It should be noted that the various data generated by the target application in the first operation mode are generated in the virtual operation environment. The various data generated by the target application in the second mode of operation are generated in the real operating environment. The virtual operating environment and the real operating environment are mutually isolated and do not interfere with each other. Therefore, various data generated in the virtual operating environment are cleared, and various data generated in the real operating environment are not influenced.
In the related art, when a user starts a target application, input data generated in the running process of the target application and response data of a server of the target application responding to the input data are not cleared after the target application exits. Therefore, when the user enters the target application program again, the user can see the previous browsing records.
According to the embodiment of the disclosure, a user starts the body-separated application of the target application or starts the first operation mode of the target application, and input data generated when the target application operates in the first operation mode and response data of the server of the target application responding to the input data are cleared. Therefore, when the user enters the target application program again, the user cannot see the previous browsing history.
By the embodiment of the disclosure, the seamless browsing effect in the application program can be realized by clearing the input data generated by the target application running in the first running mode and the response data of the server of the target application responding to the input data.
Fig. 4 schematically shows a block diagram of an apparatus for information processing according to an embodiment of the present disclosure.
As shown in fig. 4, the apparatus 400 may include an obtaining module 410 and an initiating module 420.
An obtaining module 410 is configured to obtain a start operation for the target application, where the start operation is used to instruct the target application to run in the first running mode.
The starting module 420 is configured to start the target application and the target application is operated in the first operation mode in response to a starting operation, so as to prevent the target application from binding the electronic device having the target application.
By the embodiment of the disclosure, the running mode of the application when the application is started can be determined before the application is started, so that the server corresponding to the application program cannot push the content based on the browsing record when the application is running, the electronic equipment cannot acquire the information of the user in the process of using the application program of the electronic equipment by the user, and the content is pushed according to the information of the user, thereby protecting the privacy information of the user.
As an alternative embodiment, the obtaining module 410 is configured to: the method comprises the steps of obtaining a target application determined by starting operation under the condition that the electronic equipment activates a privacy protection mode, determining that the target application runs in a first running mode under the condition that the target application belongs to a protection application list, and determining that the target application runs in a second running mode under the condition that the target application does not belong to the protection application list, wherein the first running mode is different from the second running mode.
According to the embodiment of the disclosure, by judging whether the electronic equipment is in the privacy protection mode, the starting operation for the target application is obtained under the condition that the privacy protection mode is activated, the judgment of the starting mode of the target application is realized from the aspect of the running mode of the electronic equipment, and the intelligence of the electronic equipment is improved.
As an alternative embodiment, the obtaining module 410 is configured to: obtaining a starting operation, determining a target application based on the starting operation and determining the running mode to be a first running mode.
As an alternative embodiment, the start module is configured to: in case the target application reads a device identification of the electronic device, a random device identification is provided, wherein the random device identification is different from a real device identification of the electronic device.
Through the embodiment of the disclosure, the determination of the running mode of the target application can be realized through different starting operations, and the implementation mode is flexible.
As an optional embodiment, the start module is further configured to at least one of: providing a virtual geographical position under the condition that a target application reads the geographical position of the electronic equipment, wherein the virtual geographical position is different from the current geographical position of the electronic equipment, providing a virtual network card address under the condition that the target application reads the network card address of the electronic equipment, wherein the virtual network card address is different from the physical address of the network card of the electronic equipment, intercepting associated start to prohibit starting other applications under the condition that the target application is associated with starting other applications, and shielding a notification message under the condition that the notification message pushed by a server of the target application is obtained.
Through the embodiment of the disclosure, based on the random device identifier, the target application can be prevented from being associated with the real electronic device, so that when the electronic device runs in the first running mode, the information generated by the operation of the user on the target application is not corresponding to the real device information, and the content push based on the information generated by the operation is also meaningless.
As an alternative embodiment, the obtaining module is configured to: and starting the body-separating application of the target application, wherein the body-separating application is interacted with the server side of the target application based on the random equipment identification.
According to the embodiment of the disclosure, the split-body application interacts with the server of the target application based on the random equipment identifier, the random equipment identifier is a virtual equipment identifier, and the server cannot obtain a real equipment identifier, so that the operation behavior of the user executed on the split-body application cannot be associated with the user, and the user information leakage can be avoided.
As an alternative embodiment, the apparatus further includes a clearing module, in addition to the obtaining module 410 and the starting module 420, configured to clear the input data generated by the target application running in the first running mode and the response data of the server response input data of the target application in case that the target application exits from running in the first running mode.
By the embodiment of the disclosure, the seamless browsing effect in the application program can be realized by clearing the input data generated by the target application running in the first running mode and the response data of the server of the target application responding to the input data.
Fig. 5 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, the electronic device 500 includes a processor 510, a computer-readable storage medium 520, and a display screen 530. The electronic device 500 may perform a method according to an embodiment of the present disclosure.
In particular, processor 510 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 510 may also include on-board memory for caching purposes. Processor 510 may be a single processing unit or a plurality of processing units for performing different actions of a method flow according to embodiments of the disclosure.
Computer-readable storage media 520, for example, may be non-volatile computer-readable storage media, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 520 may include a computer program 521, which computer program 521 may include code/computer-executable instructions that, when executed by the processor 510, cause the processor 510 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 521 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 521 may include one or more program modules, including for example 521A, modules 521B, … …. It should be noted that the division and number of modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, and when these program modules are executed by the processor 510, the processor 510 may execute the method according to the embodiment of the present disclosure or any variation thereof.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (10)

1. A method of information processing, comprising:
obtaining a starting operation aiming at a target application, wherein the starting operation is used for indicating the target application to run in a first running mode; and
in response to the start operation, the target application is started and the target application is run in the first running mode to prevent the target application from binding the electronic device having the target application.
2. The method of claim 1, wherein the obtaining a launch operation for a target application comprises:
under the condition that the electronic equipment activates a privacy protection mode, obtaining a target application determined by the starting operation;
determining that the target application operates in the first operation mode under the condition that the target application belongs to a protected application list; and
and determining that the target application runs in a second running mode under the condition that the target application does not belong to the protection application list, wherein the first running mode is different from the second running mode.
3. The method of claim 1, wherein the obtaining a launch operation for a target application comprises:
obtaining a start operation;
and determining the target application and determining the running mode to be the first running mode based on the starting operation.
4. The method of claim 2 or 3, wherein said launching the target application and running the target application in the first mode of operation in response to the launch operation comprises:
and under the condition that the target application reads the equipment identification of the electronic equipment, providing a random equipment identification, wherein the random equipment identification is different from the real equipment identification of the electronic equipment.
5. The method of claim 4, wherein the launching of the target application and the running of the target application in the first mode of operation in response to the launching operation further comprises at least one of:
providing a virtual geographical position under the condition that the target application reads the geographical position of the electronic equipment, wherein the virtual geographical position is different from the current geographical position of the electronic equipment;
providing a virtual network card address under the condition that the target application reads the network card address of the electronic equipment, wherein the virtual network card address is different from the physical address of the network card of the electronic equipment;
intercepting the associated start to prohibit starting of other applications under the condition that the target application is associated with starting of other applications;
and shielding the notification message under the condition of obtaining the notification message pushed by the server side of the target application.
6. The method of claim 2 or 3, wherein said launching the target application and running the target application in the first mode of operation in response to the launch operation comprises:
and starting the body-separating application of the target application, wherein the body-separating application interacts with a server of the target application based on random equipment identification.
7. The method of claim 5 or 6, wherein the method further comprises:
and in the case that the target application exits from running in the first running mode, clearing the input data generated by running the target application in the first running mode and the response data of the server of the target application responding to the input data.
8. An apparatus for information processing, comprising:
the device comprises an obtaining module, a starting module and a display module, wherein the obtaining module is configured to obtain starting operation aiming at a target application, and the starting operation is used for indicating the target application to run in a first running mode; and
a starting module configured to start the target application and the target application is operated in the first operation mode in response to the starting operation, so as to prevent the target application from binding the electronic device having the target application.
9. An electronic device, comprising:
a display screen; and
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-7.
10. A computer-readable storage medium storing computer-executable instructions that, when executed, implement the method of any one of claims 1 to 7.
CN201911422639.8A 2019-12-31 2019-12-31 Information processing method, device, electronic equipment and medium Active CN111142973B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911422639.8A CN111142973B (en) 2019-12-31 2019-12-31 Information processing method, device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911422639.8A CN111142973B (en) 2019-12-31 2019-12-31 Information processing method, device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN111142973A true CN111142973A (en) 2020-05-12
CN111142973B CN111142973B (en) 2022-05-31

Family

ID=70523041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911422639.8A Active CN111142973B (en) 2019-12-31 2019-12-31 Information processing method, device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN111142973B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113805972A (en) * 2021-09-24 2021-12-17 维沃移动通信有限公司 Application running method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750465A (en) * 2011-03-21 2012-10-24 微软公司 Information privacy system and method
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN104102358A (en) * 2014-07-18 2014-10-15 北京奇虎科技有限公司 Privacy information protecting method and privacy information protecting device
CN106095464A (en) * 2016-06-23 2016-11-09 努比亚技术有限公司 A kind of method and device of the seamless operation of application program
CN106845270A (en) * 2017-01-17 2017-06-13 北京奇虎科技有限公司 A kind of seamless browsing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750465A (en) * 2011-03-21 2012-10-24 微软公司 Information privacy system and method
CN103678175A (en) * 2013-12-05 2014-03-26 长城信息产业股份有限公司 Address concealing method and embedded equipment based on address concealing technology
CN104102358A (en) * 2014-07-18 2014-10-15 北京奇虎科技有限公司 Privacy information protecting method and privacy information protecting device
CN106095464A (en) * 2016-06-23 2016-11-09 努比亚技术有限公司 A kind of method and device of the seamless operation of application program
CN106845270A (en) * 2017-01-17 2017-06-13 北京奇虎科技有限公司 A kind of seamless browsing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113805972A (en) * 2021-09-24 2021-12-17 维沃移动通信有限公司 Application running method and device

Also Published As

Publication number Publication date
CN111142973B (en) 2022-05-31

Similar Documents

Publication Publication Date Title
WO2018019241A1 (en) Update processing method and device for terminal application, and computer storage medium
JP6915091B2 (en) Application processing methods, equipment and storage media
US11245725B2 (en) Dynamically updating policy controls for mobile devices and applications
EP2562667A1 (en) Apparatus and method for providing security information on background process
CN104468551A (en) Method and device for saving traffic based on advertisement blocking
US9973513B2 (en) Method and apparatus for communication number update
CN112165482B (en) Data processing method, data processing device, computer equipment and medium
US10516690B2 (en) Physical device detection for a mobile application
WO2014090088A1 (en) Method, server, and system for data sharing in social networking service
US20180209807A1 (en) Moving track sharing method and apparatus, and storage medium
US20230015289A1 (en) Web Activity Concealment
CN104639521A (en) Application safety verification method and system, application server and application client
CN111142973B (en) Information processing method, device, electronic equipment and medium
CN108762983B (en) Multimedia data recovery method and device
US20140040345A1 (en) Determining presence status based on user analytics data
CN108289056B (en) Method and device for sharing dynamic chart and computing equipment
KR20110129573A (en) Systems and methods for information extraction based mobile device forensic
US8631090B2 (en) Resource-conserving technique for as-available data delivery to a mobile device
US9578460B2 (en) Determining if a target device is collocated with other devices in a user's contacts list using movement vectors
CN116089924A (en) Method, device, computer equipment and storage medium for accessing permission data
CN108897639B (en) File processing method and device
CN114764349A (en) Control method, device, medium and electronic equipment for cross-application running of sub-applications
JP2013145511A (en) Api execution controller and program
KR102368826B1 (en) Cloud Server And Method of Thereof
US20120157070A1 (en) System and method to execute instructions on mobile devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant