CN116680737A - Application hiding management method, terminal and medium - Google Patents
Application hiding management method, terminal and medium Download PDFInfo
- Publication number
- CN116680737A CN116680737A CN202310652735.1A CN202310652735A CN116680737A CN 116680737 A CN116680737 A CN 116680737A CN 202310652735 A CN202310652735 A CN 202310652735A CN 116680737 A CN116680737 A CN 116680737A
- Authority
- CN
- China
- Prior art keywords
- application
- verification information
- hiding
- foreground
- hidden
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 23
- 238000012795 verification Methods 0.000 claims abstract description 145
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000004590 computer program Methods 0.000 claims description 7
- 230000015654 memory Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 6
- 238000012217 deletion Methods 0.000 description 4
- 230000037430 deletion Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 210000000554 iris Anatomy 0.000 description 4
- 238000012545 processing Methods 0.000 description 2
- 238000005336 cracking Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
The invention provides an application hiding management method, a terminal and a medium, which relate to the technical field of computers and are used for solving the problem that the prior art lacks effective protection means for applications, wherein the method comprises the following steps: receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction; receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface; and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information. The invention provides the hidden management for the hidden application through the foreground application, improves the protection of important application data through secondary verification, can effectively improve the security of user privacy data and avoids the loss caused by the theft of the user privacy data.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an application hiding management method, a terminal, and a computer readable storage medium.
Background
With the rapid development of science and technology, the functions of smart phones are becoming perfect, more and more people like to use smart phones, store various information such as photos, videos, short messages and the like in the smart phones, even have some private information, and possibly have some property information in some APP (Application, third party Application). The protection of this information is becoming increasingly important to mobile phone users, and has to be subject to half-point flash. Therefore, how to effectively protect the private information of the mobile phone user is a problem to be solved.
However, in the prior art, encryption protection is performed on the user privacy data, only the user data is often protected, but an APP storing the user privacy data lacks an effective protection means, for example, protection is not paid attention to an application carrying a user fund for transferring in and out and a data stream source. When the user mobile phone is lost or taken by an lawbreaker, the lawbreaker can easily cause serious consequences of the user property being transferred or consumed by cracking the user mobile phone and application verification information or by stealing the user verification information in advance, and the like, thereby bringing loss to the user.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an application hiding management method, a terminal and a computer readable storage medium aiming at the defects of the prior art, so as to solve the problem that the prior art lacks effective protection means for applications.
In a first aspect, the present invention provides an application hiding management method, where the method includes an application starting step, specifically including:
receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface;
and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
Optionally, after the foreground application is started, the method further includes:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
Optionally, displaying a second verification information input interface in the foreground application interface, specifically including:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Optionally, before the application starting step, the method further comprises an application encrypting step, specifically comprising:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
Optionally, before the application starting step, the method further includes an application hanging step, specifically including:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
Optionally, after the applying the step of hanging, the method further includes an applying data hiding step, specifically including:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Optionally, after the step of applying data hiding, the method further comprises an application tracking step, specifically comprising:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
In a second aspect, the present invention provides a terminal, where the terminal includes an application starting module, and specifically includes:
the first display unit is used for receiving a starting instruction of the foreground application and displaying a first verification information input interface according to the starting instruction;
the second display unit is connected with the first display unit and is used for receiving the first verification information input through the first verification information input interface, starting a foreground application according to the first verification information and displaying a second verification information input interface in the foreground application interface;
the third display unit is connected with the second display unit and is used for receiving the second verification information input through the second verification information input interface and displaying and/or starting the secondary hiding application according to the second verification information.
Optionally, the terminal further includes:
the application encryption module is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module is connected with the application encryption module and used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module is connected with the application hanging module and is used for hiding all data of the application hanging on the foreground application;
the application tracking module is connected with the application data hiding module and the application starting module and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
In a third aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements an application hiding management method as described above.
The invention provides an application hiding management method, a terminal and a computer readable storage medium, which can realize that an important application for storing user privacy data is used as a secondary hiding application, after being hidden in a foreground application, the foreground application is called out to be verified according to conventions and the important application is verified, the foreground application is used for providing hiding management for the hiding application, the protection of the important application data is improved through the secondary verification, the safety of the user privacy data can be effectively improved, and the loss caused by stealing the user privacy data is avoided.
Drawings
FIG. 1 is a flow chart of an application hiding management method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another application hiding management method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal application starting module according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention, and are not limiting of the invention.
It is to be understood that the various embodiments of the invention and the features of the embodiments may be combined with each other without conflict.
It is to be understood that only the portions relevant to the present invention are shown in the drawings for convenience of description, and the portions irrelevant to the present invention are not shown in the drawings.
It should be understood that each unit and module in the embodiments of the present invention may correspond to only one physical structure, may be formed by a plurality of physical structures, or may be integrated into one physical structure.
It will be appreciated that the functions and steps noted in the flowcharts and block diagrams of the subject invention can occur out of the order noted in the figures without conflict.
It is to be understood that the flowcharts and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, devices, methods according to various embodiments of the present invention. Where each block in the flowchart or block diagrams may represent a unit, module, segment, code, or the like, which comprises executable instructions for implementing the specified functions. Moreover, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions, or by combinations of hardware and computer instructions.
It should be understood that the units and modules related in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
as shown in fig. 1 and 2, embodiment 1 of the present invention provides an application hiding management method, where the method at least includes an application starting step S5, specifically includes:
s51, receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
s52, receiving first verification information input through the first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in the foreground application interface;
and S53, receiving second verification information input through a second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
Specifically, in this embodiment, the method may be set in a terminal, to implement secure startup of a secondary hidden application preset in the terminal, where a specific startup process includes: after receiving a starting instruction of a user for a foreground application, the terminal displays a first verification information input interface according to the starting instruction; then, after receiving first verification information input by a user through a first verification information input interface, the terminal starts a foreground application according to the first verification information, and displays a second verification information input interface in the foreground application interface; finally, after receiving the second verification information input by the user through the second verification information input interface, the terminal displays and/or starts the secondary hiding application corresponding to the second verification information according to the second verification information. The method can be realized through the process: the important application for storing the user privacy data is used as a secondary hiding application, after the important application is hidden in the foreground application, the foreground application is required to be verified according to conventions and the important application is required to be verified, the foreground application provides hiding management for the hiding application, the protection of the important application data is improved through secondary verification, the safety of the user privacy data can be effectively improved, and the loss caused by the fact that the user privacy data is stolen is avoided. For example, APP (such as payment treasures, weChat, QQ, etc.) related to money transfer by the user is all invisible as secondary hiding applications, when the user enters the mobile phone system, the applications are invisible to the user, unauthorized users cannot see the applications related to property APP, and only the applications are visible when the user inputs a specific password in a specific state, so that even if the user is in the hands of the lawbreaker, the mobile phone of the user cannot steal money on the mobile phone application of the user, and the safety of property of the user on the mobile phone network is guaranteed to the greatest extent.
Optionally, after the foreground application is started, the method further includes:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
Specifically, in the present embodiment, the hiding applications include a primary hiding application and a secondary hiding application. When the user inputs the first verification information and opens the foreground application, the primary hidden application is displayed in the foreground application interface, and the user can send out a starting instruction of the primary hidden application by clicking an icon displayed in the foreground application interface by the primary hidden application. After the secondary hiding application is hidden on the foreground application interface, even if the foreground application is opened, the secondary hiding application is still invisible to the outside, and the secondary hiding application is visible after the user inputs the second verification information. After the hidden application is started, the display interface of the hidden application is not independently displayed at the terminal, but is displayed through the foreground application interface, after the use of the hidden application is completed, the hidden application can be stored in the background without being displayed on the current page, and after the hidden application enters the background storage mode, the hidden application can be awakened through switching the foreground application. By the setting, the application with different importance degrees can realize different hiding degrees in the foreground application, and display and start in different security verification modes.
Optionally, displaying a second verification information input interface in the foreground application interface, specifically including:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Specifically, in this embodiment, after the foreground application is started, the second verification information input interface is displayed in the foreground application interface together with the primary hidden application in the form of an icon/button/menu, and the user calls out the second verification information input interface by clicking the icon/button/menu, and then inputs the second verification information to call out the secondary hidden application, so as to further enhance the concealment of the secondary hidden application.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Specifically, in this embodiment, one foreground application may simultaneously correspond to a plurality of hidden applications, or may simultaneously correspond to a plurality of secondary hidden applications, and for the secondary hidden applications, since they need to be called through the second verification information, each secondary hidden application needs unique second verification information, and in order to improve security, the first verification information and the second verification information are also preset as different information.
Optionally, before the application starting step S5, the method further includes an application encrypting step S1, specifically including:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
Specifically, in this embodiment, before the application is started, the foreground application and the secondary hiding application need to set respective verification information first, the primary hiding application may also set own verification information, the verification information may be password information composed of letters, numbers, symbols, and the like, may also be biometric information such as fingerprints, irises, and the like, and the verification information of the foreground application and the secondary hiding application preferably meets different requirements, but the primary hiding application may not meet different requirements if the verification information is set.
Optionally, before the application starting step S5, the method further includes an application hanging step S2, specifically including:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
Specifically, in this embodiment, before the application is started, the secondary hiding application needs to be hung under the foreground application to implement secondary hiding, meanwhile, if there is a primary hiding application, the application encrypting step S1 and the application hanging step S2 need not limit the execution sequence, in the application hanging step S2, the application encrypting step S1 is inserted by prompting, so long as the application to be secondarily hidden has authentication information set before being hidden, the authentication information is implemented by encryption principle, specifically, the application can be encrypted in the form of fingerprint, iris or password, etc., the foreground application also needs to be set with authentication information, the time point of setting the authentication information need not be limited, and the authentication information can also be in the form of fingerprint, iris or password, etc. More specifically, verification of the foreground application can be realized in a login password mode, the application to be hidden is encrypted in various modes such as fingerprint, iris or password different from the foreground application, and the application to be hidden can be not encrypted if the application to be hidden is a primary hidden application. That is, there are three types of hidden applications that are ultimately formed: the first hidden application does not have verification information, and only the first hidden application is dragged to the foreground application for hiding, after a user inputs the first verification information to start the foreground application, the hidden application is displayed in an interface of the foreground application, and the user clicks a certain icon of the hidden application to start the corresponding hidden application; the second hidden application sets verification information, but once hiding is selected when the second hidden application is dragged to the foreground application, after a user inputs the first verification information to start the foreground application, the hidden application is displayed in an interface of the foreground application, and after the user clicks a certain icon of the hidden application, the user requests to input the second verification information, and after the user inputs the second verification information, the corresponding hidden application can be started; the third hidden application sets verification information, when the third hidden application drags the first hidden application to the foreground application, secondary hiding is selected, after a user inputs the first verification information to start the foreground application, the hidden application is not displayed in an interface of the foreground application, the user clicks an icon/button/menu and the like of a second verification information input interface displayed in the interface of the foreground application, the second verification information input interface is popped up, after the user inputs the second verification information, a certain hidden application corresponding to the input second verification information is displayed in the interface of the foreground application, or a certain hidden application corresponding to the input second verification information is directly started. Through the steps of hanging, the application is hidden in different management modes through the foreground application, particularly the secondary hiding application is hidden to a higher degree, and a non-terminal user cannot even know that the application exists on the terminal, so that the hidden effect is good, and the data security degree is high.
Optionally, after the application of the hitching step S2, the method further includes an application data hiding step S3, specifically including:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Specifically, in this embodiment, after the hidden application is hung on the foreground application, the terminal performs special processing on the data of the hidden application, and hides the data, such as the name, display information, operation parameters, and the like, of the hidden application, where the system setting and the like of the terminal are related to the hidden application, and other positions of the terminal are not displayed with any information of the application except the foreground application.
Optionally, after the application data hiding step S3, the method further includes an application tracking step S4, specifically including:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
Specifically, in this embodiment, after the hiding application is completed and hiding, the terminal further performs data tracking on the hiding application, for example, the application starting step S5 runs the data generated after the hiding application hung on the foreground application, and executes the application data hiding step S3 again to implement data hiding, and after receiving the deletion instruction on the application, deletes the corresponding application and data, including: if a deletion instruction of the hidden application hung on the foreground application is received, deleting the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application; if a deletion instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application, wherein the deletion mode improves the management authority and efficiency of the foreground application on the hidden application.
Example 2:
as shown in fig. 3 and 4, embodiment 2 of the present invention provides a terminal, where the terminal at least includes an application starting module 5, and specifically includes:
a first display unit 51, configured to receive a start instruction for a foreground application, and display a first verification information input interface according to the start instruction;
a second display unit 52 connected to the first display unit 51, for receiving the first authentication information input through the first authentication information input interface, starting the foreground application according to the first authentication information, and displaying a second authentication information input interface in the foreground application interface;
and a third display unit 53 connected to the second display unit 52, for receiving the second authentication information input through the second authentication information input interface, and displaying and/or starting the secondary hiding application according to the second authentication information.
Optionally, the terminal further includes:
the application encryption module 1 is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module 2 is connected with the application encryption module 1 and is used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module 3 is connected with the application leaning module 2 and is used for hiding all data of the application leaning on the foreground application for the hidden application leaning on the foreground application;
the application tracking module 4 is connected with the application data hiding module 3 and the application starting module 5, and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
Optionally, the second display unit 52 is further configured to display the primary hidden application in the foreground application interface;
the third display unit 53 is further configured to display the primary and/or secondary hidden application interface in the foreground application interface after the primary and/or secondary hidden application is started.
Optionally, the second display unit 52 is specifically further configured to:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Optionally, the application encryption module 1 specifically includes:
the first encryption unit is used for setting first verification information for the foreground application, wherein the first verification information can adopt password information or biological characteristic information;
the second encryption unit is used for setting second verification information for the application to be hidden, and the second verification information can adopt biological characteristic information or password information.
Optionally, the application hooking module 2 specifically comprises:
the option unit is used for displaying primary hiding options and secondary hiding options after detecting that the application to be hidden is dragged to the foreground application;
the first hiding unit is connected with the option unit and is used for hiding the application to be hidden in the foreground application interface if an instruction for selecting one hiding option is received;
the second hiding unit is connected with the option unit and the second encryption unit and is used for detecting whether the application to be hidden is provided with second verification information or not if an instruction for selecting the secondary hiding option is received, prompting to set the second verification information if the application to be hidden is not provided with the second verification information, and hiding the application to be hidden behind the foreground application interface if the second verification information is provided.
Optionally, the application data hiding module 3 is specifically configured to:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Optionally, the application tracking module 4 specifically includes:
and the deleting unit is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
Specifically, in this embodiment, the terminal is a device corresponding to embodiment 1, which is configured to hide an important application in the terminal, and provide management for the hidden important application by a foreground application in the terminal, so as to improve protection of the application by the terminal, and may be specifically understood in conjunction with embodiment 1.
Example 3:
embodiment 3 of the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the application hiding management method as described in embodiment 1.
Specifically, in this embodiment, the computer program stored in the computer readable storage medium may be run on the terminal, so as to implement hiding of the important applications in the terminal, and provide management for the hidden important applications by the foreground application in the terminal, so as to improve the protection of the application by the terminal. Computer-readable storage media includes volatile or nonvolatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media includes, but is not limited to, RAM (Random Access Memory ), ROM (Read-Only Memory), EEPROM (Electrically Erasable Programmable Read Only Memory, charged erasable programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact Disc Read-Only Memory), digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
In addition, the present invention may also provide an electronic device including a memory and a processor, the memory storing a computer program, the processor executing the application hiding management method as described in embodiment 1 when the processor runs the computer program stored in the memory.
The memory is connected with the processor, the memory can be flash memory or read-only memory or other memories, and the processor can be a central processing unit or a singlechip.
Embodiments 1 to 3 of the present invention provide an application hiding management method, a terminal, and a computer readable storage medium, which can implement that an important application storing user privacy data is used as a secondary hiding application, after being hidden in a foreground application, recall that the foreground application needs to be verified according to a contract and the important application itself needs to be verified, provide hiding management for the hiding application through the foreground application, improve protection of the important application data through the secondary verification, effectively improve security of the user privacy data, and avoid loss caused by theft of the user privacy data.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.
Claims (11)
1. An application hiding management method is characterized by comprising an application starting step, wherein the application starting step specifically comprises the following steps:
receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface;
and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
2. The method of claim 1, wherein after launching the foreground application, the method further comprises:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
3. The method according to claim 2, wherein displaying a second authentication information input interface in the foreground application interface, in particular comprises:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
4. The method of claim 1, wherein the secondary hiding application includes a plurality of first authentication information and second authentication information corresponding to each secondary hiding application are different.
5. The method according to any of the claims 1-4, characterized in that the method further comprises, before the application start step, an application encryption step, in particular comprising:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
6. The method according to claim 5, characterized in that before the application start step, the method further comprises an application hooking step, in particular comprising:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
7. The method according to claim 6, characterized in that after the application of the step of hanging, the method further comprises the step of applying data hiding, in particular comprising:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
8. The method according to claim 7, characterized in that after the application data hiding step, the method further comprises an application tracking step, in particular comprising:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
9. The terminal is characterized by comprising an application starting module, wherein the application starting module specifically comprises:
the first display unit is used for receiving a starting instruction of the foreground application and displaying a first verification information input interface according to the starting instruction;
the second display unit is connected with the first display unit and is used for receiving the first verification information input through the first verification information input interface, starting a foreground application according to the first verification information and displaying a second verification information input interface in the foreground application interface;
the third display unit is connected with the second display unit and is used for receiving the second verification information input through the second verification information input interface and displaying and/or starting the secondary hiding application according to the second verification information.
10. The terminal according to claim 9, characterized in that the terminal further comprises:
the application encryption module is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module is connected with the application encryption module and used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module is connected with the application hanging module and is used for hiding all data of the application hanging on the foreground application;
the application tracking module is connected with the application data hiding module and the application starting module and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
11. A computer readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the application hiding management method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310652735.1A CN116680737A (en) | 2023-06-02 | 2023-06-02 | Application hiding management method, terminal and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310652735.1A CN116680737A (en) | 2023-06-02 | 2023-06-02 | Application hiding management method, terminal and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116680737A true CN116680737A (en) | 2023-09-01 |
Family
ID=87781756
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310652735.1A Pending CN116680737A (en) | 2023-06-02 | 2023-06-02 | Application hiding management method, terminal and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116680737A (en) |
-
2023
- 2023-06-02 CN CN202310652735.1A patent/CN116680737A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11394555B2 (en) | Mobile terminal privacy protection method and protection apparatus, and mobile terminal | |
CN103617382A (en) | Privacy protection method and device | |
US9378344B2 (en) | Method and apparatus for protecting information based on data card | |
CN105760737A (en) | Control method for applications and terminal | |
US11475123B2 (en) | Temporary removal of software programs to secure mobile device | |
CN103577761A (en) | Method and device for processing privacy data in mobile equipment | |
CN104463013A (en) | Mobile terminal and data encryption method thereof | |
EP2835997A1 (en) | Cell phone data encryption method and decryption method | |
CN106599115B (en) | Data protection method, device and terminal | |
WO2017008415A1 (en) | Apparatus and method for launching mobile applications from a lock screen | |
US7975309B2 (en) | Systems and methods for securing data in an electronic apparatus | |
WO2019011083A1 (en) | Private information processing method and apparatus, and mobile terminal | |
JP7278345B2 (en) | Mobile terminal privacy protection method and protection device, and mobile terminal | |
WO2021056767A1 (en) | Information processing method, mobile terminal and computer storage medium | |
CN116680737A (en) | Application hiding management method, terminal and medium | |
CN106161365B (en) | Data processing method and device and terminal | |
WO2017185461A1 (en) | Method and system for recovering tampered key information of virtual subscriber identity module | |
CN103052060A (en) | Method for improving information security of mobile terminal and mobile terminal | |
JP6045104B2 (en) | Data erasing program, data erasing method, computer having data erasing function and data erasing management server | |
CN106295274B (en) | Application program control method and device | |
CN111182122A (en) | Mode control method, intelligent terminal and device with storage function | |
CN113407959B (en) | Operation execution method and device and electronic equipment | |
US20240129299A1 (en) | Selectively and intelligently displaying authentication notifications to protect users | |
US10797870B1 (en) | Systems and methods for generating passwords | |
WO2024081095A1 (en) | Selectively and intelligently displaying authentication notifications to protect users |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |