CN116680737A - Application hiding management method, terminal and medium - Google Patents

Application hiding management method, terminal and medium Download PDF

Info

Publication number
CN116680737A
CN116680737A CN202310652735.1A CN202310652735A CN116680737A CN 116680737 A CN116680737 A CN 116680737A CN 202310652735 A CN202310652735 A CN 202310652735A CN 116680737 A CN116680737 A CN 116680737A
Authority
CN
China
Prior art keywords
application
verification information
hiding
foreground
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310652735.1A
Other languages
Chinese (zh)
Inventor
齐飞
盛明哲
陶蒙华
王宣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202310652735.1A priority Critical patent/CN116680737A/en
Publication of CN116680737A publication Critical patent/CN116680737A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention provides an application hiding management method, a terminal and a medium, which relate to the technical field of computers and are used for solving the problem that the prior art lacks effective protection means for applications, wherein the method comprises the following steps: receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction; receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface; and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information. The invention provides the hidden management for the hidden application through the foreground application, improves the protection of important application data through secondary verification, can effectively improve the security of user privacy data and avoids the loss caused by the theft of the user privacy data.

Description

Application hiding management method, terminal and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an application hiding management method, a terminal, and a computer readable storage medium.
Background
With the rapid development of science and technology, the functions of smart phones are becoming perfect, more and more people like to use smart phones, store various information such as photos, videos, short messages and the like in the smart phones, even have some private information, and possibly have some property information in some APP (Application, third party Application). The protection of this information is becoming increasingly important to mobile phone users, and has to be subject to half-point flash. Therefore, how to effectively protect the private information of the mobile phone user is a problem to be solved.
However, in the prior art, encryption protection is performed on the user privacy data, only the user data is often protected, but an APP storing the user privacy data lacks an effective protection means, for example, protection is not paid attention to an application carrying a user fund for transferring in and out and a data stream source. When the user mobile phone is lost or taken by an lawbreaker, the lawbreaker can easily cause serious consequences of the user property being transferred or consumed by cracking the user mobile phone and application verification information or by stealing the user verification information in advance, and the like, thereby bringing loss to the user.
Disclosure of Invention
The technical problem to be solved by the invention is to provide an application hiding management method, a terminal and a computer readable storage medium aiming at the defects of the prior art, so as to solve the problem that the prior art lacks effective protection means for applications.
In a first aspect, the present invention provides an application hiding management method, where the method includes an application starting step, specifically including:
receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface;
and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
Optionally, after the foreground application is started, the method further includes:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
Optionally, displaying a second verification information input interface in the foreground application interface, specifically including:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Optionally, before the application starting step, the method further comprises an application encrypting step, specifically comprising:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
Optionally, before the application starting step, the method further includes an application hanging step, specifically including:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
Optionally, after the applying the step of hanging, the method further includes an applying data hiding step, specifically including:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Optionally, after the step of applying data hiding, the method further comprises an application tracking step, specifically comprising:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
In a second aspect, the present invention provides a terminal, where the terminal includes an application starting module, and specifically includes:
the first display unit is used for receiving a starting instruction of the foreground application and displaying a first verification information input interface according to the starting instruction;
the second display unit is connected with the first display unit and is used for receiving the first verification information input through the first verification information input interface, starting a foreground application according to the first verification information and displaying a second verification information input interface in the foreground application interface;
the third display unit is connected with the second display unit and is used for receiving the second verification information input through the second verification information input interface and displaying and/or starting the secondary hiding application according to the second verification information.
Optionally, the terminal further includes:
the application encryption module is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module is connected with the application encryption module and used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module is connected with the application hanging module and is used for hiding all data of the application hanging on the foreground application;
the application tracking module is connected with the application data hiding module and the application starting module and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
In a third aspect, the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements an application hiding management method as described above.
The invention provides an application hiding management method, a terminal and a computer readable storage medium, which can realize that an important application for storing user privacy data is used as a secondary hiding application, after being hidden in a foreground application, the foreground application is called out to be verified according to conventions and the important application is verified, the foreground application is used for providing hiding management for the hiding application, the protection of the important application data is improved through the secondary verification, the safety of the user privacy data can be effectively improved, and the loss caused by stealing the user privacy data is avoided.
Drawings
FIG. 1 is a flow chart of an application hiding management method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another application hiding management method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal application starting module according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the technical scheme of the present invention better understood by those skilled in the art, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings.
It is to be understood that the specific embodiments and figures described herein are merely illustrative of the invention, and are not limiting of the invention.
It is to be understood that the various embodiments of the invention and the features of the embodiments may be combined with each other without conflict.
It is to be understood that only the portions relevant to the present invention are shown in the drawings for convenience of description, and the portions irrelevant to the present invention are not shown in the drawings.
It should be understood that each unit and module in the embodiments of the present invention may correspond to only one physical structure, may be formed by a plurality of physical structures, or may be integrated into one physical structure.
It will be appreciated that the functions and steps noted in the flowcharts and block diagrams of the subject invention can occur out of the order noted in the figures without conflict.
It is to be understood that the flowcharts and block diagrams of the present invention illustrate the architecture, functionality, and operation of possible implementations of systems, apparatuses, devices, methods according to various embodiments of the present invention. Where each block in the flowchart or block diagrams may represent a unit, module, segment, code, or the like, which comprises executable instructions for implementing the specified functions. Moreover, each block or combination of blocks in the block diagrams and flowchart illustrations can be implemented by hardware-based systems that perform the specified functions, or by combinations of hardware and computer instructions.
It should be understood that the units and modules related in the embodiments of the present invention may be implemented by software, or may be implemented by hardware, for example, the units and modules may be located in a processor.
Example 1:
as shown in fig. 1 and 2, embodiment 1 of the present invention provides an application hiding management method, where the method at least includes an application starting step S5, specifically includes:
s51, receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
s52, receiving first verification information input through the first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in the foreground application interface;
and S53, receiving second verification information input through a second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
Specifically, in this embodiment, the method may be set in a terminal, to implement secure startup of a secondary hidden application preset in the terminal, where a specific startup process includes: after receiving a starting instruction of a user for a foreground application, the terminal displays a first verification information input interface according to the starting instruction; then, after receiving first verification information input by a user through a first verification information input interface, the terminal starts a foreground application according to the first verification information, and displays a second verification information input interface in the foreground application interface; finally, after receiving the second verification information input by the user through the second verification information input interface, the terminal displays and/or starts the secondary hiding application corresponding to the second verification information according to the second verification information. The method can be realized through the process: the important application for storing the user privacy data is used as a secondary hiding application, after the important application is hidden in the foreground application, the foreground application is required to be verified according to conventions and the important application is required to be verified, the foreground application provides hiding management for the hiding application, the protection of the important application data is improved through secondary verification, the safety of the user privacy data can be effectively improved, and the loss caused by the fact that the user privacy data is stolen is avoided. For example, APP (such as payment treasures, weChat, QQ, etc.) related to money transfer by the user is all invisible as secondary hiding applications, when the user enters the mobile phone system, the applications are invisible to the user, unauthorized users cannot see the applications related to property APP, and only the applications are visible when the user inputs a specific password in a specific state, so that even if the user is in the hands of the lawbreaker, the mobile phone of the user cannot steal money on the mobile phone application of the user, and the safety of property of the user on the mobile phone network is guaranteed to the greatest extent.
Optionally, after the foreground application is started, the method further includes:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
Specifically, in the present embodiment, the hiding applications include a primary hiding application and a secondary hiding application. When the user inputs the first verification information and opens the foreground application, the primary hidden application is displayed in the foreground application interface, and the user can send out a starting instruction of the primary hidden application by clicking an icon displayed in the foreground application interface by the primary hidden application. After the secondary hiding application is hidden on the foreground application interface, even if the foreground application is opened, the secondary hiding application is still invisible to the outside, and the secondary hiding application is visible after the user inputs the second verification information. After the hidden application is started, the display interface of the hidden application is not independently displayed at the terminal, but is displayed through the foreground application interface, after the use of the hidden application is completed, the hidden application can be stored in the background without being displayed on the current page, and after the hidden application enters the background storage mode, the hidden application can be awakened through switching the foreground application. By the setting, the application with different importance degrees can realize different hiding degrees in the foreground application, and display and start in different security verification modes.
Optionally, displaying a second verification information input interface in the foreground application interface, specifically including:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Specifically, in this embodiment, after the foreground application is started, the second verification information input interface is displayed in the foreground application interface together with the primary hidden application in the form of an icon/button/menu, and the user calls out the second verification information input interface by clicking the icon/button/menu, and then inputs the second verification information to call out the secondary hidden application, so as to further enhance the concealment of the secondary hidden application.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Specifically, in this embodiment, one foreground application may simultaneously correspond to a plurality of hidden applications, or may simultaneously correspond to a plurality of secondary hidden applications, and for the secondary hidden applications, since they need to be called through the second verification information, each secondary hidden application needs unique second verification information, and in order to improve security, the first verification information and the second verification information are also preset as different information.
Optionally, before the application starting step S5, the method further includes an application encrypting step S1, specifically including:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
Specifically, in this embodiment, before the application is started, the foreground application and the secondary hiding application need to set respective verification information first, the primary hiding application may also set own verification information, the verification information may be password information composed of letters, numbers, symbols, and the like, may also be biometric information such as fingerprints, irises, and the like, and the verification information of the foreground application and the secondary hiding application preferably meets different requirements, but the primary hiding application may not meet different requirements if the verification information is set.
Optionally, before the application starting step S5, the method further includes an application hanging step S2, specifically including:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
Specifically, in this embodiment, before the application is started, the secondary hiding application needs to be hung under the foreground application to implement secondary hiding, meanwhile, if there is a primary hiding application, the application encrypting step S1 and the application hanging step S2 need not limit the execution sequence, in the application hanging step S2, the application encrypting step S1 is inserted by prompting, so long as the application to be secondarily hidden has authentication information set before being hidden, the authentication information is implemented by encryption principle, specifically, the application can be encrypted in the form of fingerprint, iris or password, etc., the foreground application also needs to be set with authentication information, the time point of setting the authentication information need not be limited, and the authentication information can also be in the form of fingerprint, iris or password, etc. More specifically, verification of the foreground application can be realized in a login password mode, the application to be hidden is encrypted in various modes such as fingerprint, iris or password different from the foreground application, and the application to be hidden can be not encrypted if the application to be hidden is a primary hidden application. That is, there are three types of hidden applications that are ultimately formed: the first hidden application does not have verification information, and only the first hidden application is dragged to the foreground application for hiding, after a user inputs the first verification information to start the foreground application, the hidden application is displayed in an interface of the foreground application, and the user clicks a certain icon of the hidden application to start the corresponding hidden application; the second hidden application sets verification information, but once hiding is selected when the second hidden application is dragged to the foreground application, after a user inputs the first verification information to start the foreground application, the hidden application is displayed in an interface of the foreground application, and after the user clicks a certain icon of the hidden application, the user requests to input the second verification information, and after the user inputs the second verification information, the corresponding hidden application can be started; the third hidden application sets verification information, when the third hidden application drags the first hidden application to the foreground application, secondary hiding is selected, after a user inputs the first verification information to start the foreground application, the hidden application is not displayed in an interface of the foreground application, the user clicks an icon/button/menu and the like of a second verification information input interface displayed in the interface of the foreground application, the second verification information input interface is popped up, after the user inputs the second verification information, a certain hidden application corresponding to the input second verification information is displayed in the interface of the foreground application, or a certain hidden application corresponding to the input second verification information is directly started. Through the steps of hanging, the application is hidden in different management modes through the foreground application, particularly the secondary hiding application is hidden to a higher degree, and a non-terminal user cannot even know that the application exists on the terminal, so that the hidden effect is good, and the data security degree is high.
Optionally, after the application of the hitching step S2, the method further includes an application data hiding step S3, specifically including:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Specifically, in this embodiment, after the hidden application is hung on the foreground application, the terminal performs special processing on the data of the hidden application, and hides the data, such as the name, display information, operation parameters, and the like, of the hidden application, where the system setting and the like of the terminal are related to the hidden application, and other positions of the terminal are not displayed with any information of the application except the foreground application.
Optionally, after the application data hiding step S3, the method further includes an application tracking step S4, specifically including:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
Specifically, in this embodiment, after the hiding application is completed and hiding, the terminal further performs data tracking on the hiding application, for example, the application starting step S5 runs the data generated after the hiding application hung on the foreground application, and executes the application data hiding step S3 again to implement data hiding, and after receiving the deletion instruction on the application, deletes the corresponding application and data, including: if a deletion instruction of the hidden application hung on the foreground application is received, deleting the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application; if a deletion instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application, wherein the deletion mode improves the management authority and efficiency of the foreground application on the hidden application.
Example 2:
as shown in fig. 3 and 4, embodiment 2 of the present invention provides a terminal, where the terminal at least includes an application starting module 5, and specifically includes:
a first display unit 51, configured to receive a start instruction for a foreground application, and display a first verification information input interface according to the start instruction;
a second display unit 52 connected to the first display unit 51, for receiving the first authentication information input through the first authentication information input interface, starting the foreground application according to the first authentication information, and displaying a second authentication information input interface in the foreground application interface;
and a third display unit 53 connected to the second display unit 52, for receiving the second authentication information input through the second authentication information input interface, and displaying and/or starting the secondary hiding application according to the second authentication information.
Optionally, the terminal further includes:
the application encryption module 1 is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module 2 is connected with the application encryption module 1 and is used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module 3 is connected with the application leaning module 2 and is used for hiding all data of the application leaning on the foreground application for the hidden application leaning on the foreground application;
the application tracking module 4 is connected with the application data hiding module 3 and the application starting module 5, and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
Optionally, the second display unit 52 is further configured to display the primary hidden application in the foreground application interface;
the third display unit 53 is further configured to display the primary and/or secondary hidden application interface in the foreground application interface after the primary and/or secondary hidden application is started.
Optionally, the second display unit 52 is specifically further configured to:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
Optionally, the secondary hiding applications include a plurality of second hiding applications, and the first verification information and the second verification information corresponding to each secondary hiding application are different.
Optionally, the application encryption module 1 specifically includes:
the first encryption unit is used for setting first verification information for the foreground application, wherein the first verification information can adopt password information or biological characteristic information;
the second encryption unit is used for setting second verification information for the application to be hidden, and the second verification information can adopt biological characteristic information or password information.
Optionally, the application hooking module 2 specifically comprises:
the option unit is used for displaying primary hiding options and secondary hiding options after detecting that the application to be hidden is dragged to the foreground application;
the first hiding unit is connected with the option unit and is used for hiding the application to be hidden in the foreground application interface if an instruction for selecting one hiding option is received;
the second hiding unit is connected with the option unit and the second encryption unit and is used for detecting whether the application to be hidden is provided with second verification information or not if an instruction for selecting the secondary hiding option is received, prompting to set the second verification information if the application to be hidden is not provided with the second verification information, and hiding the application to be hidden behind the foreground application interface if the second verification information is provided.
Optionally, the application data hiding module 3 is specifically configured to:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
Optionally, the application tracking module 4 specifically includes:
and the deleting unit is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
Specifically, in this embodiment, the terminal is a device corresponding to embodiment 1, which is configured to hide an important application in the terminal, and provide management for the hidden important application by a foreground application in the terminal, so as to improve protection of the application by the terminal, and may be specifically understood in conjunction with embodiment 1.
Example 3:
embodiment 3 of the present invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the application hiding management method as described in embodiment 1.
Specifically, in this embodiment, the computer program stored in the computer readable storage medium may be run on the terminal, so as to implement hiding of the important applications in the terminal, and provide management for the hidden important applications by the foreground application in the terminal, so as to improve the protection of the application by the terminal. Computer-readable storage media includes volatile or nonvolatile, removable or non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, computer program modules or other data. Computer-readable storage media includes, but is not limited to, RAM (Random Access Memory ), ROM (Read-Only Memory), EEPROM (Electrically Erasable Programmable Read Only Memory, charged erasable programmable Read-Only Memory), flash Memory or other Memory technology, CD-ROM (Compact Disc Read-Only Memory), digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer.
In addition, the present invention may also provide an electronic device including a memory and a processor, the memory storing a computer program, the processor executing the application hiding management method as described in embodiment 1 when the processor runs the computer program stored in the memory.
The memory is connected with the processor, the memory can be flash memory or read-only memory or other memories, and the processor can be a central processing unit or a singlechip.
Embodiments 1 to 3 of the present invention provide an application hiding management method, a terminal, and a computer readable storage medium, which can implement that an important application storing user privacy data is used as a secondary hiding application, after being hidden in a foreground application, recall that the foreground application needs to be verified according to a contract and the important application itself needs to be verified, provide hiding management for the hiding application through the foreground application, improve protection of the important application data through the secondary verification, effectively improve security of the user privacy data, and avoid loss caused by theft of the user privacy data.
It is to be understood that the above embodiments are merely illustrative of the application of the principles of the present invention, but not in limitation thereof. Various modifications and improvements may be made by those skilled in the art without departing from the spirit and substance of the invention, and are also considered to be within the scope of the invention.

Claims (11)

1. An application hiding management method is characterized by comprising an application starting step, wherein the application starting step specifically comprises the following steps:
receiving a starting instruction of a foreground application, and displaying a first verification information input interface according to the starting instruction;
receiving first verification information input through a first verification information input interface, starting a foreground application according to the first verification information, and displaying a second verification information input interface in a foreground application interface;
and receiving second verification information input through the second verification information input interface, and displaying and/or starting a secondary hiding application according to the second verification information.
2. The method of claim 1, wherein after launching the foreground application, the method further comprises:
displaying a primary hidden application in a foreground application interface;
after the primary and/or secondary hiding application is started, the primary and/or secondary hiding application interface is displayed in the foreground application interface.
3. The method according to claim 2, wherein displaying a second authentication information input interface in the foreground application interface, in particular comprises:
displaying icons/buttons/menus of a second verification information input interface in the foreground application interface;
and receiving clicking information of icons/buttons/menus of the second verification information input interface, and displaying the second verification information input interface in the foreground application interface according to the clicking information.
4. The method of claim 1, wherein the secondary hiding application includes a plurality of first authentication information and second authentication information corresponding to each secondary hiding application are different.
5. The method according to any of the claims 1-4, characterized in that the method further comprises, before the application start step, an application encryption step, in particular comprising:
setting first verification information for foreground application, wherein the first verification information can adopt password information or biological characteristic information;
and setting second verification information for the application to be hidden, wherein the second verification information can adopt biological characteristic information or password information.
6. The method according to claim 5, characterized in that before the application start step, the method further comprises an application hooking step, in particular comprising:
when the application to be hidden is detected to be dragged to the foreground application, displaying primary hiding options and secondary hiding options;
if an instruction for selecting one hiding option is received, hiding the application to be hidden in a foreground application interface;
if an instruction for selecting the secondary hiding option is received, detecting whether the application to be hidden is provided with second verification information, if not, prompting to set the second verification information, and if so, hiding the application to be hidden behind a foreground application interface.
7. The method according to claim 6, characterized in that after the application of the step of hanging, the method further comprises the step of applying data hiding, in particular comprising:
and hiding all data of the hidden application which is hung on the foreground application outside the foreground application.
8. The method according to claim 7, characterized in that after the application data hiding step, the method further comprises an application tracking step, in particular comprising:
and if a deleting instruction of the foreground application is received, deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application.
9. The terminal is characterized by comprising an application starting module, wherein the application starting module specifically comprises:
the first display unit is used for receiving a starting instruction of the foreground application and displaying a first verification information input interface according to the starting instruction;
the second display unit is connected with the first display unit and is used for receiving the first verification information input through the first verification information input interface, starting a foreground application according to the first verification information and displaying a second verification information input interface in the foreground application interface;
the third display unit is connected with the second display unit and is used for receiving the second verification information input through the second verification information input interface and displaying and/or starting the secondary hiding application according to the second verification information.
10. The terminal according to claim 9, characterized in that the terminal further comprises:
the application encryption module is used for receiving first verification information set for a foreground application and second verification information set for an application to be hidden;
the application hanging module is connected with the application encryption module and used for hanging the application to be hidden on a foreground application to realize hiding;
the application data hiding module is connected with the application hanging module and is used for hiding all data of the application hanging on the foreground application;
the application tracking module is connected with the application data hiding module and the application starting module and is used for deleting the foreground application, the hidden application hung on the foreground application and all data of the hidden application hung on the foreground application if a deleting instruction of the foreground application is received.
11. A computer readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the application hiding management method according to any one of claims 1-8.
CN202310652735.1A 2023-06-02 2023-06-02 Application hiding management method, terminal and medium Pending CN116680737A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310652735.1A CN116680737A (en) 2023-06-02 2023-06-02 Application hiding management method, terminal and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310652735.1A CN116680737A (en) 2023-06-02 2023-06-02 Application hiding management method, terminal and medium

Publications (1)

Publication Number Publication Date
CN116680737A true CN116680737A (en) 2023-09-01

Family

ID=87781756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310652735.1A Pending CN116680737A (en) 2023-06-02 2023-06-02 Application hiding management method, terminal and medium

Country Status (1)

Country Link
CN (1) CN116680737A (en)

Similar Documents

Publication Publication Date Title
US11394555B2 (en) Mobile terminal privacy protection method and protection apparatus, and mobile terminal
CN103617382A (en) Privacy protection method and device
US9378344B2 (en) Method and apparatus for protecting information based on data card
CN105760737A (en) Control method for applications and terminal
US11475123B2 (en) Temporary removal of software programs to secure mobile device
CN103577761A (en) Method and device for processing privacy data in mobile equipment
CN104463013A (en) Mobile terminal and data encryption method thereof
EP2835997A1 (en) Cell phone data encryption method and decryption method
CN106599115B (en) Data protection method, device and terminal
WO2017008415A1 (en) Apparatus and method for launching mobile applications from a lock screen
US7975309B2 (en) Systems and methods for securing data in an electronic apparatus
WO2019011083A1 (en) Private information processing method and apparatus, and mobile terminal
JP7278345B2 (en) Mobile terminal privacy protection method and protection device, and mobile terminal
WO2021056767A1 (en) Information processing method, mobile terminal and computer storage medium
CN116680737A (en) Application hiding management method, terminal and medium
CN106161365B (en) Data processing method and device and terminal
WO2017185461A1 (en) Method and system for recovering tampered key information of virtual subscriber identity module
CN103052060A (en) Method for improving information security of mobile terminal and mobile terminal
JP6045104B2 (en) Data erasing program, data erasing method, computer having data erasing function and data erasing management server
CN106295274B (en) Application program control method and device
CN111182122A (en) Mode control method, intelligent terminal and device with storage function
CN113407959B (en) Operation execution method and device and electronic equipment
US20240129299A1 (en) Selectively and intelligently displaying authentication notifications to protect users
US10797870B1 (en) Systems and methods for generating passwords
WO2024081095A1 (en) Selectively and intelligently displaying authentication notifications to protect users

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination