WO2017045511A1 - 顶层悬浮窗的控制方法、装置和移动终端 - Google Patents
顶层悬浮窗的控制方法、装置和移动终端 Download PDFInfo
- Publication number
- WO2017045511A1 WO2017045511A1 PCT/CN2016/095891 CN2016095891W WO2017045511A1 WO 2017045511 A1 WO2017045511 A1 WO 2017045511A1 CN 2016095891 W CN2016095891 W CN 2016095891W WO 2017045511 A1 WO2017045511 A1 WO 2017045511A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- window
- floating window
- application
- auxiliary event
- event
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/542—Event management; Broadcasting; Multicasting; Notifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/545—Gui
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- the present invention relates to the field of mobile terminal technologies, and in particular, to a method, an apparatus, and a mobile terminal for controlling a top-level floating window.
- users use mobile terminals to do a lot of things, for example, users can use mobile communication tools to chat, take photos, and transfer documents.
- Some applications in the mobile phone use the floating window technology to force the bubble to pop up on the mobile phone under any circumstances.
- the communication tool FB Messenger as long as the chat message is received, the chat dialog window will pop up on the mobile phone.
- the situation can be met from dozens to hundreds of times a day, which is a kind of interference to people.
- the more serious is that the way of pop-up bubbles can not be blocked, so that anyone can open the floating window to pop up bubbles, the user's chat privacy is easy to leak, and the security is very poor.
- the present application aims to solve at least one of the technical problems in the related art to some extent.
- the method for controlling a top-level floating window includes: acquiring an auxiliary event in an operating system in a mobile terminal; determining, according to the auxiliary event, whether a top-level floating window exists; if the top-level floating window exists, Receiving an instruction that the user triggers the top level floating window, and providing an identity verification interface according to the instruction.
- the determining whether there is a top level floating window according to the auxiliary event comprises: determining whether the auxiliary event includes an auxiliary event of a window state change and an auxiliary event of a window content change, and Whether the corresponding application package name is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top suspension a window, and the application corresponding to the top floating window is the application.
- the method before the obtaining an auxiliary event in the operating system in the mobile terminal, the method further includes: opening a floating window message protection function of the target application.
- the method before the obtaining the auxiliary event in the operating system in the mobile terminal, the method further includes: acquiring the auxiliary event reading right in the operating system.
- the providing an authentication interface according to the instruction specifically includes: determining whether an application corresponding to the top floating window is the target application; if the top floating window corresponds to The application is the target application, and the authentication interface is provided according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window .
- the method further includes providing an application interface corresponding to the top level floating window if the user is authenticated.
- the method for controlling the top-level floating window proposed by the embodiment of the first aspect of the present application provides an authentication interface to protect the user by triggering the top-level floating window of the mobile terminal and the application corresponding to the top-level floating window as the target application. Privacy, effectively improve the security of user data.
- the control device for the top-level floating window proposed by the embodiment of the second aspect of the present invention includes: an auxiliary event obtaining module, configured to acquire an auxiliary event in an operating system in the mobile terminal; and a top floating window determining module, configured to determine according to the auxiliary event Whether there is a top-level floating window; an authentication interface providing module, configured to receive an instruction that the user triggers the top-level floating window when the top-level floating window exists, and provide an authentication interface according to the instruction.
- the top-level floating window determining module determines that the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package of the two When the names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is the application.
- the apparatus further includes: a floating window message protection function opening module, configured to enable a floating window message protection function of the target application.
- the apparatus further includes: an auxiliary event read permission obtaining module, configured to acquire the auxiliary event read permission in the operating system.
- the authentication interface providing module is specifically configured to: determine whether an application corresponding to the top floating window is the target application; if the application corresponding to the top floating window is And the target application provides an authentication interface according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window.
- the method further includes: an application interface providing module, configured to provide an application interface corresponding to the top floating window when the user passes the authentication.
- the control device for the top floating window proposed by the embodiment of the second aspect of the present invention provides an identity verification interface to protect the user by triggering the top-level floating window of the mobile terminal and the application corresponding to the top-level floating window as the target application. Privacy, effectively improve the security of user data.
- the mobile terminal provided by the embodiment of the third aspect of the present invention includes: a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the casing, and the processor and the memory are disposed on the circuit board.
- Power circuit for powering various circuits or devices of the mobile terminal memory for storing executable program code;
- the executable program code stored in the memory is read to run a program corresponding to the executable program code for performing the above-described control method of the top floating window proposed by any one of the first aspects of the present application.
- the mobile terminal provided by the embodiment of the third aspect of the present invention provides an identity verification interface after the top-level floating window of the mobile terminal is triggered, and the application corresponding to the top-level floating window is the target application, thereby protecting the privacy of the user. Improve the security of user data.
- the method for identifying a top-level floating window includes: acquiring an auxiliary event in an operating system in a mobile terminal; determining whether the auxiliary event includes an auxiliary event of a window state change and an auxiliary event of a window content change, And the application package names corresponding to the two are the same; if the auxiliary event of the window state change and the auxiliary event of the window content change are included, and the corresponding application package names are the same, the window is determined to be the top layer. Floating window.
- the method before the obtaining the auxiliary event in the operating system in the mobile terminal, the method further includes: acquiring the auxiliary event reading right in the operating system.
- the method further includes receiving an instruction that the user triggers the top level floating window, and providing an identity verification interface according to the instruction.
- the method further comprises providing the application interface if the user is authenticated.
- the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package of the two
- the judgment window is the top-level floating window
- the top-level floating window pops up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
- the device for identifying a top-level floating window includes: an auxiliary event obtaining module, configured to acquire an auxiliary event in an operating system in the mobile terminal; and a determining module, configured to determine whether the auxiliary event includes a window state The auxiliary event of the changed auxiliary event and the window content change, and the application package names corresponding to the two are the same, wherein if the auxiliary event of the window state change and the auxiliary event of the window content change are included, and the two correspond to If the application package name is the same, the window is determined to be the top floating window.
- the apparatus further includes: an auxiliary event read permission obtaining module, configured to acquire the auxiliary event read permission in the operating system.
- the apparatus further includes: an identity verification interface providing module, configured to provide an identity verification interface according to the instruction when receiving an instruction that the user triggers the top level floating window.
- the apparatus further includes: an application interface providing module, configured to provide the application interface when the user is authenticated.
- the device for identifying the top-level floating window proposed by the embodiment of the fifth aspect of the present application, wherein the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application of the two
- the judgment window is the top-level floating window
- the top-level floating window pops up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
- the mobile terminal provided in the embodiment of the sixth aspect of the present application includes: a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the casing, and the processor and the memory are disposed on the circuit board.
- a power circuit for powering various circuits or devices of the mobile terminal; a memory for storing executable program code; and a processor for executing a program corresponding to the executable program code by reading executable program code stored in the memory,
- the mobile terminal provided in the embodiment of the sixth aspect of the present application, when the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the application package names corresponding to the two are the same,
- the judgment window is a top-level floating window, and the top-level floating window is popped up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
- a storage medium storing one or more modules, when the one or more modules are executed by an electronic device, causing the electronic device to perform: The method for controlling the top suspension window proposed by any one of the embodiments or the method for identifying the top suspension window proposed by any of the above fourth embodiments of the present application.
- the application program of the eighth aspect of the present application is configured to perform the control method of the top floating window proposed in any one of the foregoing first aspects of the present application, or any one of the foregoing fourth aspects of the present application.
- the proposed method for identifying the top suspended window is configured to perform the control method of the top floating window proposed in any one of the foregoing first aspects of the present application, or any one of the foregoing fourth aspects of the present application.
- FIG. 1 is a schematic flow chart of a method for controlling a top suspension window according to an embodiment of the present application
- FIG. 2 is a schematic flow chart of a method for controlling a top suspension window according to another embodiment of the present application
- FIG. 3 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
- FIG. 4 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
- FIG. 5 is a schematic diagram of steps of setting an auxiliary event read permission in the embodiment of the present application.
- FIG. 6 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
- FIG. 7 is a schematic diagram of a top suspension window of a mobile terminal in an embodiment of the present application.
- FIG. 8 is a schematic flow chart of a method for controlling a top suspension window according to another embodiment of the present application.
- FIG. 9 is a schematic diagram of a jump interface after a user triggers a top-level floating window in the prior art
- FIG. 10 is a schematic diagram of a jump interface after a user triggers a top-level floating window in the embodiment of the present application
- FIG. 11 is a schematic flow chart of a method for identifying a top suspension window according to another embodiment of the present application.
- FIG. 12 is a schematic flow chart of a method for identifying a top suspension window according to another embodiment of the present application.
- FIG. 13 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application.
- FIG. 14 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application.
- FIG. 15 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
- 16 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
- FIG. 17 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
- FIG. 18 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
- FIG. 1 is a schematic flow chart of a method for controlling a top suspension window according to an embodiment of the present application, the method includes:
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the method further includes:
- the target application is, for example, an application that needs to protect the privacy of the message.
- the communication tool FB Messenger For example, the communication tool FB Messenger.
- the floating window message protection function can be set by the user in advance.
- the method further includes:
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
- the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
- the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
- determining whether there is a top-level floating window according to the auxiliary event specifically includes determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package name Whether it is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is a window The application corresponding to the auxiliary event of the state change and the auxiliary event of the window content change.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that there is a top level floating window.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- providing an authentication interface according to the instruction includes: determining whether the application corresponding to the top-level floating window is a target The application; if the application corresponding to the top floating window is the target application, the authentication interface is provided according to the instruction, and if the application corresponding to the top floating window is not the target application, the application corresponding to the top floating window is provided. Program interface.
- the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
- the method further includes:
- the application interface corresponding to the top floating window is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
- FIG. 11 is a schematic flowchart of a method for identifying a top-level floating window according to another embodiment of the present application, where the method includes:
- S111 Acquire an auxiliary event in an operating system in the mobile terminal.
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the method before acquiring the auxiliary event in the operating system in the mobile terminal, the method further includes:
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include “on” and "off”. When the status of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system.
- the status of the CM Security tag module 41 is "on", which means that read permission is set for the auxiliary event in the operating system.
- the user can slide the button 51 to the right to jump to the interface shown in FIG. 6.
- the user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- S112 Determine whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application obtains an auxiliary event A, it determines whether the auxiliary event A includes a secondary event of the Window state change and a secondary event of the Window content change, and the auxiliary event of the Window state change and the application package corresponding to the auxiliary event of the Window content change. Whether the names are the same.
- the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
- the method further includes:
- S122 Receive an instruction that the user triggers the top level floating window, and provide an authentication interface according to the instruction.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- the application interface corresponding to the top floating window is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
- FIG. 13 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application, the device 130 package
- the auxiliary event obtaining module 1301, the top level floating window determining module 1302, and the authentication interface providing module 1303 are included.
- the auxiliary event obtaining module 1301 is configured to acquire an auxiliary event in the operating system in the mobile terminal.
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the device 130 further includes a floating window message protection function opening module 1304.
- the floating window message protection function opening module 1304 is configured to enable the floating window message protection function of the target application.
- the target application is, for example, an application that needs to protect the privacy of the message.
- the communication tool FB Messenger For example, the communication tool FB Messenger.
- the floating window message protection function can be set by the user in advance.
- the apparatus 130 further includes an auxiliary event reading authority obtaining module 1305.
- the auxiliary event read permission obtaining module 1305 is configured to acquire the auxiliary event read permission in the operating system.
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
- the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- the top floating window determining module 1302 is configured to determine whether there is a top floating window according to the auxiliary event.
- FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
- the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
- the top-level floating window determining module 1302 determines that there is a top-level floating window when determining that the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, and The application corresponding to the top floating window corresponds to the auxiliary event of the window state change and the auxiliary event of the window content change. s application.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change Then, it is determined that there is a top floating window.
- the authentication interface providing module 1303 is configured to receive an instruction that the user triggers the top level floating window when the top level floating window exists, and provide an authentication interface according to the instruction.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- the authentication interface providing module 1303 is specifically configured to: determine whether an application corresponding to the top-level floating window is a target application; if the application corresponding to the top-level floating window is a target application, according to the instruction Providing an authentication interface. If the application corresponding to the top floating window is not the target application, the application interface corresponding to the top floating window is provided.
- the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
- the device 130 further includes an application interface providing module 1306.
- the application interface providing module 1306 is configured to provide an application interface corresponding to the top floating window when the user passes the authentication.
- the corresponding content after the top floating window is triggered is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
- FIG. 16 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
- the apparatus 160 includes an auxiliary event acquisition module 1601 and a determination module 1602.
- the auxiliary event obtaining module 1601 is configured to acquire an auxiliary event in the operating system in the mobile terminal.
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the apparatus 160 further includes:
- the auxiliary event read permission obtaining module 1603 is configured to acquire the auxiliary event read permission in the operating system.
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
- the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- the determining module 1602 is configured to determine whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same, wherein the auxiliary event and the window content including the window state change are included If the auxiliary event is changed and the corresponding application package name is the same, the judgment window is the top floating window.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
- the apparatus 160 further includes:
- the authentication interface providing module 1604 is configured to provide an authentication interface according to the instruction when receiving an instruction that the user triggers the top-level floating window.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- the application interface provides a module 1605 for providing an application interface when the user is authenticated.
- the application interface corresponding to the top floating window is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
- the embodiment of the present application further provides a mobile terminal, which includes a housing 1701, a processor 1702, a memory 1703, a circuit board 1704, and a power supply circuit 1705.
- the circuit board 1704 is disposed inside the space surrounded by the housing 1701.
- the processor 1702 and the memory 1703 are disposed on the circuit board 1704;
- the power supply circuit 1705 is configured to supply power to the respective circuits or devices of the mobile terminal;
- the memory 1703 is configured to store executable program code;
- the processor 1702 is stored in the read memory 1703. Executable code to run a program corresponding to the executable code for execution:
- S11' Acquire an auxiliary event in the operating system in the mobile terminal.
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
- the target application is, for example, an application that needs to protect the privacy of the message.
- the communication tool FB Messenger For example, the communication tool FB Messenger.
- the floating window message protection function can be set by the user in advance.
- the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
- the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
- the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
- determining whether there is a top-level floating window according to the auxiliary event specifically includes determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package name Whether it is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is a window The application corresponding to the auxiliary event of the state change and the auxiliary event of the window content change.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application gets a secondary event A, if the secondary event A includes the auxiliary event of Window state change and the auxiliary event of Window content change, and the auxiliary event of Window state change and the package name of the application corresponding to the auxiliary event of Window content change The same, it is determined that there is a top floating window.
- S13' if there is a top-level floating window, receiving an instruction that the user triggers the top-level floating window, and providing an authentication interface according to the instruction.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- providing an authentication interface according to the instruction includes: determining whether the application corresponding to the top-level floating window is a target The application; if the application corresponding to the top floating window is the target application, providing an authentication interface according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window.
- the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
- the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
- the application interface corresponding to the top floating window is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
- the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
- S111' Acquire an auxiliary event in an operating system in the mobile terminal.
- the execution subject of this embodiment is an application of the mobile terminal.
- the application may refer to a software program running on an electronic device.
- the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
- a mobile terminal such as a smartphone, or a tablet.
- the operating system is a computer program that manages and controls computer hardware and software resources.
- the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
- the Android operating system For example, the Android operating system.
- auxiliary events can be represented by Accessibility event.
- the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
- the processor 1702 operates by reading executable program code stored in the memory 1703. Execute the program corresponding to the program code for execution:
- the auxiliary event read permission may be preset by the user.
- the application CM Security can be used to set the auxiliary event read permission in the operating system.
- the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
- the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
- the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
- S112' determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same.
- the window state change can be represented by Window state change
- the window content change can be represented by Window content change
- a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
- a secondary event of Window content change is triggered.
- the application obtains an auxiliary event A, it determines whether the auxiliary event A includes a secondary event of the Window state change and a secondary event of the Window content change, and the auxiliary event of the Window state change and the application package corresponding to the auxiliary event of the Window content change. Whether the names are the same.
- the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
- the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
- S122' receiving an instruction that the user triggers the top-level floating window, and providing an authentication interface according to the instruction.
- the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
- the authentication interface is to unlock the interface.
- the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
- the application interface corresponding to the top floating window is provided.
- the mobile terminal pops up the chat interface of the application corresponding to the top floating window.
- an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
- the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
- the mobile terminal exists in various forms including, but not limited to:
- Mobile communication devices These devices are characterized by mobile communication functions and are mainly aimed at providing voice and data communication.
- Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
- Ultra-mobile personal computer equipment This type of equipment belongs to the category of personal computers, has computing and processing functions, and generally has mobile Internet access.
- Such terminals include: PDAs, MIDs, and UMPC devices, such as the iPad.
- Portable entertainment devices These devices can display and play multimedia content. Such devices include: audio, video players (such as iPod), handheld game consoles, e-books, and smart toys and portable car navigation devices.
- the embodiment of the present application further provides a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
- the control method of the top suspension window
- the embodiment of the present application further provides a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
- the method for identifying the top suspended window is not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to store a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
- the embodiment of the present application further provides an application program for performing the control method of the top floating window according to any of the foregoing embodiments at runtime.
- the embodiment of the present application further provides an application program for performing the method for identifying the top floating window according to any of the foregoing embodiments at runtime.
- portions of the application can be implemented in hardware, software, firmware, or a combination thereof.
- multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
- a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
- each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
- the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
- the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
- the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
Claims (24)
- 一种顶层悬浮窗的控制方法,其特征在于,包括:获取移动终端中操作系统中的辅助事件;根据所述辅助事件判断是否存在顶层悬浮窗;如果存在所述顶层悬浮窗,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
- 如权利要求1所述的顶层悬浮窗的控制方法,其特征在于,所述根据所述辅助事件判断是否存在顶层悬浮窗,具体包括:判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
- 如权利要求1或2所述的顶层悬浮窗的控制方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:开启目标应用程序的悬浮窗讯息保护功能。
- 如权利要求1至3中任一项所述的顶层悬浮窗的控制方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:获取所述操作系统中的所述辅助事件读取权限。
- 如权利要求3或4所述的顶层悬浮窗的控制方法,其特征在于,所述根据所述指令,提供身份验证界面,具体包括:判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
- 如权利要求1至5中任一项所述的顶层悬浮窗的控制方法,其特征在于,所述方法还包括:如果用户通过身份验证,则提供所述顶层悬浮窗对应的应用程序界面。
- 一种顶层悬浮窗的控制装置,其特征在于,包括:辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;顶层悬浮窗判断模块,用于根据所述辅助事件判断是否存在顶层悬浮窗;身份验证界面提供模块,用于在存在所述顶层悬浮窗时,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
- 如权利要求7所述的顶层悬浮窗的控制装置,其特征在于,所述顶层悬浮窗判断模块在判断所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序的包名相同时,判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
- 如权利要求7或8所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:悬浮窗讯息保护功能开启模块,用于开启目标应用程序的悬浮窗讯息保护功能。
- 如权利要求7至9中任一项所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
- 如权利要求9或10所述的顶层悬浮窗的控制装置,其特征在于,所述身份验证界面提供模块具体用于:判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
- 如权利要求7至11中任一项所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:应用程序界面提供模块,用于在所述用户通过身份验证时,提供所述顶层悬浮窗对应的应用程序界面。
- 一种移动终端,其特征在于,包括:壳体;处理器;存储器;电路板和电源电路;其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过读取 存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法。
- 一种顶层悬浮窗的识别方法,其特征在于,包括:获取移动终端中操作系统中的辅助事件;判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断所述视窗为顶层悬浮窗。
- 如权利要求14所述的顶层悬浮窗识别方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:获取所述操作系统中的所述辅助事件读取权限。
- 如权利要求14或15所述的顶层悬浮窗识别方法,其特征在于,所述方法还包括:接收到用户触发所述顶层悬浮窗的指令,则根据所述指令,提供身份验证界面。
- 如权利要求16所述的顶层窗口识别方法,其特征在于,所述方法还包括:如果用户通过身份验证,则提供所述应用程序界面。
- 一种顶层悬浮窗的识别装置,其特征在于,包括:辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;判断模块,用于判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同,其中,如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断所述视窗为顶层悬浮窗。
- 如权利要求18所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
- 如权利要求18或19所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:身份验证界面提供模块,用于在接收到用户触发所述顶层悬浮窗的指令时,根据所述指令,提供身份验证界面。
- 如权利要求20所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:应用程序界面提供模块,用于在用户通过身份验证时,提供所述应用程序界面。
- 一种移动终端,其特征在于,包括:壳体;处理器;存储器;电路板和电源电路;其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
- 一种存储介质,其特征在于,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备:执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法或权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
- 一种应用程序,其特征在于,用于在运行时,执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法或权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/756,930 US20180253538A1 (en) | 2015-09-18 | 2016-08-18 | Method and device for controlling top floating window and mobile terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510601330.0 | 2015-09-18 | ||
CN201510601330.0A CN105224836B (zh) | 2015-09-18 | 2015-09-18 | 顶层悬浮窗的控制方法、装置和移动设备 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017045511A1 true WO2017045511A1 (zh) | 2017-03-23 |
Family
ID=54993801
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/095891 WO2017045511A1 (zh) | 2015-09-18 | 2016-08-18 | 顶层悬浮窗的控制方法、装置和移动终端 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20180253538A1 (zh) |
CN (1) | CN105224836B (zh) |
WO (1) | WO2017045511A1 (zh) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224836B (zh) * | 2015-09-18 | 2018-11-20 | 北京金山安全软件有限公司 | 顶层悬浮窗的控制方法、装置和移动设备 |
CN105808257B (zh) * | 2016-03-08 | 2020-07-07 | 杭州朗和科技有限公司 | 一种应用弹窗识别方法和装置 |
CN111857897A (zh) * | 2019-04-25 | 2020-10-30 | 北京小米移动软件有限公司 | 一种信息显示方法、装置及存储介质 |
CN114546554B (zh) * | 2022-02-14 | 2023-11-07 | 支付宝(杭州)信息技术有限公司 | 一种控件的展示方法、装置以及设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951568A (zh) * | 2010-08-17 | 2011-01-19 | 优视科技有限公司 | 短信信息拦截处理方法及装置 |
US20120158472A1 (en) * | 2010-12-21 | 2012-06-21 | Research In Motion Limited | Contextual customization of content display on a communication device |
CN103164113A (zh) * | 2013-01-31 | 2013-06-19 | 广东欧珀移动通信有限公司 | 一种备忘录快捷显示方法、装置及移动终端 |
CN103412751A (zh) * | 2013-08-05 | 2013-11-27 | 北京奇虎科技有限公司 | 一种锁屏界面的信息展示方法和装置 |
CN104049847A (zh) * | 2014-06-30 | 2014-09-17 | 宇龙计算机通信科技(深圳)有限公司 | 一种移动终端的信息提示方法及系统 |
CN105224836A (zh) * | 2015-09-18 | 2016-01-06 | 北京金山安全软件有限公司 | 顶层悬浮窗的控制方法、装置和移动设备 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110247065A1 (en) * | 2011-03-14 | 2011-10-06 | Volodymyr Melnyk | Simultaneous screen unlock and operation initiation |
CN104714725B (zh) * | 2011-12-31 | 2018-10-09 | 北京奇虎科技有限公司 | 一种悬浮窗的显示方法及装置 |
US9916072B2 (en) * | 2013-02-20 | 2018-03-13 | Lg Electronics Inc. | Application and notification window display management in a mobile terminal |
-
2015
- 2015-09-18 CN CN201510601330.0A patent/CN105224836B/zh active Active
-
2016
- 2016-08-18 US US15/756,930 patent/US20180253538A1/en not_active Abandoned
- 2016-08-18 WO PCT/CN2016/095891 patent/WO2017045511A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101951568A (zh) * | 2010-08-17 | 2011-01-19 | 优视科技有限公司 | 短信信息拦截处理方法及装置 |
US20120158472A1 (en) * | 2010-12-21 | 2012-06-21 | Research In Motion Limited | Contextual customization of content display on a communication device |
CN103164113A (zh) * | 2013-01-31 | 2013-06-19 | 广东欧珀移动通信有限公司 | 一种备忘录快捷显示方法、装置及移动终端 |
CN103412751A (zh) * | 2013-08-05 | 2013-11-27 | 北京奇虎科技有限公司 | 一种锁屏界面的信息展示方法和装置 |
CN104049847A (zh) * | 2014-06-30 | 2014-09-17 | 宇龙计算机通信科技(深圳)有限公司 | 一种移动终端的信息提示方法及系统 |
CN105224836A (zh) * | 2015-09-18 | 2016-01-06 | 北京金山安全软件有限公司 | 顶层悬浮窗的控制方法、装置和移动设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105224836A (zh) | 2016-01-06 |
CN105224836B (zh) | 2018-11-20 |
US20180253538A1 (en) | 2018-09-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11184359B2 (en) | Automated access control policy generation for computer resources | |
WO2016050146A1 (zh) | 移动终端设备中的界面信息处理方法及装置 | |
US9076020B2 (en) | Protected mode for mobile communication and other devices | |
US9600670B2 (en) | Provisioning location-based security policy | |
WO2016037318A1 (zh) | 一种指纹识别方法、装置及移动终端 | |
US9998488B2 (en) | Protection system including machine learning snapshot evaluation | |
US10687211B2 (en) | Mobile device, method for displaying screen thereof, wearable device, method for driving the same, and computer-readable recording medium | |
WO2014206203A1 (en) | System and method for detecting unauthorized login webpage | |
WO2017045511A1 (zh) | 顶层悬浮窗的控制方法、装置和移动终端 | |
WO2017211205A1 (zh) | 一种白名单更新方法和装置 | |
US9426606B2 (en) | Electronic apparatus and method of pairing in electronic apparatus | |
KR20150080736A (ko) | 전자 장치의 기능 실행 방법 및 이를 사용하는 전자 장치 | |
CN108475304B (zh) | 一种关联应用程序和生物特征的方法、装置以及移动终端 | |
US11176228B2 (en) | Application interface display method, apparatus, and terminal, and storage medium | |
WO2019029093A1 (zh) | 一种快捷启动功能页面的方法及其装置、电子设备 | |
WO2017054585A1 (zh) | 网络接入方法、装置及系统 | |
US9510182B2 (en) | User onboarding for newly enrolled devices | |
US20150248548A1 (en) | Increasing access security with time since last access | |
WO2018153288A1 (zh) | 数值转移方法、装置、设备及存储介质 | |
EP3662399B1 (en) | Electronic device and control method thereof | |
US9015798B1 (en) | User authentication using pointing device | |
US9830437B2 (en) | Automatic log-in function control | |
WO2019095449A1 (zh) | 一种防止个人信息泄露的方法和装置 | |
US20160021143A1 (en) | Device federation | |
US20180234849A1 (en) | Biometric-based disabling of mobile device feature(s) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16845625 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 15756930 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/07/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16845625 Country of ref document: EP Kind code of ref document: A1 |