WO2017045511A1 - 顶层悬浮窗的控制方法、装置和移动终端 - Google Patents

顶层悬浮窗的控制方法、装置和移动终端 Download PDF

Info

Publication number
WO2017045511A1
WO2017045511A1 PCT/CN2016/095891 CN2016095891W WO2017045511A1 WO 2017045511 A1 WO2017045511 A1 WO 2017045511A1 CN 2016095891 W CN2016095891 W CN 2016095891W WO 2017045511 A1 WO2017045511 A1 WO 2017045511A1
Authority
WO
WIPO (PCT)
Prior art keywords
window
floating window
application
auxiliary event
event
Prior art date
Application number
PCT/CN2016/095891
Other languages
English (en)
French (fr)
Inventor
林怡安
蔡晓杰
杨镇宇
Original Assignee
北京金山安全软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京金山安全软件有限公司 filed Critical 北京金山安全软件有限公司
Priority to US15/756,930 priority Critical patent/US20180253538A1/en
Publication of WO2017045511A1 publication Critical patent/WO2017045511A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/545Gui
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Definitions

  • the present invention relates to the field of mobile terminal technologies, and in particular, to a method, an apparatus, and a mobile terminal for controlling a top-level floating window.
  • users use mobile terminals to do a lot of things, for example, users can use mobile communication tools to chat, take photos, and transfer documents.
  • Some applications in the mobile phone use the floating window technology to force the bubble to pop up on the mobile phone under any circumstances.
  • the communication tool FB Messenger as long as the chat message is received, the chat dialog window will pop up on the mobile phone.
  • the situation can be met from dozens to hundreds of times a day, which is a kind of interference to people.
  • the more serious is that the way of pop-up bubbles can not be blocked, so that anyone can open the floating window to pop up bubbles, the user's chat privacy is easy to leak, and the security is very poor.
  • the present application aims to solve at least one of the technical problems in the related art to some extent.
  • the method for controlling a top-level floating window includes: acquiring an auxiliary event in an operating system in a mobile terminal; determining, according to the auxiliary event, whether a top-level floating window exists; if the top-level floating window exists, Receiving an instruction that the user triggers the top level floating window, and providing an identity verification interface according to the instruction.
  • the determining whether there is a top level floating window according to the auxiliary event comprises: determining whether the auxiliary event includes an auxiliary event of a window state change and an auxiliary event of a window content change, and Whether the corresponding application package name is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top suspension a window, and the application corresponding to the top floating window is the application.
  • the method before the obtaining an auxiliary event in the operating system in the mobile terminal, the method further includes: opening a floating window message protection function of the target application.
  • the method before the obtaining the auxiliary event in the operating system in the mobile terminal, the method further includes: acquiring the auxiliary event reading right in the operating system.
  • the providing an authentication interface according to the instruction specifically includes: determining whether an application corresponding to the top floating window is the target application; if the top floating window corresponds to The application is the target application, and the authentication interface is provided according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window .
  • the method further includes providing an application interface corresponding to the top level floating window if the user is authenticated.
  • the method for controlling the top-level floating window proposed by the embodiment of the first aspect of the present application provides an authentication interface to protect the user by triggering the top-level floating window of the mobile terminal and the application corresponding to the top-level floating window as the target application. Privacy, effectively improve the security of user data.
  • the control device for the top-level floating window proposed by the embodiment of the second aspect of the present invention includes: an auxiliary event obtaining module, configured to acquire an auxiliary event in an operating system in the mobile terminal; and a top floating window determining module, configured to determine according to the auxiliary event Whether there is a top-level floating window; an authentication interface providing module, configured to receive an instruction that the user triggers the top-level floating window when the top-level floating window exists, and provide an authentication interface according to the instruction.
  • the top-level floating window determining module determines that the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package of the two When the names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is the application.
  • the apparatus further includes: a floating window message protection function opening module, configured to enable a floating window message protection function of the target application.
  • the apparatus further includes: an auxiliary event read permission obtaining module, configured to acquire the auxiliary event read permission in the operating system.
  • the authentication interface providing module is specifically configured to: determine whether an application corresponding to the top floating window is the target application; if the application corresponding to the top floating window is And the target application provides an authentication interface according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window.
  • the method further includes: an application interface providing module, configured to provide an application interface corresponding to the top floating window when the user passes the authentication.
  • the control device for the top floating window proposed by the embodiment of the second aspect of the present invention provides an identity verification interface to protect the user by triggering the top-level floating window of the mobile terminal and the application corresponding to the top-level floating window as the target application. Privacy, effectively improve the security of user data.
  • the mobile terminal provided by the embodiment of the third aspect of the present invention includes: a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the casing, and the processor and the memory are disposed on the circuit board.
  • Power circuit for powering various circuits or devices of the mobile terminal memory for storing executable program code;
  • the executable program code stored in the memory is read to run a program corresponding to the executable program code for performing the above-described control method of the top floating window proposed by any one of the first aspects of the present application.
  • the mobile terminal provided by the embodiment of the third aspect of the present invention provides an identity verification interface after the top-level floating window of the mobile terminal is triggered, and the application corresponding to the top-level floating window is the target application, thereby protecting the privacy of the user. Improve the security of user data.
  • the method for identifying a top-level floating window includes: acquiring an auxiliary event in an operating system in a mobile terminal; determining whether the auxiliary event includes an auxiliary event of a window state change and an auxiliary event of a window content change, And the application package names corresponding to the two are the same; if the auxiliary event of the window state change and the auxiliary event of the window content change are included, and the corresponding application package names are the same, the window is determined to be the top layer. Floating window.
  • the method before the obtaining the auxiliary event in the operating system in the mobile terminal, the method further includes: acquiring the auxiliary event reading right in the operating system.
  • the method further includes receiving an instruction that the user triggers the top level floating window, and providing an identity verification interface according to the instruction.
  • the method further comprises providing the application interface if the user is authenticated.
  • the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package of the two
  • the judgment window is the top-level floating window
  • the top-level floating window pops up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
  • the device for identifying a top-level floating window includes: an auxiliary event obtaining module, configured to acquire an auxiliary event in an operating system in the mobile terminal; and a determining module, configured to determine whether the auxiliary event includes a window state The auxiliary event of the changed auxiliary event and the window content change, and the application package names corresponding to the two are the same, wherein if the auxiliary event of the window state change and the auxiliary event of the window content change are included, and the two correspond to If the application package name is the same, the window is determined to be the top floating window.
  • the apparatus further includes: an auxiliary event read permission obtaining module, configured to acquire the auxiliary event read permission in the operating system.
  • the apparatus further includes: an identity verification interface providing module, configured to provide an identity verification interface according to the instruction when receiving an instruction that the user triggers the top level floating window.
  • the apparatus further includes: an application interface providing module, configured to provide the application interface when the user is authenticated.
  • the device for identifying the top-level floating window proposed by the embodiment of the fifth aspect of the present application, wherein the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application of the two
  • the judgment window is the top-level floating window
  • the top-level floating window pops up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
  • the mobile terminal provided in the embodiment of the sixth aspect of the present application includes: a casing, a processor, a memory, a circuit board, and a power supply circuit, wherein the circuit board is disposed inside the space enclosed by the casing, and the processor and the memory are disposed on the circuit board.
  • a power circuit for powering various circuits or devices of the mobile terminal; a memory for storing executable program code; and a processor for executing a program corresponding to the executable program code by reading executable program code stored in the memory,
  • the mobile terminal provided in the embodiment of the sixth aspect of the present application, when the auxiliary event in the operating system in the mobile terminal includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the application package names corresponding to the two are the same,
  • the judgment window is a top-level floating window, and the top-level floating window is popped up in the mobile terminal to support the interception operation of the top-level floating window by the mobile terminal, thereby protecting the privacy of the user and effectively improving the security of the user data.
  • a storage medium storing one or more modules, when the one or more modules are executed by an electronic device, causing the electronic device to perform: The method for controlling the top suspension window proposed by any one of the embodiments or the method for identifying the top suspension window proposed by any of the above fourth embodiments of the present application.
  • the application program of the eighth aspect of the present application is configured to perform the control method of the top floating window proposed in any one of the foregoing first aspects of the present application, or any one of the foregoing fourth aspects of the present application.
  • the proposed method for identifying the top suspended window is configured to perform the control method of the top floating window proposed in any one of the foregoing first aspects of the present application, or any one of the foregoing fourth aspects of the present application.
  • FIG. 1 is a schematic flow chart of a method for controlling a top suspension window according to an embodiment of the present application
  • FIG. 2 is a schematic flow chart of a method for controlling a top suspension window according to another embodiment of the present application
  • FIG. 3 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
  • FIG. 4 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
  • FIG. 5 is a schematic diagram of steps of setting an auxiliary event read permission in the embodiment of the present application.
  • FIG. 6 is a schematic diagram of steps of setting an auxiliary event reading permission in the embodiment of the present application.
  • FIG. 7 is a schematic diagram of a top suspension window of a mobile terminal in an embodiment of the present application.
  • FIG. 8 is a schematic flow chart of a method for controlling a top suspension window according to another embodiment of the present application.
  • FIG. 9 is a schematic diagram of a jump interface after a user triggers a top-level floating window in the prior art
  • FIG. 10 is a schematic diagram of a jump interface after a user triggers a top-level floating window in the embodiment of the present application
  • FIG. 11 is a schematic flow chart of a method for identifying a top suspension window according to another embodiment of the present application.
  • FIG. 12 is a schematic flow chart of a method for identifying a top suspension window according to another embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application.
  • FIG. 14 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application.
  • FIG. 15 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
  • 16 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
  • FIG. 17 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
  • FIG. 18 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application.
  • FIG. 1 is a schematic flow chart of a method for controlling a top suspension window according to an embodiment of the present application, the method includes:
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the method further includes:
  • the target application is, for example, an application that needs to protect the privacy of the message.
  • the communication tool FB Messenger For example, the communication tool FB Messenger.
  • the floating window message protection function can be set by the user in advance.
  • the method further includes:
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
  • the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
  • the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
  • determining whether there is a top-level floating window according to the auxiliary event specifically includes determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package name Whether it is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is a window The application corresponding to the auxiliary event of the state change and the auxiliary event of the window content change.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that there is a top level floating window.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • providing an authentication interface according to the instruction includes: determining whether the application corresponding to the top-level floating window is a target The application; if the application corresponding to the top floating window is the target application, the authentication interface is provided according to the instruction, and if the application corresponding to the top floating window is not the target application, the application corresponding to the top floating window is provided. Program interface.
  • the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
  • the method further includes:
  • the application interface corresponding to the top floating window is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
  • FIG. 11 is a schematic flowchart of a method for identifying a top-level floating window according to another embodiment of the present application, where the method includes:
  • S111 Acquire an auxiliary event in an operating system in the mobile terminal.
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the method before acquiring the auxiliary event in the operating system in the mobile terminal, the method further includes:
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include “on” and "off”. When the status of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system.
  • the status of the CM Security tag module 41 is "on", which means that read permission is set for the auxiliary event in the operating system.
  • the user can slide the button 51 to the right to jump to the interface shown in FIG. 6.
  • the user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • S112 Determine whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application obtains an auxiliary event A, it determines whether the auxiliary event A includes a secondary event of the Window state change and a secondary event of the Window content change, and the auxiliary event of the Window state change and the application package corresponding to the auxiliary event of the Window content change. Whether the names are the same.
  • the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
  • the method further includes:
  • S122 Receive an instruction that the user triggers the top level floating window, and provide an authentication interface according to the instruction.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • the application interface corresponding to the top floating window is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
  • FIG. 13 is a schematic structural diagram of a control device for a top suspension window according to another embodiment of the present application, the device 130 package
  • the auxiliary event obtaining module 1301, the top level floating window determining module 1302, and the authentication interface providing module 1303 are included.
  • the auxiliary event obtaining module 1301 is configured to acquire an auxiliary event in the operating system in the mobile terminal.
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the device 130 further includes a floating window message protection function opening module 1304.
  • the floating window message protection function opening module 1304 is configured to enable the floating window message protection function of the target application.
  • the target application is, for example, an application that needs to protect the privacy of the message.
  • the communication tool FB Messenger For example, the communication tool FB Messenger.
  • the floating window message protection function can be set by the user in advance.
  • the apparatus 130 further includes an auxiliary event reading authority obtaining module 1305.
  • the auxiliary event read permission obtaining module 1305 is configured to acquire the auxiliary event read permission in the operating system.
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
  • the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • the top floating window determining module 1302 is configured to determine whether there is a top floating window according to the auxiliary event.
  • FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
  • the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
  • the top-level floating window determining module 1302 determines that there is a top-level floating window when determining that the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, and The application corresponding to the top floating window corresponds to the auxiliary event of the window state change and the auxiliary event of the window content change. s application.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change Then, it is determined that there is a top floating window.
  • the authentication interface providing module 1303 is configured to receive an instruction that the user triggers the top level floating window when the top level floating window exists, and provide an authentication interface according to the instruction.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • the authentication interface providing module 1303 is specifically configured to: determine whether an application corresponding to the top-level floating window is a target application; if the application corresponding to the top-level floating window is a target application, according to the instruction Providing an authentication interface. If the application corresponding to the top floating window is not the target application, the application interface corresponding to the top floating window is provided.
  • the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
  • the device 130 further includes an application interface providing module 1306.
  • the application interface providing module 1306 is configured to provide an application interface corresponding to the top floating window when the user passes the authentication.
  • the corresponding content after the top floating window is triggered is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
  • FIG. 16 is a schematic structural diagram of an apparatus for identifying a top suspension window according to another embodiment of the present application.
  • the apparatus 160 includes an auxiliary event acquisition module 1601 and a determination module 1602.
  • the auxiliary event obtaining module 1601 is configured to acquire an auxiliary event in the operating system in the mobile terminal.
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the apparatus 160 further includes:
  • the auxiliary event read permission obtaining module 1603 is configured to acquire the auxiliary event read permission in the operating system.
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
  • the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • the determining module 1602 is configured to determine whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same, wherein the auxiliary event and the window content including the window state change are included If the auxiliary event is changed and the corresponding application package name is the same, the judgment window is the top floating window.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
  • the apparatus 160 further includes:
  • the authentication interface providing module 1604 is configured to provide an authentication interface according to the instruction when receiving an instruction that the user triggers the top-level floating window.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • the application interface provides a module 1605 for providing an application interface when the user is authenticated.
  • the application interface corresponding to the top floating window is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
  • the embodiment of the present application further provides a mobile terminal, which includes a housing 1701, a processor 1702, a memory 1703, a circuit board 1704, and a power supply circuit 1705.
  • the circuit board 1704 is disposed inside the space surrounded by the housing 1701.
  • the processor 1702 and the memory 1703 are disposed on the circuit board 1704;
  • the power supply circuit 1705 is configured to supply power to the respective circuits or devices of the mobile terminal;
  • the memory 1703 is configured to store executable program code;
  • the processor 1702 is stored in the read memory 1703. Executable code to run a program corresponding to the executable code for execution:
  • S11' Acquire an auxiliary event in the operating system in the mobile terminal.
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
  • the target application is, for example, an application that needs to protect the privacy of the message.
  • the communication tool FB Messenger For example, the communication tool FB Messenger.
  • the floating window message protection function can be set by the user in advance.
  • the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
  • the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • FIG. 7 it is a schematic diagram of a top floating window in a mobile terminal.
  • the module 70 is a top-level floating window that pops up after the communication tool receives a new message, and the top-level floating window is used to notify the user that a new message has been received to remind the user to view.
  • determining whether there is a top-level floating window according to the auxiliary event specifically includes determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and the corresponding application package name Whether it is the same; if the auxiliary event includes the auxiliary event of the window state change and the auxiliary event of the window content change, and the corresponding application package names are the same, it is determined that there is a top floating window, and the application corresponding to the top floating window is a window The application corresponding to the auxiliary event of the state change and the auxiliary event of the window content change.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application gets a secondary event A, if the secondary event A includes the auxiliary event of Window state change and the auxiliary event of Window content change, and the auxiliary event of Window state change and the package name of the application corresponding to the auxiliary event of Window content change The same, it is determined that there is a top floating window.
  • S13' if there is a top-level floating window, receiving an instruction that the user triggers the top-level floating window, and providing an authentication interface according to the instruction.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • providing an authentication interface according to the instruction includes: determining whether the application corresponding to the top-level floating window is a target The application; if the application corresponding to the top floating window is the target application, providing an authentication interface according to the instruction; if the application corresponding to the top floating window is not the target application, providing an application interface corresponding to the top floating window.
  • the application corresponding to the top floating window is the communication tool FB Messenger, and the target application that the user needs to set the floating window message protection function is also FB Messenger, then Provides an interface to authenticate the user to receive authentication information entered by the user and verify the identity of the user.
  • the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
  • the application interface corresponding to the top floating window is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top-level floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • an authentication interface is provided, which protects the privacy of the user and effectively improves the security of the user data.
  • the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
  • S111' Acquire an auxiliary event in an operating system in the mobile terminal.
  • the execution subject of this embodiment is an application of the mobile terminal.
  • the application may refer to a software program running on an electronic device.
  • the electronic device is, for example, a personal computer (PC), a cloud device or a mobile terminal.
  • a mobile terminal such as a smartphone, or a tablet.
  • the operating system is a computer program that manages and controls computer hardware and software resources.
  • the OS is the most basic system software running directly on the "bare metal". Any other software must be supported by the operating system. .
  • the Android operating system For example, the Android operating system.
  • auxiliary events can be represented by Accessibility event.
  • the mobile terminal's application obtains the auxiliary event of the top-level floating window of the new message pop-up message in the communication tool FB Messenger in the mobile phone.
  • the processor 1702 operates by reading executable program code stored in the memory 1703. Execute the program corresponding to the program code for execution:
  • the auxiliary event read permission may be preset by the user.
  • the application CM Security can be used to set the auxiliary event read permission in the operating system.
  • the button 31 "Go” in FIG. 3 can be clicked to cause the application CM Security to jump to the interface shown in FIG. 4, or click the button 32 "Cancel” in FIG. 3 to exit the auxiliary event reading in the setting operating system.
  • the states of the CM Security tag module 41 in FIG. 4 include "on" and "off”.
  • the state of the CM Security tag module 41 When the state of the CM Security tag module 41 is set to "off", it means that the read permission is not set for the auxiliary event in the operating system, and when the state of the CM Security tag module 41 is set to "on", the auxiliary event setting in the operating system is set. Read permission. Referring to FIG. 5, the user can slide the button 51 to the right to jump to the interface shown in FIG. 6. The user can set the auxiliary event read permission in the operating system by clicking button 61 "OK" in FIG.
  • S112' determining whether the auxiliary event includes an auxiliary event of the window state change and an auxiliary event of the window content change, and whether the application package names corresponding to the two are the same.
  • the window state change can be represented by Window state change
  • the window content change can be represented by Window content change
  • a window event is triggered when the window in the mobile terminal is switched from foreground to background, or from background to foreground.
  • a secondary event of Window content change is triggered.
  • the application obtains an auxiliary event A, it determines whether the auxiliary event A includes a secondary event of the Window state change and a secondary event of the Window content change, and the auxiliary event of the Window state change and the application package corresponding to the auxiliary event of the Window content change. Whether the names are the same.
  • the application gets a secondary event A if the secondary event A includes a secondary event of Window state change and a secondary event of Window content change, and the auxiliary event of Window state change is the same as the application package name corresponding to the auxiliary event of Window content change , then determine that the window is the top floating window.
  • the processor 1702 runs a program corresponding to the executable program code by reading the executable program code stored in the memory 1703 for execution:
  • S122' receiving an instruction that the user triggers the top-level floating window, and providing an authentication interface according to the instruction.
  • the instruction to trigger the top floating window may be, for example, a user click, or a top floating window may be slid.
  • the authentication interface is to unlock the interface.
  • the unlock interface can be used for character unlocking, fingerprint unlocking or voiceprint unlocking.
  • the application interface corresponding to the top floating window is provided.
  • the mobile terminal pops up the chat interface of the application corresponding to the top floating window.
  • an authentication interface is provided, and when the user passes the authentication, the top-level floating window is provided.
  • the determination window is a top-level floating window. It can be timely monitored that the top-level floating window pops up in the mobile terminal to support the mobile terminal to intercept the top-level floating window, protect the privacy of the user, and effectively improve the security of the user data.
  • the mobile terminal exists in various forms including, but not limited to:
  • Mobile communication devices These devices are characterized by mobile communication functions and are mainly aimed at providing voice and data communication.
  • Such terminals include: smart phones (such as iPhone), multimedia phones, functional phones, and low-end phones.
  • Ultra-mobile personal computer equipment This type of equipment belongs to the category of personal computers, has computing and processing functions, and generally has mobile Internet access.
  • Such terminals include: PDAs, MIDs, and UMPC devices, such as the iPad.
  • Portable entertainment devices These devices can display and play multimedia content. Such devices include: audio, video players (such as iPod), handheld game consoles, e-books, and smart toys and portable car navigation devices.
  • the embodiment of the present application further provides a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
  • the control method of the top suspension window
  • the embodiment of the present application further provides a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
  • the method for identifying the top suspended window is not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to, but not limited to store a storage medium, where the storage medium stores one or more modules, when the one or more modules are executed by one electronic device, causing the electronic device to perform any of the foregoing embodiments.
  • the embodiment of the present application further provides an application program for performing the control method of the top floating window according to any of the foregoing embodiments at runtime.
  • the embodiment of the present application further provides an application program for performing the method for identifying the top floating window according to any of the foregoing embodiments at runtime.
  • portions of the application can be implemented in hardware, software, firmware, or a combination thereof.
  • multiple steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system.
  • a suitable instruction execution system For example, if implemented in hardware, as in another embodiment, it can be implemented by any one or combination of the following techniques well known in the art: having logic gates for implementing logic functions on data signals. Discrete logic circuits, application specific integrated circuits with suitable combinational logic gates, programmable gate arrays (PGAs), field programmable gate arrays (FPGAs), etc.
  • each functional unit in each embodiment of the present application may be integrated into one processing module, or each unit may exist physically separately, or two or more units may be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or in the form of software functional modules.
  • the integrated modules, if implemented in the form of software functional modules and sold or used as stand-alone products, may also be stored in a computer readable storage medium.
  • the above mentioned storage medium may be a read only memory, a magnetic disk or an optical disk or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

一种顶层悬浮窗的控制方法、装置和移动终端。该顶层悬浮窗的控制方法包括获取移动终端中操作系统中的辅助事件(S11);根据辅助事件判断是否存在顶层悬浮窗(S12);如果存在顶层悬浮窗,则接收用户触发顶层悬浮窗的指令,根据指令,提供身份验证界面(S13)。

Description

顶层悬浮窗的控制方法、装置和移动终端
相关申请的交叉引用
本申请基于申请号为201510601330.0,申请日为2015年9月18日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及移动终端技术领域,尤其涉及一种顶层悬浮窗的控制方法、装置和移动终端。
背景技术
在人们的日常生活中,用户会使用移动终端完成很多操作,例如,用户可以使用手机通讯工具进行聊天、拍摄照片,以及传送文档等。
手机中的有些应用程序使用悬浮窗技术,强制在任何情况下在手机上弹出气泡,例如,通讯工具FB Messenger,只要收到聊天消息,则会在手机上弹出聊天对话的窗口,这种弹出气泡的情况,每天可以遇到数十次至数百次,对人们是一种干扰。此外,更为严重的是这种弹出气泡的方式,不能够被阻拦,导致任何人都可以打开此悬浮窗弹出气泡,用户的聊天隐私容易泄露,安全性非常差。
发明内容
本申请旨在至少在一定程度上解决相关技术中的技术问题之一。
本申请第一方面实施例提出的顶层悬浮窗的控制方法,包括:获取移动终端中操作系统中的辅助事件;根据所述辅助事件判断是否存在顶层悬浮窗;如果存在所述顶层悬浮窗,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
在本申请的至少一个实施例中,所述根据所述辅助事件判断是否存在顶层悬浮窗,具体包括:判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
在本申请的至少一个实施例中,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:开启目标应用程序的悬浮窗讯息保护功能。
在本申请的至少一个实施例中,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:获取所述操作系统中的所述辅助事件读取权限。
在本申请的至少一个实施例中,所述根据所述指令,提供身份验证界面,具体包括:判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
在本申请的至少一个实施例中,所述方法还包括:如果用户通过身份验证,则提供所述顶层悬浮窗对应的应用程序界面。
本申请第一方面实施例提出的顶层悬浮窗的控制方法,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
本申请第二方面实施例提出的顶层悬浮窗的控制装置,包括:辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;顶层悬浮窗判断模块,用于根据所述辅助事件判断是否存在顶层悬浮窗;身份验证界面提供模块,用于在存在所述顶层悬浮窗时,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
在本申请的至少一个实施例中,所述顶层悬浮窗判断模块在判断所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
在本申请的至少一个实施例中,所述装置还包括:悬浮窗讯息保护功能开启模块,用于开启目标应用程序的悬浮窗讯息保护功能。
在本申请的至少一个实施例中,所述装置还包括:辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
在本申请的至少一个实施例中,所述身份验证界面提供模块具体用于:判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
在本申请的至少一个实施例中,还包括:应用程序界面提供模块,用于在所述用户通过身份验证时,提供所述顶层悬浮窗对应的应用程序界面。
本申请第二方面实施例提出的顶层悬浮窗的控制装置,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
本申请第三方面实施例提出的移动终端,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过 读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行上述本申请第一方面任一项实施例提出的顶层悬浮窗的控制方法。
本申请第三方面实施例提出的移动终端,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
本申请第四方面实施例提出的顶层悬浮窗的识别方法,包括:获取移动终端中操作系统中的辅助事件;判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断所述视窗为顶层悬浮窗。
在本申请的至少一个实施例中,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:获取所述操作系统中的所述辅助事件读取权限。
在本申请的至少一个实施例中,所述方法还包括:接收到用户触发所述顶层悬浮窗的指令,则根据所述指令,提供身份验证界面。
在本申请的至少一个实施例中,所述方法还包括:如果用户通过身份验证,则提供所述应用程序界面。
本申请第四方面实施例提出的顶层悬浮窗的识别方法,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
本申请第五方面实施例提出的顶层悬浮窗的识别装置,包括:辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;判断模块,用于判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同,其中,如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断视窗为顶层悬浮窗。
在本申请的至少一个实施例中,所述装置还包括:辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
在本申请的至少一个实施例中,所述装置还包括:身份验证界面提供模块,用于在接收到用户触发所述顶层悬浮窗的指令时,根据所述指令,提供身份验证界面。
在本申请的至少一个实施例中,所述装置还包括:应用程序界面提供模块,用于在用户通过身份验证时,提供所述应用程序界面。
本申请第五方面实施例提出的顶层悬浮窗的识别装置,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序 包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
本申请第六方面实施例提出的移动终端,包括:壳体、处理器、存储器、电路板和电源电路,其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:上述本申请第四方面任一项实施例提出的顶层悬浮窗的识别方法。
本申请第六方面实施例提出的移动终端,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
本申请第七方面实施例提出的存储介质,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备执行:上述本申请第一方面任一项实施例提出的顶层悬浮窗的控制方法或上述本申请第四方面任一项实施例提出的顶层悬浮窗的识别方法。
本申请第八方面实施例提出的应用程序,用于在运行时,执行上述本申请第一方面任一项实施例提出的顶层悬浮窗的控制方法或上述本申请第四方面任一项实施例提出的顶层悬浮窗的识别方法。
本申请附加的方面和优点将在下面的描述中部分给出,部分将从下面的描述中变得明显,或通过本申请的实践了解到。
附图说明
本申请上述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1是本申请一实施例提出的顶层悬浮窗的控制方法的流程示意图;
图2是本申请另一实施例提出的顶层悬浮窗的控制方法的流程示意图;
图3是本申请实施例中设置辅助事件读取权限的步骤示意图;
图4是本申请实施例中设置辅助事件读取权限的步骤示意图;
图5是本申请实施例中设置辅助事件读取权限的步骤示意图;
图6是本申请实施例中设置辅助事件读取权限的步骤示意图;
图7是本申请实施例中移动终端顶层悬浮窗的示意图;
图8是本申请另一实施例提出的顶层悬浮窗的控制方法的流程示意图;
图9是现有技术中用户触发顶层悬浮窗后的跳转界面示意图;
图10是本申请实施例中用户触发顶层悬浮窗后的跳转界面示意图;
图11是本申请另一实施例提出的顶层悬浮窗的识别方法的流程示意图;
图12是本申请另一实施例提出的顶层悬浮窗的识别方法的流程示意图;
图13是本申请另一实施例提出的顶层悬浮窗的控制装置的结构示意图;
图14是本申请另一实施例提出的顶层悬浮窗的控制装置的结构示意图;
图15是本申请另一实施例提出的顶层悬浮窗的识别装置的结构示意图;
图16是本申请另一实施例提出的顶层悬浮窗的识别装置的结构示意图;
图17是本申请另一实施例提出的顶层悬浮窗的识别装置的结构示意图;
图18是本申请一实施例提出的移动终端的结构示意图。
具体实施方式
下面详细描述本申请的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本申请,而不能理解为对本申请的限制。相反,本申请的实施例包括落入所附加权利要求书的精神和内涵范围内的所有变化、修改和等同物。
图1是本申请一实施例提出的顶层悬浮窗的控制方法的流程示意图,该方法包括:
S11:获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
一个实施例中,参见图2,在S11之前,该方法还包括:
S21:开启目标应用程序的悬浮窗讯息保护功能。
目标应用程序例如为需要保护讯息隐私的应用程序。
例如,通讯工具FB Messenger。
在本申请的至少一个实施例中,可以由用户预先设置开启悬浮窗讯息保护功能。
另一个实施例中,参见图2,在S11之前,该方法还包括:
S22:获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
S12:根据辅助事件判断是否存在顶层悬浮窗。
参见图7,为移动终端中顶层悬浮窗的示意图。图中模块70为通讯工具收到新的消息后,弹出的顶层悬浮窗,该顶层悬浮窗用于通知用户收到了新的消息,提醒用户查看。
其中,在本申请的一个实施例中,根据辅助事件判断是否存在顶层悬浮窗具体包括判断辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果判断辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断存在顶层悬浮窗,且顶层悬浮窗对应的应用程序为视窗状态改变的辅助事件和视窗内容改变的辅助事件对应的应用程序。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名相同,则确定存在顶层悬浮窗。
S13:如果存在顶层悬浮窗,则接收用户触发顶层悬浮窗的指令,根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
在本申请的至少一个实施例中,如果存在顶层悬浮窗,且接收到用户触发顶层悬浮窗的指令,则根据指令,提供身份验证界面,具体包括:判断顶层悬浮窗对应的应用程序是否为目标应用程序;如果顶层悬浮窗对应的应用程序是目标应用程序,则根据指令,提供身份验证界面,如果顶层悬浮窗对应的应用程序不是目标应用程序,则提供顶层悬浮窗对应的应用 程序界面。
例如,在接收到用户触发顶层悬浮窗的指令之后,如果顶层悬浮窗对应的应用程序为通讯工具FB Messenger,且用户预先设置的需要开启悬浮窗讯息保护功能的目标应用程序也为FB Messenger,则提供验证用户身份的界面,以接收用户输入的验证信息,验证用户身份。
另一个实施例中,参见图8,在S13之后,该方法还包括:
S14:如果用户通过身份验证,则提供顶层悬浮窗对应的应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗对应的应用程序界面。例如,参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
图11是本申请另一实施例提出的顶层悬浮窗的识别方法的流程示意图,该方法包括:
S111:获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
另一个实施例中,参见图12,获取移动终端中操作系统中的辅助事件之前,该方法还包括:
S121:获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设 置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
S112:判断辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,则判断辅助事件A是否包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名是否相同。
S113:如果包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断视窗为顶层悬浮窗。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名相同,则确定视窗为顶层悬浮窗。
另一个实施例中,参见图12,该方法还包括:
S122:接收到用户触发顶层悬浮窗的指令,则根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
S123:如果用户通过身份验证,则提供应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗对应的应用程序界面。例如,参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
图13是本申请另一实施例提出的顶层悬浮窗的控制装置的结构示意图,该装置130包 括辅助事件获取模块1301、顶层悬浮窗判断模块1302,以及身份验证界面提供模块1303。
辅助事件获取模块1301,用于获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
一个实施例中,参见图14,该装置130还包括悬浮窗讯息保护功能开启模块1304。
悬浮窗讯息保护功能开启模块1304,用于开启目标应用程序的悬浮窗讯息保护功能。
目标应用程序例如为需要保护讯息隐私的应用程序。
例如,通讯工具FB Messenger。
在本申请的至少一个实施例中,可以由用户预先设置开启悬浮窗讯息保护功能。
另一个实施例中,参见图14,该装置130还包括辅助事件读取权限获取模块1305。
辅助事件读取权限获取模块1305,用于获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
顶层悬浮窗判断模块1302,用于根据辅助事件判断是否存在顶层悬浮窗。
参见图7,为移动终端中顶层悬浮窗的示意图。图中模块70为通讯工具收到新的消息后,弹出的顶层悬浮窗,该顶层悬浮窗用于通知用户收到了新的消息,提醒用户查看。
另一个实施例中,顶层悬浮窗判断模块1302在判断辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断存在顶层悬浮窗,且顶层悬浮窗对应的应用程序为视窗状态改变的辅助事件和视窗内容改变的辅助事件对应 的应用程序。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名相同,则辅确定存在顶层悬浮窗。
身份验证界面提供模块1303,用于在存在顶层悬浮窗时,则接收用户触发顶层悬浮窗的指令,根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
在本申请的至少一个实施例中,身份验证界面提供模块1303具体用于:判断顶层悬浮窗对应的应用程序是否为目标应用程序;如果顶层悬浮窗对应的应用程序是目标应用程序,则根据指令,提供身份验证界面,如果顶层悬浮窗对应的应用程序不是目标应用程序,则提供顶层悬浮窗对应的应用程序界面。
例如,在接收到用户触发顶层悬浮窗的指令之后,如果顶层悬浮窗对应的应用程序为通讯工具FB Messenger,且用户预先设置的需要开启悬浮窗讯息保护功能的目标应用程序也为FB Messenger,则提供验证用户身份的界面,以接收用户输入的验证信息,验证用户身份。
另一个实施例中,参见图15,其特征在于,该装置130还包括应用程序界面提供模块1306。
应用程序界面提供模块1306,用于在用户通过身份验证时,提供顶层悬浮窗对应的应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗触发之后对应的内容。例如,参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
图16是本申请另一实施例提出的顶层悬浮窗的识别装置的结构示意图,该装置160包括辅助事件获取模块1601和判断模块1602。
辅助事件获取模块1601,用于获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
另一个实施例中,参见图17,该装置160还包括:
辅助事件读取权限获取模块1603,用于获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
判断模块1602,用于判断辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同,其中,如果包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断视窗为顶层悬浮窗。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名相同,则确定视窗为顶层悬浮窗。
另一个实施例中,参见图17,该装置160还包括:
身份验证界面提供模块1604,用于在接收到用户触发顶层悬浮窗的指令时,根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
应用程序界面提供模块1605,用于在用户通过身份验证时,提供应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗对应的应用程序界面。例如,参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
本申请实施例还提供了一种移动终端,该移动终端包括壳体1701、处理器1702、存储器1703、电路板1704和电源电路1705,其中,电路板1704安置在壳体1701围成的空间内部,处理器1702和存储器1703设置在电路板1704上;电源电路1705,用于为移动终端的各个电路或器件供电;存储器1703用于存储可执行程序代码;处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S11’:获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S21’:开启目标应用程序的悬浮窗讯息保护功能。
目标应用程序例如为需要保护讯息隐私的应用程序。
例如,通讯工具FB Messenger。
在本申请的至少一个实施例中,可以由用户预先设置开启悬浮窗讯息保护功能。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S22’:获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
S12’:根据辅助事件判断是否存在顶层悬浮窗。
参见图7,为移动终端中顶层悬浮窗的示意图。图中模块70为通讯工具收到新的消息后,弹出的顶层悬浮窗,该顶层悬浮窗用于通知用户收到了新的消息,提醒用户查看。
其中,在本申请的一个实施例中,根据辅助事件判断是否存在顶层悬浮窗具体包括判断辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;如果判断辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断存在顶层悬浮窗,且顶层悬浮窗对应的应用程序为视窗状态改变的辅助事件和视窗内容改变的辅助事件对应的应用程序。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序的包名相同,则确定存在顶层悬浮窗。
S13’:如果存在顶层悬浮窗,则接收用户触发顶层悬浮窗的指令,根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
在本申请的至少一个实施例中,如果存在顶层悬浮窗,且接收到用户触发顶层悬浮窗的指令,则根据指令,提供身份验证界面,具体包括:判断顶层悬浮窗对应的应用程序是否为目标应用程序;如果顶层悬浮窗对应的应用程序是目标应用程序,则根据指令,提供身份验证界面;如果顶层悬浮窗对应的应用程序不是目标应用程序,则提供顶层悬浮窗对应的应用程序界面。
例如,在接收到用户触发顶层悬浮窗的指令之后,如果顶层悬浮窗对应的应用程序为通讯工具FB Messenger,且用户预先设置的需要开启悬浮窗讯息保护功能的目标应用程序也为FB Messenger,则提供验证用户身份的界面,以接收用户输入的验证信息,验证用户身份。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S14’:如果用户通过身份验证,则提供顶层悬浮窗对应的应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗对应的应用程序界面。例如,参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在触发移动终端的顶层悬浮窗后,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,保护了用户的隐私,有效提高用户数据的安全性。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S111’:获取移动终端中操作系统中的辅助事件。
本实施例的执行主体是移动终端的应用程序。
其中,应用程序可以是指运行在电子设备上的软件程序。电子设备例如为个人电脑(Personal Computer,PC),云端设备或者移动终端。
移动终端例如智能手机,或者平板电脑等。
操作系统(Operating System,OS)是管理和控制计算机硬件与软件资源的计算机程序,OS是直接运行在“裸机”上的最基本的系统软件,任何其他软件都必须在操作系统的支持下才能运行。例如,Android操作系统。
其中,辅助事件可以用Accessibility event表示。
例如,移动终端的应用程序获取手机中的通讯工具FB Messenger弹出新消息的顶层悬浮窗这一辅助事件。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可 执行程序代码对应的程序,以用于执行:
S121’:获取操作系统中的辅助事件读取权限。
在本申请的至少一个实施例中,辅助事件读取权限可以由用户预先设置。
例如,参见图3,本申请实施例中可以使用应用程序CM Security设置操作系统中的辅助事件读取权限。具体地,可以点击图3中的按钮31“Go”,使应用程序CM Security跳转至图4所示界面,也可以点击图3中的按钮32“Cancel”退出设置操作系统中的辅助事件读取权限的界面。图4中的CM Security标签模块41的状态包括“on”和“off”。当设置CM Security标签模块41的状态为“off”,表示不对操作系统中的辅助事件设置读取权限,当设置CM Security标签模块41的状态为“on”,表示对操作系统中的辅助事件设置读取权限。参见图5,用户可以将按钮51向右滑动,则跳转至图6所示界面。用户可以通过点击图6中的按钮61“OK”,设置操作系统中的辅助事件读取权限。
S112’:判断辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同。
其中,视窗状态改变可以由Window state change表示,视窗内容改变可以由Window content change表示。
当移动终端中的视窗由前景转换到背景,或者由背景转换到前景时,会触发Window state change的辅助事件。当移动终端中视窗的内容发生变化时,会触发Window content change的辅助事件。
例如,应用程序获取一个辅助事件A,则判断辅助事件A是否包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名是否相同。
S113’:如果包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断视窗为顶层悬浮窗。
例如,应用程序获取一个辅助事件A,如果辅助事件A包括Window state change的辅助事件和Window content change的辅助事件,且Window state change的辅助事件和Window content change的辅助事件对应的应用程序包名相同,则确定视窗为顶层悬浮窗。
另一实施例中,处理器1702通过读取存储器1703中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行:
S122’:接收到用户触发顶层悬浮窗的指令,则根据指令,提供身份验证界面。
其中,触发顶层悬浮窗的指令可以例如用户点击,或者,滑动顶层悬浮窗。
身份验证界面为解锁界面。
解锁界面可以为字符解锁、指纹解锁或声纹解锁。
S123’:如果用户通过身份验证,则提供应用程序界面。
现有技术中,当用户触发顶层悬浮窗,则提供顶层悬浮窗对应的应用程序界面。例如, 参见图9,当用户收到图7所示的顶层悬浮窗的新消息提醒信息并且点击该顶层悬浮窗后,则移动终端弹出该顶层悬浮窗对应的应用程序的聊天界面。而本实施例中,参见图10,当用户触发顶层悬浮窗,并在顶层悬浮窗对应的应用程序为目标应用程序时,提供身份验证界面,当用户通过身份验证后,则提供顶层悬浮窗对应的应用程序界面。
本实施例中,通过在移动终端中操作系统中的辅助事件包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名相同时,判断视窗为顶层悬浮窗,可以及时监测到移动终端中弹出了顶层悬浮窗,以支持移动终端对顶层悬浮窗的拦截操作,保护了用户的隐私,有效提高用户数据的安全性。
该移动终端以多种形式存在,包括但不限于:
(1)移动通信设备:这类设备的特点是具备移动通信功能,并且以提供话音、数据通信为主要目标。这类终端包括:智能手机(例如iPhone)、多媒体手机、功能性手机,以及低端手机等。
(2)超移动个人计算机设备:这类设备属于个人计算机的范畴,有计算和处理功能,一般也具备移动上网特性。这类终端包括:PDA、MID和UMPC设备等,例如iPad。
(3)便携式娱乐设备:这类设备可以显示和播放多媒体内容。该类设备包括:音频、视频播放器(例如iPod),掌上游戏机,电子书,以及智能玩具和便携式车载导航设备。
(4)其他具有数据交互功能的电子装置。
本申请实施例还提供了一种存储介质,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备执行前述任一实施例所述的顶层悬浮窗的控制方法。
本申请实施例还提供了一种存储介质,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备执行前述任一实施例所述的顶层悬浮窗的识别方法。
本申请实施例还提供了一种应用程序,用于在运行时,执行前述任一实施例所述的顶层悬浮窗的控制方法。
本申请实施例还提供了一种应用程序,用于在运行时,执行前述任一实施例所述的顶层悬浮窗的识别方法。
需要说明的是,在本申请的描述中,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。此外,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。
流程图中或在此以其他方式描述的任何过程或方法描述可以被理解为,表示包括一个或更多个用于实现特定逻辑功能或过程的步骤的可执行指令的代码的模块、片段或部分,并且本申请的优选实施方式的范围包括另外的实现,其中可以不按所示出或讨论的顺序,包括根据所涉及的功能按基本同时的方式或按相反的顺序,来执行功能,这应被本申请的实施例所 属技术领域的技术人员所理解。
应当理解,本申请的各部分可以用硬件、软件、固件或它们的组合来实现。在上述实施方式中,多个步骤或方法可以用存储在存储器中且由合适的指令执行系统执行的软件或固件来实现。例如,如果用硬件来实现,和在另一实施方式中一样,可用本领域公知的下列技术中的任一项或他们的组合来实现:具有用于对数据信号实现逻辑功能的逻辑门电路的离散逻辑电路,具有合适的组合逻辑门电路的专用集成电路,可编程门阵列(PGA),现场可编程门阵列(FPGA)等。
本技术领域的普通技术人员可以理解实现上述实施例方法携带的全部或部分步骤是可以通过程序来指令相关的硬件完成,所述的程序可以存储于一种计算机可读存储介质中,该程序在执行时,包括方法实施例的步骤之一或其组合。
此外,在本申请各个实施例中的各功能单元可以集成在一个处理模块中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。所述集成的模块如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。
上述提到的存储介质可以是只读存储器,磁盘或光盘等。
在本说明书的描述中,参考术语“一个实施例”、“一些实施例”、“示例”、“具体示例”、或“一些示例”等的描述意指结合该实施例或示例描述的具体特征、结构、材料或者特点包含于本申请的至少一个实施例或示例中。在本说明书中,对上述术语的示意性表述不一定指的是相同的实施例或示例。而且,描述的具体特征、结构、材料或者特点可以在任何的一个或多个实施例或示例中以合适的方式结合。
尽管上面已经示出和描述了本申请的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本申请的限制,本领域的普通技术人员在本申请的范围内可以对上述实施例进行变化、修改、替换和变型。

Claims (24)

  1. 一种顶层悬浮窗的控制方法,其特征在于,包括:
    获取移动终端中操作系统中的辅助事件;
    根据所述辅助事件判断是否存在顶层悬浮窗;
    如果存在所述顶层悬浮窗,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
  2. 如权利要求1所述的顶层悬浮窗的控制方法,其特征在于,所述根据所述辅助事件判断是否存在顶层悬浮窗,具体包括:
    判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;
    如果所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
  3. 如权利要求1或2所述的顶层悬浮窗的控制方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:
    开启目标应用程序的悬浮窗讯息保护功能。
  4. 如权利要求1至3中任一项所述的顶层悬浮窗的控制方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:
    获取所述操作系统中的所述辅助事件读取权限。
  5. 如权利要求3或4所述的顶层悬浮窗的控制方法,其特征在于,所述根据所述指令,提供身份验证界面,具体包括:
    判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;
    如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;
    如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
  6. 如权利要求1至5中任一项所述的顶层悬浮窗的控制方法,其特征在于,所述方法还包括:
    如果用户通过身份验证,则提供所述顶层悬浮窗对应的应用程序界面。
  7. 一种顶层悬浮窗的控制装置,其特征在于,包括:
    辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;
    顶层悬浮窗判断模块,用于根据所述辅助事件判断是否存在顶层悬浮窗;
    身份验证界面提供模块,用于在存在所述顶层悬浮窗时,则接收用户触发所述顶层悬浮窗的指令,根据所述指令,提供身份验证界面。
  8. 如权利要求7所述的顶层悬浮窗的控制装置,其特征在于,所述顶层悬浮窗判断模块在判断所述辅助事件包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序的包名相同时,判断存在顶层悬浮窗,且所述顶层悬浮窗对应的应用程序为所述应用程序。
  9. 如权利要求7或8所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:
    悬浮窗讯息保护功能开启模块,用于开启目标应用程序的悬浮窗讯息保护功能。
  10. 如权利要求7至9中任一项所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:
    辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
  11. 如权利要求9或10所述的顶层悬浮窗的控制装置,其特征在于,所述身份验证界面提供模块具体用于:
    判断所述顶层悬浮窗对应的应用程序是否为所述目标应用程序;
    如果所述顶层悬浮窗对应的应用程序是所述目标应用程序,则根据所述指令,提供身份验证界面;
    如果所述顶层悬浮窗对应的应用程序不是所述目标应用程序,则提供所述顶层悬浮窗对应的应用程序界面。
  12. 如权利要求7至11中任一项所述的顶层悬浮窗的控制装置,其特征在于,所述装置还包括:
    应用程序界面提供模块,用于在所述用户通过身份验证时,提供所述顶层悬浮窗对应的应用程序界面。
  13. 一种移动终端,其特征在于,包括:
    壳体;
    处理器;
    存储器;
    电路板和电源电路;
    其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过读取 存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法。
  14. 一种顶层悬浮窗的识别方法,其特征在于,包括:
    获取移动终端中操作系统中的辅助事件;
    判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同;
    如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断所述视窗为顶层悬浮窗。
  15. 如权利要求14所述的顶层悬浮窗识别方法,其特征在于,所述获取移动终端中操作系统中的辅助事件之前,所述方法还包括:
    获取所述操作系统中的所述辅助事件读取权限。
  16. 如权利要求14或15所述的顶层悬浮窗识别方法,其特征在于,所述方法还包括:
    接收到用户触发所述顶层悬浮窗的指令,则根据所述指令,提供身份验证界面。
  17. 如权利要求16所述的顶层窗口识别方法,其特征在于,所述方法还包括:
    如果用户通过身份验证,则提供所述应用程序界面。
  18. 一种顶层悬浮窗的识别装置,其特征在于,包括:
    辅助事件获取模块,用于获取移动终端中操作系统中的辅助事件;
    判断模块,用于判断所述辅助事件是否包括视窗状态改变的辅助事件和视窗内容改变的辅助事件,且二者对应的应用程序包名是否相同,其中,如果包括所述视窗状态改变的辅助事件和所述视窗内容改变的辅助事件,且二者对应的应用程序包名相同,则判断所述视窗为顶层悬浮窗。
  19. 如权利要求18所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:
    辅助事件读取权限获取模块,用于获取所述操作系统中的所述辅助事件读取权限。
  20. 如权利要求18或19所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:
    身份验证界面提供模块,用于在接收到用户触发所述顶层悬浮窗的指令时,根据所述指令,提供身份验证界面。
  21. 如权利要求20所述的顶层悬浮窗识别装置,其特征在于,所述装置还包括:
    应用程序界面提供模块,用于在用户通过身份验证时,提供所述应用程序界面。
  22. 一种移动终端,其特征在于,包括:
    壳体;
    处理器;
    存储器;
    电路板和电源电路;
    其中,电路板安置在壳体围成的空间内部,处理器和存储器设置在电路板上;电源电路,用于为移动终端的各个电路或器件供电;存储器用于存储可执行程序代码;处理器通过读取存储器中存储的可执行程序代码来运行与可执行程序代码对应的程序,以用于执行权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
  23. 一种存储介质,其特征在于,所述存储介质存储有一个或者多个模块,当所述一个或者多个模块被一个电子设备执行时,使得所述电子设备:
    执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法或权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
  24. 一种应用程序,其特征在于,用于在运行时,执行权利要求1至6中任一项所述的顶层悬浮窗的控制方法或权利要求14至17中任一项所述的顶层悬浮窗的识别方法。
PCT/CN2016/095891 2015-09-18 2016-08-18 顶层悬浮窗的控制方法、装置和移动终端 WO2017045511A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/756,930 US20180253538A1 (en) 2015-09-18 2016-08-18 Method and device for controlling top floating window and mobile terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510601330.0 2015-09-18
CN201510601330.0A CN105224836B (zh) 2015-09-18 2015-09-18 顶层悬浮窗的控制方法、装置和移动设备

Publications (1)

Publication Number Publication Date
WO2017045511A1 true WO2017045511A1 (zh) 2017-03-23

Family

ID=54993801

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/095891 WO2017045511A1 (zh) 2015-09-18 2016-08-18 顶层悬浮窗的控制方法、装置和移动终端

Country Status (3)

Country Link
US (1) US20180253538A1 (zh)
CN (1) CN105224836B (zh)
WO (1) WO2017045511A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224836B (zh) * 2015-09-18 2018-11-20 北京金山安全软件有限公司 顶层悬浮窗的控制方法、装置和移动设备
CN105808257B (zh) * 2016-03-08 2020-07-07 杭州朗和科技有限公司 一种应用弹窗识别方法和装置
CN111857897A (zh) * 2019-04-25 2020-10-30 北京小米移动软件有限公司 一种信息显示方法、装置及存储介质
CN114546554B (zh) * 2022-02-14 2023-11-07 支付宝(杭州)信息技术有限公司 一种控件的展示方法、装置以及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951568A (zh) * 2010-08-17 2011-01-19 优视科技有限公司 短信信息拦截处理方法及装置
US20120158472A1 (en) * 2010-12-21 2012-06-21 Research In Motion Limited Contextual customization of content display on a communication device
CN103164113A (zh) * 2013-01-31 2013-06-19 广东欧珀移动通信有限公司 一种备忘录快捷显示方法、装置及移动终端
CN103412751A (zh) * 2013-08-05 2013-11-27 北京奇虎科技有限公司 一种锁屏界面的信息展示方法和装置
CN104049847A (zh) * 2014-06-30 2014-09-17 宇龙计算机通信科技(深圳)有限公司 一种移动终端的信息提示方法及系统
CN105224836A (zh) * 2015-09-18 2016-01-06 北京金山安全软件有限公司 顶层悬浮窗的控制方法、装置和移动设备

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110247065A1 (en) * 2011-03-14 2011-10-06 Volodymyr Melnyk Simultaneous screen unlock and operation initiation
CN104714725B (zh) * 2011-12-31 2018-10-09 北京奇虎科技有限公司 一种悬浮窗的显示方法及装置
US9916072B2 (en) * 2013-02-20 2018-03-13 Lg Electronics Inc. Application and notification window display management in a mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101951568A (zh) * 2010-08-17 2011-01-19 优视科技有限公司 短信信息拦截处理方法及装置
US20120158472A1 (en) * 2010-12-21 2012-06-21 Research In Motion Limited Contextual customization of content display on a communication device
CN103164113A (zh) * 2013-01-31 2013-06-19 广东欧珀移动通信有限公司 一种备忘录快捷显示方法、装置及移动终端
CN103412751A (zh) * 2013-08-05 2013-11-27 北京奇虎科技有限公司 一种锁屏界面的信息展示方法和装置
CN104049847A (zh) * 2014-06-30 2014-09-17 宇龙计算机通信科技(深圳)有限公司 一种移动终端的信息提示方法及系统
CN105224836A (zh) * 2015-09-18 2016-01-06 北京金山安全软件有限公司 顶层悬浮窗的控制方法、装置和移动设备

Also Published As

Publication number Publication date
CN105224836A (zh) 2016-01-06
CN105224836B (zh) 2018-11-20
US20180253538A1 (en) 2018-09-06

Similar Documents

Publication Publication Date Title
US11184359B2 (en) Automated access control policy generation for computer resources
WO2016050146A1 (zh) 移动终端设备中的界面信息处理方法及装置
US9076020B2 (en) Protected mode for mobile communication and other devices
US9600670B2 (en) Provisioning location-based security policy
WO2016037318A1 (zh) 一种指纹识别方法、装置及移动终端
US9998488B2 (en) Protection system including machine learning snapshot evaluation
US10687211B2 (en) Mobile device, method for displaying screen thereof, wearable device, method for driving the same, and computer-readable recording medium
WO2014206203A1 (en) System and method for detecting unauthorized login webpage
WO2017045511A1 (zh) 顶层悬浮窗的控制方法、装置和移动终端
WO2017211205A1 (zh) 一种白名单更新方法和装置
US9426606B2 (en) Electronic apparatus and method of pairing in electronic apparatus
KR20150080736A (ko) 전자 장치의 기능 실행 방법 및 이를 사용하는 전자 장치
CN108475304B (zh) 一种关联应用程序和生物特征的方法、装置以及移动终端
US11176228B2 (en) Application interface display method, apparatus, and terminal, and storage medium
WO2019029093A1 (zh) 一种快捷启动功能页面的方法及其装置、电子设备
WO2017054585A1 (zh) 网络接入方法、装置及系统
US9510182B2 (en) User onboarding for newly enrolled devices
US20150248548A1 (en) Increasing access security with time since last access
WO2018153288A1 (zh) 数值转移方法、装置、设备及存储介质
EP3662399B1 (en) Electronic device and control method thereof
US9015798B1 (en) User authentication using pointing device
US9830437B2 (en) Automatic log-in function control
WO2019095449A1 (zh) 一种防止个人信息泄露的方法和装置
US20160021143A1 (en) Device federation
US20180234849A1 (en) Biometric-based disabling of mobile device feature(s)

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16845625

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 15756930

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 02/07/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 16845625

Country of ref document: EP

Kind code of ref document: A1