WO2018053904A1 - 一种信息处理方法及终端 - Google Patents

一种信息处理方法及终端 Download PDF

Info

Publication number
WO2018053904A1
WO2018053904A1 PCT/CN2016/104042 CN2016104042W WO2018053904A1 WO 2018053904 A1 WO2018053904 A1 WO 2018053904A1 CN 2016104042 W CN2016104042 W CN 2016104042W WO 2018053904 A1 WO2018053904 A1 WO 2018053904A1
Authority
WO
WIPO (PCT)
Prior art keywords
application
target
information
avatar
target information
Prior art date
Application number
PCT/CN2016/104042
Other languages
English (en)
French (fr)
Inventor
黄庆军
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2018053904A1 publication Critical patent/WO2018053904A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Definitions

  • the present invention relates to the field of the Internet, and in particular, to an information processing method and a terminal.
  • the notification information when an application of a terminal (such as a mobile phone or a tablet computer) receives the notification information, the notification information is displayed. For example, when the mobile phone receives the short message, the mobile phone displays it. In this way, the protection of the privacy information is not strong, which is not conducive to the user to protect the information in the process of using the mobile phone.
  • the private mode can be used to hide certain information of the user, the private mode can protect the information, but the private mode is protected in the security system, and therefore needs to be between the two operating systems. Switching is difficult.
  • the embodiment of the invention provides an information processing method and a terminal, which can conveniently protect information.
  • a first aspect of the embodiments of the present invention provides an information processing method, including:
  • the target application has a corresponding avatar application, determining whether the target object of the target information is the avatar application;
  • the receiving object of the target information is the avatar application, instructing the avatar application to receive the target information.
  • the determining whether the object to be received by the target information is the avatar application comprises:
  • the target information When the target information carries the receiving object indication information, it is determined whether the receiving object of the target information is the avatar application according to the receiving object indication information.
  • the method after determining whether the target application has a corresponding avatar application, the method also includes:
  • the main application corresponding to the target application is instructed to receive the target information.
  • the determining whether the target object of the target information is the avatar application further includes:
  • the receiving object of the target information is not the avatar application, indicating that the main application corresponding to the target application receives the target information.
  • the method After the indicating that the avatar application receives the target information, the method also includes:
  • the target information is saved in a database of the avatar application and the target information is encrypted.
  • the method further includes:
  • a second aspect of the embodiments of the present invention provides a terminal, including:
  • the first determining unit is configured to determine, when the target information for the target application is received, whether the target application has a corresponding avatar application;
  • the second determining unit is configured to determine, if the first determining unit determines that the target application has a corresponding avatar application, determine whether the receiving object of the target information is the avatar application;
  • the indicating unit is configured to, if the second determining unit determines that the receiving object of the target information is the avatar application, instructing the avatar application to receive the target information.
  • the second determining unit is specifically configured to:
  • the target information When the target information carries the receiving object indication information, it is determined whether the receiving object of the target information is the avatar application according to the receiving object indication information.
  • the indicating unit is further configured to:
  • the first determining unit determines whether the target application has a corresponding avatar application, if the target application does not have a corresponding avatar application, the main application corresponding to the target application is instructed to receive the target information.
  • the indicating unit is further configured to:
  • the second determining unit determines whether the receiving object of the target information is the avatar application, if the receiving object of the target information is not the avatar application, indicating the main application receiving station corresponding to the target application Target information.
  • the terminal further includes:
  • a storage unit configured to save the target information in a database of the avatar application after the indication unit instructs the avatar application to receive the target information, and encrypt the target information.
  • the terminal when the desktop icon of the avatar application is in a hidden state or a camouflage state, the terminal also includes:
  • An obtaining unit configured to acquire first identity verification information after the indication unit instructs the avatar application to receive the target information
  • a matching unit configured to match the first identity verification information with the second identity verification information stored in advance
  • a restoring unit configured to restore the desktop icon of the avatar application when the first authentication information and the second authentication information are successfully matched.
  • the target information for the target application when the target information for the target application is received, whether the target application has a corresponding avatar application is determined, and if the target application has a corresponding avatar application, it is determined whether the target object is the avatar.
  • the application if the target information is received by the avatar application, indicates that the avatar application receives the target information. Thereby, the target information can be received by the avatar application, and therefore, the target information can be conveniently protected.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of an information processing method according to an embodiment of the present disclosure
  • FIG. 2 is a schematic flowchart diagram of a second embodiment of an information processing method according to an embodiment of the present disclosure
  • FIG. 3 is a schematic flowchart diagram of a third embodiment of an information processing method according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram of a first embodiment of a terminal according to an embodiment of the present invention.
  • FIG. 5 is still another schematic structural diagram of a first embodiment of a terminal according to an embodiment of the present disclosure.
  • FIG. 6 is still another schematic structural diagram of a first embodiment of a terminal according to an embodiment of the present disclosure.
  • FIG. 7 is a schematic structural diagram of a second embodiment of a terminal according to an embodiment of the present invention.
  • references to "an embodiment” herein mean that a particular feature, structure, or characteristic described in connection with the embodiments can be included in at least one embodiment of the invention.
  • the appearances of the phrases in various places in the specification are not necessarily referring to the same embodiments, and are not exclusive or alternative embodiments that are mutually exclusive. Those skilled in the art will understand and implicitly understand that the embodiments described herein can be combined with other embodiments.
  • the terminal described in the embodiment of the present invention may include a smart phone (such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.), a tablet computer, a palmtop computer, a notebook computer, a mobile Internet device (MID, Mobile Internet Devices), or a wearable device.
  • a smart phone such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.
  • a tablet computer such as an Android mobile phone, an iOS mobile phone, a Windows Phone mobile phone, etc.
  • a palmtop computer such as a notebook computer
  • MID Mobile Internet Devices
  • Application of double-opening as a special case of application avatar mainly refers to running two identical applications simultaneously through software, that is, including one main application and one avatar application, for example, using WeChat multiple opening as an example, on a mobile phone Install multiple WeChat at the same time and ensure that multiple accounts are used at the same time without repeated login.
  • a mobile phone simultaneously opens 3 WeChat applications (one of which is a main application and two avatar applications), and each of them conducts a friend chat, a micro-business, a friend circle, etc., and does not interfere with each other, and will not be on the mobile phone. Another WeChat squeezed out.
  • the above-mentioned avatar application can be a mirror application of the main application. Or, for any application, it can be divided into two parts, one for the main application and one for the avatar application.
  • the two-part compositing is a complete application, and the main application is used to perform some lower-privileged operations. Apps are designed to be specific to higher-privileged operations, so avatar applications are more secure.
  • the main application of an application is a complete application, and the avatar application is only a part of it.
  • the name of the main application and the avatar application may be differently set.
  • the name of the WeChat is taken as an example: the main application name may be WeChat 1, the avatar application name may be WeChat 2, WeChat 3, and when the avatar application is hidden or disguised, the main application name may be directly WeChat, the present invention
  • the hidden meaning means that the icon corresponding to an application cannot be found on the desktop
  • the meaning of the camouflage means that the icon of an application is disguised as another icon, for example, the WeChat icon is disguised as an Alipay icon, thus having a certain Deceptive, of course, the camouflage icon can choose to use the icon of the application with low frequency, so it is not easy to attract the attention of other users.
  • the avatar application can share a database with the main application.
  • the main application and the avatar application can also be
  • the terminal may set an application to be a primary application and a avatar application in advance.
  • the number of the avatar applications may be at least one, and when the user uses the terminal, the main application and the at least one avatar application may be simultaneously opened on the terminal. .
  • the main application and the avatar application can be set to receive different information respectively.
  • the main application can receive some non-private information
  • the avatar application can receive some private information
  • the avatar application can be hidden, so that the avatar application cannot be on the interface.
  • the application described in the embodiments of the present invention may include a main application and at least one avatar application.
  • the main application can be in the normal mode
  • the avatar application can be in the normal mode or the safe mode, wherein the normal mode and the security mode are two opposite modes.
  • the user runs the application mainly in the normal mode. . Therefore, when an application includes a main application and a avatar application, there may be two cases, one case may be the main application in the normal mode, the avatar application is also in the normal mode, and the other case may be the main application. In normal mode, the avatar application is in safe mode.
  • the first case may be: the main application and all the avatar applications are in the normal mode
  • the second case may be: the main application and All avatar applications are in safe mode
  • the third case can be: the main application is in normal mode, some avatar applications are in normal mode, and other avatar applications are in safe mode.
  • FIG. 1 is a schematic flowchart diagram of a first embodiment of an information processing method according to an embodiment of the present invention.
  • the information processing method described in this embodiment includes the following steps:
  • the above target applications may include, but are not limited to, a video playing application, a chat application, a game application, a payment application, a shopping application, and the like.
  • the terminal may detect the number of applications corresponding to the target application stored in the terminal. If the number of applications corresponding to the target application is greater than 1, it indicates that the target application has a corresponding avatar application. Conversely, if the terminal detects the target The number of applications corresponding to the application is 1 or 0. This indicates that the target application does not have a corresponding avatar application. When the number of applications is 1, the target application does not have a corresponding avatar application. When the number of applications is 0, the target application is not installed in the terminal. . For example, if an application includes a main application and two avatar applications, the number of applications corresponding to the target application is 3. Therefore, the application has a corresponding avatar application, and for example, if an application includes an application, the application does not have Corresponding avatar application.
  • the terminal can detect the integrity of the target application stored in the terminal. It can be seen from the above that when the target application is divided into two parts, one is the main application and the other is the split application, the two-part synthesis is a complete application.
  • the terminal detects whether the function module of the target application is complete, and includes all the function modules, indicating that the target application has no avatar application. If only some functional modules are included, the target application has a avatar application. In addition, if the target application can only perform some low-privileged operations, or the target application can only perform some higher-privileged work, the target application has been divided into the main application and the avatar application.
  • the terminal can detect the integrity of the target application stored in the terminal. If the terminal detects that the target should be related to the application only part, that is, only a part of the complete application, it means that the detected application is a separate application of the target application.
  • a link between the main application and the avatar application may be stored in the database of the application. If the target application has no avatar application, only the link of the main application is in the database, and the terminal detects whether there is much in the target application database.
  • the target application has a corresponding avatar application, determine whether the target object of the target information is the avatar application.
  • the target information is detected first. If the preset keyword is detected in the target information, the target object is confirmed to be the target application corresponding to the target application.
  • the preset keyword may be preset by the user or the application developer, and the preset keyword may include but is not limited to: bank card number, account number, password, phone number, ID number, 'money', 'yuan', 'number Keywords such as ', 'transfer', 'important', 'confidential', 'security', 'dating', 'privacy', 'money', etc., for example, if the received target information contains 'transfer', it can be determined The target information is received by the avatar application.
  • the target information for the target application in step 101 may carry the receiving object indication information, and the terminal may determine, according to the receiving object indication information, whether the target information is received by the primary application or the avatar application.
  • the user can preset that the information sent by the contact A is received by the avatar application B.
  • the contact A sends the information to the user
  • the information indicating that the receiving object carries the pointing object is directed to the avatar application B
  • the avatar application B can directly receive the information sent by the contact A, of course, all the contacts are set after the setting.
  • the information that person A sends to the user can be viewed by the user in the application B.
  • the terminal may set the receiving object of the target information, that is, classify and manage the target information, and set different avatar applications to receive information of different categories or different contacts, so that the user conveniently classifies and manages the information receiving.
  • the information may be classified into multiple categories, and the information includes three types of information: A, B, and C.
  • the type A information is received by the main application of the M application
  • the type B information is received by the first application of the M application.
  • the receiving object of the target information is the avatar application, instructing the avatar application to receive the target information.
  • the avatar application may be instructed to receive the target information.
  • the target information may be saved in a database corresponding to the avatar application.
  • the target information may be further encrypted.
  • the encryption may be performed by using an algorithm such as a symmetric encryption algorithm, an asymmetric encryption algorithm, an exclusive OR encryption algorithm, etc., of course, in the encryption process, the unique identification information of the terminal may also be selected as a key, wherein the unique identifier
  • the information may include, but is not limited to, a telephone number, an Integrated Circuit Card Identity (ICCID), an International Mobile Equipment Identification Number (IMEI), fingerprint information stored in the terminal, or iris information. Wait.
  • the main application corresponding to the target application may be instructed to receive the target information.
  • the main application corresponding to the target application may be instructed to receive the target information.
  • only one main application may indicate that the target application corresponding to the target application receives the target information.
  • the main application corresponding to the target application may be instructed to receive the target information.
  • the terminal may receive the default information as the main application.
  • the terminal may receive the target information corresponding to the main application corresponding to the target application, and the main application may directly notify the target information after receiving the target information.
  • the reminder may be, for example, the terminal vibrating or ringing and displaying the source of the target information on the screen of the terminal.
  • the terminal may indicate that the main application of the target application receives the target information, and after receiving the target information, the main application may directly alert the user.
  • the target information for the target application is received, whether the target application has a corresponding avatar application is determined, and if the target application has a corresponding avatar application, it is determined whether the target object is a avatar application. If the target information is received by the avatar application, the avatar application is instructed to receive the target information. Thereby, the target information can be received by the avatar application, and therefore, the target information can be conveniently protected. For example, important information or private information can be received by the avatar application, the avatar application can be disguised as other applications, or can be hidden, and the information in the avatar application can be further encrypted, thereby facilitating protection of important information or private information. .
  • the method provided by the embodiment of the present invention may be performed in the same operating system mode, for example, a normal mode, or a security mode.
  • the main application may be in a regular mode, and the main application corresponds to the avatar.
  • the application can be in a safe mode, and in particular, depending on the actual situation.
  • FIG. 2 it is a schematic flowchart of a second embodiment of an information processing method according to an embodiment of the present invention.
  • the information processing method described in this embodiment includes the following steps:
  • the target application has a corresponding avatar application, determine whether the target object of the target information is the avatar application.
  • the target object of the target information is the avatar application, instruct the avatar application to receive the target information.
  • the above steps 201-203 may refer to step 101-step 103 of the information processing method described in FIG.
  • the target information may be saved in a database corresponding to the avatar application.
  • the target information may be further encrypted, and thus the target information is further protected.
  • the avatar application can be in a hidden state or in a spoofed state, so that it is difficult to find other avatar applications.
  • the avatar application needs to be found first, and then the target information is found. If the target information is in an encrypted state, the target information needs to be decrypted.
  • the user when the avatar application is in a hidden state or a masquerading state, the user does not want to be notified by other users that the avatar application receives the target information. At this time, the target information may not be received, and the avatar application may directly save the target information, when the user When the avatar app is opened, the target information can be searched.
  • the user may be prompted to receive the information through a preset prompting method.
  • the terminal can vibrate, but the received information is not displayed, and the user can know that the avatar application receives the information by sensing the vibration.
  • the user sets a preset ringtone for the information received by the avatar application, and when the user hears the ringtone, the user can know that the avatar application receives the information.
  • the screen saver of the terminal may change to become a preset picture or a preset effect. When the user opens the terminal, the screen saver may be changed in time to know the avatar in the hidden state. The app received the message.
  • the target information for the target application when the target information for the target application is received, it is determined whether the target application has a corresponding avatar application, and if the target application has a corresponding application avatar, it is determined whether the target object is received.
  • the avatar application if the target object is the application avatar, the avatar application is instructed to receive the target information.
  • the target information can be received by the avatar application, and therefore, can be applied to protect the target information.
  • important information or private information can be received by the avatar application, the avatar application can be disguised as other applications, or can be hidden, and the information in the avatar application can be further encrypted, thereby facilitating protection of important information or private information. .
  • FIG. 3 it is a schematic flowchart of a third embodiment of an information processing method according to an embodiment of the present invention.
  • the information processing method described in this embodiment includes the following steps:
  • the target application has a corresponding avatar application, determine whether the target object of the target information is the avatar application.
  • the target object of the target information is the avatar application, instruct the avatar application to receive the target information.
  • the above steps 301-303 may refer to step 101-step 103 of the information processing method described in FIG.
  • the avatar application can be in a hidden state or a camouflage state. In the hidden state, the user cannot see the corresponding desktop icon on the desktop. In the masquerading state, the avatar application can be disguised as other desktop icons to confuse the user, and also has Certainly interesting.
  • the terminal may obtain the first identity verification information, where the first identity verification information may include, but is not limited to, fingerprint information, iris information, a character string, a vibration parameter, a track pattern, voice information, and the like, where the first identity verification information is in the foregoing One or a combination thereof (for example, iris information combined with fingerprint information).
  • the first authentication information may be matched with the pre-stored second authentication information, and when the first authentication information and the second authentication information are successfully matched, the desktop icon of the avatar application is restored.
  • multiple avatar applications may be on the desktop of the terminal, but are in a hidden state.
  • the hidden application icon may be displayed on the desktop of the terminal, further
  • the desktop icon of the avatar application can no longer be seen on the desktop of the terminal.
  • the main application and the avatar application of the target application can be seen.
  • the target application when the information about the target application is received, it is determined whether the target application has a corresponding avatar application, and if the target application has a corresponding avatar application, it is determined whether the target object is a avatar.
  • the application if the target information is received by the avatar application, indicates that the avatar application receives the target information, and after receiving the target information, the first identity verification information may be obtained, and after the verification is passed, the target information may be viewed.
  • important information or private information can be received by the avatar application, the avatar application can be disguised as other applications, or can be hidden, and the information in the avatar application can be further encrypted, thereby facilitating protection of important information or private information. .
  • the device for implementing the information processing method provided by the embodiment of the present invention is as follows:
  • FIG. 4 is a schematic structural diagram of an embodiment of a terminal according to an embodiment of the present invention.
  • the terminal described in this embodiment includes: a first determining unit 401, a second determining unit 402, and an indicating unit 403, as follows:
  • the first determining unit 401 is configured to determine, when the target information for the target application is received, whether the target application has a corresponding avatar application;
  • the second determining unit 402 is configured to determine, if the first determining unit 401 determines that the target application has a corresponding avatar application, determine whether the target object of the target information is the avatar application;
  • the indicating unit 403 is configured to instruct the avatar application to receive the target information if the second determining unit 402 determines that the receiving object of the target information is the avatar application.
  • the above target applications may include, but are not limited to, a video playing application, a chat application, a game application, a payment application, a shopping application, and the like.
  • the first determining unit 401 can detect the number of applications corresponding to the target application stored in the terminal, and if the number of applications corresponding to the target application is greater than 1, it indicates that the target application has a corresponding avatar application, and conversely, if The number of applications corresponding to the target application is 1 or 0. This indicates that the target application does not have a corresponding avatar application.
  • the target application does not have a corresponding avatar application.
  • the target application is not Installed in the terminal. For example, if an application includes a main application and two avatar applications, the number of applications corresponding to the target application is 3. Therefore, the application has a corresponding avatar application, and for example, if an application includes an application, the application does not have Corresponding avatar application.
  • the first determining unit 401 can detect the integrity of the target application stored in the terminal.
  • the two-part synthesis is a complete application. It can detect whether the function module of the target application is complete, including all the function modules, indicating that the target application has no avatar application. If only some functional modules are included, the target application has a avatar application. In addition, if the target application can only perform some low-privileged operations, or the target application can only perform some higher-privileged work, the target application has been divided into the main application and the avatar application.
  • the first determining unit 401 can detect the integrity of the target application stored in the terminal. If the application to which the target should be detected is only part of it, that is, only part of the complete application, it indicates that a targeted application of the target application is detected.
  • a link between the main application and the avatar application may be stored. If the target application has no avatar application, only the link of the main application is in the database, and the first determining unit 401 may detect the target application. Whether there are multiple application links in the database to determine whether the target application has a avatar application. If there is only one application link, the target application has no avatar application. If there are multiple application links, the target application has a avatar application.
  • the second determining unit 402 is specifically configured to:
  • the target information When the target information carries the receiving object indication information, it is determined whether the receiving object of the target information is the avatar application according to the receiving object indication information.
  • the indicating unit 403 is further configured to:
  • the first determining unit 401 determines whether the target application has a corresponding avatar application, if the target application does not have a corresponding avatar application, the main application corresponding to the target application is instructed to receive the target information.
  • the indicating unit 403 is further configured to:
  • the second determining unit 402 determines whether the receiving object of the target information is the avatar application, if the receiving object of the target information is not the avatar application, indicating that the target application corresponds to the main application receiving The target information.
  • FIG. 5 is a modified structure of FIG. 4.
  • the terminal described in FIG. 4 may further include: a storage unit 404, which is specifically as follows:
  • the storage unit 404 is configured to save the target information in a database of the avatar application after the indication unit 403 instructs the avatar application to receive the target information, and encrypt the target information.
  • FIG. 6 and FIG. 6 are a modified structure of FIG. 4.
  • the terminal described in FIG. 4 further Can include:
  • the obtaining unit 405 is configured to acquire the first identity verification information after the indication unit 403 instructs the avatar application to receive the target information;
  • the matching unit 406 is configured to match the first identity verification information with the second identity verification information stored in advance;
  • the restoring unit 407 is configured to restore the desktop icon of the avatar application when the first identity verification information and the second identity verification information are successfully matched.
  • the target information for the target application is received, whether the target application has a corresponding avatar application is determined, and if the target application has a corresponding avatar application, it is determined whether the target object is a avatar application. If the target information is received by the avatar application, the avatar application is instructed to receive the target information.
  • the information can be received using the avatar application and, therefore, can be applied to protect the information.
  • important information or private information can be received by the avatar application, the avatar application can be disguised as other applications, or can be hidden, and the information in the avatar application can be further encrypted, thereby facilitating protection of important information or private information. .
  • the method provided by the embodiment of the present invention may be performed in the same operating system mode, for example, a normal mode, or a security mode.
  • the main application may be in a regular mode, and the main application corresponds to the avatar.
  • the application can be in a safe mode, and in particular, depending on the actual situation.
  • FIG. 7 is a schematic structural diagram of a second embodiment of a terminal according to an embodiment of the present invention.
  • the terminal described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, such as a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 is connected via bus 5000.
  • the input device 1000 may be a touch panel, a physical button, or a mouse.
  • the output device 2000 described above may specifically be a display screen.
  • the above memory 4000 may be a high speed RAM memory or a non-volatile memory such as a magnetic disk memory.
  • the above memory 4000 is used to store a set of program codes, and the input device 1000, the output device 2000, and the processor 3000 are used to call the program code stored in the memory 4000, and perform the following operations:
  • the processor 3000 is configured to:
  • the target application has a corresponding avatar application, determining whether the target object of the target information is the avatar application;
  • the receiving object of the target information is the avatar application, instructing the avatar application to receive the target information.
  • the determining, by the processor 3000, whether the object to be received by the target information is the avatar application comprises:
  • the target information When the target information carries the receiving object indication information, it is determined whether the receiving object of the target information is the avatar application according to the receiving object indication information.
  • the processor 3000 determines whether the target application has a corresponding avatar application
  • the processor is further configured to:
  • the main application corresponding to the target application is instructed to receive the target information.
  • the processor 3000 determines whether the object to be received by the target information is the avatar application.
  • the processor is further configured to:
  • the receiving object of the target information is not the avatar application, indicating that the main application corresponding to the target application receives the target information.
  • the processor 3000 indicates that the avatar application receives the target information
  • the processor is further configured to:
  • the target information is saved in a database of the avatar application and the target information is encrypted.
  • the processor 3000 is further configured to: when the desktop icon of the avatar application is in a hidden state or a spoofed state, and after the avatar application is instructed to receive the target information,
  • the embodiment of the present invention further provides a computer storage medium, wherein the computer storage medium can store a program, and the program includes some or all of the steps of any one of the information processing methods described in the foregoing method embodiments.
  • embodiments of the present invention can be provided as a method, apparatus (device), or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
  • the computer program is stored/distributed in a suitable medium, provided with other hardware or as part of the hardware, or in other distributed forms, such as over the Internet or other wired or wireless telecommunication systems.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

一种信息处理方法及终端,其中,所述方法包括:在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用(101);若所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用(102);若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息(103)。从而可方便地对信息进行保护。

Description

一种信息处理方法及终端
本申请要求于2016年9月22日提交中国专利局,申请号为201610841560.9、发明名称为“一种信息处理方法及终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及互联网领域,具体涉及一种信息处理方法及终端。
背景技术
现有技术中,终端(如手机、平板电脑等)的应用在接收到通知信息时,该通知信息便会显示出来,例如,手机在接收到短信的时候,便会显示出来。如此,对于隐私信息的保护力度不大,不利于用户在使用手机的过程中对信息进行保护。现有技术中,虽然可以利用私密模式对用户的某些信息进行隐藏,私密模式虽然可以对信息进行保护,但是,私密模式是在安全系统中进行保护,因而,需要在两种操作系统之间进行切换,操作较为麻烦。
发明内容
本发明实施例提供了一种信息处理方法及终端,可方便地对信息进行保护。
本发明实施例第一方面提供了一种信息处理方法,包括:
在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
若所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用;
若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
结合本发明实施例的第一方面,在第一方面的第一种可能的实施方式中,所述判断所述目标信息的接收对象是否为所述分身应用,包括:
检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
或者,
在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
结合本发明实施例第一方面或第一方面的第一种可能实施方式,在第一方面的第二种可能实施方式中,所述判断所述目标应用是否有对应的分身应用之后,所述方法还包括:
若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
结合本发明实施例第一方面或第一方面的第一种可能实施方式,在第一方面的第三种可能实施方式中,所述判断所述目标信息的接收对象是否为所述分身应用之后,所述方法还包括:
若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
结合本发明实施例第一方面或第一方面的第一种可能实施方式,在第一方面的第四种可能实施方式中,所述指示所述分身应用接收所述目标信息之后,所述方法还包括:
将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
结合本发明实施例第一方面或第一方面的第一种可能实施方式,在第一方面的第五种可能实施方式中,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,所述指示所述分身应用接收所述目标信息之后,所述方法还包括:
获取第一身份验证信息;
将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
本发明实施例第二方面提供了一种终端,包括:
第一判断单元,设置为在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
第二判断单元,设置为若所述第一判断单元判断出所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用;
指示单元,设置为若所述第二判断单元判断出所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
结合本发明实施例第二方面,在第二方面的第一种可能实施方式中,所述第二判断单元具体设置为:
检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
或者,
在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
结合本发明实施例第二方面或第二方面的第一种可能实施方式,在第二方面的第二种可能实施方式中,所述指示单元还具体设置为:
在所述第一判断单元判断所述目标应用是否有对应的分身应用之后,若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
结合本发明实施例第二方面或第二方面的第一种可能实施方式,在第二方面的第三种可能实施方式中,所述指示单元还具体设置为:
在所述第二判断单元判断所述目标信息的接收对象是否为所述分身应用之后,若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
结合本发明实施例第二方面或第二方面的第一种可能实施方式,在第二方面的第四种可能实施方式中,所述终端还包括:
存储单元,设置为在所述指示单元指示所述分身应用接收所述目标信息之后,将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
结合本发明实施例第二方面或第二方面的第一种可能实施方式,在第二方面的第五种可能实施方式中,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,所述终端还包括:
获取单元,设置为在所述指示单元指示所述分身应用接收所述目标信息之后,获取第一身份验证信息;
匹配单元,设置为将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
还原单元,设置为在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
可以看出,通过本发明实施例,在接收到针对目标应用的目标信息时,判断目标应用是否有对应的分身应用,若目标应用有对应的分身应用,则判断目标信息的接收对象是否为分身应用,若目标信息的接收对象为分身应用,则指示分身应用接收目标信息。从而,可利用分身应用接收目标信息,因此,可方便地对目标信息进行保护。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种信息处理方法的第一实施例流程示意图;
图2是本发明实施例提供的一种信息处理方法的第二实施例流程示意图;
图3是本发明实施例提供的一种信息处理方法的第三实施例流程示意图;
图4是本发明实施例提供的一种终端的第一实施例结构示意图;
图5是本发明实施例提供的一种终端的第一实施例又一结构示意图;
图6是本发明实施例提供的一种终端的第一实施例又一结构示意图;
图7是本发明实施例提供的一种终端的第二实施例结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
本发明的说明书和权利要求书及所述附图中的术语“第一”、“第二”、“第三”和“第四”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本发明的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
本发明实施例所描述的终端可以包括智能手机(如Android手机、iOS手机、Windows Phone手机等)、平板电脑、掌上电脑、笔记本电脑、移动互联网设备(MID,Mobile Internet Devices)或穿戴式设备等,上述终端仅是举例,而非穷举,包含但不限于上述终端。
需要说明的是,现有技术中,
应用双开作为应用分身的一个特例,其主要是指通过软件方式,同时运行两个相同应用程序,即包含一个主应用和一个分身应用,例如,以微信多开为例,即在一部手机上同时安装多个微信并且可保证多个账户同时使用无需反复登陆。比如,一部手机同时打开3个微信应用(其中,1个主应用,2个分身应用),分别进行好友聊天、微商做生意、发朋友圈等,均互不干扰,不会被手机上另一微信挤掉。
可选地,上述分身应用可为主应用的镜像应用。或者,对任一应用而言,可将其分为两部分,一部分为主应用,一部分为分身应用,两部分合成才是一个完整应用,主应用用于进行一些权限较低的操作,而分身应用则用于专门针对权限较高的操作,因而,分身应用安全性更高。或者,某一应用的主应用为一完整的应用,分身应用只是其一部分。
可选地,为了使用户便于区别主应用和分身应用,可将主应用和分身应用的名称,图标图片,图标颜色或者图标大小等中的至少一个进行区别设置。例如,以微信的名称为例:主应用名称可为微信1,分身应用名称可为微信2、微信3,另外,当分身应用均隐藏或者伪装时,则主应用名称可直接为微信,本发明实施例中,隐藏的意思是指某一应用对应的图标在桌面无法找到,伪装的意思是指某一应用的图标伪装成其他图标,例如,将微信图标伪装为支付宝图标,如此,具有一定的迷惑性,当然,伪装的图标可选择使用频率低的应用的图标,如此,不容易引起其他用户注意。另外,分身应用可以和主应用共用一个数据库,当然,主应用和分身应用也可以由不同的数据库,具体依据实际情况而定。
可选地,终端可预先将某一个应用设置为主应用和分身应用,当然,分身应用的个数可以为至少一个,用户在使用终端时,可在终端上同时打开主应用和至少一个分身应用。进一步地,可以设置主应用和分身应用分别接收不同的信息,例如,主应用可接收一些非私密信息,分身应用可以接收一些私密信息,还可以将分身应用进行隐藏,使分身应用无法在界面上直接看到,需要查看分身应用时,可通过预设方式(例如,进行身份验证)打开分身应用,或者,将分身应用接收到的信息进行加密,在查看该信息时,需要打开该分身应用,并对该信息进行解密,从而,在解密成功后,才可以查看该信息。
进一步需要说明的是,本发明实施例中所描述的应用可包含主应用和至少一个分身应用。其中,主应用可处在常规模式下,而分身应用则可处于常规模式或者安全模式下,其中,常规模式与安全模式为相对的两种模式,通常情况下,用户主要在常规模式下运行应用。因此,在某一应用包含主应用和一个分身应用时,可包含两种情况,一种情况可为主应用在常规模式下,分身应用也在常规模式下,另一种情况可为主应用在常规模式下,分身应用则在安全模式下。在某一应用包含主应用和多个分身应用时,可包含如下三种情况,第一种情况可为:主应用和所有分身应用均在常规模式下,第二种情况可为:主应用和所有分身应用均在安全模式下,第三种情况可为:主应用处于常规模式下,部分分身应用处于常规模式下,其他的分身应用处于安全模式下。
请参阅图1,为本发明实施例提供的一种信息处理方法的第一实施例流程示意图。本实施例中所描述的信息处理方法,包括以下步骤:
101、在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用。
其中,上述目标应用可包括但不仅限于:视频播放应用,聊天应用,游戏应用,支付应用、购物应用等。
可选地,终端可检测该终端中存储的目标应用所对应的应用数目,若目标应用所对应的应用数目大于1,则说明该目标应用有对应的分身应用,相反地,若终端检测到目标应用对应的应用数目为1或者0 ,这说明目标应用没有对应的分身应用,在应用数目为1时,目标应用没对应的分身应用,在应用数目为0时,该目标应用未在终端中安装。例如,某一应用,包含主应用及两个分身应用,则该目标应用对应的应用数目为3,因此,该应用有对应的分身应用,又例如,某一应用包含一个应用,则该应用没有对应的分身应用。
可选地,终端可检测该终端中存储的目标应用的完整性。由上述可知,当目标应用分为两部分,一部分为主应用,一部分为分身应用,两部分合成才是一个完整应用。终端检测目标应用的功能模块是否完整,包含全部的功能模块,则说明该目标应用没分身应用,若只包含部分功能模块,则说明该目标应用有分身应用。另外,如果目标应用只能进行一些权限较低的操作,或者,目标应用只能进行一些权限较高的工作,说明目标应用已经被分成了主应用和分身应用。
可选地,终端可检测该终端中存储的目标应用的整体性。若终端检测到目标应相关的应用只是部分,即只是完整应用的一部分时,说明检测到的是目标应用的一个分身应用。
可选的,通常情况下,一个应用的数据库中可存储有主应用和分身应用的链接,若目标应用没有分身应用,则数据库中只有主应用的链接,终端通过检测目标应用数据库中是否有多个应用链接来判断目标应用是否有分身应用,若只有1个应用链接,则说明该目标应用没分身应用,若有多个应用链接,则说明该目标应用有分身应用。
102、若所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用。
其中,当终端接收到针对目标应用的目标信息时,先对目标信息进行检测,若在目标信息中检测到预设关键字,则可确认目标信息的接收对象为目标应用对应的分身应用。例如,预设关键字可由用户或者应用开发商预先设置,该预设关键字可包括但不仅限于:银行卡号、账号、密码、电话号码、身份证号、‘钱’、‘元’、‘数字’、‘转账’、‘重要’、‘保密’、‘安全’、‘约会’、‘隐私’、‘money’等关键字,例如,若接收的目标信息中包含‘转账’,则由可确定该目标信息的接收对象为分身应用。
可选地,步骤101中的针对目标应用的目标信息可携带有接收对象指示信息,终端可根据该接收对象指示信息判断该目标信息由主应用接收还是分身应用接收。例如,用户在使用微信时,用户可预先设置联系人A发送的信息由分身应用B接收。设置后,每当联系人A发送信息给该用户时,该信息中会携带接收对象指示信息均指向分身应用B,分身应用B可直接接收联系人A发送的信息,当然,设置后所有由联系人A发送给该用户的信息,用户可在分身应用B中进行查看。
可选地,终端可以对目标信息的接收对象进行设置,即对目标信息进行分类管理,可以设置不同的分身应用接收不同类别或不同联系人的信息,使用户方便对信息接收进行分类管理。例如,可将信息分为多类,假设包含A、B和C三类信息,其中,A类信息由M应用的主应用接收,B类信息由M应用的第一分身应用接收,C类信息由M应用的第二分身应用接收。
103、若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
其中,当检测到目标应用有对应的分身应用,并且,该目标信息的接收对象是分身应用时,可以指示分身应用接收该目标信息。分身应用接收完该目标信息之后,可将该目标信息保存在分身应用对应的数据库中,当然,还可以进一步地对该目标信息进行加密。其中,加密可采用如下算法进行:对称加密算法、非对称加密算法、异或加密算法等等,当然,在加密过程中,还可以选择该终端的唯一标识信息作为密钥,其中,该唯一标识信息可包括但不仅限于:电话号码、集成电路卡识别码(Integrate Circuit Card Identity,ICCID)、国际移动设备识别码(International Mobile Equipment Identification Number,IMEI)、该终端中存储的指纹信息或者虹膜信息等等。
可选地,上述判断目标应用是否有对应的分身应用之后,若目标应用没有对应的分身应用,可指示该目标应用对应的主应用接收目标信息。
可选地,上述判断目标信息的接收对象是否为分身应用之后,若目标信息的接收对象不为分身应用,可指示该目标应用对应的主应用接收目标信息。
可选地,若目标应用没有对应的分身应用,则只有一个主应用,可指示该目标应用对应的主应用接收目标信息。
可选地,若目标应用有对应的分身应用,但未指示该目标信息是由主应用接收或者分身应用接收,那么,可指示目标应用对应的主应用接收目标信息。
可选地,当用户没有对目标信息的接收对象进行任何的设定,终端可默认信息的接收对象为主应用。
可选地,当终端确定目标应用没有对应的分身应用时,即目标应用只有主应用的情况,终端可将指示目标应用对应的主应用接收目标信息,主应用接收到目标信息后,可直接提醒用户。提醒的方式可例如,终端发出振动或者响铃,并在终端的屏幕上显示目标信息的来源。
可选地,当终端确定目标应用有对应的分身应用,但是目标信息接收对象不是分身应用时,终端可指示目标应用的主应用接收目标信息,主应用接收到目标信息后,可直接提醒用户。
可以看出,通过本发明实施例,在接收到针对目标应用的目标信息时,判断目标应用是否有对应的分身应用,若目标应用有对应的分身应用,判断目标信息的接收对象是否为分身应用,若目标信息的接收对象为分身应用,指示分身应用接收目标信息。从而,可利用分身应用接收目标信息,因此,可方便地对目标信息进行保护。例如,可将重要信息或者私密信息由分身应用接收,该分身应用可伪装成其他应用,或者,可隐藏,并且分身应用中的信息可进一步加密,因而,有利于对重要信息或者私密信息进行保护。当然,本发明实施例所提供的方法可在同一操作系统模式下进行,例如,常规模式,或者,安全模式,当然,还可以进一步地,主应用可在常规模式,而该主应用对应的分身应用可在安全模式,具体地,可依据实际情况而定。
与上述一致地,请参阅图2,为本发明实施例提供的一种信息处理方法的第二实施例流程示意图。本实施例中所描述的信息处理方法,包括以下步骤:
201、在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用。
202、若所述目标应用有对应的分身应用,判断所述目标信息的接收对象是否为所述分身应用。
203、若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
其中,上述步骤201-步骤203可参考图1所描述的信息处理方法的步骤101-步骤103。
204、将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
可选地,在分身应用接收到目标信息之后,可将该目标信息保存在该分身应用对应的数据库中,当然,可进一步对该目标信息进行加密,如此,进一步对该目标信息进行保护。当然,该分身应用可处于隐藏状态下或者伪装状态下,如此,以混淆其他用户很难发现该分身应用。相应地,在查看该目标信息时,需要先找到该分身应用,然后,找到该目标信息,若该目标信息处于加密状态,则需要对该目标信息进行解密。
可选地,当分身应用处于隐藏状态或者伪装状态下,说明用户不想被其他用户知道分身应用接收到目标信息,此时,可不给予目标信息接收提醒,分身应用可直接保存该目标信息,当用户打开分身应用时,可搜索到该目标信息。
可选地,若需要及时地知晓分身应用接收到信息,或者分身应用接收到的信息极为重要,可以通过预设的提示方法提示用户分身应用接收到信息。例如,可以由终端进行振动,但并不显示接收到的信息,用户可通过感受振动知道是分身应用接收到信息。又例如,用户为分身应用接收到信息设置预设铃声,当用户听到该铃声时,即可知道该分身应用接收到信息。又例如,当分身应用接收到信息时,终端的屏保可发生改变,变成预设图片或者预设效果,当用户打开终端时,可及时看出屏保发生变化,即可知晓隐藏状态下的分身应用接收到了信息。
可以看出,通过本发明实施例,在接收到针对目标应用的目标信息时,判断该目标应用是否有对应的分身应用,若该目标应用有对应的应用分身,判断该目标信息的接收对象是否为分身应用,若该目标信息的接收对象为应用分身,指示分身应用接收目标信息。从而,可利用分身应用接收目标信息,因此,可应用于对目标信息进行保护。例如,可将重要信息或者私密信息由分身应用接收,该分身应用可伪装成其他应用,或者,可隐藏,并且分身应用中的信息可进一步加密,因而,有利于对重要信息或者私密信息进行保护。
与上述一致地,请参阅图3,为本发明实施例提供的一种信息处理方法的第三实施例流程示意图。本实施例中所描述的信息处理方法,包括以下步骤:
301、在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用。
302、若所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用。
303、若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
其中,上述步骤301-步骤303可参考图1所描述的信息处理方法的步骤101-步骤103。
304、在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,获取第一身份验证信息。
其中,分身应用可以处于隐藏状态或者伪装状态,在隐藏状态下,用户无法在桌面见到其对应的桌面图标,在伪装状态下,分身应用可伪装成其他桌面图标,以混淆用户,同时也具有一定的趣味性。终端可获取第一身份验证信息,该第一身份验证信息可包括但不仅限于:指纹信息、虹膜信息、字符串、振动参数、轨迹图案、语音信息等等,第一身份验证信息为上述中的一种或者其组合(例如,虹膜信息与指纹信息组合)。
305、将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配。
可选地,可将第一身份验证信息与预先存储的第二身份验证信息进行匹配,并在第一身份验证信息与第二身份验证信息匹配成功时,还原分身应用的桌面图标。例如多个分身应用可以是都在终端的桌面上,只是处于隐藏状态,当用户输入第一身份验证信息,并在其验证通过后,可在终端的桌面上将隐藏的应用图标显现出来,进一步地,当一段时间未使用该分身应用或者终端再次处于灭屏状态时,终端的桌面上可再次看不到该分身应用的桌面图标。
306、在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
可选地,上述还原分身应用的桌面图标后,可看出该目标应用的主应用和分身应用。
可以看出,通过本发明实施例,在接收到针对目标应用的信息时,判断该目标应用是否有对应的分身应用,若目标应用有对应的分身应用,判断该目标信息的接收对象是否为分身应用,若该目标信息的接收对象为分身应用,指示分身应用接收目标信息,在接收到目标信息后,可获取第一身份验证信息,并在其验证通过后,才可以查看目标信息。例如,可将重要信息或者私密信息由分身应用接收,该分身应用可伪装成其他应用,或者,可隐藏,并且分身应用中的信息可进一步加密,因而,有利于对重要信息或者私密信息进行保护。
与上述一致地,以下为实施上述本发明实施例提供的信息处理方法的装置,具体如下:
请参阅图4,为本发明实施例提供的一种终端的实施例结构示意图。本实施例中所描述的终端,包括:第一判断单元401、第二判断单元402和指示单元403,具体如下:
第一判断单元401,设置为在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
第二判断单元402,设置为若所述第一判断单元401判断出所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用;
指示单元403,设置为若所述第二判断单元402判断出所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
其中,上述目标应用可包括但不仅限于:视频播放应用,聊天应用,游戏应用,支付应用、购物应用等。
可选地,第一判断单元401可检测该终端中存储的目标应用所对应的应用数目,若目标应用所对应的应用数目大于1,则说明该目标应用有对应的分身应用,相反地,若检测到目标应用对应的应用数目为1或者0 ,这说明目标应用没有对应的分身应用,在应用数目为1时,目标应用没对应的分身应用,在应用数目为0时,该目标应用未在终端中安装。例如,某一应用,包含主应用及两个分身应用,则该目标应用对应的应用数目为3,因此,该应用有对应的分身应用,又例如,某一应用包含一个应用,则该应用没有对应的分身应用。
可选地,第一判断单元401可检测该终端中存储的目标应用的完整性。有上述可知,当目标应用分为两部分,一部分为主应用,一部分为分身应用,两部分合成才是一个完整应用。可检测目标应用的功能模块是否完整,包含全部的功能模块,则说明该目标应用没分身应用,若只包含部分功能模块,则说明该目标应用有分身应用。另外,如果目标应用只能进行一些权限较低的操作,或者,目标应用只能进行一些权限较高的工作,说明目标应用已经被分成了主应用和分身应用。
可选地,第一判断单元401可检测该终端中存储的目标应用的整体性。若检测到目标应相关的应用只是部分,即只是完整的应用的一部分时,说明检测到的是目标应用的一个分身应用。
可选的,通常情况下,一个应用的数据库中可存储有主应用和分身应用的链接,若目标应用没有分身应用,则数据库中只有主应用的链接,第一判断单元401可通过检测目标应用数据库中是否有多个应用链接来判断目标应用是否有分身应用,若只有1个应用链接,则说明该目标应用没分身应用,若有多个应用链接,则说明该目标应用有分身应用。
可选地,所述第二判断单元402具体设置为:
检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
或者,
在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
可选地,所述指示单元403还具体设置为:
在所述第一判断单元401判断所述目标应用是否有对应的分身应用之后,若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
可选地,所述指示单元403还具体设置为:
在所述第二判断单元402判断所述目标信息的接收对象是否为所述分身应用之后,若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
可选地,如图5,图5为图4的一种变型结构,图5与图4相比较,图4所描述的终端还可包括:存储单元404,具体如下:
存储单元404,设置为在所述指示单元403指示所述分身应用接收所述目标信息之后,将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
可选地,如图6,图6为图4的一种变型结构,图6与图4相比较,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,图4所描述的终端还可包括:
获取单元405,设置为在所述指示单元403指示所述分身应用接收所述目标信息之后,获取第一身份验证信息;
匹配单元406,设置为将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
还原单元407,设置为在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
可以看出,通过本发明实施例,在接收到针对目标应用的目标信息时,判断目标应用是否有对应的分身应用,若目标应用有对应的分身应用,判断目标信息的接收对象是否为分身应用,若目标信息的接收对象为分身应用,指示分身应用接收目标信息。从而,可利用分身应用接收信息,因此,可应用于对信息进行保护。例如,可将重要信息或者私密信息由分身应用接收,该分身应用可伪装成其他应用,或者,可隐藏,并且分身应用中的信息可进一步加密,因而,有利于对重要信息或者私密信息进行保护。当然,本发明实施例所提供的方法可在同一操作系统模式下进行,例如,常规模式,或者,安全模式,当然,还可以进一步地,主应用可在常规模式,而该主应用对应的分身应用可在安全模式,具体地,可依据实际情况而定。
请参阅图7,为本发明实施例提供的一种终端的第二实施例结构示意图。本实施例中所描述的终端,包括:至少一个输入设备1000;至少一个输出设备2000;至少一个处理器3000,例如CPU;和存储器4000,上述输入设备1000、输出设备2000、处理器3000和存储器4000通过总线5000连接。
其中,上述输入设备1000具体可为触控面板、物理按键或者鼠标。
上述输出设备2000具体可为显示屏。
上述存储器4000可以是高速RAM存储器,也可为非易失存储器(non-volatile memory),例如磁盘存储器。上述存储器4000用于存储一组程序代码,上述输入设备1000、输出设备2000和处理器3000用于调用存储器4000中存储的程序代码,执行如下操作:
上述处理器3000,用于:
在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
若所述目标应用有对应的分身应用,判断所述目标信息的接收对象是否为所述分身应用;
若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
可选地,上述处理器3000判断所述目标信息的接收对象是否为所述分身应用,包括:
检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
或者,
在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
可选地,上述处理器3000判断所述目标应用是否有对应的分身应用之后,还具体用于:
若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
可选地,上述处理器3000判断所述目标信息的接收对象是否为所述分身应用之后,还具体用于:
若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
可选地,上述处理器3000指示所述分身应用接收所述目标信息之后,还具体用于:
将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
可选地,上述处理器3000,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,以及指示所述分身应用接收所述目标信息之后,还具体用于:
获取第一身份验证信息;
将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
本发明实施例还提供一种计算机存储介质,其中,该计算机存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的任何一种信息处理方法的部分或全部步骤。
尽管在此结合各实施例对本发明进行了描述,然而,在实施所要求保护的本发明过程中,本领域技术人员通过查看所述附图、公开内容、以及所附权利要求书,可理解并实现所述公开实施例的其他变化。在权利要求中,“包括”(comprising)一词不排除其他组成部分或步骤,“一”或“一个”不排除多个的情况。单个处理器或其他单元可以实现权利要求中列举的若干项功能。相互不同的从属权利要求中记载了某些措施,但这并不表示这些措施不能组合起来产生良好的效果。
本领域技术人员应明白,本发明的实施例可提供为方法、装置(设备)、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。计算机程序存储/分布在合适的介质中,与其它硬件一起提供或作为硬件的一部分,也可以采用其他分布形式,如通过Internet或其它有线或无线电信系统。
本发明是参照本发明实施例的方法、装置(设备)和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管结合具体特征及其实施例对本发明进行了描述,显而易见的,在不脱离本发明的精神和范围的情况下,可对其进行各种修改和组合。相应地,本说明书和附图仅仅是所附权利要求所界定的本发明的示例性说明,且视为已覆盖本发明范围内的任意和所有修改、变化、组合或等同物。显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。

Claims (12)

  1. 一种信息处理方法,其特征在于,包括:
    在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
    若所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用;
    若所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
  2. 根据权利要求1所述的方法,其特征在于,所述判断所述目标信息的接收对象是否为所述分身应用,包括:
    检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
    或者,
    在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
  3. 根据权利要求1或2任一项所述的方法,其特征在于,所述判断所述目标应用是否有对应的分身应用之后,所述方法还包括:
    若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
  4. 根据权利要求1或2任一项所述的方法,其特征在于,所述判断所述目标信息的接收对象是否为所述分身应用之后,所述方法还包括:
    若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
  5. 根据权利要求1或2任一项所述的方法,其特征在于,所述指示所述分身应用接收所述目标信息之后,所述方法还包括:
    将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
  6. 根据权利要求1或2任一项所述的方法,其特征在于,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,所述指示所述分身应用接收所述目标信息之后,所述方法还包括:
    获取第一身份验证信息;
    将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
    在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
  7. 一种终端,其特征在于,包括:
    第一判断单元,设置为在接收到针对目标应用的目标信息时,判断所述目标应用是否有对应的分身应用;
    第二判断单元,设置为若所述第一判断单元判断出所述目标应用有对应的分身应用,则判断所述目标信息的接收对象是否为所述分身应用;
    指示单元,设置为若所述第二判断单元判断出所述目标信息的接收对象为所述分身应用,则指示所述分身应用接收所述目标信息。
  8. 根据权利要求7所述终端,其特征在于,所述第二判断单元具体设置为:
    检测所述目标信息是否包含预设关键字,若所述目标信息包含所述预设关键字,则确定所述目标信息的接收对象为所述分身应用;
    或者,
    在所述目标信息携带接收对象指示信息时,根据所述接收对象指示信息判断所述目标信息的接收对象是否为所述分身应用。
  9. 根据权利要求7或8任一项所述终端,其特征在于,所述指示单元还具体设置为:
    在所述第一判断单元判断所述目标应用是否有对应的分身应用之后,若所述目标应用没有对应的分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
  10. 根据权利要求7或8任一项所述终端,其特征在于,所述指示单元还具体设置为:
    在所述第二判断单元判断所述目标信息的接收对象是否为所述分身应用之后,若所述目标信息的接收对象不为所述分身应用,则指示所述目标应用对应的主应用接收所述目标信息。
  11. 根据权利要求7或8任一项所述终端,其特征在于,所述终端还包括:
    存储单元,设置为在所述指示单元指示所述分身应用接收所述目标信息之后,将所述目标信息保存在所述分身应用的数据库中,并对所述目标信息进行加密。
  12. 根据权利要求7或8任一项所述终端,其特征在于,在所述分身应用的桌面图标处于隐藏状态或者伪装状态时,所述终端还包括:
    获取单元,设置为在所述指示单元指示所述分身应用接收所述目标信息之后,获取第一身份验证信息;
    匹配单元,设置为将所述第一身份验证信息与预先存储的第二身份验证信息进行匹配;
    还原单元,设置为在所述第一身份验证信息与所述第二身份验证信息匹配成功时,还原所述分身应用的桌面图标。
PCT/CN2016/104042 2016-09-22 2016-10-31 一种信息处理方法及终端 WO2018053904A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610841560.9 2016-09-22
CN201610841560.9A CN106648583B (zh) 2016-09-22 2016-09-22 一种信息处理方法及终端

Publications (1)

Publication Number Publication Date
WO2018053904A1 true WO2018053904A1 (zh) 2018-03-29

Family

ID=58852184

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/104042 WO2018053904A1 (zh) 2016-09-22 2016-10-31 一种信息处理方法及终端

Country Status (2)

Country Link
CN (1) CN106648583B (zh)
WO (1) WO2018053904A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111158935A (zh) * 2019-12-31 2020-05-15 北京奇艺世纪科技有限公司 一种应用程序检测方法、装置、计算机设备及存储介质

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108519922B (zh) * 2018-04-12 2022-07-12 珠海市魅族科技有限公司 信息推送方法及装置、终端设备及计算机可读存储介质
CN109032686B (zh) * 2018-06-07 2021-10-22 北京小米移动软件有限公司 数据处理方法及装置
CN109447637A (zh) * 2018-10-18 2019-03-08 四川师范大学 基于在线数据的线上交易支付密码验证方法
CN109697343B (zh) * 2018-12-28 2021-08-17 联想(北京)有限公司 验证方法及系统、计算机系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760032A (zh) * 2012-03-19 2012-10-31 联想(北京)有限公司 一种信息处理的方法和电子设备
CN104866342A (zh) * 2015-05-07 2015-08-26 北京数字天域科技有限责任公司 在智能终端上同时开启多个同一应用程序的方法和装置
CN105760045A (zh) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法、应用程序的登录装置和终端
CN105933546A (zh) * 2016-06-29 2016-09-07 宇龙计算机通信科技(深圳)有限公司 一种消息通知方法、装置及终端
CN105930188A (zh) * 2016-04-22 2016-09-07 厦门芯鸽信息科技有限公司 一种单移动设备虚拟多个移动设备的方法
CN106330678A (zh) * 2016-08-29 2017-01-11 宇龙计算机通信科技(深圳)有限公司 一种应用消息提醒方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8849717B2 (en) * 2009-07-09 2014-09-30 Simon Cooper Methods and systems for upgrade and synchronization of securely installed applications on a computing device
CN102509055B (zh) * 2011-11-24 2015-04-08 宇龙计算机通信科技(深圳)有限公司 移动终端及该移动终端程序隐藏方法
CN102752751B (zh) * 2012-06-29 2015-08-12 宇龙计算机通信科技(深圳)有限公司 应用的保护方法及装置
CN105791581B (zh) * 2016-03-25 2019-07-26 努比亚技术有限公司 应用操作方法、装置及移动终端

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760032A (zh) * 2012-03-19 2012-10-31 联想(北京)有限公司 一种信息处理的方法和电子设备
CN104866342A (zh) * 2015-05-07 2015-08-26 北京数字天域科技有限责任公司 在智能终端上同时开启多个同一应用程序的方法和装置
CN105760045A (zh) * 2016-01-29 2016-07-13 宇龙计算机通信科技(深圳)有限公司 应用程序的登录方法、应用程序的登录装置和终端
CN105930188A (zh) * 2016-04-22 2016-09-07 厦门芯鸽信息科技有限公司 一种单移动设备虚拟多个移动设备的方法
CN105933546A (zh) * 2016-06-29 2016-09-07 宇龙计算机通信科技(深圳)有限公司 一种消息通知方法、装置及终端
CN106330678A (zh) * 2016-08-29 2017-01-11 宇龙计算机通信科技(深圳)有限公司 一种应用消息提醒方法及系统

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111158935A (zh) * 2019-12-31 2020-05-15 北京奇艺世纪科技有限公司 一种应用程序检测方法、装置、计算机设备及存储介质
CN111158935B (zh) * 2019-12-31 2023-07-25 北京奇艺世纪科技有限公司 一种应用程序检测方法、装置、计算机设备及存储介质

Also Published As

Publication number Publication date
CN106648583A (zh) 2017-05-10
CN106648583B (zh) 2020-12-15

Similar Documents

Publication Publication Date Title
WO2018053904A1 (zh) 一种信息处理方法及终端
WO2018018695A1 (zh) 一种应用冻结管理的方法、装置以及终端
WO2017206456A1 (zh) 一种视频通话中视频图像展示方法及装置
WO2020029585A1 (zh) 基于迁移学习的神经网络联邦建模方法、设备及存储介质
WO2019174090A1 (zh) 截屏文件分享的控制方法、装置、设备和计算机存储介质
WO2018082142A1 (zh) 一种录屏方法以及装置
WO2020147383A1 (zh) 基于区块链系统的流程审批方法、装置、系统及非易失性存储介质
WO2017119548A1 (ko) 보안성이 강화된 사용자 인증방법
WO2019024126A1 (zh) 基于区块链的知识管理方法、终端及服务器
WO2017122980A1 (en) Electronic device and method for authenticating identification information thereof
WO2018098886A1 (zh) 一种开启车门的方法、移动终端、车载终端及系统
WO2018072261A1 (zh) 信息加密方法及装置、信息解密方法及装置及终端
WO2016206530A1 (zh) 一种高级安全的移动支付方法、装置及系统
WO2018035930A1 (zh) 一种系统解锁方法和设备
WO2018076879A1 (zh) 数据备份方法、装置、存储介质及终端
WO2020155772A1 (zh) 验证图片发送方法、合成方法及装置、存储介质和终端
WO2021056833A1 (zh) 私密联系人的私密信息保护方法、装置及可读存储介质
WO2012053875A2 (ko) 지문 정보를 통한 데이터 송신 수신 장치 및 시스템
WO2017016272A1 (zh) 一种虚拟资源数据的处理方法、装置及系统
WO2018032583A1 (zh) 一种终端位置信息获取方法及装置
WO2018079999A1 (en) Electronic device and method for operating the same
WO2018000640A1 (zh) 一种语音加密的测试方法及测试设备
WO2020032351A1 (ko) 익명 디지털 아이덴티티 수립 방법
WO2015026083A1 (ko) 휴대폰 본인인증 도용방지와 스미싱 방지를 위한 문자메시지 보안시스템 및 방법
WO2018076446A1 (zh) 一种消息同步方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16916643

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16916643

Country of ref document: EP

Kind code of ref document: A1