CN103530549B - File/applied program processing method on communication terminal and device - Google Patents

File/applied program processing method on communication terminal and device Download PDF

Info

Publication number
CN103530549B
CN103530549B CN201310436168.2A CN201310436168A CN103530549B CN 103530549 B CN103530549 B CN 103530549B CN 201310436168 A CN201310436168 A CN 201310436168A CN 103530549 B CN103530549 B CN 103530549B
Authority
CN
China
Prior art keywords
file
application program
input signal
audio input
operated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310436168.2A
Other languages
Chinese (zh)
Other versions
CN103530549A (en
Inventor
马章栋
冯立夫
黄媛媛
赵新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201310436168.2A priority Critical patent/CN103530549B/en
Publication of CN103530549A publication Critical patent/CN103530549A/en
Application granted granted Critical
Publication of CN103530549B publication Critical patent/CN103530549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L15/00Speech recognition
    • G10L15/26Speech to text systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Human Computer Interaction (AREA)
  • Acoustics & Sound (AREA)
  • Multimedia (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the file/applied program processing method on communication terminal and device, wherein, described method includes: the event being operated audio input signal and the file/application program of communication terminal is monitored;If monitoring the event that file/application program is operated, and in preset time range, monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing to carry out, as privacy information, the object protected;Perform to protect operation accordingly, to avoid the file/application program operated compromised according to preset privacy preserving operations mode file/application program to being operated.By means of the invention it is possible to during to needing on terminal unit to protect as privacy information, more effectively protect the privacy information of user.

Description

File/applied program processing method on communication terminal and device
Technical field
The present invention relates to file/application program protection processing technology field, be specifically related on communication terminal File/applied program processing method and device.
Background technology
What at present Intelligent mobile communication terminal (including mobile phone, panel computer etc.) provided take pictures, record a video, The functions such as recording bring happiness lived experience easily for user really, however one can not be ignored ask Topic is exactly privacy.The memory space of communication terminal is constantly increasing, in a communication terminal The files such as a lot of picture, video and recording can be stored, these multimedia files for a user As be individual privacy, if communication terminal is obtained by others, these information will face compromised Risk.
Therefore, solve the technical problem that to be that how terminal to be led in the urgent need to those skilled in the art The information realization carrying out protecting as privacy information is needed to be effectively protected in news terminal.
Summary of the invention
In view of the above problems, it is proposed that the present invention is to provide one to overcome the problems referred to above or at least partly Ground solves the file/applied program processing method on the communication terminal of the problems referred to above and moves logical accordingly File/application processing apparatus on news terminal unit, it is possible to needing as privacy on terminal unit During information is protected, more effectively protect the privacy information of user.
According to one aspect of the present invention, it is provided that at the file/application program on a kind of communication terminal Reason method, including:
The event being operated audio input signal and the file/application program of communication terminal is supervised Control;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting the audio input signal of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
Alternatively, the described audio input signal to communication terminal is monitored including:
By the interface of the audio detection device of communication terminal, obtain described audio detection device collection The audio input signal arrived.
Alternatively, pre-save benchmark voice data, judged whether to monitor satisfied in the following manner The audio input signal of prerequisite:
The waveform of the audio input signal collected Yu described benchmark voice data is carried out similarity system design;
If similarity reaches preset threshold value, then judge to monitor the audio frequency input letter meeting prerequisite Number.
Alternatively, pre-save text message corresponding to reference speech signals or believe directly as benchmark The text message of breath, judges whether to monitor the audio input signal meeting prerequisite in the following manner:
Described audio input signal is carried out speech recognition, therefrom extracts text message;
The text message extracted is compared with the text message pre-saved;
If identical, then judge to monitor the audio input signal meeting prerequisite.
Alternatively, the described audio input signal to communication terminal and file/application program are operated Event be monitored before also include:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that the audio input signal of terminal and file/application program are operated is monitored.
Alternatively, the described audio input signal to communication terminal and file/application program are operated Event be monitored including:
The event being created audio input signal and the new file of communication terminal is monitored.
Alternatively, the described event being created file new in communication terminal is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the audio input signal meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
Alternatively, the described event being operated the file/application program in communication terminal is monitored, Including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
Alternatively, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the audio input signal meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the audio frequency input letter of communication terminal Number meet time difference between preset condition, and the described very first time and the second time less than time preset Between threshold value, then be defined as the file/application program operated needing as privacy information carry out protecting right As.
According to a further aspect in the invention, it is provided that at the file/application program on a kind of communication terminal Reason device, including:
Monitoring unit, for being grasped audio input signal and the file/application program of communication terminal The event made is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset The audio input signal meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
Alternatively,
Described monitoring unit, specifically for the interface by the audio detection device of communication terminal, obtains The audio input signal that described audio detection device collects.
Alternatively, pre-save benchmark voice data, judged whether to monitor satisfied in the following manner The audio input signal of prerequisite:
Waveform comparing unit, for audio input signal and the described benchmark voice data that will be monitored Waveform carries out similarity system design;
First identifying unit, if reaching preset threshold value for similarity, then judges to monitor to meet in advance Put the audio input signal of condition.
Alternatively, pre-save text message corresponding to reference speech signals or believe directly as benchmark The text message of breath, judges whether to monitor the audio input signal meeting prerequisite in the following manner:
Voice recognition unit, for carrying out speech recognition, Cong Zhongti to the audio input signal monitored Take out text message;
Text comparing unit, for comparing the text message extracted with the text message pre-saved Right;
First identifying unit, if the comparison result for text comparing unit is identical, then judges monitoring To the audio input signal meeting prerequisite.
Alternatively, also include:
Run program monitoring unit, be used for the audio input signal to communication terminal and file/application Before the event that program is operated is monitored, the application program being currently running in communication terminal is entered Row monitoring;
Start unit, if the application program for being currently running belongs to preset critical applications, then The event that audio input signal and the file/application program of communication terminal are operated by startup is supervised Control.
Alternatively, described monitoring unit includes:
First monitoring subelement, for being created the audio input signal of communication terminal and new file The event built is monitored.
Alternatively, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
Alternatively, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And the audio input signal monitoring communication terminal in preset time range meets preset condition, Then it is defined as described new file needing to carry out, as privacy information, the object protected.
Alternatively, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
Alternatively, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the audio input signal meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and audio input signal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
According to the file/applied program processing method on the communication terminal of the present invention and device, can be right The event that the audio input signal of communication terminal and file/application program are operated is monitored, as Fruit finds that file/application program is operated, and monitors in preset time range and meet prerequisite Audio input signal, then can as user to perform privacy preserving operations confirmation, therefore may be used Directly to perform to protect operation to new file according to preset privacy preserving operations mode.Visible, in this mistake Cheng Zhong, can confirm that user is the need of to literary composition in the way of directly by detection audio user input operation Part/application program carries out secret protection, user-friendly, and user confirm carry out secret protection it After, directly can perform concrete protection operation according to pre-set protection mode of operation backstage, and Need not user in interface, select the operations such as concrete transfer path, setting code again, therefore, it can Reduce the risk that the private file of user is compromised further.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the skill of the present invention Art means, and can being practiced according to the content of description, and in order to allow, the present invention's is above and other Objects, features and advantages can become apparent, below especially exemplified by the detailed description of the invention of the present invention.
Accompanying drawing explanation
By reading the detailed description of hereafter preferred implementation, various other advantage and benefit for this Field those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, And it is not considered as limitation of the present invention.And in whole accompanying drawing, be denoted by the same reference numerals Identical parts.In the accompanying drawings:
Fig. 1 shows the flow chart of method according to an embodiment of the invention;And
Fig. 2 shows the schematic diagram of an apparatus in accordance with one embodiment of the invention.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing shows The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and not Should be limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to more thoroughly Understand the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
In embodiments of the present invention, it is provided that a run on communication terminal application program (be It is easy to describe, this application program is referred to as " defence program " by the embodiment of the present invention), this defence program The event that the audio input signal of communication terminal and file/application program are operated can be supervised Control, then according to monitored results, file/application program is performed privacy preserving operations.For example, it is possible to The event creating new file is monitored, if it find that there is new file to be created, also judges that it whether may be used Can be the private file of user, if it is, audio input signal can be monitored, if monitoring To meeting the audio input signal of prerequisite, then according to preset mode, newly created file can be held Row protection operation.It is to say, for user perspective, can be that protection specified by newly created file in advance Mode of operation, such as, can directly delete, or file shifts and preassigns the target directory of transfer Position, or, it is also possible to the password used when file is encrypted and preassigns encryption, etc., (such as user says the lifes such as a word additionally to provide a section audio beforehand through modes such as recording to defence program Become one section of voice), defence program just can be using this section audio as judgment standard (certainly, defence program The audio reference of acquiescence can also be used, as long as making user know this audio reference by certain mode Information).So, at a newly-generated file, or file is operated, or application program quilt After installing or being used, user just can input one section of voice, and then defence program just can be by user The voice signal of input is compared with the audio frequency preserved before, if similarity between the two meets one Fixed condition, then can carry out the trigger protection program file to being operated/application program with this and perform correspondence Privacy preserving operations.Below this is introduced in detail.
Seeing Fig. 1, the embodiment of the present invention provide firstly the file on a kind of communication terminal/application journey Sequence processing method, in the method, the executive agent of each step can be just previously described defence program, when So it is likely in actual applications realize by the way of hardware.The method may comprise steps of:
S101: the event that audio input signal and the file/application program of communication terminal are operated It is monitored;
When implementing, the event that file/application program is operated just can include the thing that new file is created The thing that the mounted event of event that part, existing file are edited, application program, application program are used Part etc..Event except being operated file/application program is monitored, it is also possible to mobile communication eventually The audio input signal of end is monitored.When implementing, can be by the audio detection of communication terminal Device (such as MIC etc.) default setting is the state opened, and this makes it possible to Real-time Collection to the external world Audio signal, follow-up when judging whether audio input signal meets preset condition, can will collect Audio input signal compare with the reference information pre-set, it may be judged whether same or similar.Its In, specifically when the audio input signal collected is compared with the reference information pre-set, as Really reference information is also a section audio information, then can be compared by the waveform of two audio signals, root Similarity between the two is judged according to information such as the positions that waveform medium wave peak, trough occur, if similar Degree reaches certain threshold value, then reach prerequisite.Or, if benchmark audio frequency is the voice (recorded before Sentence or one section of word), then can also pre-save the Word message comprised in this elementary audio, or only Preserve passage, when collecting current audio input signal, it can be carried out speech recognition, Therefrom extracting Word message, the Word message corresponding with the reference information pre-saved compares, and sentences Breaking, both are the most identical, if identical, then meet prerequisite.
It is further to note that generally, only at some specific application programs operationally, It is only possible to produce the file that possible needs carry out as privacy information protecting, or this specifically applies journey Sequence itself may belong to the application program needing to carry out secret protection.Therefore, the guarantor in the embodiment of the present invention The application program run current in communication terminal can also be monitored, if it find that close by the program of protecting Key application program is currently running, and restarts the audio input signal to communication terminal and file/application The event that program is operated is monitored, if the current application program run does not includes producing privacy The critical applications of file, then can start the audio input signal to communication terminal and The event that file/application program is operated is monitored.In this manner it is possible to need not be by communication terminal Audio detection device is set to always on state, is only found the application program of key when being currently running, It is then turned on audio detection device.Wherein, so-called critical applications can include photographing unit, videocorder, Recorder program, JICQ etc..Wherein, the program information that detection is currently running is permissible The API provided by system is completed, such as, obtain the program running program information under android system As follows:
// obtain system service ActivityManager
ActivityManager manager= (ActivityManager)getSystemService(ACTIVITY_SERVICE);
// obtain the task stack list being currently running,
List<RunningTaskInfo>runningTasks=manager.getRunningTasks(1);
// obtain the task stack of current top, i.e. foreground task stack
RunningTaskInforunningTaskInfo=runningTasks.get(0);
The top Activity of // acquisition foreground task stack
ComponentNametopActivity=runningTaskInfo.topActivity;
// obtain the bag name applied
String packageName=topActivity.getPackageName();。
Wherein method getSystemService (), getRunningTasks (), getPackageName () are The api function that android system provides.
It addition, in order to the file/application program that may belong to privacy of user is protected timely, In embodiments of the present invention, defence program can first pass through a background process to file/application program quilt The event of operation is monitored.Concrete, in order to realize this monitoring, can there is various ways.Such as, Under in one way in which, it is possible to use the event sniffer of communication terminal operating system, monitor behaviour The broadcast sent as system, by the filtration to system broadcast message, knows file/application program quilt The event of operation.It is to say, background program can be supervised by the event of communication terminal operating system Listen device, each system message occurred is judged, if type of message is file/application program quilt The event of operation, then can therefrom extract the filename of the file operated, suffix name, be operated The information such as the title of application program.Such as, under android system, when creating new file, system meeting Sending the broadcast creating file, background program can arrange a BroadCastReceiver to be carried out broadcast Monitor and filter, judging whether the event occurring to create new file according to the type of message of broadcast.
Or, under another kind of implementation, it is also possible to utilize the hook of communication terminal operating system Function, the event being operated user file/application program is monitored.It is to say, in file/application During program is operated, need to call relevant program and realize the operation to file/application program, In embodiments of the present invention, it is possible to use API Hook Function, background program can provide Hook Function also Deflector guide subfunction (generally being realized), such hook is called by Modification growth function entry address by original Function is just obtained in that the information such as the filename of the file operated, suffix name, completes file/application journey The monitoring of the event that sequence is operated, and obtain the information such as the filename in event, application name.
It should be noted that in actual applications, for preserving the catalogue one of file in communication terminal As have a lot, but general only some catalogue may comprise the private file of user, and other Catalogue, such as, typically will not deposit use in the most sightless catalogues such as storage system file The private file at family.Therefore, during the event creating new file is monitored, can be the most right Some specific catalogues are monitored, and monitor the change of file in this specific catalogue, it is judged that Qi Zhongshi No have new file to be created.Such as, this specific catalogue could be for preserving the photo of user, regarding The catalogue of the files such as frequency.
S102: if monitoring the event that file/application program is operated, and at preset time range Inside monitor the audio input signal meeting prerequisite, then file/the application program operated is defined as Needs carry out the object protected as privacy information;
If monitored the event that file/application program is operated, and before or after this event Certain period of time in also detected that the audio input signal meeting prerequisite, then can be by mobile logical The audio input signal of news terminal meet this event of prerequisite be defined as needs that user sends to file/ Application program carries out the trigger event of secret protection, accordingly, it is possible to be defined as by this document/application program Needs carry out the object protected as privacy information.
When implementing, when monitoring the event that file/application program is operated, record the very first time, When monitoring the audio input signal meeting prerequisite, recorded for the second time;So, if monitored The event that file/application program is operated, and the audio input signal of communication terminal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.Wherein, first Sequencing relation between time and the second time can not be defined, say, that for user For, when certain file/application program is protected by needs as privacy information, can to this document/ Before or after application program operates, perform the operations such as one section of specific audio signal of input, this Sample just can automatically trigger and file/application program is carried out secret protection.
Wherein, for creating the event of new file, the file/application program operated is being defined as Before needing as the object of privacy information protection, it is also possible to judge further.Specifically sentencing Time disconnected, if being the monitoring that the event creating new file in specific catalogue is carried out before, then can be straight Connect the catalogue according to new file place and judge that it belongs to the needs object as privacy information protection.The most just It is to say, owing to only some catalogues that may produce private file being monitored in advance, therefore, monitors New file be the most all the file in these specific catalogues, can be defined as need as privacy believe Breath carries out the file protected.Otherwise, create new file even if monitoring, and also in the regular hour In the range of monitored qualified audio input signal, it is also possible to need not be defined as needing conduct Privacy information carries out the file protected.
Or, while monitoring new document creation event, it is also possible to get the suffix of new file The information such as name, therefore, can analyze the file type information of the file that makes new advances accordingly, and then, can basis File type information judges that whether new file is that user needs to carry out, as privacy information, the object protected.Example As, generally, if it find that file type belongs to the types such as picture, video, audio frequency, the most permissible It is judged to that needs carry out the object protected as privacy information.
Certainly, in order to improve the accuracy of judgement further, it is also possible to above two mode is combined. That is, the establishment event of file new in some specific catalogues can be monitored, if it find that specific Catalogue in create new file, determine the file type of the file that makes new advances further according to the suffix name of new file, If file type belongs to again preset particular type, then the file that this is newly created can be probably needs The object protected is carried out as privacy information.
Such as, the example in an actual application may is that first start application monitoring service routine (after Platform runs), when application monitoring programme detects application program (photographing unit, the recorder relevant to privacy Deng) start time, startup file monitoring service routine (running background) and and start audio detection device (after Platform runs), the establishment event of file under the path that file monitor program monitoring is relevant, when there being private file During establishment, record the very first time, when qualified audio input signal being detected, when recording second Between, compare the difference between two time, the special time threshold after file creation time when the second time When value (such as 10 seconds) is interior, performs the protection to private file and process operation.
S103: perform corresponding according to the preset privacy preserving operations mode file to being operated/application program Protection operation, to avoid the file/application program operated compromised.
Determining that a file/application program operated belongs to what needs carried out protecting as privacy information After object, it is possible to file that can be newly created according to preset privacy preserving operations mode performs protection behaviour Make.
Wherein, the privacy preserving operations of the file/application program operated can directly will be operated File/application program is deleted;Or can also is that and the file/application program operated is shifted, At this point it is possible to specified the target directory position of transfer when pre-setting by user;Again or, it is also possible to File/the application program operated is encrypted, adds and it is possible to specified when pre-setting by user The password used time close, etc..It should be noted that due to the quilt under dissimilar or different directories File/the application program of operation is likely to be of different severity levels, therefore, it can the most dissimilar Or the file/application program operated under different directories arranges different protection modes of operation.Such as, The file of picture category is set to transfer preserve, the private file of video class is set to encryption etc..
In a word, in embodiments of the present invention, can be to the audio input signal of communication terminal and literary composition The event that part/application program is operated is monitored, if it find that file/application program is operated, and Monitor the audio input signal meeting prerequisite in preset time range, then can as with The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode New file is performed protection operation.Visible, in the process, can be directly defeated by detection audio user Enter operation mode to confirm that user carries out secret protection the need of to file/application program, facilitate user Operation, and after user confirms to carry out secret protection, can be directly according to pre-set protection Mode of operation backstage performs concrete protection operation, selects concrete turning again in interface without user Moving the operation such as path, setting code, the private file that therefore, it can reduce further user is compromised Risk.
It is corresponding with the file/applied program processing method on the communication terminal that the embodiment of the present invention provides, The embodiment of the present invention additionally provides the file/application processing apparatus on a kind of communication terminal, sees Fig. 2, this device may include that
Monitoring unit 201, is used for the audio input signal to communication terminal and file/application program The event operated is monitored;
Determine unit 202, if for monitoring the event that file/application program is operated, and in advance The audio input signal meeting prerequisite is monitored, then the file/should that will be operated in the time range put It is defined as the object that needs carry out protecting as privacy information by program;
Operating unit 203, for according to the file/application to being operated of the preset privacy preserving operations mode Program performs to protect operation accordingly, to avoid the file/application program operated compromised.
When implementing, monitoring unit 201 specifically may be used for the audio detection by communication terminal The interface of device, obtains the audio input signal that described audio detection device collects.
In order to the audio input data monitored is analyzed, benchmark voice data can be pre-saved, This benchmark audio-frequency information can be that defence program acquiescence offer (needs to accuse in advance in modes such as help informations Know user), or can be that user records voluntarily.At this point it is possible to judge whether in the following manner Monitor the audio input signal meeting prerequisite:
Waveform comparing unit, for audio input signal and the described benchmark voice data that will be monitored Waveform carries out similarity system design;
First identifying unit, if reaching preset threshold value for similarity, then judges to monitor to meet in advance Put the audio input signal of condition.
Or, under another kind of implementation, the text that reference speech signals is corresponding can be pre-saved Information or the text message directly as reference information, judge whether to monitor satisfied in the following manner The audio input signal of prerequisite:
Voice recognition unit, for carrying out speech recognition, Cong Zhongti to the audio input signal monitored Take out text message;
Text comparing unit, for comparing the text message extracted with the text message pre-saved Right;
First identifying unit, if the comparison result for text comparing unit is identical, then judges monitoring To the audio input signal meeting prerequisite.
When implementing, this device can also include:
Run program monitoring unit, be used for the audio input signal to communication terminal and file/application Before the event that program is operated is monitored, the application program being currently running in communication terminal is entered Row monitoring;
Start unit, if the application program for being currently running belongs to preset critical applications, then The event that audio input signal and the file/application program of communication terminal are operated by startup is supervised Control.
Wherein, described monitoring unit includes:
First monitoring subelement, for being created the audio input signal of communication terminal and new file The event built is monitored.
Wherein said first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
This device can also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And the audio input signal monitoring communication terminal in preset time range meets preset condition, Then it is defined as described new file needing to carry out, as privacy information, the object protected.
It addition, described monitoring unit can also include:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
This device can also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the audio input signal meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and audio input signal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
Described operating unit includes:
Deletion action subelement, for performing deletion action to the file operated/application program;
Or,
Transfer subelement, for according to preset catalogue, transfers to pre-by the file/application program operated Under the catalogue first specified;
Or,
Encryption sub-unit operable, for according to preset password, is encrypted the file/application program operated.
When implementing, different types of file/application program can corresponding different protection mode of operation.
Visible, in embodiments of the present invention, can be to the audio input signal of communication terminal and literary composition The event that part/application program is operated is monitored, if it find that file/application program is operated, and Monitor the audio input signal meeting prerequisite in preset time range, then can as with The family confirmation to execution privacy preserving operations, therefore can be with directly according to preset privacy preserving operations mode New file is performed protection operation.Visible, in the process, can be directly defeated by detection audio user Enter operation mode to confirm that user carries out secret protection the need of to file/application program, facilitate user Operation, and after user confirms to carry out secret protection, can be directly according to pre-set protection Mode of operation backstage performs concrete protection operation, selects concrete turning again in interface without user Moving the operation such as path, setting code, the private file that therefore, it can reduce further user is compromised Risk.
Algorithm and display be not solid with any certain computer, virtual system or miscellaneous equipment provided herein Have relevant.Various general-purpose systems can also be used together with based on teaching in this.As described above, Construct the structure required by this kind of system to be apparent from.Additionally, the present invention is also not for any specific Programming language.It is understood that, it is possible to use various programming languages realize the content of invention described herein, And the description done language-specific above is the preferred forms in order to disclose the present invention.
In description mentioned herein, illustrate a large amount of detail.It is to be appreciated, however, that this Inventive embodiment can be put into practice in the case of not having these details.In some instances, not It is shown specifically known method, structure and technology, in order to do not obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help understand in each inventive aspect one Or multiple, above in the description of the exemplary embodiment of the present invention, each feature of the present invention is sometimes It is grouped together in single embodiment, figure or descriptions thereof.But, should be by the disclosure Method be construed to reflect an intention that i.e. the present invention for required protection require ratio in each claim The middle more feature of feature be expressly recited.More precisely, as the following claims reflect As, inventive aspect is all features less than single embodiment disclosed above.Therefore, it then follows Claims of detailed description of the invention are thus expressly incorporated in this detailed description of the invention, the most each right Requirement itself is all as the independent embodiment of the present invention.
Those skilled in the art are appreciated that and can carry out the module in the equipment in embodiment certainly Change adaptively and they are arranged in one or more equipment different from this embodiment.Permissible Module in embodiment or unit or assembly are combined into a module or unit or assembly, and in addition may be used To put them into multiple submodule or subelement or sub-component.Except such feature and/or process or Outside at least some in unit excludes each other, can use any combination that (this specification is included companion With claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or All processes of person's equipment or unit are combined.Unless expressly stated otherwise, this specification (includes companion With claim, summary and accompanying drawing) disclosed in each feature can by provide identical, equivalent or phase Replace like the alternative features of purpose.
Although additionally, it will be appreciated by those of skill in the art that embodiments more described herein include it Some feature included in its embodiment rather than further feature, but the group of the feature of different embodiment Close and mean to be within the scope of the present invention and formed different embodiments.Such as, in following power In profit claim, one of arbitrarily can mode making in any combination of embodiment required for protection With.
The all parts embodiment of the present invention can realize with hardware, or to process at one or more The software module run on device realizes, or realizes with combinations thereof.Those skilled in the art should Understand, microprocessor or digital signal processor (DSP) can be used in practice to realize according to this Some or all portions in file on the communication terminal of inventive embodiments/application program processing equipment The some or all functions of part.The present invention is also implemented as performing method as described herein Part or all equipment or device program (such as, computer program and computer program). The program of such present invention of realization can store on a computer-readable medium, or can have one Or the form of multiple signals.Such signal can be downloaded from internet website and obtain, or carrying There is provided on body signal, or provide with any other form.
The present invention will be described rather than limits the invention to it should be noted above-described embodiment, And those skilled in the art can design replacement in fact without departing from the scope of the appended claims Execute example.In the claims, should not will be located in any reference marks between bracket to be configured to right is wanted The restriction asked.Word " comprises " and does not excludes the presence of the element or step not arranged in the claims.It is positioned at Word "a" or "an" before element does not excludes the presence of multiple such element.The present invention is permissible By means of including the hardware of some different elements and realizing by means of properly programmed computer.? If listing in the unit claim of equipment for drying, several in these devices can be by same Hardware branch specifically embodies.Word first, second and third use do not indicate that any order. Can be title by these word explanations.
The application can apply to computer system/server, and they can be with other universal or special calculating numerous System environments or configuration operate together.Be suitable to be used together with computer system/server is well-known The example of calculating system, environment and/or configuration includes but not limited to: personal computer system, server meter Calculation machine system, thin client, thick client computer, hand-held or laptop devices, system based on microprocessor, Set Top Box, programmable consumer electronics, NetPC Network PC, minicomputer system mass computing Machine system and the distributed cloud computing technology environment including any of the above described system, etc..
Computer system/server can be in the computer system executable instruction performed by computer system Describe under the general linguistic context of (such as program module).Generally, program module can include routine, program, Target program, assembly, logic, data structure etc., they perform specific task or realize specific Abstract data type.Computer system/server can be implemented in distributed cloud computing environment, distribution In formula cloud computing environment, task is to be performed by by the remote processing devices of communication network links.Dividing In cloth cloud computing environment, program module may be located at and includes that the Local or Remote of storage device calculates system On storage medium.
The invention also discloses the file/applied program processing method on A1, a kind of communication terminal, bag Include:
The event being operated audio input signal and the file/application program of communication terminal is supervised Control;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting the audio input signal of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
A2, method as described in A1, the described audio input signal to communication terminal is monitored Including:
By the interface of the audio detection device of communication terminal, obtain described audio detection device collection The audio input signal arrived.
A3, method as described in A1, pre-saved benchmark voice data, judged in the following manner Whether monitor the audio input signal meeting prerequisite:
The waveform of the audio input signal collected Yu described benchmark voice data is carried out similarity system design;
If similarity reaches preset threshold value, then judge to monitor the audio frequency input letter meeting prerequisite Number.
A4, method as described in A1, pre-save text message corresponding to reference speech signals or Directly as the text message of reference information, judge whether in the following manner to monitor to meet prerequisite Audio input signal:
Described audio input signal is carried out speech recognition, therefrom extracts text message;
The text message extracted is compared with the text message pre-saved;
If identical, then judge to monitor the audio input signal meeting prerequisite.
A5, method as described in A1, the described audio input signal to communication terminal and file/ The event that application program is operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that the audio input signal of terminal and file/application program are operated is monitored.
A6, method as described in A1, the described audio input signal to communication terminal and file/ The event that application program is operated is monitored including:
The event being created audio input signal and the new file of communication terminal is monitored.
A7, method as described in A6, the described event being created file new in communication terminal is entered Row monitoring, including:
New document creation event in assigned catalogue in communication terminal is monitored.
A8, method as described in A6, also include:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the audio input signal meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
A9, method as described in A1, described operated the file/application program in communication terminal Event be monitored, including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
A10, method as described in any one of A1 to A9, also include:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the audio input signal meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the audio frequency input letter of communication terminal Number meet time difference between preset condition, and the described very first time and the second time less than time preset Between threshold value, then be defined as the file/application program operated needing as privacy information carry out protecting right As.
The invention also discloses the file/application processing apparatus on B1, a kind of communication terminal, bag Include:
Monitoring unit, for being grasped audio input signal and the file/application program of communication terminal The event made is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset The audio input signal meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
B2, device as described in B1,
Described monitoring unit, specifically for the interface by the audio detection device of communication terminal, obtains The audio input signal that described audio detection device collects.
B3, device as described in B1, pre-saved benchmark voice data, judge in the following manner be The no audio input signal meeting prerequisite that monitors:
Waveform comparing unit, for audio input signal and the described benchmark voice data that will be monitored Waveform carries out similarity system design;
First identifying unit, if reaching preset threshold value for similarity, then judges to monitor to meet in advance Put the audio input signal of condition.
B4, device as described in B1, pre-save text message corresponding to reference speech signals or straight Connect the text message as reference information, judge whether in the following manner to monitor to meet prerequisite Audio input signal:
Voice recognition unit, for carrying out speech recognition, Cong Zhongti to the audio input signal monitored Take out text message;
Text comparing unit, for comparing the text message extracted with the text message pre-saved Right;
First identifying unit, if the comparison result for text comparing unit is identical, then judges monitoring To the audio input signal meeting prerequisite.
B5, device as described in B1, also include:
Run program monitoring unit, be used for the audio input signal to communication terminal and file/application Before the event that program is operated is monitored, the application program being currently running in communication terminal is entered Row monitoring;
Start unit, if the application program for being currently running belongs to preset critical applications, then The event that audio input signal and the file/application program of communication terminal are operated by startup is supervised Control.
B6, device as described in B1, described monitoring unit includes:
First monitoring subelement, for being created the audio input signal of communication terminal and new file The event built is monitored.
B7, device as described in B6, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
B8, device as described in B6, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And the audio input signal monitoring communication terminal in preset time range meets preset condition, Then it is defined as described new file needing to carry out, as privacy information, the object protected.
B9, device as described in B1, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
B10, device as described in any one of B1 to B9, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the audio input signal meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and audio input signal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.

Claims (20)

1. file/the applied program processing method on communication terminal, including:
The event being operated audio input signal and the file/application program of communication terminal is supervised Control;
If monitoring the event that file/application program is operated, and monitor in preset time range To meeting the audio input signal of prerequisite, then it is defined as the file/application program operated needing to make The object protected is carried out for privacy information;
Corresponding protection is performed according to preset privacy preserving operations mode file/application program to being operated Operation, to avoid the file/application program operated compromised.
2. the method for claim 1, the described audio input signal to communication terminal is carried out Monitoring includes:
By the interface of the audio detection device of communication terminal, obtain described audio detection device collection The audio input signal arrived.
3. the method for claim 1, has pre-saved benchmark voice data, in the following manner Judge whether to monitor the audio input signal meeting prerequisite:
The waveform of the audio input signal collected Yu described benchmark voice data is carried out similarity system design;
If similarity reaches preset threshold value, then judge to monitor the audio frequency input letter meeting prerequisite Number.
4. the method for claim 1, pre-saves the text message that reference speech signals is corresponding Or directly as the text message of reference information, judge whether in the following manner to monitor meet preset The audio input signal of condition:
Described audio input signal is carried out speech recognition, therefrom extracts text message;
The text message extracted is compared with the text message pre-saved;
If identical, then judge to monitor the audio input signal meeting prerequisite.
5. the method for claim 1, the described audio input signal to communication terminal and The event that file/application program is operated also includes before being monitored:
The application program being currently running in communication terminal is monitored;
If the application program being currently running belongs to preset critical applications, then start mobile communication The event that the audio input signal of terminal and file/application program are operated is monitored.
6. the method for claim 1, the described audio input signal to communication terminal and The event that file/application program is operated is monitored including:
The event being created audio input signal and the new file of communication terminal is monitored.
7. method as claimed in claim 6, the described thing that file new in communication terminal is created Part is monitored, including:
New document creation event in assigned catalogue in communication terminal is monitored.
8. method as claimed in claim 6, also includes:
When monitoring the event creating new file, obtain the file type information of new file;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And in preset time range, monitor the audio input signal meeting prerequisite, then by described new literary composition Part is defined as the object that needs carry out protecting as privacy information.
9. the method for claim 1, described to the file in communication terminal/application program quilt The event of operation is monitored, including:
Edited the file in communication terminal, application program is mounted or application program used Action Events is monitored.
10. the method as described in any one of claim 1 to 9, also includes:
When monitoring the event that file/application program is operated, record the very first time;
When monitoring the audio input signal meeting prerequisite, recorded for the second time;
If the event that file/application program is operated is monitored described, and in preset time range Monitor the audio input signal meeting prerequisite, be then defined as the file/application program operated needing The object protected is carried out as privacy information, including:
If monitoring the event that file/application program is operated, and the audio frequency input letter of communication terminal Number meet time difference between preset condition, and the described very first time and the second time less than time preset Between threshold value, then be defined as the file/application program operated needing as privacy information carry out protecting right As.
File/application processing apparatus on 11. 1 kinds of communication terminals, including:
Monitoring unit, for being grasped audio input signal and the file/application program of communication terminal The event made is monitored;
Determine unit, if for monitoring the event that file/application program is operated, and preset The audio input signal meeting prerequisite, the then file/application journey that will be operated is monitored in time range Sequence is defined as the object that needs carry out protecting as privacy information;
Operating unit, for according to preset privacy preserving operations mode file/application program to being operated Perform to protect operation accordingly, to avoid the file/application program operated compromised.
12. devices as claimed in claim 11,
Described monitoring unit, specifically for the interface by the audio detection device of communication terminal, obtains The audio input signal that described audio detection device collects.
13. devices as claimed in claim 11, have pre-saved benchmark voice data, by with lower section Formula judges whether to monitor the audio input signal meeting prerequisite:
Waveform comparing unit, for audio input signal and the described benchmark voice data that will be monitored Waveform carries out similarity system design;
First identifying unit, if reaching preset threshold value for similarity, then judges to monitor to meet in advance Put the audio input signal of condition.
14. devices as claimed in claim 11, pre-save the text envelope that reference speech signals is corresponding Breath or directly as the text message of reference information, judge whether in the following manner to monitor meet pre- Put the audio input signal of condition:
Voice recognition unit, for carrying out speech recognition, Cong Zhongti to the audio input signal monitored Take out text message;
Text comparing unit, for comparing the text message extracted with the text message pre-saved Right;
First identifying unit, if the comparison result for text comparing unit is identical, then judges monitoring To the audio input signal meeting prerequisite.
15. devices as claimed in claim 11, also include:
Run program monitoring unit, be used for the audio input signal to communication terminal and file/application Before the event that program is operated is monitored, the application program being currently running in communication terminal is entered Row monitoring;
Start unit, if the application program for being currently running belongs to preset critical applications, then The event that audio input signal and the file/application program of communication terminal are operated by startup is supervised Control.
16. devices as claimed in claim 11, described monitoring unit includes:
First monitoring subelement, for being created the audio input signal of communication terminal and new file The event built is monitored.
17. devices as claimed in claim 16, described first monitoring subelement specifically for:
New document creation event in assigned catalogue in communication terminal is monitored.
18. devices as claimed in claim 16, also include:
Type information acquiring unit, in time monitoring the event creating new file, obtains the literary composition of new file Part type information;
Described determine unit specifically for:
If monitoring creates the event of new file, and the file type of described new file belongs to preset type, And the audio input signal monitoring communication terminal in preset time range meets preset condition, Then it is defined as described new file needing to carry out, as privacy information, the object protected.
19. devices as claimed in claim 11, described monitoring unit includes:
Second monitoring subelement, for being edited the file in communication terminal, application program is pacified The Action Events that dress or application program are used is monitored.
20. devices as described in any one of claim 11 to 19, also include:
Very first time record unit, is used for when monitoring the event that file/application program is operated, record The very first time;
Second time record unit, in time monitoring the audio input signal meeting prerequisite, record Second time;
Described determine unit specifically for:
If monitoring the event that file/application program is operated, and audio input signal meets preset bar Time difference between part, and the described very first time and the second time, then will be by less than preset time threshold File/the application program of operation is defined as the object that needs carry out protecting as privacy information.
CN201310436168.2A 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device Active CN103530549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310436168.2A CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310436168.2A CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Publications (2)

Publication Number Publication Date
CN103530549A CN103530549A (en) 2014-01-22
CN103530549B true CN103530549B (en) 2016-08-24

Family

ID=49932553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310436168.2A Active CN103530549B (en) 2013-09-23 2013-09-23 File/applied program processing method on communication terminal and device

Country Status (1)

Country Link
CN (1) CN103530549B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200170B (en) * 2014-04-15 2018-06-19 中兴通讯股份有限公司 The method for secret protection and electronic equipment of a kind of electronic equipment
CN105471585A (en) * 2015-12-09 2016-04-06 广州华多网络科技有限公司 Cancelling method and device of user information
CN106980797A (en) * 2017-03-24 2017-07-25 北京奇虎科技有限公司 A kind of method, device and computing device for realizing file protection
CN106997761A (en) * 2017-04-20 2017-08-01 滁州职业技术学院 The method and mobile terminal of a kind of secret protection

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308654A (en) * 2007-05-14 2008-11-19 华为技术有限公司 Speech analysis and recognition method, system and apparatus
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102917106A (en) * 2012-10-26 2013-02-06 上海吟隆信息科技有限公司 Melody identification based cellphone unlocking method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101308654A (en) * 2007-05-14 2008-11-19 华为技术有限公司 Speech analysis and recognition method, system and apparatus
CN101616495A (en) * 2008-06-23 2009-12-30 网秦无限(北京)科技有限公司 The method and system of individual privacy in the protection mobile phone
CN102917106A (en) * 2012-10-26 2013-02-06 上海吟隆信息科技有限公司 Melody identification based cellphone unlocking method

Also Published As

Publication number Publication date
CN103530549A (en) 2014-01-22

Similar Documents

Publication Publication Date Title
US10120552B2 (en) Annotating collaborative content to facilitate mining key content as a runbook
CN103763124A (en) Internet user behavior analyzing and early-warning system and method
CN103530549B (en) File/applied program processing method on communication terminal and device
KR101990598B1 (en) Method and device for recommending solution based on user operation behavior
CN110933103B (en) Anti-crawler method, device, equipment and medium
US11301947B2 (en) System and method for collecting forensic data via a mobile device
WO2014172956A1 (en) Login method,apparatus, and system
CN105025318A (en) Feedback method and device for abnormal log information of application program
CN108234400B (en) Attack behavior determination method and device and situation awareness system
CN103514396B (en) File/applied program processing method and device on communication terminal
CN104965731B (en) A kind of data processing method and electric terminal
CN111314063A (en) Big data information management method, system and device based on Internet of things
CN103778377A (en) Terminal and method for preventing sensitive information leakage
CN103530550B (en) File/applied program processing method on communication terminal and device
CN106331858A (en) Method, device and system for detecting program installation adaptation
CN112488872A (en) Electric power operation data monitoring system
CN115001967B (en) Data acquisition method and device, electronic equipment and storage medium
CN109491748B (en) Wearable device control method and control terminal based on small program
CN115277670A (en) Network connection control method and device of target application and electronic equipment
US20190104137A1 (en) Playbook-based security investigations using a card system framework
CN103488930A (en) Method and device for processing file/application program on mobile communication terminal
CN100501669C (en) Screen protection system and method
CN109327433B (en) Threat perception method and system based on operation scene analysis
CN103488950B (en) Method and device for processing file/application program on mobile communication terminal
CN113691875B (en) Application program password login processing method and device, intelligent terminal and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220712

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co., Ltd