CN104021352A - Method and system for isolating applications through data - Google Patents

Method and system for isolating applications through data Download PDF

Info

Publication number
CN104021352A
CN104021352A CN201410203596.5A CN201410203596A CN104021352A CN 104021352 A CN104021352 A CN 104021352A CN 201410203596 A CN201410203596 A CN 201410203596A CN 104021352 A CN104021352 A CN 104021352A
Authority
CN
China
Prior art keywords
owner
deposit data
visitor
data catalogue
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410203596.5A
Other languages
Chinese (zh)
Inventor
李林
杨虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhuo You Network Technology Co Ltd
Original Assignee
Shanghai Zhuo You Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhuo You Network Technology Co Ltd filed Critical Shanghai Zhuo You Network Technology Co Ltd
Priority to CN201410203596.5A priority Critical patent/CN104021352A/en
Publication of CN104021352A publication Critical patent/CN104021352A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to the field of communications and discloses a method and system for isolating applications through data. The method includes the following steps that when a user enters a visitor mode, all the applications running before the user enters the visitor mode are ended; after the user enters the visitor mode, a directory for storing host data generated in the application running process before the user enters the visitor mode is hidden; when the hidden applications of the directory for storing host data are run in the visitor mode, a directory for storing visitor data generated by running the applications is generated; before the user exits the visitor mode, the directory for storing visitor data is deleted; the directory for storing host data is displayed again. Compared with the prior art, not only does a terminal reserve data used when the applications are run by a terminal host, but also the privacy of the terminal host can be effectively protected.

Description

By the method and system of application usage data isolation
Technical field
The present invention relates to the communications field, particularly by the method and system of application usage data isolation.
Background technology
In actual life; conventionally can run into such problem; when others uses our application of mobile phone open; such as during QQ; conventionally before having existed in account and/or cryptographic session frame, oneself uses account and the password of this QQ; we do not wish that others knows oneself account and password conventionally; especially password; but while not wishing again to log in this application, all want pretty troublesome manual input account and/or password at every turn; especially oneself all forget when account and/or password are and so on, just have no idea to log in this application.
In order to overcome this defect of terminal, in prior art, in terminal, be provided with normal mode and visitor's pattern.Under normal mode, even if exit application, while again logging in this application, account and password still can exist, and user only need click login button can complete login; And when terminal enters visitor's pattern; terminal can judge whether each application is that Manual Logos are to specify the application that will hide; automatically the icon hiding of the application that will hide will be specified; such as QQ icon hiding is got up; prevent that visitor from seeing owner's account and password, so just can effectively protect owner's privacy.
But in use, there is following shortcoming in aforesaid way, when visitor wants to move the QQ being hidden, owing to can not find the icon of QQ, can think that owner does not install QQ by mistake, will reinstall a QQ, can repeat like this to install same application, mobile phone EMS memory outside occupying volume, and waste network traffics.
Summary of the invention
The object of the present invention is to provide a kind of method and system that application usage data is isolated, make terminal both retain the data of using when terminal owner moves application, also can effectively protect terminal owner's privacy.
For solving the problems of the technologies described above, the invention provides a kind of method that application usage data is isolated, comprise following steps:
When entering visitor's pattern, finish all application that move before entering described visitor's pattern;
After entering described visitor's pattern, the owner's deposit data catalogue that enters described visitor's pattern operation application before generation is hidden;
While moving the application that described owner's deposit data catalogue is hidden under described visitor's pattern, visitor's deposit data catalogue that this application of generating run produces;
When exiting described visitor's pattern, delete described visitor's deposit data catalogue;
Again show described owner's deposit data catalogue.
It is a kind of by the system of application usage data isolation that the present invention also provides, and comprises: execution module, finish module, and operation module, generation module, hides module, removing module and again display module;
Described execution module enters and exits visitor's pattern for control terminal;
Described operation module is used for moving application;
Described end module, for when described execution module control terminal enters visitor's pattern, finishes to enter all application of the before described operation module operation of described visitor's pattern;
Described generation module, for before described execution module control terminal enters visitor's pattern, when the described application of described operation module operation, generates owner's deposit data catalogue;
Described hiding module, for entering after described visitor's pattern at described execution module control terminal, is hidden described owner's deposit data catalogue;
Described generation module is also for entering after described visitor's pattern at described execution module control terminal, when described operation module is moved the application that described owner's deposit data catalogue is hidden under described visitor's pattern, visitor's deposit data catalogue that this application of generating run produces;
Described removing module, for when described execution module control terminal exits described visitor's pattern, is deleted described visitor's deposit data catalogue;
Described display module again, for deleting after described visitor's deposit data catalogue at described removing module, shows described owner's deposit data catalogue again.
Embodiment of the present invention in terms of existing technologies, after entering visitor's pattern, first the owner's deposit data catalogue that enters visitor's pattern operation application before generation is hidden, rather than by the icon hiding of this application, like this when visitor need to move this application, just can not can not find the icon of this application, avoid visitor to take in terminal not this application and again download and install this application, save terminal internal memory and network traffics, also protected in addition terminal owner's privacy, after entering visitor's pattern, when visitor moves this application, due to the owner's deposit data catalogue before can not find, will generate visitor's deposit data catalogue, when exiting visitor's pattern, terminal can be by visitor's deposit data directory delete of above-mentioned generation, and hiding owner's deposit data catalogue before again showing, in the time of so just can making terminal owner again move this application, also need not again manually input necessary data (such as account and password), even if user has been forgotten move this to apply required account and password can not have any impact to again moving this application yet, make man-machine interaction more smooth, to sum up, the method in the present invention has retained the historical data that user moves application, facilitates the user to reuse this application, also effectively protects user's privacy.
Preferably, described, by the hiding step of owner's deposit data catalogue that before entering described visitor's pattern, operation application produces, adopt the mode of the title of revising described owner's deposit data catalogue to hide described owner's deposit data catalogue;
Correspondingly, in the described step that again shows described owner's deposit data catalogue, recover the title of described owner's deposit data catalogue.
In the present embodiment, after entering visitor's pattern, by revising the title of owner's deposit data catalogue, owner's deposit data catalogue is hidden, when exiting visitor's pattern, by recovering the title of owner's deposit data catalogue, it is shown again, because only revised directory name in the process of hiding and again showing, most effective, respond also the most quick, power saving, the not utilization rate of occupied terminal internal memory and CPU.
Preferably, in the hiding step of described owner's deposit data catalogue operation application before entering described visitor's pattern is produced, comprise following sub-step:
Compress described owner's deposit data catalogue, generate the compression piece of described owner's deposit data catalogue;
Delete described owner's deposit data catalogue;
Correspondingly, in the described step that again shows described owner's deposit data catalogue, the compression piece solution of described owner's deposit data catalogue is pressed into described owner's deposit data catalogue.
Because compression after file not can with existing catalog conflict, so in the present embodiment, after entering visitor's pattern, also can generate by compression owner deposit data catalogue the compression piece of owner's deposit data catalogue, then deleting owner's deposit data catalogue hides it, when exiting visitor's pattern, mode by decompress(ion) is pressed into owner's deposit data catalogue by the compression piece solution of owner's deposit data catalogue shows it again, because only owner's deposit data catalogue has been carried out to compression and decompress(ion) in the process of hiding and again showing, efficiency is higher, respond also more quick, compared with power saving, less occupied terminal internal memory and CPU usage.
Accompanying drawing explanation
Fig. 1 is the method flow diagram of application usage data being isolated according in first embodiment of the invention;
Fig. 2 is the method flow diagram of application usage data being isolated according in second embodiment of the invention;
Fig. 3 is the method flow diagram of application usage data being isolated according in third embodiment of the invention;
Fig. 4 is the system schematic of application usage data being isolated according in four embodiment of the invention;
Fig. 5 is the system schematic of application usage data being isolated according in fifth embodiment of the invention.
Embodiment
For making the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing, the embodiments of the present invention are explained in detail.Yet, persons of ordinary skill in the art may appreciate that in each embodiment of the present invention, in order to make reader understand the application better, many ins and outs have been proposed.But, even without these ins and outs and the many variations based on following embodiment and modification, also can realize each claim of the application technical scheme required for protection.
The first embodiment of the present invention relates to a kind of by the method for application usage data isolation.Idiographic flow as shown in Figure 1, comprises following steps:
Step 101: when entering visitor's pattern, finish all application that move before entering visitor's pattern.
Step 102: after entering visitor's pattern, the owner's deposit data catalogue that enters visitor's pattern operation application before generation is hidden.
Step 103: while moving the application that above-mentioned owner's deposit data catalogue is hidden under visitor's pattern, visitor's deposit data catalogue that this application of generating run produces.
Step 104: when exiting visitor's pattern, delete visitor's deposit data catalogue.
Step 105: again show owner's deposit data catalogue.
Present embodiment in terms of existing technologies, after entering visitor's pattern, first the owner's deposit data catalogue that enters visitor's pattern operation application before generation to be hidden, rather than by the icon hiding of this application, like this when visitor need to move this application, just can not can not find the icon of this application, avoid visitor to take in terminal not this application and again download and install this application, save terminal internal memory and network traffics, also protected in addition terminal owner's privacy, while moving this application under visitor's pattern, due to the owner's deposit data catalogue before can not find, will generate visitor's deposit data catalogue, when exiting visitor's pattern, terminal can be by visitor's deposit data directory delete of above-mentioned generation, and hiding owner's deposit data catalogue before again showing, in the time of so just can making terminal owner again move this application, also need not again manually input necessary data (such as account and password), even if user has been forgotten move this to apply required account and password can not have any impact to again moving this application yet, make man-machine interaction more smooth, to sum up, the method in the present invention has retained the historical data that user moves application, facilitates the user to reuse this application, also effectively protects user's privacy.
The second embodiment of the present invention relates to a kind of by the method for application usage data isolation.The second embodiment is a specific embodiment of the first embodiment.In the present embodiment, after entering visitor's pattern, by owner's deposit data catalogue being compressed into owner's deposit data catalogue compression piece, then deleting owner's deposit data catalogue hides it, when exiting visitor's pattern, the mode by decompress(ion) is pressed into owner's deposit data catalogue by the compression piece solution of owner's deposit data catalogue shows it again.Idiographic flow as shown in Figure 2.
Step 201: when entering visitor's pattern, finish all application that move before entering visitor's pattern.
Step 202: after entering visitor's pattern, owner's deposit data catalogue is compressed into the compression piece of owner's deposit data catalogue.
Step 203: delete owner's deposit data catalogue.
Step 204: while moving the compressed application of above-mentioned owner's deposit data catalogue under visitor's pattern, visitor's deposit data catalogue that this application of generating run produces.
Step 205: when exiting visitor's pattern, delete visitor's deposit data catalogue.
Step 206: the compression piece solution of owner's deposit data catalogue is pressed into owner's deposit data catalogue.
Because compression after file not can with existing catalog conflict, present embodiment has only been carried out compression, deletion and decompress(ion) to owner's deposit data catalogue in the process of hiding and again showing, so present embodiment efficiency is high, responding fast, power saving, occupied terminal internal memory is few, seldom takies CPU usage.
Present embodiment is a specific embodiment of the first embodiment, and the correlation technique details of mentioning in the first embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.
The 3rd embodiment of the present invention relates to a kind of by the method for application usage data isolation.The 3rd embodiment is the further improvement of the second embodiment, in the second embodiment, after entering visitor's pattern, by compression, owner's deposit data catalogue is hidden, and when exiting visitor's pattern, by decompress(ion), it is shown again.And in the present embodiment, after entering visitor's pattern, by revising the title of owner's deposit data catalogue, owner's deposit data catalogue is hidden, when exiting visitor's pattern, by recovering the title of owner's deposit data catalogue, it is shown again, idiographic flow as shown in Figure 3.
Step 301: when entering visitor's pattern, finish all application that move before entering visitor's pattern.
Step 302: when entering visitor's pattern, revise the title of owner's deposit data catalogue.
Step 303: while moving the application that the title of above-mentioned owner's deposit data catalogue is modified under visitor's pattern, visitor's deposit data catalogue that this application of generating run produces.
Step 304: when exiting visitor's pattern, delete visitor's deposit data catalogue.
Step 305: the title of recovering owner's deposit data catalogue.
In present embodiment because only revised directory name in the process of hiding and again showing of owner's deposit data catalogue, so with respect to the second embodiment, efficiency is higher, respond also faster, more power saving, the still less utilization rate of occupied terminal internal memory and CPU.
The step of the whole bag of tricks is divided above, just in order being described clearly, can to merge into a step or some step is split while realizing, and is decomposed into a plurality of steps, as long as comprise identical logical relation, all in the protection domain of this patent.
Four embodiment of the invention relates to a kind of by the system of application usage data isolation, as shown in Figure 4, comprises: execution module, finish module, and operation module, generation module, hides module, removing module and again display module.
Specifically, execution module enters and exits visitor's pattern for control terminal, operation module is used for moving application, finish module for when execution module control terminal enters visitor's pattern, finish to move before entering visitor's pattern all application of module operation, generation module is for before execution module control terminal enters visitor's pattern, when operation module operation application, produce owner's deposit data catalogue, hide module for entering after visitor's pattern at execution module control terminal, hide owner's deposit data catalogue, generation module is also for entering after visitor's pattern at execution module control terminal, when operation module is moved the application that owner's deposit data catalogue is hidden under visitor's pattern, visitor's deposit data catalogue that this application of generating run produces, removing module is for when execution module control terminal exits visitor's pattern, delete visitor's deposit data catalogue, again display module is for deleting at removing module after visitor's deposit data catalogue, again show owner's deposit data catalogue.
Be not difficult to find, present embodiment is the system embodiment corresponding with the first embodiment, present embodiment can with the enforcement of working in coordination of the first embodiment.The correlation technique details of mentioning in the first embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in present embodiment also can be applicable in the first embodiment.
The 5th embodiment of the present invention relates to a kind of by the system of application usage data isolation.The 5th embodiment is a specific embodiment of the 4th embodiment.In present embodiment, as shown in Figure 5, hiding module comprises compression submodule and deletes submodule, compression submodule is for when hiding module is hidden owner's deposit data catalogue, compression owner deposit data catalogue, generate the compression piece of owner's deposit data catalogue, delete submodule for owner's deposit data catalogue being compressed into after the compression piece of owner's deposit data catalogue at compression submodule, delete owner's deposit data catalogue, correspondingly, again display module is for when again showing owner's deposit data catalogue, the compression piece solution of owner's deposit data catalogue is pressed into owner's deposit data catalogue.
Present embodiment is a specific embodiment of the 4th embodiment, and the correlation technique details of mentioning in the 4th embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.
Be not difficult to find, present embodiment is the system embodiment corresponding with the second embodiment, present embodiment can with the enforcement of working in coordination of the second embodiment.The correlation technique details of mentioning in the second embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in present embodiment also can be applicable in the second embodiment.
The 6th embodiment of the present invention relates to a kind of by the system of application usage data isolation.The 6th embodiment is the further improvement of the 5th embodiment, in the 5th embodiment, hide module when hiding owner's deposit data catalogue, the mode that adopts compression submodule to be compressed into compression piece is hidden it, and display module shows it by decompress(ion) again again.And in the present embodiment, hide module for when hiding owner's deposit data catalogue, adopt the mode of the title of revising owner's deposit data catalogue to hide owner's deposit data catalogue, correspondingly, again display module, for when again showing owner's deposit data catalogue, recovers the title of owner's deposit data catalogue.
Be not difficult to find, present embodiment is the system embodiment corresponding with the 3rd embodiment, present embodiment can with the enforcement of working in coordination of the 3rd embodiment.The correlation technique details of mentioning in the 3rd embodiment is still effective in the present embodiment, in order to reduce repetition, repeats no more here.Correspondingly, the correlation technique details of mentioning in present embodiment also can be applicable in the 3rd embodiment.
It is worth mentioning that, each module involved in present embodiment is logic module, and in actual applications, a logical block can be a physical location, can be also a part for a physical location, can also realize with the combination of a plurality of physical locations.In addition, for outstanding innovation part of the present invention, in present embodiment, the unit not too close with solving technical matters relation proposed by the invention do not introduced, but this does not show not exist in present embodiment other unit.
Persons of ordinary skill in the art may appreciate that the respective embodiments described above are to realize specific embodiments of the invention, and in actual applications, can to it, do various changes in the form and details, and without departing from the spirit and scope of the present invention.

Claims (6)

1. by a method for application usage data isolation, it is characterized in that, comprise following steps:
When entering visitor's pattern, finish all application that move before entering described visitor's pattern;
After entering described visitor's pattern, the owner's deposit data catalogue that enters described visitor's pattern operation application before generation is hidden;
While moving the application that described owner's deposit data catalogue is hidden under described visitor's pattern, visitor's deposit data catalogue that this application of generating run produces;
When exiting described visitor's pattern, delete described visitor's deposit data catalogue;
Again show described owner's deposit data catalogue.
2. according to claim 1 by the method for application usage data isolation, it is characterized in that, described, by the hiding step of owner's deposit data catalogue that before entering described visitor's pattern, operation application produces, adopt the mode of the title of revising described owner's deposit data catalogue to hide described owner's deposit data catalogue;
Correspondingly, in the described step that again shows described owner's deposit data catalogue, recover the title of described owner's deposit data catalogue.
3. according to claim 1 the method for application usage data isolation be is characterized in that, described by the hiding step of owner's deposit data catalogue that before entering described visitor's pattern, operation application produces, comprise following sub-step:
Compress described owner's deposit data catalogue, generate the compression piece of owner's deposit data catalogue;
Delete described owner's deposit data catalogue;
Correspondingly, in the described step that again shows described owner's deposit data catalogue, the compression piece solution of described owner's deposit data catalogue is pressed into described owner's deposit data catalogue.
4. by a system for application usage data isolation, it is characterized in that, comprise: execution module, finish module, operation module, generation module, hides module, removing module and again display module;
Described execution module enters and exits visitor's pattern for control terminal;
Described operation module is used for moving application;
Described end module, for when described execution module control terminal enters visitor's pattern, finishes to enter all application of the before described operation module operation of described visitor's pattern;
Described generation module, for before described execution module control terminal enters visitor's pattern, produces owner's deposit data catalogue when the described application of described operation module operation;
Described hiding module, for entering after described visitor's pattern at described execution module control terminal, is hidden described owner's deposit data catalogue;
Described generation module is also for entering after described visitor's pattern at described execution module control terminal, when described operation module is moved the application that described owner's deposit data catalogue is hidden under described visitor's pattern, visitor's deposit data catalogue that this application of generating run produces;
Described removing module, for when described execution module control terminal exits described visitor's pattern, is deleted described visitor's deposit data catalogue;
Described display module again, for deleting after described visitor's deposit data catalogue at described removing module, shows described owner's deposit data catalogue again.
5. according to claim 4 by the system of application usage data isolation, it is characterized in that, described hiding module, for when hiding described owner's deposit data catalogue, adopts the mode of the title of revising described owner's deposit data catalogue to hide described owner's deposit data catalogue;
Correspondingly, described display module again, for when again showing described owner's deposit data catalogue, recovers the title of described owner's deposit data catalogue.
6. the system that application usage data is isolated according to claim 4, is characterized in that, described hiding module comprises compression submodule and deletes submodule;
Described compression submodule, for when hiding module is hidden described owner's deposit data catalogue, compresses described owner's deposit data catalogue, generates the compression piece of owner's deposit data catalogue;
Described deletion submodule, for described owner's deposit data catalogue being compressed into after the compression piece of owner's deposit data catalogue at described compression submodule, is deleted described owner's deposit data catalogue;
Correspondingly, described display module again, for when again showing described owner's deposit data catalogue, is pressed into described owner's deposit data catalogue by the compression piece solution of described owner's deposit data catalogue.
CN201410203596.5A 2014-05-14 2014-05-14 Method and system for isolating applications through data Pending CN104021352A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410203596.5A CN104021352A (en) 2014-05-14 2014-05-14 Method and system for isolating applications through data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410203596.5A CN104021352A (en) 2014-05-14 2014-05-14 Method and system for isolating applications through data

Publications (1)

Publication Number Publication Date
CN104021352A true CN104021352A (en) 2014-09-03

Family

ID=51438099

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410203596.5A Pending CN104021352A (en) 2014-05-14 2014-05-14 Method and system for isolating applications through data

Country Status (1)

Country Link
CN (1) CN104021352A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105916136A (en) * 2016-06-15 2016-08-31 维沃移动通信有限公司 SIM card using method and mobile terminal
CN106022165A (en) * 2016-05-31 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Access control method and device
CN106295284A (en) * 2015-05-27 2017-01-04 中兴通讯股份有限公司 A kind of information protecting method and mobile terminal
CN106446703A (en) * 2015-08-13 2017-02-22 中国电信股份有限公司 Method, security terminal and system used for realizing burning-after-leaving-from-hand function
CN106648734A (en) * 2016-09-30 2017-05-10 珠海市魅族科技有限公司 Application program access management method and device
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
WO2023109305A1 (en) * 2021-12-17 2023-06-22 中兴通讯股份有限公司 Application management and control method and apparatus, mobile terminal, and storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295284A (en) * 2015-05-27 2017-01-04 中兴通讯股份有限公司 A kind of information protecting method and mobile terminal
CN106446703A (en) * 2015-08-13 2017-02-22 中国电信股份有限公司 Method, security terminal and system used for realizing burning-after-leaving-from-hand function
CN106446703B (en) * 2015-08-13 2019-06-04 中国电信股份有限公司 For realizing method, security terminal and the system for burning function from hand
CN106022165A (en) * 2016-05-31 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Access control method and device
CN105916136A (en) * 2016-06-15 2016-08-31 维沃移动通信有限公司 SIM card using method and mobile terminal
CN106648734A (en) * 2016-09-30 2017-05-10 珠海市魅族科技有限公司 Application program access management method and device
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
WO2023109305A1 (en) * 2021-12-17 2023-06-22 中兴通讯股份有限公司 Application management and control method and apparatus, mobile terminal, and storage medium

Similar Documents

Publication Publication Date Title
CN104021352A (en) Method and system for isolating applications through data
CN106716379B (en) Data processing method and device and terminal equipment
CN103577594A (en) Lock screen interface information pushing system and method
CN105373419A (en) Background application operation method and system
CN102546905A (en) Mobile terminal, method for realizing screen capture in same and system
CN104216753A (en) Method for rapidly starting application program for terminal, and terminal
WO2014169600A1 (en) Method, device and terminal for processing hidden file folder
CN103164229A (en) Method and device for clearing progresses of mobile terminal
CN102521020A (en) Application screen capture method and application screen capture device for mobile terminals
CN104978109A (en) Application program interface display method and terminal
CN103379482A (en) Method and device for preventing recording in process of communicating by telephone
CN102937990A (en) Method and device for cleaning files
CN104268033A (en) Storage method of terminal data, and method and device for restoring default settings of terminal
CN105224194B (en) A kind of data processing method and terminal
CN106776908B (en) Data cleaning method and device and terminal
CN104407829A (en) Method and device thereof for displaying image mirror
CN105260674A (en) Screen capture processing method and apparatus and intelligent terminal
CN104216723A (en) Software starting method and mobile device
CN103257893B (en) A kind of methods, devices and systems obtaining input state-event
CN106502495B (en) Method and device for accessing desktop in visitor mode
CN102984044A (en) Method and device based on virtual private network (VPN) to achieve data transmission security
CN104657641A (en) Screen locking system with navigation entry function and unlocking method for same
CN103514003A (en) Program installation method and device
CN103425936B (en) A kind of method realizing data confidentiality and electronic equipment
US20150020165A1 (en) System of executing application and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20140903