CN106547590A - The startup method of privacy application program and starter - Google Patents
The startup method of privacy application program and starter Download PDFInfo
- Publication number
- CN106547590A CN106547590A CN201610957943.2A CN201610957943A CN106547590A CN 106547590 A CN106547590 A CN 106547590A CN 201610957943 A CN201610957943 A CN 201610957943A CN 106547590 A CN106547590 A CN 106547590A
- Authority
- CN
- China
- Prior art keywords
- application program
- privacy
- interface
- privacy application
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- User Interface Of Digital Computer (AREA)
- Stored Programmes (AREA)
Abstract
The invention provides the startup method and starter of a kind of privacy application program, the method includes:Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, the startup verification interface matched with application scenarios pointed by camouflage applications icon is shown;Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program user is taken pictures.In technical scheme, when the second people in addition to terminal use terminal screen in the case of unblock, the privacy application program is touched, the privacy application program can show that the startup matched with application scenarios pointed by camouflage applications icon verifies interface, so that second people cannot know the true content information of privacy application program, and second people not will be considered that the privacy application program is pretended and encrypted, to reach higher camouflage effectiveness.
Description
Technical field
The present invention relates to communication technical field, specifically, the present invention relates to a kind of startup method of privacy application program
With a kind of starter of privacy application program.
Background technology
The Internet has had been introduced into the epoch of maturation, and exchanging between network and user be increasingly taken seriously, and makes
Intelligent mobile terminal is increasingly becoming the necessary article of most netizens, corresponding various application programs also meet the tendency of and
It is raw.But as the shortcut icon and Apply Names of existing application program can typically be directly displayed at the main interface of mobile terminal
In, anyone can pass through shortcut icon and Apply Names directly determines the type and content of application program, and accordingly, there exist should
May be opened by other people with program and browse or operate and the safety issue of caused privacy of user leakage.
In the prior art, it is the problems of above-mentioned in order to solve, generally using by mobile terminal operating system
Arrange the mode of password to prevent malice from using and check the application program of mobile terminal, so as to protect the secret of application program
Property;But if mobile terminal is in released state, application program is constantly exposed in its main interface, if now mobile terminal
Got by other people, then the personal secrets of the application program that still there is a problem of ensureing mobile terminal.
The content of the invention
It is to overcome above-mentioned technical problem or solving above-mentioned technical problem at least in part, special to propose technical scheme below:
Embodiments of the invention propose a kind of startup method of privacy application program, including:
Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, is shown and camouflage applications figure
The startup verification interface that application scenarios pointed by mark match;
Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;
When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program user is carried out
Take pictures.
Preferably, the method also includes:When encrypted message is verified successfully, start privacy application program.
Preferably, the method also includes:Receive establishment touching for the privacy application program of arbitrary native applications program
Send out operation, there is provided multiple optional camouflage applications icons;
Based on the user for receiving for the camouflage applications icon of native applications program selecting, create for native applications journey
The privacy application program of sequence.
Preferably, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;
Wherein, the method also includes:Operational order in response to starting privacy application program, runs privacy application program;
When privacy application program performs corresponding operation operation by calling system resource needed for which, by privacy application journey
The operation bag name of sequence is revised as the operation bag name of native applications program;
By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform privacy application program
Corresponding operation operation.
Preferably, when privacy application program performs corresponding operation operation by calling system resource needed for which, will be hidden
The operation bag name of private application program is revised as the operation bag name of native applications program, including:
The process of privacy application program is monitored by Hook Function, to link up with privacy application call system money
The resource name in source;
In the preset interface of calling system resource, the operation bag name of privacy application program is revised as into native applications program
Operation bag name.
Preferably, the method also includes:The photo got by application program of taking pictures is preserved to local, and sends photograph
Piece is preserved to the webserver.
Preferably, pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.
Preferably, application scenarios pointed by camouflage applications icon include calculator application scene, radio application scene,
At least one in figure application scenarios, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio
It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is
Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches
Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios
It is file search inputting interface to start verification interface.
Another embodiment of the present invention proposes a kind of hiding display starter of application program, including:
Interface display module, grasps for detecting triggering of the user to the camouflage applications icon of arbitrary privacy application program
Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon;
Encrypted message receiver module, for receive user by starting the encrypted message that verification interface is input into, and to receiving
To encrypted message verified;
First check results performing module, for when encrypted message verifies the continuous frequency of failure and is more than predetermined threshold, opening
Dynamic taking pictures and is taken pictures to user at application program.
Preferably, the device also includes:Second check results performing module, for when encrypted message is verified successfully, opening
Dynamic privacy application program.
Preferably, the device also includes:Camouflage applications icon provide module, for receive create for it is arbitrary it is primary should
With the trigger action of the privacy application program of program, there is provided multiple optional camouflage applications icons;
Privacy application program creation module, for being answered for the camouflage of native applications program selecting based on the user for receiving
With icon, the privacy application program for native applications program is created.
Preferably, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;
Wherein, the device also includes:Privacy application program runs module, for the behaviour in response to starting privacy application program
Instruct, run privacy application program;
Operation bag modified module, for performing corresponding run by calling system resource needed for which when privacy application program
During operation, the operation bag name of privacy application program is revised as into the operation bag name of native applications program;
System resource allocation module, for required system resource allocation to modification to be run the privacy application journey of Bao Minghou
Sequence, to perform the corresponding operation operation of privacy application program.
Preferably, bag modified module is run, including:Process monitoring unit, for passing through Hook Function to privacy application journey
The process of sequence is monitored, to link up with the resource name of privacy application call system resource;
Operation is guaranteed the repair free of charge and changes unit, in the preset interface of calling system resource, by the operation bag of privacy application program
Name is revised as the operation bag name of native applications program.
Preferably, the device also includes:Preserving module, for by the photo got by application program of taking pictures preserve to
Locally, and send photo and preserved to the webserver.
Preferably, pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.
Preferably, application scenarios pointed by camouflage applications icon include calculator application scene, radio application scene,
At least one in figure application scenarios, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio
It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is
Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches
Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios
It is file search inputting interface to start verification interface.
In technical scheme, detect triggering of the user to the camouflage applications icon of arbitrary privacy application program and grasp
Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon, when the in addition to terminal use
Two people terminal unit screen in the case of unblock, touched the privacy application program, the privacy application program can show
Interface is verified with the startup that application scenarios pointed by camouflage applications icon match so that second people cannot know privacy application
The true content information of program, and second people not will be considered that the privacy application program is pretended and encrypted, with reach compared with
High camouflage effectiveness;Further, it is even if second people has known that the privacy application program is pretended, correct getting
Startup verification interface password in the case of, can not still enter into the privacy application program, realize in terminal unit
Comprehensive camouflage in screen to application program;When second people is attempted into the privacy application program by verifying interface, and school
The continuous frequency of failure is tested more than predetermined threshold, then can start application program of taking pictures, with the complexion image of second people that takes pictures, with
Ensure the identity of terminal use's can be known second people.The present invention can be with the case of the unlocking screen of terminal unit, still
Ensure that privacy application program, for the stronger privacy of user, prevents application program not by the second people institute in addition to terminal use
Use, so as to effectively protect the personal secrets of user data in application program so that the Experience Degree of user is improved.
The additional aspect of the present invention and advantage will be set forth in part in the description, and these will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
It is substantially and easy to understand, wherein:
Schematic flow sheets of the Fig. 1 for the startup method of the privacy application program of one embodiment of the invention;
Schematic flow sheets of the Fig. 2 for the establishment privacy application program of a preferred embodiment of the present invention;
Fig. 3 is that the flow process of the operation operation of the execution privacy application program of another preferred embodiment of the present invention is illustrated
Figure;
Fig. 4 is that the operation bag name of the privacy application program of another preferred embodiment of the present invention is revised as native applications journey
The schematic flow sheet of the operation bag name of sequence;
Structural framing schematic diagrams of the Fig. 5 for the starter of the privacy application program of an alternative embodiment of the invention;
Fig. 6 is the privacy application program with establishment privacy function of application of a preferred embodiment of the present invention
The structural framing schematic diagram of starter;
Fig. 7 is another preferred embodiment of the present invention with the hidden of the operation operating function for performing privacy application program
The structural framing schematic diagram of the starter of private application program;
Fig. 8 is the structural framing schematic diagram of the operation bag modified module of another preferred embodiment of the present invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish
Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, "
It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that arranging used in the description of the present invention
Diction " including " refers to there is the feature, integer, step, operation, element and/or component, but it is not excluded that existing or adding
One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange
Diction "and/or" includes the one or more associated wholes or any cell of listing item and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined all terms used herein (include technology art
Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also
It is understood by, those terms defined in such as general dictionary, it should be understood that with the context with prior art
The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication
To explain.
It should be noted that the embodiment of the present invention is realized based on mobile terminal operating system, mobile terminal operation system
System is the operating system based on (SuSE) Linux OS freedom and open source code, for example, android system.
Schematic flow sheets of the Fig. 1 for the startup method of the privacy application program of one embodiment of the invention.
Step S101:Detect trigger action of the user to the camouflage applications icon of arbitrary privacy application program, show with
The startup verification interface that application scenarios pointed by camouflage applications icon match;Step S102:Receive user is by starting verification
The encrypted message of interface input, and the encrypted message to receiving verifies;Step S103:Lose when encrypted message verification is continuous
When losing number of times more than predetermined threshold, startup is taken pictures and application program user is taken pictures.
In technical scheme, detect triggering of the user to the camouflage applications icon of arbitrary privacy application program and grasp
Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon, when the in addition to terminal use
Two people terminal unit screen in the case of unblock, touched the privacy application program, the privacy application program can show
Interface is verified with the startup that application scenarios pointed by camouflage applications icon match so that second people cannot know privacy application
The true content information of program, and second people not will be considered that the privacy application program is pretended and encrypted, with reach compared with
High camouflage effectiveness;Further, it is even if second people has known that the privacy application program is pretended, correct getting
Startup verification interface password in the case of, can not still enter into the privacy application program, realize in terminal unit
Comprehensive camouflage in screen to application program;When second people is attempted into the privacy application program by verifying interface, and school
The continuous frequency of failure is tested more than predetermined threshold, then can start application program of taking pictures, with the complexion image of second people that takes pictures, with
Ensure the identity of terminal use's can be known second people.The present invention can be with the case of the unlocking screen of terminal unit, still
Ensure that privacy application program, for the stronger privacy of user, prevents application program not by the second people institute in addition to terminal use
Use, so as to effectively protect the personal secrets of user data in application program so that the Experience Degree of user is improved.
It is described further below for implementing for each step:
Step S101:Detect trigger action of the user to the camouflage applications icon of arbitrary privacy application program, show with
The startup verification interface that application scenarios pointed by camouflage applications icon match.
Specifically, application scenarios pointed by camouflage applications icon include:Calculator application scene, radio application scene,
At least one in map application scene, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio
It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is
Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches
Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios
It is file search inputting interface to start verification interface.
For example, user clicks on the camouflage applications of the privacy application program " Tencent QQ " shown in the user interface of mobile terminal
Icon, Source Music icon;And show that the startup matched with radio application scene verifies interface, as radio input
Interface.
Pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.Such as, application program
For instant messaging application program, its application scenarios is chat application scene, but its camouflage applications icon is computer icon, with meter
The startup verification interface that calculation device application scenarios match is computer inputting interface.
It should be noted that when the second people of non-end-user is in the case of mobile terminal screen unblock, it is seen that mobile
During the camouflage applications icon of the privacy application program in terminal in the user interface of screen display, not will be considered that the application program is
The privacy application program for having pretended, so as to avoid the real information of the privacy application program from being obtained by the second people of non-end-user
Situation about knowing occurs, and realizes the first secret protection again to the application program.
When the second people of non-end-user is in the case of mobile terminal screen unblock, it is not intended to or maliciously click on mobile whole
During the privacy application program pretended in the user interface of screen display in end, as its camouflage applications icon verifies boundary with starting
The Perfect Matchings in face so that the second people of non-end-user not will be considered that the privacy application program is pretended and encrypted, from
And the privacy application program is exited, to reach more perfect camouflage effectiveness and the safeguard protection to the privacy application program, realize
The second secret protection again to the privacy application program.
Step S102:Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving
Verified.
Wherein, encrypted message is included but is not limited to:The computing formula matched with computer inputting interface and radio frequency
The radio reception channel that road selection interface matches, searches for the location finding title that inputting interface matches with geographical position;With file
The file search title that the file search inputting interface of management application scenarios matches;It is input into the number of degrees of compass applications scene
The direction number of degrees that interface matches;The file search title matched with the file search inputting interface of cloud disk application scenarios.
For example, user is to input corresponding password on computer inputting interface verification interface is started:“2+3”;User exists
It is to input corresponding password in radio channels selection interface to start verification interface:“103.7”;User verifies interface in startup
Corresponding password is input on geographical position search inputting interface:" 40, Dongcheng District east ";In file management application scene, user
It is to input corresponding password on file search inputting interface verification interface is started:" picture ";User verifies interface in startup
Corresponding password is input on number of degrees inputting interface:“76.5”;In cloud disk application scenarios, user is searched for file at startup verification interface
Corresponding password is input on rope inputting interface:" film ".
Step S103:When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup takes pictures application program simultaneously
User is taken pictures.
Specifically, if user starts on verification interface the encrypted message that is input into and preset encrypted message not phase in input
Together, then encrypted message verification is unsuccessful, exits the privacy application program;It is input on verification interface when user starts in input simultaneously
Encrypted message it is double with preset encrypted message when differing, startup is taken pictures application program, and user is taken pictures simultaneously
Exit the privacy application program.When the second people of non-end-user is in the case of mobile terminal screen unblock, malice or unintentionally point
When hitting the hide application program, even if second people has known that the privacy application program is pretended, but the privacy application program
Cipher mode still can effectively protect the personal secrets of user, prevent the privacy of user to be compromised, to the privacy application
Program realizes triple secret protections;And in the checking password of the double input error of the second people, can take this second
The photo of people, to inform terminal use.
Specifically, the method also includes:When encrypted message is verified successfully, start privacy application program.
When user starts the encrypted message and preset message in cipher being input on verification interface in the input of privacy application program
Manner of breathing is same, then encrypted message is verified successfully, starts the privacy application program.
Specifically, as shown in Fig. 2 the method also includes:Step 201:Establishment is received for arbitrary native applications program
Privacy application program trigger action, there is provided multiple optional camouflage applications icons;Step 202:Based on the user for receiving
For the camouflage applications icon of native applications program selecting, the privacy application program for native applications program is created.
It should be noted that user is after the camouflage applications icon for selecting privacy application program, the camouflage applications icon
Corresponding camouflage applications title also determines that e.g., the corresponding camouflage applications of " computer " camouflage applications icon are entitled therewith
" computer ".While privacy application program is created, its camouflage applications icon and camouflage applications title are also created therewith;And by
In when the camouflage applications icon and camouflage applications title are created on user's desktop, terminal Android system authority need to be obtained,
And the process of acquisition terminal Android system authority is complex;Therefore in the preferred embodiment, terminal can not obtained
In the case of Android system authority, camouflage applications icon and camouflage applications title are created and is being covered on user's desktop
Preset user interface on.Activity component or user circle of the preset user interface by terminal android system
Face Core Generator is created.Wherein, entered by the Activity components or user interface Core Generator of terminal android system
Row creates the preset user interface, belongs to the more ripe technology of this area, and those skilled in the art should be pre-
Expect the technology contents, just repeat no more herein.
Specifically, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;Such as
Shown in Fig. 3, the method also includes:Step S301:Operational order in response to starting privacy application program, runs privacy application journey
Sequence;Step S302:When privacy application program performs corresponding operation operation by calling system resource needed for which, should by privacy
The operation bag name of native applications program is revised as with the operation bag name of program;Step S303:By required system resource allocation to repairing
Change the privacy application program of operation Bao Minghou, to perform the corresponding operation operation of privacy application program.
Wherein, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed.For example,
In terminal unit, operation bag name " com.tencent.mobileqq " and the privacy application journey of native applications program " Tencent QQ "
Operation bag name " com.tencent.mobileqq.1 " of sequence " Tencent QQ " is different.
Step S301:Operational order in response to starting privacy application program, runs privacy application program.
Specifically, in terminal unit, the operational order in response to starting privacy application program runs privacy application journey
Sequence, wherein, the operation bag name of privacy application program is different from the operation bag name of native applications program, privacy application program with it is primary
Application program can be run in terminal unit simultaneously, and the corresponding native applications program of privacy application program reads identical
System is readable and system read-only file.
Android operation system has which to be different from the principle of other operating systems, and Android provides four big groups for developer
Part, refers specifically to the components such as Activity, Service, Broadcast Receiver and Content Provider.
Android application programs are supplied to user to be installed in the form of APK installation kits, in APK installation kits, with for encapsulating reality
Show the classes.dex code files of the program code of each component and for each component used by Expression and Application program
The Androidmanifest.xml configuration files of the content such as log-on message and authority application information.
Management of the Android to process, in units of wrapping name, the unique bag name of each application assigned one, due to
The installation process of application program is exactly PackageManagerService (PMS) parsing Androidmanifest.xml files
Process, and the bag name of privacy application program is different from the bag name of native applications program in the present invention, therefore, when locally having installed original
In the case of raw application program, privacy application program also can be arranged on local simultaneously, realize passing through
ActivityManagerService (AMS) normally runs privacy application program.In Android operation system, PMS mainly bears
Blame all apk to system to be managed, manage the components such as such as Activiey, Service therein, parse wherein from apk
Component, after being saved in dependency structure, related interface polls system mounting assembly can be passed through, the installation of apk, unloading,
Deletion is all responsible for by PMS.In Android operation system, AMS is applied not only to manage all program process
The life cycle of Activity, it also manages Service, Broadcast Receiver and Content of system simultaneously
The components such as Provider, the mode for starting an Activity in the application are included by calling startActivity side
Method starts the Activity that specifies and clicks the icon of an application program to start new Activity etc..
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect
The operation of the icon of privacy application program " Tencent QQ ", operation privacy application program " Tencent QQ " are double-clicked to user;Wherein, privacy
The operation bag name of application program " Tencent QQ ", such as " com.tencent.mobileqq.1 ", different from native applications program " Tengxun
The operation bag name of QQ ", such as " com.tencent.mobileqq ", privacy application program " Tencent QQ " " is risen with native applications program
News QQ " can be run in terminal unit simultaneously, and privacy application program " Tencent QQ " is shared with native applications program " Tencent QQ "
The system readable documents and system of the system readable documents and the read-only file of system of terminal unit, wherein terminal unit
What read-only file included Activity, Service, Broadcast Receiver, Content Provider and PMS etc. can
Reading, read-only file.
Step S302:When privacy application program performs corresponding operation operation by calling system resource needed for which, will
The operation bag name of privacy application program is revised as the operation bag name of native applications program.
Specifically, when privacy application program " Tencent QQ " performs corresponding operation operation by calling system resource needed for which
When, the corresponding native applications program " Tencent QQ " of operation bag entitled " com.tencent.mobileqq.1 " of privacy application program
Operation bag entitled " com.tencent.mobileqq ", by the operation bag name of privacy application program " Tencent QQ "
" com.tencent.mobileqq.1 " is revised as the operation bag name of native applications program " Tencent QQ "
“com.tencent.mobileqq”。
As shown in figure 4, when privacy application program performs corresponding operation operation by calling system resource needed for which, will
The step of operation bag name of privacy application program is revised as the operation bag name of native applications program, including:Step S401:By hook
Subfunction is monitored to the process of privacy application program, to link up with the resource name of privacy application call system resource;
Step S402:In the preset interface of calling system resource, the operation bag name of privacy application program is revised as into native applications journey
The operation bag name of sequence.
Wherein, the preset interface of calling system resource, including but not limited to calls following any one and privacy application program
Between interactive interface:Activity components;Service components;Broadcast Receiver components;Content
Provider components;NotifyServer middlewares.
Need exist for illustrate be:Term " hook " is covered for by intercepting the function transmitted between component software
Call, message or event to be changing or increase the technology of the behavior of operating system, application program or other software component.And locate
The code for managing this intercepted function call, event or message is thus referred to as hook hook functions.Hook is generally used for various
Target, including being debugged to function and be extended to function.Its example can be included in keyboard or mouse event is delivered to
Them are intercepted before application program, or hooking system service call (system call) or system function behavior, function are performed
As a result etc., to monitor or change function of application program or other assemblies etc..The present embodiment can adopt hook hook functions
System resource needed for adapter privacy application program run time call performs corresponding operation operation, it should be noted that this
System resource needed for bright middle adapter privacy application program run time call performs corresponding operation operation and is not limited to by hook
The mode of sub- hook functions is realized.
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect
The operation of the icon of privacy application program " Tencent QQ " is double-clicked to user, privacy application program " Tencent QQ " is run, wherein, privacy
Operation bag name " com.tencent.mobileqq.1 " of application program " Tencent QQ " is different from native applications program " Tencent QQ "
Operation bag name " com.tencent.mobileqq ", in the running of native applications program " Tencent QQ ", by hook
The process of the privacy application program " Tencent QQ " that function pair has been created is monitored, when privacy application program " Tencent QQ " request is adjusted
When using resource, Hook Function can link up with the resource name that privacy application program " Tencent QQ " calls resource, obtain privacy application journey
It is the start Activity methods in Activity components that sequence " Tencent QQ " calls the resource name of resource;Subsequently by default
The interface for calling Activity component resources and Activity components carry out data interaction, during data interaction, will
Operation bag name " com.tencent.mobileqq.1 " of privacy application program " Tencent QQ " is revised as
“com.tencent.mobileqq”。
Step S303:By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform privacy
The corresponding operation operation of application program.
Specifically, by required system resource allocation to the privacy application program for changing operation Bao Minghou, should to perform privacy
With the operation of system resource needed for routine call.
For example, example is connected, by the system Activity resource needed for privacy application program " Tencent QQ " according to privacy application
The bag status of program " Tencent QQ " is assigned to privacy application program " Tencent QQ ", and now the bag of privacy application program " Tencent QQ " is entitled
" com.tencent.mobileqq ", subsequently performs the corresponding operation operation of privacy application program " Tencent QQ ".
Specifically, the method also includes:The photo got by application program of taking pictures is preserved to local, and sends photograph
Piece is preserved to the webserver.
For example, when user or non-end-user the second people input start on verification interface the encrypted message that is input into it is pre-
The encrypted message put is double when differing, and startup is taken pictures application program, and user or second people are taken pictures, and should
Photo is preserved into picture file, and the photo upload is preserved to the cloud disk webserver, for terminal use couple
The complexion image repeatedly attempted into second people of privacy application program is checked, to know the identity of second people.
Structural framing schematic diagrams of the Fig. 5 for the starter of the privacy application program of an alternative embodiment of the invention.
Interface display module 501, detects trigger action of the user to the camouflage applications icon of arbitrary privacy application program,
Show the startup verification interface matched with application scenarios pointed by camouflage applications icon;Encrypted message receiver module 502, receives
User is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;First check results
Performing module 503, when encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures application program to user
Taken pictures.
It is described further below for implementing for modules:
Interface display module 501, detects trigger action of the user to the camouflage applications icon of arbitrary privacy application program,
Show the startup verification interface matched with application scenarios pointed by camouflage applications icon.
Specifically, application scenarios pointed by camouflage applications icon include:Calculator application scene, radio application scene,
At least one in map application scene, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio
It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is
Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches
Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios
It is file search inputting interface to start verification interface.
For example, user clicks on the camouflage applications of the privacy application program " Tencent QQ " shown in the user interface of mobile terminal
Icon, Source Music icon;And show that the startup matched with radio application scene verifies interface, as radio input
Interface.
Pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.Such as, application program
For instant messaging application program, its application scenarios is chat application scene, but its camouflage applications icon is computer icon, with meter
The startup verification interface that calculation device application scenarios match is computer inputting interface.
It should be noted that when the second people of non-end-user is in the case of mobile terminal screen unblock, it is seen that mobile
During the camouflage applications icon of the privacy application program in terminal in the user interface of screen display, not will be considered that the application program is
The privacy application program for having pretended, so as to avoid the real information of the privacy application program from being obtained by the second people of non-end-user
Situation about knowing occurs, and realizes the first secret protection again to the application program.
When the second people of non-end-user is in the case of mobile terminal screen unblock, it is not intended to or maliciously click on mobile whole
During the privacy application program pretended in the user interface of screen display in end, as its camouflage applications icon verifies boundary with starting
The Perfect Matchings in face so that the second people of non-end-user not will be considered that the privacy application program is pretended and encrypted, from
And the privacy application program is exited, to reach more perfect camouflage effectiveness and the safeguard protection to the privacy application program, realize
The second secret protection again to the privacy application program.
Encrypted message receiver module 502, receive user verify the encrypted message of interface input by starting, and to receiving
Encrypted message verified.
Wherein, encrypted message is included but is not limited to:The computing formula matched with computer inputting interface and radio frequency
The radio reception channel that road selection interface matches, searches for the location finding title that inputting interface matches with geographical position;With file
The file search title that the file search inputting interface of management application scenarios matches;It is input into the number of degrees of compass applications scene
The direction number of degrees that interface matches;The file search title matched with the file search inputting interface of cloud disk application scenarios.
For example, user is to input corresponding password on computer inputting interface verification interface is started:“2+3”;User exists
It is to input corresponding password in radio channels selection interface to start verification interface:“103.7”;User verifies interface in startup
Corresponding password is input on geographical position search inputting interface:" 40, Dongcheng District east ";In file management application scene, user
It is to input corresponding password on file search inputting interface verification interface is started:" picture ";User verifies interface in startup
Corresponding password is input on number of degrees inputting interface:“76.5”;In cloud disk application scenarios, user is searched for file at startup verification interface
Corresponding password is input on rope inputting interface:" film ".
First check results performing module 503, when encrypted message verifies the continuous frequency of failure is more than predetermined threshold, starts
Take pictures and application program user is taken pictures.
Specifically, if user starts on verification interface the encrypted message that is input into and preset encrypted message not phase in input
Together, then encrypted message verification is unsuccessful, exits the privacy application program;It is input on verification interface when user starts in input simultaneously
Encrypted message it is double with preset encrypted message when differing, the first check results performing module 503 starts that take pictures should
With program, the privacy application program is taken pictures and is exited to user.When the second people of non-end-user is in mobile terminal screen
In the case of unblock, malice or when being not intended to click on the hide application program, even if second people has known the privacy application program
Pretended, but the cipher mode of the privacy application program still can effectively be protected the personal secrets of user, prevent user's
Privacy is compromised, and realizes triple secret protections to the privacy application program;And in the double input error of the second people
During checking password, the photo of second people can be taken, to inform terminal use.
Specifically, as shown in fig. 6, the device also includes:Camouflage applications icon provides module 601, receives establishment and is directed to
The trigger action of the privacy application program of arbitrary native applications program, there is provided multiple optional camouflage applications icons;Privacy application
Program creation module 602, based on the user for receiving for the camouflage applications icon of native applications program selecting, creates for original
The privacy application program of raw application program.
It should be noted that user is after the camouflage applications icon for selecting privacy application program, the camouflage applications icon
Corresponding camouflage applications title also determines that e.g., the corresponding camouflage applications of " computer " camouflage applications icon are entitled therewith
" computer ".While privacy application program is created, its camouflage applications icon and camouflage applications title are also created therewith;And by
In when the camouflage applications icon and camouflage applications title are created on user's desktop, terminal Android system authority need to be obtained,
And the process of acquisition terminal Android system authority is complex;Therefore in the preferred embodiment, terminal can not obtained
In the case of Android system authority, camouflage applications icon and camouflage applications title are created and is being covered on user's desktop
Preset user interface on.Activity component or user circle of the preset user interface by terminal android system
Face Core Generator is created.Wherein, entered by the Activity components or user interface Core Generator of terminal android system
Row creates the preset user interface, belongs to the more ripe technology of this area, and those skilled in the art should be pre-
Expect the technology contents, just repeat no more herein.
Specifically, as shown in fig. 7, the device also includes:Second check results performing module 701, when encrypted message is verified
When successful, start privacy application program.
When user starts the encrypted message and preset message in cipher being input on verification interface in the input of privacy application program
Manner of breathing is same, then encrypted message is verified successfully, and the second check results performing module starts the privacy application program.
Specifically, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;Such as
Shown in Fig. 7, the device also includes:Privacy application program runs module 702, and the operation in response to starting privacy application program refers to
Order, runs privacy application program;Operation bag modified module 703, when privacy application program is held by calling system resource needed for which
When the corresponding operation of row is operated, the operation bag name of privacy application program is revised as into the operation bag name of native applications program;System
Resource distribution module 704, by required system resource allocation to the privacy application program for changing operation Bao Minghou, should to perform privacy
With the corresponding operation operation of program.
Wherein, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed.For example,
In terminal unit, operation bag name " com.tencent.mobileqq " and the privacy application journey of native applications program " Tencent QQ "
Operation bag name " com.tencent.mobileqq.1 " of sequence " Tencent QQ " is different.
Privacy application program runs module 702, the operational order in response to starting privacy application program, runs privacy application
Program.
Specifically, in terminal unit, privacy application program runs module 702 in response to starting the behaviour of privacy application program
Instruct, run privacy application program, wherein, the operation bag name of privacy application program is different from the operation bag of native applications program
Name, privacy application program can be run in terminal unit simultaneously with native applications program, and privacy application program is corresponding
Native applications program reads that identical system is readable and system read-only file.
Android operation system has which to be different from the principle of other operating systems, and Android provides four big groups for developer
Part, refers specifically to the components such as Activity, Service, Broadcast Receiver and Content Provider.
Android application programs are supplied to user to be installed in the form of APK installation kits, in APK installation kits, with for encapsulating reality
Show the classes.dex code files of the program code of each component and for each component used by Expression and Application program
The Androidmanifest.xml configuration files of the content such as log-on message and authority application information.
Management of the Android to process, in units of wrapping name, the unique bag name of each application assigned one, due to
The installation process of application program is exactly PackageManagerService (PMS) parsing Androidmanifest.xml files
Process, and the bag name of privacy application program is different from the bag name of native applications program in the present invention, therefore, when locally having installed original
In the case of raw application program, privacy application program also can be arranged on local simultaneously, realize passing through
ActivityManagerService (AMS) normally runs privacy application program.In Android operation system, PMS mainly bears
Blame all apk to system to be managed, manage the components such as such as Activiey, Service therein, parse wherein from apk
Component, after being saved in dependency structure, related interface polls system mounting assembly can be passed through, the installation of apk, unloading,
Deletion is all responsible for by PMS.In Android operation system, AMS is applied not only to manage all program process
The life cycle of Activity, it also manages Service, Broadcast Receiver and Content of system simultaneously
The components such as Provider, the mode for starting an Activity in the application are included by calling startActivity side
Method starts the Activity that specifies and clicks the icon of an application program to start new Activity etc..
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect
The operation of the icon of privacy application program " Tencent QQ ", operation privacy application program " Tencent QQ " are double-clicked to user;Wherein, privacy
The operation bag name of application program " Tencent QQ ", such as " com.tencent.mobileqq.1 ", different from native applications program " Tengxun
The operation bag name of QQ ", such as " com.tencent.mobileqq ", privacy application program " Tencent QQ " " is risen with native applications program
News QQ " can be run in terminal unit simultaneously, and privacy application program " Tencent QQ " is shared with native applications program " Tencent QQ "
The system readable documents and system of the system readable documents and the read-only file of system of terminal unit, wherein terminal unit
What read-only file included Activity, Service, Broadcast Receiver, Content Provider and PMS etc. can
Reading, read-only file.
Operation bag modified module 703, when privacy application program performs corresponding operation by calling system resource needed for which
During operation, the operation bag name of privacy application program is revised as into the operation bag name of native applications program.
Specifically, when privacy application program " Tencent QQ " performs corresponding operation operation by calling system resource needed for which
When, the corresponding native applications program " Tencent QQ " of operation bag entitled " com.tencent.mobileqq.1 " of privacy application program
Operation bag entitled " com.tencent.mobileqq ", by the operation bag name of privacy application program " Tencent QQ "
" com.tencent.mobileqq.1 " is revised as the operation bag name of native applications program " Tencent QQ "
“com.tencent.mobileqq”。
As shown in figure 8, operation bag modified module 703, including:Process monitoring unit 801, should to privacy by Hook Function
It is monitored with the process of program, to link up with the resource name of privacy application call system resource;Operation is guaranteed the repair free of charge and changes unit
802, in the preset interface of calling system resource, the operation bag name of privacy application program is revised as into the fortune of native applications program
Row bag name.
Wherein, the preset interface of calling system resource, including but not limited to calls following any one and privacy application program
Between interactive interface:Activity components;Service components;Broadcast Receiver components;Content
Provider components;NotifyServer middlewares.
Need exist for illustrate be:Term " hook " is covered for by intercepting the function transmitted between component software
Call, message or event to be changing or increase the technology of the behavior of operating system, application program or other software component.And locate
The code for managing this intercepted function call, event or message is thus referred to as hook hook functions.Hook is generally used for various
Target, including being debugged to function and be extended to function.Its example can be included in keyboard or mouse event is delivered to
Them are intercepted before application program, or hooking system service call (system call) or system function behavior, function are performed
As a result etc., to monitor or change function of application program or other assemblies etc..The present embodiment can adopt hook hook functions
System resource needed for adapter privacy application program run time call performs corresponding operation operation, it should be noted that this
System resource needed for bright middle adapter privacy application program run time call performs corresponding operation operation and is not limited to by hook
The mode of sub- hook functions is realized.
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect
The operation of the icon of privacy application program " Tencent QQ " is double-clicked to user, privacy application program " Tencent QQ " is run, wherein, privacy
Operation bag name " com.tencent.mobileqq.1 " of application program " Tencent QQ " is different from native applications program " Tencent QQ "
Operation bag name " com.tencent.mobileqq ", in the running of native applications program " Tencent QQ ", by hook
The process of the privacy application program " Tencent QQ " that function pair has been created is monitored, when privacy application program " Tencent QQ " request is adjusted
When using resource, Hook Function can link up with the resource name that privacy application program " Tencent QQ " calls resource, obtain privacy application journey
It is the start Activity methods in Activity components that sequence " Tencent QQ " calls the resource name of resource;Subsequently by default
The interface for calling Activity component resources and Activity components carry out data interaction, during data interaction, will
Operation bag name " com.tencent.mobileqq.1 " of privacy application program " Tencent QQ " is revised as
“com.tencent.mobileqq”。
System resource allocation module 704, by required system resource allocation to the privacy application program for changing operation Bao Minghou,
To perform the corresponding operation operation of privacy application program.
For example, example is connected, by the system Activity resource needed for privacy application program " Tencent QQ " according to privacy application
The bag status of program " Tencent QQ " is assigned to privacy application program " Tencent QQ ", and now the bag of privacy application program " Tencent QQ " is entitled
" com.tencent.mobileqq ", subsequently performs the corresponding operation operation of privacy application program " Tencent QQ ".
Specifically, the device also includes:Preserving module, the photo got by application program of taking pictures is preserved to this
Ground, and send photo and preserved to the webserver.For example, when the second people of user or non-end-user starts school in input
When testing that the encrypted message being input on interface is double with preset encrypted message to be differed, startup is taken pictures application program, to
Family or second people are taken pictures, and the photo is preserved into picture file, and by the photo upload to cloud disk network service
Device is preserved, and the complexion image repeatedly attempted into second people of privacy application program is looked into for terminal use
See, to know the identity of second people.
Those skilled in the art of the present technique are appreciated that the present invention includes being related to for performing in operation described herein
One or more of equipment.These equipment can be for needed for purpose and specially design and manufacture, or can also include general
Known device in computer.These equipment have the computer program being stored in which, and these computer programs are optionally
Activation is reconstructed.During such computer program can be stored in equipment (for example, computer) computer-readable recording medium or it is stored in
It is suitable to store and e-command is coupled in any kind of medium of bus respectively, the computer-readable medium is included but not
Be limited to any kind of disk (include floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, only
Read memorizer), RAM (Random Access Memory, immediately memorizer), EPROM (Erasable Programmable
Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable
Programmable Read-Only Memory, EEPROM), flash memory, magnetic card or light line card
Piece.It is, computer-readable recording medium include being stored in the form of it can read by equipment (for example, computer) or transmission information any Jie
Matter.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or
The combination of each frame and these structure charts and/or block diagram and/or the frame in flow graph in block diagram and/or flow graph.This technology is led
Field technique personnel be appreciated that can by these computer program instructions be supplied to general purpose computer, special purpose computer or other
The processor of programmable data processing method realizing, so as to pass through the process of computer or other programmable data processing methods
Device is performing the scheme specified in the frame or multiple frames of structure chart disclosed by the invention and/or block diagram and/or flow graph.
Various operations that those skilled in the art of the present technique had been discussed in being appreciated that the present invention, method, in flow process
Step, measure, scheme can be replaced, changed, combined or deleted.Further, it is each with what is discussed in the present invention
Kind of operation, method, other steps in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted.
Further, it is of the prior art with the various operations disclosed in the present invention, method, flow process in step, measure, scheme
Can also be replaced, changed, reset, decomposed, combined or deleted.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a kind of startup method of privacy application program, it is characterised in that include:
Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, is shown and the camouflage applications figure
The startup verification interface that application scenarios pointed by mark match;
Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;
When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program the user is carried out
Take pictures.
2. method according to claim 1, it is characterised in that also include:
When encrypted message is verified successfully, start the privacy application program.
3. method according to claim 1 and 2, it is characterised in that also include:
Receive the trigger action for creating the privacy application program for arbitrary native applications program, there is provided multiple optional camouflages
Application icon;
Based on the user for receiving for the native applications program selecting camouflage applications icon, create for it is described it is primary should
With the privacy application program of program.
4. method according to claim 3, it is characterised in that the operation Bao Mingyu of the native applications program is hidden accordingly
The operation bag name of private application program is differed;
Wherein, the method also includes:
Operational order in response to starting privacy application program, runs the privacy application program;
When the privacy application program performs corresponding operation operation by calling system resource needed for which, should by the privacy
The operation bag name of the native applications program is revised as with the operation bag name of program;
By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform the privacy application journey
The corresponding operation operation of sequence.
5. method according to claim 4, it is characterised in that when the privacy application program is by calling system needed for which
When resource performs corresponding operation operation, the operation bag name of the privacy application program is revised as into the native applications program
Operation bag name, including:
The process of the privacy application program is monitored by Hook Function, to link up with the privacy application call system
The resource name of system resource;
In the preset interface of calling system resource, the operation bag name of the privacy application program is revised as into the native applications
The operation bag name of program.
6. method according to claim 1, it is characterised in that also include:
The photo got by the application program of taking pictures is preserved to local, and sends photo and protected to the webserver
Deposit.
7. the method according to any one of claim 1-6, it is characterised in that applied field pointed by the camouflage applications icon
Scape is uncorrelated to the application scenarios of the privacy application program.
8. the method according to any one of claim 1-6, it is characterised in that applied field pointed by the camouflage applications icon
Scape includes calculator application scene, radio application scene, map application scene, file management application scene, compass applications
At least one in scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;With radio application field
The startup verification interface that scape matches is channel selection interface;Interface is verified for geography with the startup that map application scene matches
Location finding inputting interface;It is file search inputting interface that interface is verified with the startup that file management application scene matches;With
The startup verification interface that compass applications scene matches is number of degrees inputting interface;The startup school matched with cloud disk application scenarios
Interface is tested for file search inputting interface.
9. the hiding display starter of a kind of application program, it is characterised in that include:
Interface display module, for detecting trigger action of the user to the camouflage applications icon of arbitrary privacy application program, shows
Show that the startup matched with application scenarios pointed by the camouflage applications icon verifies interface;
Encrypted message receiver module, for receive user by starting the encrypted message of verification interface input, and to receiving
Encrypted message is verified;
First check results performing module, for when encrypted message verifies the continuous frequency of failure and is more than predetermined threshold, starting and clapping
Take pictures according to application program and to the user.
10. device according to claim 9, it is characterised in that also include:
Second check results performing module, for when encrypted message is verified successfully, starting the privacy application program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610957943.2A CN106547590A (en) | 2016-10-27 | 2016-10-27 | The startup method of privacy application program and starter |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610957943.2A CN106547590A (en) | 2016-10-27 | 2016-10-27 | The startup method of privacy application program and starter |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106547590A true CN106547590A (en) | 2017-03-29 |
Family
ID=58393310
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610957943.2A Pending CN106547590A (en) | 2016-10-27 | 2016-10-27 | The startup method of privacy application program and starter |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106547590A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107315947A (en) * | 2017-06-20 | 2017-11-03 | 广东欧珀移动通信有限公司 | Pay class application management method, device and mobile terminal |
CN109145583A (en) * | 2018-07-27 | 2019-01-04 | 奇酷互联网络科技(深圳)有限公司 | Using unlocking method, system, mobile terminal and storage medium |
CN111324888A (en) * | 2018-12-13 | 2020-06-23 | 北京奇虎科技有限公司 | Verification method and device during application program starting, electronic equipment and storage medium |
CN111753701A (en) * | 2020-06-18 | 2020-10-09 | 百度在线网络技术(北京)有限公司 | Violation detection method, device and equipment of application program and readable storage medium |
CN113238691A (en) * | 2021-05-27 | 2021-08-10 | 维沃移动通信(杭州)有限公司 | Application icon management method and device and electronic equipment |
CN114721762A (en) * | 2022-04-19 | 2022-07-08 | 杭州安司源科技有限公司 | Control method of application program |
CN116702184A (en) * | 2022-11-15 | 2023-09-05 | 荣耀终端有限公司 | Application starting method and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794844A (en) * | 2005-12-29 | 2006-06-28 | 李志明 | Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone |
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103763091A (en) * | 2014-01-09 | 2014-04-30 | 深圳市欧珀通信软件有限公司 | Encrypting method, decrypting method, encrypting device and decrypting device of application program |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
-
2016
- 2016-10-27 CN CN201610957943.2A patent/CN106547590A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1794844A (en) * | 2005-12-29 | 2006-06-28 | 李志明 | Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone |
US20100223579A1 (en) * | 2009-03-02 | 2010-09-02 | Schwartz Gerry M | Iphone application disguiser |
CN103763091A (en) * | 2014-01-09 | 2014-04-30 | 深圳市欧珀通信软件有限公司 | Encrypting method, decrypting method, encrypting device and decrypting device of application program |
CN104318145A (en) * | 2014-09-26 | 2015-01-28 | 来安县新元机电设备设计有限公司 | Method and system for privacy protection |
CN105760737A (en) * | 2016-02-23 | 2016-07-13 | 深圳市金立通信设备有限公司 | Control method for applications and terminal |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107315947A (en) * | 2017-06-20 | 2017-11-03 | 广东欧珀移动通信有限公司 | Pay class application management method, device and mobile terminal |
CN109145583A (en) * | 2018-07-27 | 2019-01-04 | 奇酷互联网络科技(深圳)有限公司 | Using unlocking method, system, mobile terminal and storage medium |
CN111324888A (en) * | 2018-12-13 | 2020-06-23 | 北京奇虎科技有限公司 | Verification method and device during application program starting, electronic equipment and storage medium |
CN111324888B (en) * | 2018-12-13 | 2024-05-10 | 北京奇虎科技有限公司 | Verification method and device for application program starting, electronic equipment and storage medium |
CN111753701A (en) * | 2020-06-18 | 2020-10-09 | 百度在线网络技术(北京)有限公司 | Violation detection method, device and equipment of application program and readable storage medium |
CN111753701B (en) * | 2020-06-18 | 2023-08-15 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and readable storage medium for detecting violation of application program |
CN113238691A (en) * | 2021-05-27 | 2021-08-10 | 维沃移动通信(杭州)有限公司 | Application icon management method and device and electronic equipment |
CN113238691B (en) * | 2021-05-27 | 2024-03-01 | 维沃移动通信(杭州)有限公司 | Application icon management method and device and electronic equipment |
CN114721762A (en) * | 2022-04-19 | 2022-07-08 | 杭州安司源科技有限公司 | Control method of application program |
CN116702184A (en) * | 2022-11-15 | 2023-09-05 | 荣耀终端有限公司 | Application starting method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106547590A (en) | The startup method of privacy application program and starter | |
CN110414268B (en) | Access control method, device, equipment and storage medium | |
CN110912938B (en) | Access verification method and device for network access terminal, storage medium and electronic equipment | |
CN112073400B (en) | Access control method, system, device and computing equipment | |
US7979532B2 (en) | Systems and methods for using an access point for testing multiple devices and using several consoles | |
US10719610B2 (en) | Generating security manifests for software components using binary static analysis | |
CN106778291B (en) | The partition method and isolating device of application program | |
CN106446632A (en) | Hide display starting device and hide display starting method for application programs | |
CN102215254A (en) | Securely providing session key information for user consent to remote management of a computer device | |
CN109040010A (en) | A kind of identifying code acquisition methods, device and terminal | |
WO2016109955A1 (en) | Software verifying method and device | |
US10587652B2 (en) | Generating false data for suspicious users | |
CN110119350A (en) | Software Development Kit test method, device and equipment and computer storage medium | |
CN105975333B (en) | The method and device of application program operation control | |
CN107122664B (en) | Safety protection method and device | |
CN114553571A (en) | Server management method and device, electronic equipment and storage medium | |
US20190236269A1 (en) | Detecting third party software elements | |
CN110830479B (en) | Multi-card-based one-key login method, device, equipment and storage medium | |
Kang et al. | A strengthening plan for enterprise information security based on cloud computing | |
CN106529297A (en) | Method and apparatus for obtaining application state information | |
De Carvalho et al. | Secure cloud storage service for detection of security violations | |
CN116415300A (en) | File protection method, device, equipment and medium based on eBPF | |
JP5828457B2 (en) | API execution control device and program | |
Dimitriadis et al. | Malevolent app pairs: an android permission overpassing scheme | |
CN113596600A (en) | Security management method, device, equipment and storage medium for live broadcast embedded program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170329 |