CN106547590A - The startup method of privacy application program and starter - Google Patents

The startup method of privacy application program and starter Download PDF

Info

Publication number
CN106547590A
CN106547590A CN201610957943.2A CN201610957943A CN106547590A CN 106547590 A CN106547590 A CN 106547590A CN 201610957943 A CN201610957943 A CN 201610957943A CN 106547590 A CN106547590 A CN 106547590A
Authority
CN
China
Prior art keywords
application program
privacy
interface
privacy application
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610957943.2A
Other languages
Chinese (zh)
Inventor
刘刚
纪纲
郭帅
陈佩翰
徐利军
郭宗赣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610957943.2A priority Critical patent/CN106547590A/en
Publication of CN106547590A publication Critical patent/CN106547590A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)
  • Stored Programmes (AREA)

Abstract

The invention provides the startup method and starter of a kind of privacy application program, the method includes:Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, the startup verification interface matched with application scenarios pointed by camouflage applications icon is shown;Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program user is taken pictures.In technical scheme, when the second people in addition to terminal use terminal screen in the case of unblock, the privacy application program is touched, the privacy application program can show that the startup matched with application scenarios pointed by camouflage applications icon verifies interface, so that second people cannot know the true content information of privacy application program, and second people not will be considered that the privacy application program is pretended and encrypted, to reach higher camouflage effectiveness.

Description

The startup method of privacy application program and starter
Technical field
The present invention relates to communication technical field, specifically, the present invention relates to a kind of startup method of privacy application program With a kind of starter of privacy application program.
Background technology
The Internet has had been introduced into the epoch of maturation, and exchanging between network and user be increasingly taken seriously, and makes Intelligent mobile terminal is increasingly becoming the necessary article of most netizens, corresponding various application programs also meet the tendency of and It is raw.But as the shortcut icon and Apply Names of existing application program can typically be directly displayed at the main interface of mobile terminal In, anyone can pass through shortcut icon and Apply Names directly determines the type and content of application program, and accordingly, there exist should May be opened by other people with program and browse or operate and the safety issue of caused privacy of user leakage.
In the prior art, it is the problems of above-mentioned in order to solve, generally using by mobile terminal operating system Arrange the mode of password to prevent malice from using and check the application program of mobile terminal, so as to protect the secret of application program Property;But if mobile terminal is in released state, application program is constantly exposed in its main interface, if now mobile terminal Got by other people, then the personal secrets of the application program that still there is a problem of ensureing mobile terminal.
The content of the invention
It is to overcome above-mentioned technical problem or solving above-mentioned technical problem at least in part, special to propose technical scheme below:
Embodiments of the invention propose a kind of startup method of privacy application program, including:
Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, is shown and camouflage applications figure The startup verification interface that application scenarios pointed by mark match;
Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;
When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program user is carried out Take pictures.
Preferably, the method also includes:When encrypted message is verified successfully, start privacy application program.
Preferably, the method also includes:Receive establishment touching for the privacy application program of arbitrary native applications program Send out operation, there is provided multiple optional camouflage applications icons;
Based on the user for receiving for the camouflage applications icon of native applications program selecting, create for native applications journey The privacy application program of sequence.
Preferably, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;
Wherein, the method also includes:Operational order in response to starting privacy application program, runs privacy application program;
When privacy application program performs corresponding operation operation by calling system resource needed for which, by privacy application journey The operation bag name of sequence is revised as the operation bag name of native applications program;
By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform privacy application program Corresponding operation operation.
Preferably, when privacy application program performs corresponding operation operation by calling system resource needed for which, will be hidden The operation bag name of private application program is revised as the operation bag name of native applications program, including:
The process of privacy application program is monitored by Hook Function, to link up with privacy application call system money The resource name in source;
In the preset interface of calling system resource, the operation bag name of privacy application program is revised as into native applications program Operation bag name.
Preferably, the method also includes:The photo got by application program of taking pictures is preserved to local, and sends photograph Piece is preserved to the webserver.
Preferably, pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.
Preferably, application scenarios pointed by camouflage applications icon include calculator application scene, radio application scene, At least one in figure application scenarios, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios It is file search inputting interface to start verification interface.
Another embodiment of the present invention proposes a kind of hiding display starter of application program, including:
Interface display module, grasps for detecting triggering of the user to the camouflage applications icon of arbitrary privacy application program Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon;
Encrypted message receiver module, for receive user by starting the encrypted message that verification interface is input into, and to receiving To encrypted message verified;
First check results performing module, for when encrypted message verifies the continuous frequency of failure and is more than predetermined threshold, opening Dynamic taking pictures and is taken pictures to user at application program.
Preferably, the device also includes:Second check results performing module, for when encrypted message is verified successfully, opening Dynamic privacy application program.
Preferably, the device also includes:Camouflage applications icon provide module, for receive create for it is arbitrary it is primary should With the trigger action of the privacy application program of program, there is provided multiple optional camouflage applications icons;
Privacy application program creation module, for being answered for the camouflage of native applications program selecting based on the user for receiving With icon, the privacy application program for native applications program is created.
Preferably, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;
Wherein, the device also includes:Privacy application program runs module, for the behaviour in response to starting privacy application program Instruct, run privacy application program;
Operation bag modified module, for performing corresponding run by calling system resource needed for which when privacy application program During operation, the operation bag name of privacy application program is revised as into the operation bag name of native applications program;
System resource allocation module, for required system resource allocation to modification to be run the privacy application journey of Bao Minghou Sequence, to perform the corresponding operation operation of privacy application program.
Preferably, bag modified module is run, including:Process monitoring unit, for passing through Hook Function to privacy application journey The process of sequence is monitored, to link up with the resource name of privacy application call system resource;
Operation is guaranteed the repair free of charge and changes unit, in the preset interface of calling system resource, by the operation bag of privacy application program Name is revised as the operation bag name of native applications program.
Preferably, the device also includes:Preserving module, for by the photo got by application program of taking pictures preserve to Locally, and send photo and preserved to the webserver.
Preferably, pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.
Preferably, application scenarios pointed by camouflage applications icon include calculator application scene, radio application scene, At least one in figure application scenarios, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios It is file search inputting interface to start verification interface.
In technical scheme, detect triggering of the user to the camouflage applications icon of arbitrary privacy application program and grasp Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon, when the in addition to terminal use Two people terminal unit screen in the case of unblock, touched the privacy application program, the privacy application program can show Interface is verified with the startup that application scenarios pointed by camouflage applications icon match so that second people cannot know privacy application The true content information of program, and second people not will be considered that the privacy application program is pretended and encrypted, with reach compared with High camouflage effectiveness;Further, it is even if second people has known that the privacy application program is pretended, correct getting Startup verification interface password in the case of, can not still enter into the privacy application program, realize in terminal unit Comprehensive camouflage in screen to application program;When second people is attempted into the privacy application program by verifying interface, and school The continuous frequency of failure is tested more than predetermined threshold, then can start application program of taking pictures, with the complexion image of second people that takes pictures, with Ensure the identity of terminal use's can be known second people.The present invention can be with the case of the unlocking screen of terminal unit, still Ensure that privacy application program, for the stronger privacy of user, prevents application program not by the second people institute in addition to terminal use Use, so as to effectively protect the personal secrets of user data in application program so that the Experience Degree of user is improved.
The additional aspect of the present invention and advantage will be set forth in part in the description, and these will become from the following description Obtain substantially, or recognized by the practice of the present invention.
Description of the drawings
Of the invention above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments It is substantially and easy to understand, wherein:
Schematic flow sheets of the Fig. 1 for the startup method of the privacy application program of one embodiment of the invention;
Schematic flow sheets of the Fig. 2 for the establishment privacy application program of a preferred embodiment of the present invention;
Fig. 3 is that the flow process of the operation operation of the execution privacy application program of another preferred embodiment of the present invention is illustrated Figure;
Fig. 4 is that the operation bag name of the privacy application program of another preferred embodiment of the present invention is revised as native applications journey The schematic flow sheet of the operation bag name of sequence;
Structural framing schematic diagrams of the Fig. 5 for the starter of the privacy application program of an alternative embodiment of the invention;
Fig. 6 is the privacy application program with establishment privacy function of application of a preferred embodiment of the present invention The structural framing schematic diagram of starter;
Fig. 7 is another preferred embodiment of the present invention with the hidden of the operation operating function for performing privacy application program The structural framing schematic diagram of the starter of private application program;
Fig. 8 is the structural framing schematic diagram of the operation bag modified module of another preferred embodiment of the present invention.
Specific embodiment
Embodiments of the invention are described below in detail, the example of the embodiment is shown in the drawings, wherein from start to finish Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " It is individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that arranging used in the description of the present invention Diction " including " refers to there is the feature, integer, step, operation, element and/or component, but it is not excluded that existing or adding One or more other features, integer, step, operation, element, component and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connection or wireless coupling.It is used herein to arrange Diction "and/or" includes the one or more associated wholes or any cell of listing item and all combinations.
Those skilled in the art of the present technique are appreciated that unless otherwise defined all terms used herein (include technology art Language and scientific terminology), with art of the present invention in those of ordinary skill general understanding identical meaning.Should also It is understood by, those terms defined in such as general dictionary, it should be understood that with the context with prior art The consistent meaning of meaning, and unless by specific definitions as here, will not otherwise use idealization or excessively formal implication To explain.
It should be noted that the embodiment of the present invention is realized based on mobile terminal operating system, mobile terminal operation system System is the operating system based on (SuSE) Linux OS freedom and open source code, for example, android system.
Schematic flow sheets of the Fig. 1 for the startup method of the privacy application program of one embodiment of the invention.
Step S101:Detect trigger action of the user to the camouflage applications icon of arbitrary privacy application program, show with The startup verification interface that application scenarios pointed by camouflage applications icon match;Step S102:Receive user is by starting verification The encrypted message of interface input, and the encrypted message to receiving verifies;Step S103:Lose when encrypted message verification is continuous When losing number of times more than predetermined threshold, startup is taken pictures and application program user is taken pictures.
In technical scheme, detect triggering of the user to the camouflage applications icon of arbitrary privacy application program and grasp Make, show the startup verification interface matched with application scenarios pointed by camouflage applications icon, when the in addition to terminal use Two people terminal unit screen in the case of unblock, touched the privacy application program, the privacy application program can show Interface is verified with the startup that application scenarios pointed by camouflage applications icon match so that second people cannot know privacy application The true content information of program, and second people not will be considered that the privacy application program is pretended and encrypted, with reach compared with High camouflage effectiveness;Further, it is even if second people has known that the privacy application program is pretended, correct getting Startup verification interface password in the case of, can not still enter into the privacy application program, realize in terminal unit Comprehensive camouflage in screen to application program;When second people is attempted into the privacy application program by verifying interface, and school The continuous frequency of failure is tested more than predetermined threshold, then can start application program of taking pictures, with the complexion image of second people that takes pictures, with Ensure the identity of terminal use's can be known second people.The present invention can be with the case of the unlocking screen of terminal unit, still Ensure that privacy application program, for the stronger privacy of user, prevents application program not by the second people institute in addition to terminal use Use, so as to effectively protect the personal secrets of user data in application program so that the Experience Degree of user is improved.
It is described further below for implementing for each step:
Step S101:Detect trigger action of the user to the camouflage applications icon of arbitrary privacy application program, show with The startup verification interface that application scenarios pointed by camouflage applications icon match.
Specifically, application scenarios pointed by camouflage applications icon include:Calculator application scene, radio application scene, At least one in map application scene, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios It is file search inputting interface to start verification interface.
For example, user clicks on the camouflage applications of the privacy application program " Tencent QQ " shown in the user interface of mobile terminal Icon, Source Music icon;And show that the startup matched with radio application scene verifies interface, as radio input Interface.
Pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.Such as, application program For instant messaging application program, its application scenarios is chat application scene, but its camouflage applications icon is computer icon, with meter The startup verification interface that calculation device application scenarios match is computer inputting interface.
It should be noted that when the second people of non-end-user is in the case of mobile terminal screen unblock, it is seen that mobile During the camouflage applications icon of the privacy application program in terminal in the user interface of screen display, not will be considered that the application program is The privacy application program for having pretended, so as to avoid the real information of the privacy application program from being obtained by the second people of non-end-user Situation about knowing occurs, and realizes the first secret protection again to the application program.
When the second people of non-end-user is in the case of mobile terminal screen unblock, it is not intended to or maliciously click on mobile whole During the privacy application program pretended in the user interface of screen display in end, as its camouflage applications icon verifies boundary with starting The Perfect Matchings in face so that the second people of non-end-user not will be considered that the privacy application program is pretended and encrypted, from And the privacy application program is exited, to reach more perfect camouflage effectiveness and the safeguard protection to the privacy application program, realize The second secret protection again to the privacy application program.
Step S102:Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving Verified.
Wherein, encrypted message is included but is not limited to:The computing formula matched with computer inputting interface and radio frequency The radio reception channel that road selection interface matches, searches for the location finding title that inputting interface matches with geographical position;With file The file search title that the file search inputting interface of management application scenarios matches;It is input into the number of degrees of compass applications scene The direction number of degrees that interface matches;The file search title matched with the file search inputting interface of cloud disk application scenarios.
For example, user is to input corresponding password on computer inputting interface verification interface is started:“2+3”;User exists It is to input corresponding password in radio channels selection interface to start verification interface:“103.7”;User verifies interface in startup Corresponding password is input on geographical position search inputting interface:" 40, Dongcheng District east ";In file management application scene, user It is to input corresponding password on file search inputting interface verification interface is started:" picture ";User verifies interface in startup Corresponding password is input on number of degrees inputting interface:“76.5”;In cloud disk application scenarios, user is searched for file at startup verification interface Corresponding password is input on rope inputting interface:" film ".
Step S103:When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup takes pictures application program simultaneously User is taken pictures.
Specifically, if user starts on verification interface the encrypted message that is input into and preset encrypted message not phase in input Together, then encrypted message verification is unsuccessful, exits the privacy application program;It is input on verification interface when user starts in input simultaneously Encrypted message it is double with preset encrypted message when differing, startup is taken pictures application program, and user is taken pictures simultaneously Exit the privacy application program.When the second people of non-end-user is in the case of mobile terminal screen unblock, malice or unintentionally point When hitting the hide application program, even if second people has known that the privacy application program is pretended, but the privacy application program Cipher mode still can effectively protect the personal secrets of user, prevent the privacy of user to be compromised, to the privacy application Program realizes triple secret protections;And in the checking password of the double input error of the second people, can take this second The photo of people, to inform terminal use.
Specifically, the method also includes:When encrypted message is verified successfully, start privacy application program.
When user starts the encrypted message and preset message in cipher being input on verification interface in the input of privacy application program Manner of breathing is same, then encrypted message is verified successfully, starts the privacy application program.
Specifically, as shown in Fig. 2 the method also includes:Step 201:Establishment is received for arbitrary native applications program Privacy application program trigger action, there is provided multiple optional camouflage applications icons;Step 202:Based on the user for receiving For the camouflage applications icon of native applications program selecting, the privacy application program for native applications program is created.
It should be noted that user is after the camouflage applications icon for selecting privacy application program, the camouflage applications icon Corresponding camouflage applications title also determines that e.g., the corresponding camouflage applications of " computer " camouflage applications icon are entitled therewith " computer ".While privacy application program is created, its camouflage applications icon and camouflage applications title are also created therewith;And by In when the camouflage applications icon and camouflage applications title are created on user's desktop, terminal Android system authority need to be obtained, And the process of acquisition terminal Android system authority is complex;Therefore in the preferred embodiment, terminal can not obtained In the case of Android system authority, camouflage applications icon and camouflage applications title are created and is being covered on user's desktop Preset user interface on.Activity component or user circle of the preset user interface by terminal android system Face Core Generator is created.Wherein, entered by the Activity components or user interface Core Generator of terminal android system Row creates the preset user interface, belongs to the more ripe technology of this area, and those skilled in the art should be pre- Expect the technology contents, just repeat no more herein.
Specifically, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;Such as Shown in Fig. 3, the method also includes:Step S301:Operational order in response to starting privacy application program, runs privacy application journey Sequence;Step S302:When privacy application program performs corresponding operation operation by calling system resource needed for which, should by privacy The operation bag name of native applications program is revised as with the operation bag name of program;Step S303:By required system resource allocation to repairing Change the privacy application program of operation Bao Minghou, to perform the corresponding operation operation of privacy application program.
Wherein, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed.For example, In terminal unit, operation bag name " com.tencent.mobileqq " and the privacy application journey of native applications program " Tencent QQ " Operation bag name " com.tencent.mobileqq.1 " of sequence " Tencent QQ " is different.
Step S301:Operational order in response to starting privacy application program, runs privacy application program.
Specifically, in terminal unit, the operational order in response to starting privacy application program runs privacy application journey Sequence, wherein, the operation bag name of privacy application program is different from the operation bag name of native applications program, privacy application program with it is primary Application program can be run in terminal unit simultaneously, and the corresponding native applications program of privacy application program reads identical System is readable and system read-only file.
Android operation system has which to be different from the principle of other operating systems, and Android provides four big groups for developer Part, refers specifically to the components such as Activity, Service, Broadcast Receiver and Content Provider. Android application programs are supplied to user to be installed in the form of APK installation kits, in APK installation kits, with for encapsulating reality Show the classes.dex code files of the program code of each component and for each component used by Expression and Application program The Androidmanifest.xml configuration files of the content such as log-on message and authority application information.
Management of the Android to process, in units of wrapping name, the unique bag name of each application assigned one, due to The installation process of application program is exactly PackageManagerService (PMS) parsing Androidmanifest.xml files Process, and the bag name of privacy application program is different from the bag name of native applications program in the present invention, therefore, when locally having installed original In the case of raw application program, privacy application program also can be arranged on local simultaneously, realize passing through ActivityManagerService (AMS) normally runs privacy application program.In Android operation system, PMS mainly bears Blame all apk to system to be managed, manage the components such as such as Activiey, Service therein, parse wherein from apk Component, after being saved in dependency structure, related interface polls system mounting assembly can be passed through, the installation of apk, unloading, Deletion is all responsible for by PMS.In Android operation system, AMS is applied not only to manage all program process The life cycle of Activity, it also manages Service, Broadcast Receiver and Content of system simultaneously The components such as Provider, the mode for starting an Activity in the application are included by calling startActivity side Method starts the Activity that specifies and clicks the icon of an application program to start new Activity etc..
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect The operation of the icon of privacy application program " Tencent QQ ", operation privacy application program " Tencent QQ " are double-clicked to user;Wherein, privacy The operation bag name of application program " Tencent QQ ", such as " com.tencent.mobileqq.1 ", different from native applications program " Tengxun The operation bag name of QQ ", such as " com.tencent.mobileqq ", privacy application program " Tencent QQ " " is risen with native applications program News QQ " can be run in terminal unit simultaneously, and privacy application program " Tencent QQ " is shared with native applications program " Tencent QQ " The system readable documents and system of the system readable documents and the read-only file of system of terminal unit, wherein terminal unit What read-only file included Activity, Service, Broadcast Receiver, Content Provider and PMS etc. can Reading, read-only file.
Step S302:When privacy application program performs corresponding operation operation by calling system resource needed for which, will The operation bag name of privacy application program is revised as the operation bag name of native applications program.
Specifically, when privacy application program " Tencent QQ " performs corresponding operation operation by calling system resource needed for which When, the corresponding native applications program " Tencent QQ " of operation bag entitled " com.tencent.mobileqq.1 " of privacy application program Operation bag entitled " com.tencent.mobileqq ", by the operation bag name of privacy application program " Tencent QQ " " com.tencent.mobileqq.1 " is revised as the operation bag name of native applications program " Tencent QQ " “com.tencent.mobileqq”。
As shown in figure 4, when privacy application program performs corresponding operation operation by calling system resource needed for which, will The step of operation bag name of privacy application program is revised as the operation bag name of native applications program, including:Step S401:By hook Subfunction is monitored to the process of privacy application program, to link up with the resource name of privacy application call system resource; Step S402:In the preset interface of calling system resource, the operation bag name of privacy application program is revised as into native applications journey The operation bag name of sequence.
Wherein, the preset interface of calling system resource, including but not limited to calls following any one and privacy application program Between interactive interface:Activity components;Service components;Broadcast Receiver components;Content Provider components;NotifyServer middlewares.
Need exist for illustrate be:Term " hook " is covered for by intercepting the function transmitted between component software Call, message or event to be changing or increase the technology of the behavior of operating system, application program or other software component.And locate The code for managing this intercepted function call, event or message is thus referred to as hook hook functions.Hook is generally used for various Target, including being debugged to function and be extended to function.Its example can be included in keyboard or mouse event is delivered to Them are intercepted before application program, or hooking system service call (system call) or system function behavior, function are performed As a result etc., to monitor or change function of application program or other assemblies etc..The present embodiment can adopt hook hook functions System resource needed for adapter privacy application program run time call performs corresponding operation operation, it should be noted that this System resource needed for bright middle adapter privacy application program run time call performs corresponding operation operation and is not limited to by hook The mode of sub- hook functions is realized.
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect The operation of the icon of privacy application program " Tencent QQ " is double-clicked to user, privacy application program " Tencent QQ " is run, wherein, privacy Operation bag name " com.tencent.mobileqq.1 " of application program " Tencent QQ " is different from native applications program " Tencent QQ " Operation bag name " com.tencent.mobileqq ", in the running of native applications program " Tencent QQ ", by hook The process of the privacy application program " Tencent QQ " that function pair has been created is monitored, when privacy application program " Tencent QQ " request is adjusted When using resource, Hook Function can link up with the resource name that privacy application program " Tencent QQ " calls resource, obtain privacy application journey It is the start Activity methods in Activity components that sequence " Tencent QQ " calls the resource name of resource;Subsequently by default The interface for calling Activity component resources and Activity components carry out data interaction, during data interaction, will Operation bag name " com.tencent.mobileqq.1 " of privacy application program " Tencent QQ " is revised as “com.tencent.mobileqq”。
Step S303:By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform privacy The corresponding operation operation of application program.
Specifically, by required system resource allocation to the privacy application program for changing operation Bao Minghou, should to perform privacy With the operation of system resource needed for routine call.
For example, example is connected, by the system Activity resource needed for privacy application program " Tencent QQ " according to privacy application The bag status of program " Tencent QQ " is assigned to privacy application program " Tencent QQ ", and now the bag of privacy application program " Tencent QQ " is entitled " com.tencent.mobileqq ", subsequently performs the corresponding operation operation of privacy application program " Tencent QQ ".
Specifically, the method also includes:The photo got by application program of taking pictures is preserved to local, and sends photograph Piece is preserved to the webserver.
For example, when user or non-end-user the second people input start on verification interface the encrypted message that is input into it is pre- The encrypted message put is double when differing, and startup is taken pictures application program, and user or second people are taken pictures, and should Photo is preserved into picture file, and the photo upload is preserved to the cloud disk webserver, for terminal use couple The complexion image repeatedly attempted into second people of privacy application program is checked, to know the identity of second people.
Structural framing schematic diagrams of the Fig. 5 for the starter of the privacy application program of an alternative embodiment of the invention.
Interface display module 501, detects trigger action of the user to the camouflage applications icon of arbitrary privacy application program, Show the startup verification interface matched with application scenarios pointed by camouflage applications icon;Encrypted message receiver module 502, receives User is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;First check results Performing module 503, when encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures application program to user Taken pictures.
It is described further below for implementing for modules:
Interface display module 501, detects trigger action of the user to the camouflage applications icon of arbitrary privacy application program, Show the startup verification interface matched with application scenarios pointed by camouflage applications icon.
Specifically, application scenarios pointed by camouflage applications icon include:Calculator application scene, radio application scene, At least one in map application scene, file management application scene, compass applications scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;Should with radio It is channel selection interface that interface is verified with the startup that scene matches;Interface is verified with the startup that map application scene matches is Inputting interface is searched in geographical position;It is that file search is input into boundary that interface is verified with the startup that file management application scene matches Face;It is number of degrees inputting interface that interface is verified with the startup that compass applications scene matches;Match with cloud disk application scenarios It is file search inputting interface to start verification interface.
For example, user clicks on the camouflage applications of the privacy application program " Tencent QQ " shown in the user interface of mobile terminal Icon, Source Music icon;And show that the startup matched with radio application scene verifies interface, as radio input Interface.
Pointed by camouflage applications icon, application scenarios are uncorrelated to the application scenarios of privacy application program.Such as, application program For instant messaging application program, its application scenarios is chat application scene, but its camouflage applications icon is computer icon, with meter The startup verification interface that calculation device application scenarios match is computer inputting interface.
It should be noted that when the second people of non-end-user is in the case of mobile terminal screen unblock, it is seen that mobile During the camouflage applications icon of the privacy application program in terminal in the user interface of screen display, not will be considered that the application program is The privacy application program for having pretended, so as to avoid the real information of the privacy application program from being obtained by the second people of non-end-user Situation about knowing occurs, and realizes the first secret protection again to the application program.
When the second people of non-end-user is in the case of mobile terminal screen unblock, it is not intended to or maliciously click on mobile whole During the privacy application program pretended in the user interface of screen display in end, as its camouflage applications icon verifies boundary with starting The Perfect Matchings in face so that the second people of non-end-user not will be considered that the privacy application program is pretended and encrypted, from And the privacy application program is exited, to reach more perfect camouflage effectiveness and the safeguard protection to the privacy application program, realize The second secret protection again to the privacy application program.
Encrypted message receiver module 502, receive user verify the encrypted message of interface input by starting, and to receiving Encrypted message verified.
Wherein, encrypted message is included but is not limited to:The computing formula matched with computer inputting interface and radio frequency The radio reception channel that road selection interface matches, searches for the location finding title that inputting interface matches with geographical position;With file The file search title that the file search inputting interface of management application scenarios matches;It is input into the number of degrees of compass applications scene The direction number of degrees that interface matches;The file search title matched with the file search inputting interface of cloud disk application scenarios.
For example, user is to input corresponding password on computer inputting interface verification interface is started:“2+3”;User exists It is to input corresponding password in radio channels selection interface to start verification interface:“103.7”;User verifies interface in startup Corresponding password is input on geographical position search inputting interface:" 40, Dongcheng District east ";In file management application scene, user It is to input corresponding password on file search inputting interface verification interface is started:" picture ";User verifies interface in startup Corresponding password is input on number of degrees inputting interface:“76.5”;In cloud disk application scenarios, user is searched for file at startup verification interface Corresponding password is input on rope inputting interface:" film ".
First check results performing module 503, when encrypted message verifies the continuous frequency of failure is more than predetermined threshold, starts Take pictures and application program user is taken pictures.
Specifically, if user starts on verification interface the encrypted message that is input into and preset encrypted message not phase in input Together, then encrypted message verification is unsuccessful, exits the privacy application program;It is input on verification interface when user starts in input simultaneously Encrypted message it is double with preset encrypted message when differing, the first check results performing module 503 starts that take pictures should With program, the privacy application program is taken pictures and is exited to user.When the second people of non-end-user is in mobile terminal screen In the case of unblock, malice or when being not intended to click on the hide application program, even if second people has known the privacy application program Pretended, but the cipher mode of the privacy application program still can effectively be protected the personal secrets of user, prevent user's Privacy is compromised, and realizes triple secret protections to the privacy application program;And in the double input error of the second people During checking password, the photo of second people can be taken, to inform terminal use.
Specifically, as shown in fig. 6, the device also includes:Camouflage applications icon provides module 601, receives establishment and is directed to The trigger action of the privacy application program of arbitrary native applications program, there is provided multiple optional camouflage applications icons;Privacy application Program creation module 602, based on the user for receiving for the camouflage applications icon of native applications program selecting, creates for original The privacy application program of raw application program.
It should be noted that user is after the camouflage applications icon for selecting privacy application program, the camouflage applications icon Corresponding camouflage applications title also determines that e.g., the corresponding camouflage applications of " computer " camouflage applications icon are entitled therewith " computer ".While privacy application program is created, its camouflage applications icon and camouflage applications title are also created therewith;And by In when the camouflage applications icon and camouflage applications title are created on user's desktop, terminal Android system authority need to be obtained, And the process of acquisition terminal Android system authority is complex;Therefore in the preferred embodiment, terminal can not obtained In the case of Android system authority, camouflage applications icon and camouflage applications title are created and is being covered on user's desktop Preset user interface on.Activity component or user circle of the preset user interface by terminal android system Face Core Generator is created.Wherein, entered by the Activity components or user interface Core Generator of terminal android system Row creates the preset user interface, belongs to the more ripe technology of this area, and those skilled in the art should be pre- Expect the technology contents, just repeat no more herein.
Specifically, as shown in fig. 7, the device also includes:Second check results performing module 701, when encrypted message is verified When successful, start privacy application program.
When user starts the encrypted message and preset message in cipher being input on verification interface in the input of privacy application program Manner of breathing is same, then encrypted message is verified successfully, and the second check results performing module starts the privacy application program.
Specifically, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed;Such as Shown in Fig. 7, the device also includes:Privacy application program runs module 702, and the operation in response to starting privacy application program refers to Order, runs privacy application program;Operation bag modified module 703, when privacy application program is held by calling system resource needed for which When the corresponding operation of row is operated, the operation bag name of privacy application program is revised as into the operation bag name of native applications program;System Resource distribution module 704, by required system resource allocation to the privacy application program for changing operation Bao Minghou, should to perform privacy With the corresponding operation operation of program.
Wherein, the operation bag name of the corresponding privacy application programs of operation Bao Mingyu of native applications program is differed.For example, In terminal unit, operation bag name " com.tencent.mobileqq " and the privacy application journey of native applications program " Tencent QQ " Operation bag name " com.tencent.mobileqq.1 " of sequence " Tencent QQ " is different.
Privacy application program runs module 702, the operational order in response to starting privacy application program, runs privacy application Program.
Specifically, in terminal unit, privacy application program runs module 702 in response to starting the behaviour of privacy application program Instruct, run privacy application program, wherein, the operation bag name of privacy application program is different from the operation bag of native applications program Name, privacy application program can be run in terminal unit simultaneously with native applications program, and privacy application program is corresponding Native applications program reads that identical system is readable and system read-only file.
Android operation system has which to be different from the principle of other operating systems, and Android provides four big groups for developer Part, refers specifically to the components such as Activity, Service, Broadcast Receiver and Content Provider. Android application programs are supplied to user to be installed in the form of APK installation kits, in APK installation kits, with for encapsulating reality Show the classes.dex code files of the program code of each component and for each component used by Expression and Application program The Androidmanifest.xml configuration files of the content such as log-on message and authority application information.
Management of the Android to process, in units of wrapping name, the unique bag name of each application assigned one, due to The installation process of application program is exactly PackageManagerService (PMS) parsing Androidmanifest.xml files Process, and the bag name of privacy application program is different from the bag name of native applications program in the present invention, therefore, when locally having installed original In the case of raw application program, privacy application program also can be arranged on local simultaneously, realize passing through ActivityManagerService (AMS) normally runs privacy application program.In Android operation system, PMS mainly bears Blame all apk to system to be managed, manage the components such as such as Activiey, Service therein, parse wherein from apk Component, after being saved in dependency structure, related interface polls system mounting assembly can be passed through, the installation of apk, unloading, Deletion is all responsible for by PMS.In Android operation system, AMS is applied not only to manage all program process The life cycle of Activity, it also manages Service, Broadcast Receiver and Content of system simultaneously The components such as Provider, the mode for starting an Activity in the application are included by calling startActivity side Method starts the Activity that specifies and clicks the icon of an application program to start new Activity etc..
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect The operation of the icon of privacy application program " Tencent QQ ", operation privacy application program " Tencent QQ " are double-clicked to user;Wherein, privacy The operation bag name of application program " Tencent QQ ", such as " com.tencent.mobileqq.1 ", different from native applications program " Tengxun The operation bag name of QQ ", such as " com.tencent.mobileqq ", privacy application program " Tencent QQ " " is risen with native applications program News QQ " can be run in terminal unit simultaneously, and privacy application program " Tencent QQ " is shared with native applications program " Tencent QQ " The system readable documents and system of the system readable documents and the read-only file of system of terminal unit, wherein terminal unit What read-only file included Activity, Service, Broadcast Receiver, Content Provider and PMS etc. can Reading, read-only file.
Operation bag modified module 703, when privacy application program performs corresponding operation by calling system resource needed for which During operation, the operation bag name of privacy application program is revised as into the operation bag name of native applications program.
Specifically, when privacy application program " Tencent QQ " performs corresponding operation operation by calling system resource needed for which When, the corresponding native applications program " Tencent QQ " of operation bag entitled " com.tencent.mobileqq.1 " of privacy application program Operation bag entitled " com.tencent.mobileqq ", by the operation bag name of privacy application program " Tencent QQ " " com.tencent.mobileqq.1 " is revised as the operation bag name of native applications program " Tencent QQ " “com.tencent.mobileqq”。
As shown in figure 8, operation bag modified module 703, including:Process monitoring unit 801, should to privacy by Hook Function It is monitored with the process of program, to link up with the resource name of privacy application call system resource;Operation is guaranteed the repair free of charge and changes unit 802, in the preset interface of calling system resource, the operation bag name of privacy application program is revised as into the fortune of native applications program Row bag name.
Wherein, the preset interface of calling system resource, including but not limited to calls following any one and privacy application program Between interactive interface:Activity components;Service components;Broadcast Receiver components;Content Provider components;NotifyServer middlewares.
Need exist for illustrate be:Term " hook " is covered for by intercepting the function transmitted between component software Call, message or event to be changing or increase the technology of the behavior of operating system, application program or other software component.And locate The code for managing this intercepted function call, event or message is thus referred to as hook hook functions.Hook is generally used for various Target, including being debugged to function and be extended to function.Its example can be included in keyboard or mouse event is delivered to Them are intercepted before application program, or hooking system service call (system call) or system function behavior, function are performed As a result etc., to monitor or change function of application program or other assemblies etc..The present embodiment can adopt hook hook functions System resource needed for adapter privacy application program run time call performs corresponding operation operation, it should be noted that this System resource needed for bright middle adapter privacy application program run time call performs corresponding operation operation and is not limited to by hook The mode of sub- hook functions is realized.
For example, in terminal unit, start the operational order of privacy application program " Tencent QQ " in response to user, such as detect The operation of the icon of privacy application program " Tencent QQ " is double-clicked to user, privacy application program " Tencent QQ " is run, wherein, privacy Operation bag name " com.tencent.mobileqq.1 " of application program " Tencent QQ " is different from native applications program " Tencent QQ " Operation bag name " com.tencent.mobileqq ", in the running of native applications program " Tencent QQ ", by hook The process of the privacy application program " Tencent QQ " that function pair has been created is monitored, when privacy application program " Tencent QQ " request is adjusted When using resource, Hook Function can link up with the resource name that privacy application program " Tencent QQ " calls resource, obtain privacy application journey It is the start Activity methods in Activity components that sequence " Tencent QQ " calls the resource name of resource;Subsequently by default The interface for calling Activity component resources and Activity components carry out data interaction, during data interaction, will Operation bag name " com.tencent.mobileqq.1 " of privacy application program " Tencent QQ " is revised as “com.tencent.mobileqq”。
System resource allocation module 704, by required system resource allocation to the privacy application program for changing operation Bao Minghou, To perform the corresponding operation operation of privacy application program.
For example, example is connected, by the system Activity resource needed for privacy application program " Tencent QQ " according to privacy application The bag status of program " Tencent QQ " is assigned to privacy application program " Tencent QQ ", and now the bag of privacy application program " Tencent QQ " is entitled " com.tencent.mobileqq ", subsequently performs the corresponding operation operation of privacy application program " Tencent QQ ".
Specifically, the device also includes:Preserving module, the photo got by application program of taking pictures is preserved to this Ground, and send photo and preserved to the webserver.For example, when the second people of user or non-end-user starts school in input When testing that the encrypted message being input on interface is double with preset encrypted message to be differed, startup is taken pictures application program, to Family or second people are taken pictures, and the photo is preserved into picture file, and by the photo upload to cloud disk network service Device is preserved, and the complexion image repeatedly attempted into second people of privacy application program is looked into for terminal use See, to know the identity of second people.
Those skilled in the art of the present technique are appreciated that the present invention includes being related to for performing in operation described herein One or more of equipment.These equipment can be for needed for purpose and specially design and manufacture, or can also include general Known device in computer.These equipment have the computer program being stored in which, and these computer programs are optionally Activation is reconstructed.During such computer program can be stored in equipment (for example, computer) computer-readable recording medium or it is stored in It is suitable to store and e-command is coupled in any kind of medium of bus respectively, the computer-readable medium is included but not Be limited to any kind of disk (include floppy disk, hard disk, CD, CD-ROM and magneto-optic disk), ROM (Read-Only Memory, only Read memorizer), RAM (Random Access Memory, immediately memorizer), EPROM (Erasable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically Erasable Programmable Read-Only Memory, EEPROM), flash memory, magnetic card or light line card Piece.It is, computer-readable recording medium include being stored in the form of it can read by equipment (for example, computer) or transmission information any Jie Matter.
Those skilled in the art of the present technique be appreciated that can be realized with computer program instructions these structure charts and/or The combination of each frame and these structure charts and/or block diagram and/or the frame in flow graph in block diagram and/or flow graph.This technology is led Field technique personnel be appreciated that can by these computer program instructions be supplied to general purpose computer, special purpose computer or other The processor of programmable data processing method realizing, so as to pass through the process of computer or other programmable data processing methods Device is performing the scheme specified in the frame or multiple frames of structure chart disclosed by the invention and/or block diagram and/or flow graph.
Various operations that those skilled in the art of the present technique had been discussed in being appreciated that the present invention, method, in flow process Step, measure, scheme can be replaced, changed, combined or deleted.Further, it is each with what is discussed in the present invention Kind of operation, method, other steps in flow process, measure, scheme can also be replaced, changed, reset, decomposed, combined or deleted. Further, it is of the prior art with the various operations disclosed in the present invention, method, flow process in step, measure, scheme Can also be replaced, changed, reset, decomposed, combined or deleted.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (10)

1. a kind of startup method of privacy application program, it is characterised in that include:
Trigger action of the user to the camouflage applications icon of arbitrary privacy application program is detected, is shown and the camouflage applications figure The startup verification interface that application scenarios pointed by mark match;
Receive user is by starting the encrypted message that verification interface is input into, and the encrypted message to receiving is verified;
When encrypted message verifies the continuous frequency of failure is more than predetermined threshold, startup is taken pictures and application program the user is carried out Take pictures.
2. method according to claim 1, it is characterised in that also include:
When encrypted message is verified successfully, start the privacy application program.
3. method according to claim 1 and 2, it is characterised in that also include:
Receive the trigger action for creating the privacy application program for arbitrary native applications program, there is provided multiple optional camouflages Application icon;
Based on the user for receiving for the native applications program selecting camouflage applications icon, create for it is described it is primary should With the privacy application program of program.
4. method according to claim 3, it is characterised in that the operation Bao Mingyu of the native applications program is hidden accordingly The operation bag name of private application program is differed;
Wherein, the method also includes:
Operational order in response to starting privacy application program, runs the privacy application program;
When the privacy application program performs corresponding operation operation by calling system resource needed for which, should by the privacy The operation bag name of the native applications program is revised as with the operation bag name of program;
By required system resource allocation to the privacy application program for changing operation Bao Minghou, to perform the privacy application journey The corresponding operation operation of sequence.
5. method according to claim 4, it is characterised in that when the privacy application program is by calling system needed for which When resource performs corresponding operation operation, the operation bag name of the privacy application program is revised as into the native applications program Operation bag name, including:
The process of the privacy application program is monitored by Hook Function, to link up with the privacy application call system The resource name of system resource;
In the preset interface of calling system resource, the operation bag name of the privacy application program is revised as into the native applications The operation bag name of program.
6. method according to claim 1, it is characterised in that also include:
The photo got by the application program of taking pictures is preserved to local, and sends photo and protected to the webserver Deposit.
7. the method according to any one of claim 1-6, it is characterised in that applied field pointed by the camouflage applications icon Scape is uncorrelated to the application scenarios of the privacy application program.
8. the method according to any one of claim 1-6, it is characterised in that applied field pointed by the camouflage applications icon Scape includes calculator application scene, radio application scene, map application scene, file management application scene, compass applications At least one in scene and cloud disk application scenarios;
Wherein, the startup verification interface for matching with calculator application scene is computer inputting interface;With radio application field The startup verification interface that scape matches is channel selection interface;Interface is verified for geography with the startup that map application scene matches Location finding inputting interface;It is file search inputting interface that interface is verified with the startup that file management application scene matches;With The startup verification interface that compass applications scene matches is number of degrees inputting interface;The startup school matched with cloud disk application scenarios Interface is tested for file search inputting interface.
9. the hiding display starter of a kind of application program, it is characterised in that include:
Interface display module, for detecting trigger action of the user to the camouflage applications icon of arbitrary privacy application program, shows Show that the startup matched with application scenarios pointed by the camouflage applications icon verifies interface;
Encrypted message receiver module, for receive user by starting the encrypted message of verification interface input, and to receiving Encrypted message is verified;
First check results performing module, for when encrypted message verifies the continuous frequency of failure and is more than predetermined threshold, starting and clapping Take pictures according to application program and to the user.
10. device according to claim 9, it is characterised in that also include:
Second check results performing module, for when encrypted message is verified successfully, starting the privacy application program.
CN201610957943.2A 2016-10-27 2016-10-27 The startup method of privacy application program and starter Pending CN106547590A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610957943.2A CN106547590A (en) 2016-10-27 2016-10-27 The startup method of privacy application program and starter

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610957943.2A CN106547590A (en) 2016-10-27 2016-10-27 The startup method of privacy application program and starter

Publications (1)

Publication Number Publication Date
CN106547590A true CN106547590A (en) 2017-03-29

Family

ID=58393310

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610957943.2A Pending CN106547590A (en) 2016-10-27 2016-10-27 The startup method of privacy application program and starter

Country Status (1)

Country Link
CN (1) CN106547590A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315947A (en) * 2017-06-20 2017-11-03 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN109145583A (en) * 2018-07-27 2019-01-04 奇酷互联网络科技(深圳)有限公司 Using unlocking method, system, mobile terminal and storage medium
CN111324888A (en) * 2018-12-13 2020-06-23 北京奇虎科技有限公司 Verification method and device during application program starting, electronic equipment and storage medium
CN111753701A (en) * 2020-06-18 2020-10-09 百度在线网络技术(北京)有限公司 Violation detection method, device and equipment of application program and readable storage medium
CN113238691A (en) * 2021-05-27 2021-08-10 维沃移动通信(杭州)有限公司 Application icon management method and device and electronic equipment
CN114721762A (en) * 2022-04-19 2022-07-08 杭州安司源科技有限公司 Control method of application program
CN116702184A (en) * 2022-11-15 2023-09-05 荣耀终端有限公司 Application starting method and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794844A (en) * 2005-12-29 2006-06-28 李志明 Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794844A (en) * 2005-12-29 2006-06-28 李志明 Method of realizing autometic hidden picture taking and transmitting color message for illegal using mobile phone
US20100223579A1 (en) * 2009-03-02 2010-09-02 Schwartz Gerry M Iphone application disguiser
CN103763091A (en) * 2014-01-09 2014-04-30 深圳市欧珀通信软件有限公司 Encrypting method, decrypting method, encrypting device and decrypting device of application program
CN104318145A (en) * 2014-09-26 2015-01-28 来安县新元机电设备设计有限公司 Method and system for privacy protection
CN105760737A (en) * 2016-02-23 2016-07-13 深圳市金立通信设备有限公司 Control method for applications and terminal

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107315947A (en) * 2017-06-20 2017-11-03 广东欧珀移动通信有限公司 Pay class application management method, device and mobile terminal
CN109145583A (en) * 2018-07-27 2019-01-04 奇酷互联网络科技(深圳)有限公司 Using unlocking method, system, mobile terminal and storage medium
CN111324888A (en) * 2018-12-13 2020-06-23 北京奇虎科技有限公司 Verification method and device during application program starting, electronic equipment and storage medium
CN111324888B (en) * 2018-12-13 2024-05-10 北京奇虎科技有限公司 Verification method and device for application program starting, electronic equipment and storage medium
CN111753701A (en) * 2020-06-18 2020-10-09 百度在线网络技术(北京)有限公司 Violation detection method, device and equipment of application program and readable storage medium
CN111753701B (en) * 2020-06-18 2023-08-15 百度在线网络技术(北京)有限公司 Method, device, equipment and readable storage medium for detecting violation of application program
CN113238691A (en) * 2021-05-27 2021-08-10 维沃移动通信(杭州)有限公司 Application icon management method and device and electronic equipment
CN113238691B (en) * 2021-05-27 2024-03-01 维沃移动通信(杭州)有限公司 Application icon management method and device and electronic equipment
CN114721762A (en) * 2022-04-19 2022-07-08 杭州安司源科技有限公司 Control method of application program
CN116702184A (en) * 2022-11-15 2023-09-05 荣耀终端有限公司 Application starting method and electronic equipment

Similar Documents

Publication Publication Date Title
CN106547590A (en) The startup method of privacy application program and starter
CN110414268B (en) Access control method, device, equipment and storage medium
CN110912938B (en) Access verification method and device for network access terminal, storage medium and electronic equipment
CN112073400B (en) Access control method, system, device and computing equipment
US7979532B2 (en) Systems and methods for using an access point for testing multiple devices and using several consoles
US10719610B2 (en) Generating security manifests for software components using binary static analysis
CN106778291B (en) The partition method and isolating device of application program
CN106446632A (en) Hide display starting device and hide display starting method for application programs
CN102215254A (en) Securely providing session key information for user consent to remote management of a computer device
CN109040010A (en) A kind of identifying code acquisition methods, device and terminal
WO2016109955A1 (en) Software verifying method and device
US10587652B2 (en) Generating false data for suspicious users
CN110119350A (en) Software Development Kit test method, device and equipment and computer storage medium
CN105975333B (en) The method and device of application program operation control
CN107122664B (en) Safety protection method and device
CN114553571A (en) Server management method and device, electronic equipment and storage medium
US20190236269A1 (en) Detecting third party software elements
CN110830479B (en) Multi-card-based one-key login method, device, equipment and storage medium
Kang et al. A strengthening plan for enterprise information security based on cloud computing
CN106529297A (en) Method and apparatus for obtaining application state information
De Carvalho et al. Secure cloud storage service for detection of security violations
CN116415300A (en) File protection method, device, equipment and medium based on eBPF
JP5828457B2 (en) API execution control device and program
Dimitriadis et al. Malevolent app pairs: an android permission overpassing scheme
CN113596600A (en) Security management method, device, equipment and storage medium for live broadcast embedded program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170329